[PET] CfP - ACM Workshop on Information Sharing and Collaborative Security (WISCS 2015)

Sander, Tomas (HPL Princeton) tomas.sander at hp.com
Tue May 5 22:21:00 BST 2015


CALL FOR PAPERS

2nd ACM WORKSHOP ON INFORMATION SHARING AND COLLABORATIVE SECURITY (WISCS 2015)     
https://sites.google.com/site/wiscs2015/
Held in conjunction with 22nd ACM Conference on Computer and Communications Security (CCS), in Denver, Colorado, USA.  
Oct. 12, 2015

Sharing of cyber-security related information is believed to greatly enhance the ability of organizations to defend themselves against sophisticated attacks. If one organization detects a breach sharing associated security indicators (such as attacker IP addresses, domain names, file hashes etc.) provides valuable, actionable information to other organizations. The analysis of shared security data promises novel insights into emerging attacks. Sharing higher level intelligence about threat actors, the tools they use and mitigations provides defenders with much needed context for better preparing and responding to attacks. In the US and the EU major efforts are underway to strengthen information sharing. 

Yet, there are a number of technical and policy challenges to realizing this vision. Which information exactly should be shared? How can privacy and confidentiality be protected? How can we create high-fidelity intelligence from shared data that minimizes false positives?

The 2nd Workshop on Information Sharing and Collaborative Security (WISCS 2015) aims to bring together experts and practitioners from academia, industry and government to present innovative research, case studies, and legal and policy issues. The workshop solicits original research papers in these areas, both full and short papers. Workshop proceedings will be published in the ACM Digital Library. Topics of interest for the workshop include, but are not limited to:

   Collaborative intrusion detection
   Case studies of information sharing
   Domain name and IP address blacklists 
   Collaborative approaches to spear‐phishing, DDoS and other attacks
   Privacy and confidentiality
   Data deidentification
   Cryptographic protocols for collaborative security
   Scalable security analysis on shared data
   Ontologies and standards for sharing security data 
   UX and behavioral aspects of collaborating
   Policy and legal issues
   Surveillance issues 
   Trust models 
   Attacks on information sharing
   Economics of security collaboration

IMPORTANT DATES
Paper submission due:  June 8, 2015
Author notification:  July 19, 2015
Camera ready copies due:  July 29, 2015
Workshop:  October 12, 2015.  

STEERING COMMITTEE
Tomas Sander, HP
Richard Struse, DHS
Moti Yung, Columbia University and Google 

PROGRAM CO-CHAIRS
Tomas Sander, HP
Moti Yung, Columbia University and Google

PROGRAM COMMITTEE
Alessandro Acquisti, Carnegie Mellon University   
Ross Anderson, University of Cambridge
Matt Bishop, UC Davis
Sarah Brown, Fox-IT   
Jerry Bryant, Microsoft
Eric Burger, Georgetown University
Scott Coull, Redjack
James Dempsey, UC Berkeley
Julien Freudiger, PARC
Carol Fung, Virginia Commonwealth University    
Panos Kampanikis, CISCO  
Florian Kerschbaum, SAP   
Tom Millar, US CERT
Fabian Monrose, University of North Carolina     
Kathleen Moriarty, EMC
Eric Osterweil, Verisign
Christos Papadopoulos, Colorado State  University    
Ravi Sandhu, UT San Antonio
Oscar Serrano, NATO Communication and Information Agency   
Stuart Shapiro, MITRE   
Abhi Shelat, University of Virginia
Salvatore Stolfo, Columbia University
Jose Such, Lancaster University
Paul Vixie, Farsight Security    
Bulent Yener, Rensselaer Polytechnic Institute

PAPER SUBMISSIONS
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Regular submissions should be at most 10 pages in the ACM double-column format including bibliography, but excluding well-marked appendices, and at most 12 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Submissions should not be anonymized. The workshop will also consider short submissions of up to 4 pages for case studies, results that are preliminary or that require only a few pages to describe. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a short paper (4 proceedings pages).

Submissions are to be made to the Easy Chair submission web site at https://www.easychair.org/conferences/?conf=wiscs2015.  You will be requested to upload the file of your paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of June 8, 2015 to be considered. Notification of acceptance or rejection will be sent to authors by July 19, 2015. The camera ready version must be prepared by July 29, 2015 (firm). Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN. Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline.

CONTACT
Please contact the program co-chairs Tomas Sander and Moti Yung  (wiscs2015 at easychair.org) with any questions.


More information about the PET mailing list