CREDS: Cyber-security Research Ethics Dialog & Strategy
Date: Saturday, May 17, 2014
Website: www.caida.org/workshops/creds/1405
Workshop objectives and goals:
The future of online trust, innovation & self-regulation is threatened
by a widening gap between users’ expectations, formed by laws and norms,
and the capacity for great benefits and harms generated by technological
advances. As this gap widens, so too does ambiguity between asserted
rights and threats. How do we close this gap and thereby lower risks,
while also instilling trust in online activities? The solution embraces
fundamental principles of ethics to guide our decisions in the midst of
information uncertainty.
This workshop anchors off of discussions, themes, and momentum generated
from the inaugural CREDS 2013 workshop. Specifically, it targets the
shifting roles, responsibilities, and relationships between Researchers,
Ethical Review Boards, Government Agencies, Professional Societies, and
Program Committees in incentivizing and overseeing ethical research.
Its objective is to spawn dialogue and practicable solutions around the
following proposition: Building a more effective research ethics
culture is a prerequisite for balancing research innovation (i.e.,
academic freedom, reduced burdens and ambiguities) with public trust
(i.e., respect for privacy and confidentiality, accountability, data
quality), so we explore the pillars of such a culture as well as the
strategies that might be adopted to incorporate them into research
operations.
CREDS II invites case studies, research experience and position papers
that explore the following questions:
• What leadership should be engaged (i.e., institutional, government,
peer groups), and what should their respective roles and
responsibilities be?
• What education and awareness is needed?
• What information sharing/coordination needs to be improved: among
researchers, among oversight entities, and between researchers and
oversight entities?
• What knowledge and technology-transfer mechanisms can meet stated needs?
DUMA: 4th International Workshop on Data Usage Management
Date: Saturday, May 17, 2014
Website: https://sites.google.com/site/ieeespduma14
Workshop objectives and goals:
Data usage control generalizes access control to what happens to data in the future and after it has been
given away or accessed. Spanning the domains of privacy, the protection of intellectual property and compliance,
typical current requirements include "delete after thirty days," "don't delete within five years,"
"notify whenever data is given away," and "don't print." However, in the near future more general requirements
may include "do not use for employment purposes," "do not use for tracking," as well as "do not use to harm me in
any way." Major challenges in this field include policies, the relationship between end user actions and technical
events, tracking data across layers of abstraction and logical as well as physical systems, policy enforcement,
protection of the enforcement mechanisms and guarantees.
Following three successful events - the Dagstuhl Seminar on Distributed Usage Control, the W3C Privacy and
Data Usage Control Workshop, and the WWW 2012 Workshop on Data Usage Management on the Web - the goal of the
4th International Workshop on Data Usage Management is to discuss current technical developments in usage control
and, in particular, foster collaboration in the area of usage representation (policies is one mechanism),
provenance tracking, misuse identification, and distributed usage enforcement. Though enabling privacy
through careful and controlled dissemination of sensitive information is an obvious fallout of usage control,
this workshop is interested in understanding data usage control as a whole. The workshop is also interested in
discussing domain-specific solutions (which typically exist in semi-controlled environments) and their generalization
to more open environments such as the Web.
MoST: Mobile Security Technologies
Date: Saturday, May 17, 2014
Website: http://mostconf.org
Workshop objectives and goals:
With the development of new mobile platforms, such as Android and iOS, mobile computing has shown exponential growth in popularity in recent years.
To benefit from the availability of constantly-growing consumer base, new services and applications are being built from the composition of existing
ones at breakneck speed. This rapid growth has also been coupled with new security and privacy concerns and challenges. For instance, more and
more sensitive content is being collected and shared by third-party applications that, if misused, can have serious security and privacy repercussions.
Consequently, there is a growing need to study and address these new challenges.
The goal of the MoST workshop is to bring together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to
explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. The scope of MoST 2014
includes, but is not limited to, security and privacy specifically for mobile devices and services related to: Device hardware, Operating systems,
Middleware, Mobile web, Secure and efficient communication, Secure application development tools and practices, Privacy, Vulnerabilities and
remediation techniques, Usable security, Identity and access control, Risks in putting trust in the device vs. in the network/cloud, Special applications,
such as medical monitoring and records, Mobile advertisement, Secure applications and application markets, and Economic impact of security and
privacy technologies. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages).
IWCC: International Workshop on Cyber Crime
Date: Sunday, May 18, 2014
Website: http://stegano.net/IWCC2014/
Workshop objectives and goals:
Today's world's societies are becoming more and more dependent on open networks such as the Internet -
where commercial activities, business transactions and government services are realized. This has led to
the fast development of new cyber threats and numerous information security issues which are exploited by
cyber criminals. The inability to provide trusted secure services in contemporary computer network
technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover,
the frequently occurring international frauds impose the necessity to conduct the investigation of
facts spanning across multiple international borders. Such examination is often subject to different
jurisdictions and legal systems. A good illustration of the above being the Internet, which has made
it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct
their activities, and launch attacks with relative anonymity. The increased complexity of the
communications and the networking infrastructure is making investigation of the crimes difficult.
Traces of illegal digital activities are often buried in large volumes of data, which are hard to
inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene
functions like any other network, with dedicated administrators functioning as the first responders. This
poses new challenges for law enforcement policies and forces the computer societies to utilize digital
forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in
order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques
should keep pace with new technologies.
The aim of this workshop is to bring together the research accomplishments
provided by the researchers from academia and the industry. The other goal is
to show the latest research results in the field of digital forensics and to present
the development of tools and techniques which assist the investigation
process of potentially illegal cyber activity. We encourage prospective authors
to submit related distinguished research papers on the subject of both: theoretical approaches
and practical case reviews. The workshop will be accessible to both non-experts interested in
learning about this area and experts interesting in hearing about new research and approaches.
LangSec: A Workshop On Language Theoretic Security
Date: Sunday, May 18, 2014
Website: http://spw14.langsec.org
Workshop objectives and goals:
The LangSec workshop solicits contributions related to the growing
area of language--theoretic security. LangSec offers a coherent
explanation for the "science of insecurity" as more than an ad hoc
collection of software mistakes or design flaws. This explanation is
predicated on the connection between fundamental computability
principles and the continued existence of software flaws. LangSec
posits that the only path to trustworthy software that takes untrusted
inputs is treating all valid or expected inputs as a formal language
and treating the respective input-handling routines as a recognizer
for that language. The LangSec approach to system design is primarily
concerned with achieving practical assurance: development that is
rooted in fundamentally sound computability theory, but is expressed
as efficient and practical systems components. One major objective of
the workshop is to develop and share this viewpoint with attendees and
the broader systems security community to help establish a foundation
for research based on LangSec principles.
The overall goal of the workshop is to bring more clarity and focus to
two complementary areas: (1) practical software assurance and (2)
vulnerability analysis (identification, characterization, and exploit
development). The LangSec community views these activities as related
and highly structured engineering disciplines and seeks to provide a
forum to explore and develop this relationship.
WRIT: 2nd Workshop on Research for Insider Threat
Date: Sunday, May 18, 2014
Website: http://www.sei.cmu.edu/community/writ2014/
Workshop objectives and goals:
The threat of damage caused by authorized users, or insiders, is one of the most challenging security issues facing most organizations today.
Insiders often attack using authorized access and with actions very similar to non-malicious behavior. Modern insiders are further enabled by immense
data storage capabilities, advanced searching algorithms, and the difficulty of building, deploying, and managing comprehensive insider threat monitoring systems.
Furthermore, insider attacks can also include those unintentionally enabled by users who fall victim to external attacks such as phishing or drive-by downloads.
Cybersecurity professionals face significant challenges in preventing, detecting, and responding to insider attacks, and often turn to insider threat researchers
for answers. Unfortunately, insider threat researchers also face serious barriers to conducting scientifically and operationally valid work, such as access to
real-world data and ground-truth about malicious insider activity. Therefore, it is imperative that cybersecurity researchers and professionals work together to find solutions
that protect organizations from insider threats. Technical approaches to this problem are emerging, but studies show little significant progress has been made in
reducing the actual numbers or impacts of insider attacks. There are two main reasons for the relative lack of success in identifying insider threats:
- The problem is not well understood. In addition to the complex challenges surrounding collection, correlation, and detection of technical indicators, researchers
must also understand underlying human motivations and behaviors. This is not a traditional area of study for IT security researchers; configuring technical
solutions to monitor for human deception is challenging.
- Data on insider attacks is difficult to obtain-
- Ground truth data: Organizations suffering insider attacks are often reluctant to share data about those attacks publicly. Studies show over 70%
of attacks are not reported externally, including many of the most common, low-level attacks. This leads to uncertainty that available data accurately
represents the true nature of the problem.
- Baseline data: The rate of insider attacks is relatively unknown; furthermore, the behaviors of non-malicious users are also not available in large data sets.
WRIT will highlight the challenges and trends specific to the insider threat problem from multiple viewpoints, such as information technology, behavioral sciences, or criminology. Furthermore, the workshop will review emerging approaches and explore experimental possibilities for measuring the efficacy of proposed solutions. The workshop will be accessible to non-experts interested in learning about the insider threat problem as well as experts interested in learning about new research and approaches.
W2SP: Web 2.0 Security and Privacy
Date: Sunday, May 18, 2014
Website: http://w2spconf.com/2014/
Workshop objectives and goals:
W2SP brings together researchers, practitioners, web programmers, policy makers, and others
interested in the latest understanding and advances in the security and privacy of the web, browsers and
their eco-system. We have had seven years of successful W2SP workshops.
The scope of W2SP 2012 includes, but is not limited to: Trustworthy cloud-based services, privacy
and reputation in social networks, security and privacy as a service, usable security and privacy, security
for the mobile web, identity management and psuedonymity, web services/feeds/mashups, provenance and governance,
security and privacy policies for composable content, next-generation browser technology, secure extensions
and plug-ins, advertisement and affiliate fraud, measurement study for understanding web security and privacy.
We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). Authors are
encouraged to use the IEEE conference proceedings templates. W2SP will continue to be open-access: all papers
will be made available on the workshop website, and authors will not need to forfeit their copyright.