lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-id: <51B741EC.6070901@pitt.edu>
Date: Tue, 11 Jun 2013 11:27:40 -0400
From: James Joshi <jjoshi@...t.edu>
To: undisclosed-recipients: ;
Subject: CFP: IEEE SafeConfig:  6th Symposium on Security Analytics and
 Automation

CALL FOR PAPERS


IEEE SafeConfig 2013
--------------------
6th Symposium on Security Analytics and Automation (www.safeconfig.org)

(collocated with IEEE Conference on Communications and Network Security)

Washington, D.C., USA
October 14, 2013

Sponsors: IEEE (COMSOC).

Important Dates

Abstract Registration Deadline: June 25
Manuscript Submission: July 1, 2013
Review Notification: August 7, 2013
Camera Ready: August 15, 2012
Conference Dates: October 14, 2012

The new sophisticated cyber security threats demand new security 
management approaches that offer a holistic security analytics based on 
the system data including configurations, logs and network traffic. 
Security analytics must be able to handle large volumes of data in order 
to model, integrate, analyze and respond to threats at real time. The 
system configuration/policy is a key component that determines the 
security and resiliency of networked information systems and services. 
However, a typical enterprise networked environment contains thousands 
of network and security devices and millions of inter-dependent 
configuration variables (e.g., rules) that orchestrate the end-to-end 
system behavior globally. As the current technology moves toward "smart" 
cyber infrastructure and open networking platforms (e.g. OpenFlow and 
virtual computing), the need for security analytics and automation 
significantly increases. The coupled integration of network sensor data 
and configuration in a unified framework will enable intelligent 
response, automated defense, and network resiliency/agility.

This symposium offers a unique opportunity by bringing together 
researchers form academic, industry as well as government agencies to 
discuss these challenges, exchange experiences, and propose joint plans 
for promoting research and development in this area. SafeConfig 
Symposium is a one day program that will include invited talks, 
technical presentations of peer-reviewed papers, poster/demo sessions, 
and joint panels on research collaboration. SafeConfig Symposium 
solicits the submission of original unpublished ideas in 8-page long 
papers, 4-page sort papers, or 2-pages posters. Security analytics and 
automation for new emerging application domains such as clouds and data 
centers, cyber-physical systems software defined networking and Internet 
of things are of particular interest to SafeConfig community.

Topics (but are not limited to)

Science of Security Analytics and Automation:
• Security metrics.
• Abstract models and languages for configuration specification.
• Formal semantics of security policies.
• Model composition and integration.
• Autonomic defense and configuration.
• Integration of sensor information and policy configuration.
• Theory of defense-of-depth.
• Security games.
• Attack prediction and attribution.

Security Analytics Techniques:
• Techniques: formal methods, statistical, interactive visualization, 
reasoning, etc.
• Methodology: multi-level, multi-abstraction, hierarchical etc.
• Analytics under uncertainty.
• Security analytics using heterogeneous sensors.
• Automated configuration verification.
• Integrated network and host configuration.
• Configuration testing, forensics, debugging and evaluation.
• Analytics of attacks motive and attribution.
• Tools and case studies.
• Security analytics for wireless sensors and MANET.
• Security policy management.
• Accountability and provenance.

• Attack forensics and automated incident analysis.

Security Automation Techniques:
• Automated security hardening and optimization

• Security synthesis and planning.
• Policy/Configuration refinement and enforcement.
• Health-inspired security.
• Risk-aware and context-aware security.
• Cyber agility and moving target defense.
• Security configuration economics.
• Continuous monitoring.
• Usability issues in security management.
• Automated patch management.
• Automated attack response and alarm management.

Submission Guidelines

EDAS Paper/Abstract submission link for SafeConfig 2013 can be found at 
www.safeconfig.org. Papers must present original work and must be 
written in English. We require that the authors use the IEEE format for 
papers, using one of the IEEE Proceeding Templates. We solicit two types 
of papers, regular papers and position papers. The length of the regular 
papers in the proceedings format should not exceed 8 US letter pages 
excluding well-marked appendices. Committee members are not required to 
read the appendices, so papers must be intelligible without them. Short 
papers and posters may not exceed 4, and 2 pages, respectively. Papers 
are to be submitted electronically as a single PDF file at 
www.edas.info. Authors of accepted papers must guarantee that their 
papers will be presented at the conference.


TPC Co-Chairs

James Joshi, University of Pittsburgh , USA
Ehab Al-Shaer, UNC Charlotte, USA

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ