[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-id: <51C82980.8060305@pitt.edu>
Date: Mon, 24 Jun 2013 07:12:00 -0400
From: James Joshi <jjoshi@...t.edu>
To: undisclosed-recipients: ;
Subject: CFP: IEEE SafeConfig: 6th Symposium on Security Analytics and
Automation (Deadline Extended)
CALL FOR PAPERS
[Deadline Extended]
IEEE SafeConfig 2013:
6th Symposium on Security Analytics and Automation (www.safeconfig.org)
(collocated with IEEE Conference on Communications and Network Security)
Washington, D.C., USA
October 16, 2013
Sponsors: IEEE (COMSOC).
Important Dates
Abstract Registration Deadline: JULY 13, 2013 (Extended)
Manuscript Submission: July 13, 2013
Review Notification: August 7, 2013
Camera Ready: August 15, 2012
Conference Dates: October 16, 2012
The new sophisticated cyber security threats demand new security
management approaches that offer a holistic security analytics based on
the system data including configurations, logs and network traffic.
Security analytics must be able to handle large volumes of data in order
to model, integrate, analyze and respond to threats at real time. The
system configuration/policy is a key component that determines the
security and resiliency of networked information systems and services.
However, a typical enterprise networked environment contains thousands
of network and security devices and millions of inter-dependent
configuration variables (e.g., rules) that orchestrate the end-to-end
system behavior globally. As the current technology moves toward "smart"
cyber infrastructure and open networking platforms (e.g. OpenFlow and
virtual computing), the need for security analytics and automation
significantly increases. The coupled integration of network sensor data
and configuration in a unified framework will enable intelligent
response, automated defense, and network resiliency/agility.
This symposium offers a unique opportunity by bringing together
researchers form academic, industry as well as government agencies to
discuss these challenges, exchange experiences, and propose joint plans
for promoting research and development in this area. SafeConfig
Symposium is a one day program that will include invited talks,
technical presentations of peer-reviewed papers, poster/demo sessions,
and joint panels on research collaboration. SafeConfig Symposium
solicits the submission of original unpublished ideas in 8-page long
papers, 4-page sort papers, or 2-pages posters. Security analytics and
automation for new emerging application domains such as clouds and data
centers, cyber-physical systems software defined networking and Internet
of things are of particular interest to SafeConfig community.
Topics (but are not limited to)
Science of Security Analytics and Automation:
• Security metrics.
• Abstract models and languages for configuration specification.
• Formal semantics of security policies.
• Model composition and integration.
• Autonomic defense and configuration.
• Integration of sensor information and policy configuration.
• Theory of defense-of-depth.
• Security games.
• Attack prediction and attribution.
Security Analytics Techniques:
• Techniques: formal methods, statistical, interactive visualization,
reasoning, etc.
• Methodology: multi-level, multi-abstraction, hierarchical etc.
• Analytics under uncertainty.
• Security analytics using heterogeneous sensors.
• Automated configuration verification.
• Integrated network and host configuration.
• Configuration testing, forensics, debugging and evaluation.
• Analytics of attacks motive and attribution.
• Tools and case studies.
• Security analytics for wireless sensors and MANET.
• Security policy management.
• Accountability and provenance.
• Attack forensics and automated incident analysis.
Security Automation Techniques:
• Automated security hardening and optimization
• Security synthesis and planning.
• Policy/Configuration refinement and enforcement.
• Health-inspired security.
• Risk-aware and context-aware security.
• Cyber agility and moving target defense.
• Security configuration economics.
• Continuous monitoring.
• Usability issues in security management.
• Automated patch management.
• Automated attack response and alarm management.
Submission Guidelines
EDAS Paper/Abstract submission link for SafeConfig 2013 can be found at
www.safeconfig.org. Papers must present original work and must be
written in English. We require that the authors use the IEEE format for
papers, using one of the IEEE Proceeding Templates. We solicit two types
of papers, regular papers and position papers. The length of the regular
papers in the proceedings format should not exceed 8 US letter pages
excluding well-marked appendices. Committee members are not required to
read the appendices, so papers must be intelligible without them. Short
papers and posters may not exceed 4, and 2 pages, respectively. Papers
are to be submitted electronically as a single PDF file at
www.edas.info. Authors of accepted papers must guarantee that their
papers will be presented at the conference.
TPC Co-Chairs
James Joshi, University of Pittsburgh , USA
Ehab Al-Shaer, UNC Charlotte, USA
TPC Committee:
Gail-Joon Ahn, Arizona State University, USA
Michael Atighetchi, BBN Technologies, USA
Mikhail Auguston, Naval Postgraduate School, USA
Salman Baset, IBM Research, USA
Steven Borbash, US Government, USA
Seraphin Calo, IBM Research, USA
Nick Feamster, Georgia Institute of Technology, USA
Elena Ferrari, University of Insubria, Italy
Jérôme François, University of Luxembourg, Luxemburg
Brighten Godfrey, University of Illinois at Urbana-Champaign, USA
Alwyn Goodloe, NASA, USA
Lisandro Granville, Federal University of Rio Grande do Sul, Brazil
Yong Guan, Iowa State University, USA
Trent Jaeger, PSU, USA
Anupam Joshi, UMBC, USA
Krishna Kant, George Mason University, USA
Murat Kantarcioglu, University of Texas at Dallas, USA
Syed Ali Khayam, National University of Sciences and Technology (NUST),
Pakistan
Dong-Seong Kim, University of Canterbury, New Zealand
Rick Kuhn, NIST, USA
Hong Li, Intel Corporation, USA
Alex Liu, Michigan State University, USA
Peng Liu, Pennsylvania State University, USA
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Guevara Noubir, Northeastern University, USA
Xinming Ou, Kansas State University, USA
HariGovind Ramasamy, IBM Research, USA
Indrajit Ray, Colorado State University, USA
Walid Saad, University of Miami, USA
Khaled Salah, Khalifa University of Science, Technology and Research
(KUSTAR), UAE
Mohamed Shehab, University of North Carolina at Charlotte, USA
Mahesh Tripunitara, University of Waterloo, Canada
Stefano Vissicchio, Université Catholique de Louvain, Belgium
Carlos Becker, Westphall Federal University of Santa Catarina, Brazil
Geoffrey Xie, Naval Postgraduate School, USA
Jeff Yan, University ofNnewcastle, United Kingdom
Powered by blists - more mailing lists