lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 23 Jul 2013 10:46:29 +0200
From: Konrad Rieck <konrad.rieck@...-goettingen.de>
To: full-disclosure@...ts.grok.org.uk
Subject: CFP 6th ACM Workshop on Artificial Intelligence
	and Security (AISEC)

[Apologies for multiple copies of this announcement]

*** 6th ACM Workshop on Artificial Intelligence and Security ***

  https://sites.google.com/site/ccsaisec2013/home
  Held in Conjunction with ACM CCS 2013
  November 4, 2013 -- Berlin Congress Centre, Berlin, Germany

*** Extended Deadline ***

  Paper submissions due: July 29, 2013 (23:59 PDT)
  Acceptance notification: August 21, 2013
  Camera ready due: August 30, 2013
  Workshop: November 4, 2013

*** Call for Papers ***

The potential for applying artificial intelligence (AI), machine
learning, and data mining to security and privacy problems is
ever-more lucrative.  The analytic tools and intelligent behavior
provided by these techniques makes AI and learning increasingly
important for autonoumous real-time analysis and decision-making in
domains with a wealth of data or that require quick reactions to
ever-changing situations.  Particularly, these intelligent
technologies offer new solutions to security problems involving Big
Data analysis, which can be scaled through cloud-computing.  Further,
the use of learning methods in security-sensitive domains creates new
frontiers for security research, in which adversaries may attempt to
mislead or evade intelligent machines.  The 2013 ACM Workshop on
Artificial Intelligence and Security (AISec) provides a venue for
presenting and discussing new developments in this fusion of
security/privacy with AI and machine learning.

We invite original research papers describing the use of AI or machine
learning in security, privacy and related problems.  We also invite
position and open problem papers discussing the role of AI or machine
learning in security and privacy.  Submitted papers of these types may
not substantially overlap papers that have been published previously
or that are simultaneously submitted to a journal or
conference/workshop proceedings.  Finally we again welcome a
'systematization of knowledge' category of papers, which should
distill the AI or machine learning contributions of a previously
published series of security papers.

Regular research, systematization of knowledge, and open/position
paper submissions must be at most 10 pages in double-column ACM format
(note: pages must be numbered) excluding the bibliography and
well-marked appendices, and at most 12 pages overall.  Committee
members are not required to read the appendices, so the paper should
be intelligible without them.  Submissions need not be anonymized.  We
recommend the use of the ACM SIG Proceedings templates for
submissions.  The ACM format is the required template for the
camera-ready version.  Accepted papers will be published by the ACM
Digital Library and/or ACM Press.

Submissions can be made through EasyChair at:  
https://www.easychair.org/conferences/?conf=aisec2013

Topics of interest include, but are not limited to:

** Theoretical topics related to security **
* Adversarial Learning
* Robust Statistics
* Online Learning
* Learning in stochastic games

** Security applications **
* Computer Forensics
* Spam detection
* Phishing detection and prevention
* Botnet detection
* Intrusion detection and response
* Malware identification
* Authorship Identification
* Big data analytics for security

** Security-related AI problems **
* Distributed inference and decision making for security
* Secure multiparty computation and cryptographic approaches
* Privacy-preserving data mining
* Adaptive side-channel attacks
* Design and analysis of CAPTCHAs
* AI approaches to trust and reputation
* Vulnerability testing through intelligent probing (e.g. fuzzing)
* Content-driven security policy management & access control
* Techniques and methods for generating training and test sets
* Anomalous behavior detection (e.g. fraud prevention, authentication)

*** Organization ***

General Chair:  
   Ahmad-Reza Sadeghi, TU Darmstadt; CASED; Fraunhofer SIT; Intel ICRI-SC

Program Co-Chairs:
   Blaine Nelson, University of Potsdam
   Christos Dimitrakakis, EPFL
   Elaine Shi, University of Maryland, College Park

Program Committee
   Battista Biggio, University of Cagliari
   Ulf Brefeld, Technische Universität Darmstadt
   Michael Brückner, SoundCloud Inc.
   Mike Burmester, Florida State University
   Alvaro A. Cárdenas, University of Texas at Dallas
   Mario Frank, University of California, Berkeley
   Rachel Greenstadt, Drexel University
   Guofei Gu, Texas A&M University
   Ling Huang, Intel Labs
   Anthony Joseph, University of California, Berkeley
   Ari Juels, RSA Labs
   Pavel Laskov, University of Tübingen
   Daniel Lowd, University of Oregon
   Pratyusa Manadhata, HP Labs
   Aikaterini Mitrokotsa, HESSO-GE
   Roberto Perdisci, University of Georgia
   Vasyl Pihur, Google Inc.
   Konrad Rieck, University of Göttingen
   Fabio Roli, University of Cagliari
   Benjamin I. P. Rubinstein, IBM Research
   Robin Sommer, ICSI and LBNL
   Nina Taft, Technicolor
   J. D. Tygar, University of California, Berkeley
   Shobha Venkataraman, AT&T Research
   Ting-Fang Yen, RSA Labs

-- 
Prof. Dr. Konrad Rieck
Computer Security Group, University of Göttingen
http://www.sec.cs.uni-goettingen.de






Download attachment "smime.p7s" of type "application/pkcs7-signature" (4936 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ