[SC-L] c0c0n 2016 | The cy0ps c0n - Call For Papers & Call For Workshops

2016-04-25 Thread c0c0n 2016 - The CyOps Conference
______  ___   ___  __   __  
   / _ \  / _ \|__ \ / _ \/_ | / /  
   ___| | | | ___| | | |_ __  ) | | | || |/ /_  
  / __| | | |/ __| | | | '_ \/ /| | | || | '_ \ 
 | (__| |_| | (__| |_| | | | |  / /_| |_| || | (_) |
  \___|\___/ \___|\___/|_| |_| ||\___/ |_|\___/ 
 

#
c0c0n 2016 | The cy0ps c0n - Call For Papers & Call For Workshops
#

August 18-20, 2016 - Kollam / Quilon (Coulão), India

Buenos dmas from the God's Own Country!

We are extremely delighted to announce the Call for Papers and Call for
Workshops for c0c0n 2016 , a 3-day Security and
Hacking Conference (2 day conference and 1 day pre-conference workshop),
full of
interesting presentations, talks and of course filled with fun!

The conference topics are divided into four domains as follows:

>> Info Sec - Technical
>> Info Sec - Management
>> Digital Forensics and Investigations
>> Cyber Laws and Governance.

We are expecting conference and workshop submissions on the following
topics,
but are not limited to:

>> Smart Cities
>> Cloud Security
>> Browser Security
>> Honeypots/Honeynets
>> Offensive forensics
>> Software Testing/Fuzzing
>> Network and Router Hacking
>> WLAN and Bluetooth Security
>> Hacking virtualized environment
>> Lockpicking & physical security
>> National Security & Cyber Warfare
>> Open Source Security&Hacking Tools
>> Web Application Security & Hacking
>> Exploiting Layer 8/Social Engineering
>> Malware analysis & Reverse Engineering
>> New Vulnerabilities and Exploits/0-days
>> Advanced Penetration testing techniques
>> Antivirus/Firewall/UTM Evasion Techniques
>> IT Auditing/Risk management and IS Management
>> Cyber Forensics, Cyber Crime & Law Enforcement
>> Mobile Application Security-Threats and Exploits
>> Critical Infrastructure & SCADA networks Security


Presentations/topics that haven't been presented before will be preferred.


#
Submission Guidelines:
#

Email your submission to: cfp [at] is-ra [dot]org
Email subject should be: CFP c0c0n 2016 - 
Email Body:

Personal Information:
=

Speaker Name:
Job Role/Handle:
Company/Organization:
Country:
Email ID:
Contact Number:
Speaker Profile: (max 1000 words)

If there is additional speaker please mention it here following the above
format.

Presentation Details:
=
Name/Title of the presentation:
Paper Abstract: (max 3000 words)
Presentation Time Required (20, 30, 50 Minutes)
Is there any demonstration? Yes or No
Are you releasing any new tool? Yes or No
Are you releasing any new exploit? Yes or No
Have you presented the paper before on any other security / technology
conference(s)? Yes or No

Other Needs & Requirements:
===

Do you need any special equipment?
We will be providing 1 LCD projector feed, 2 screens, microphones, wired
and/or wireless Internet.
If you have any other requirement, Please mention it here and the reason.

#
Remember these Dates!
#

CFP Opens: 04 Apr 2016
CFP Closing Date:  15 May 2016
Conference Dates: 19 - 20 Aug 2016
Workshop Dates: 18 Aug 2016

*NOTE:* We do not promote vendor/product oriented submissions hence it will
be rejected.

##
Speaker Benefits:
##

>> Complimentary Conference registration.
>> Complementary Accommodation for 2 nights.
>> Invitation to Day 1 Networking Dinner / Party.
>> Travel Reimbursement (maximum upto below mentioned amount)
   # International Speaker (outside India) (USD $1000)
   # Speakers from India (INR Rs.6000)
>> Only one speaker will be eligible for the benefits in case there are two
or
more speakers for a  talk.

Thanks and Regards,

   - c0c0n 2016 Team -


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] [CFP] Workshop CFP: Who are you?! Adventures in Authentication at SOUPS 2016

2016-04-25 Thread Larry Koved
Title: Who are you?!  Adventures in Authentication

Workshop to be held at the Twelfth Symposium on Usable Privacy and 
Security - SOUPS 2016
When: June 22, 2016
Where: Denver, CO

URL: https://www.usenix.org/conference/soups2016

Description: 

Authentication, or the act of proving that someone is who they claim to 
be, is a cornerstone of security. As more time is spent using computers, 
authentication is becoming both more common and increasingly important. 
Users must authenticate to prove their identity to maintain a continuous 
presence with a wide variety of computing services. 

Our most common method of authentication continues to be based on the 
assumption of a person using a desktop computer and keyboard, or a person 
authenticating to their mobile phone -- what Bill Buxton has referred to 
as the "missionary position": one user and one computer face-to-face - no 
other position allowed. More recently, mobile devices have opened up new 
possibilities based on a variety of gestures and biometrics. 

There has been an implicit assumption that the effort of authenticating, 
both in terms of elapsed time, user actions, cognitive load and impact on 
a user's primary task, will be amortized over a relatively long lifetime 
of the authenticated session with the system, application or service. As 
computing moves into new environments, including mobile and embedded 
systems, these assumptions may no longer be valid.

In the era of mobile, embedded and ubiquitous computing, the time for each 
interaction with a device, application or service is becoming much 
briefer.  The user’s primary task may be tending to a patient, driving a 
car, operating heavy machinery, or interacting with friends and colleagues 
via mobile apps.  Due to the nature of user interaction in these new 
computing environments, and new threat models, methods of authenticating 
are needed that are both robust, easy to use, and minimize impact on the 
user's primary task.  The time / cost of authentication needs to be 
commensurate with the level of engagement with these kinds of systems and 
applications.

The purpose of this workshop is to bring together researchers and 
practitioners to share experiences, concerns, and ideas about known and 
new authentication techniques. We are interested in discussing methods of 
evaluating the impact and usability of various authentication techniques, 
and ideas about novel authentication techniques that are secure, robust 
and usable.

Target Audience:

Researchers and practitioners interested in the topics outlined below. We 
expect that researchers from both industry and academia will find relevant 
material in the workshop.

Topics of interest for this workshop include:

·   Surveys and comparisons of known authentication techniques
·   Novel metrics or comparisons of metrics for authentication 
strength 
·   Empirical evaluations of authentication techniques, including 
performance, accuracy, and the impact of authentication on a user’s 
primary task
·   New authentication techniques that target emerging computing 
environments such as mobile and embedded systems
·   Approaches (including protocols) that enable weak authentication 
schemes to be more robust
·   Existing authentication techniques applied in new environments or 
usage contexts
·   Novel approaches to the design and evaluation of authentication 
systems

The goal of this workshop is to explore these and related topics across 
the broad range of contexts, including enterprise systems, personal 
systems, and especially mobile and embedded systems (such as healthcare, 
automotive and wearable systems).  This workshop provides an informal and 
interdisciplinary setting at the intersection of security, psychological, 
and behavioral science.  Panel discussions may be organized around topics 
of interest where the workshop participants will be given an opportunity 
to give presentations, which may include current or prior work in this 
area, as well as pose new challenges in authentication.

We are soliciting 1-2 page position statements that express the nature of 
your interest in the workshop; these should include the aspects of 
authentication of interest to you, including the topic(s) that you would 
like to discuss during the workshop and panel discussions.  Position 
statements must be in PDF format, preferably using the SOUPS formatting 
template (LaTeX or MS Word).  Submissions should not be blinded. 

Accepted submissions will be posted to the SOUPS workshop web site.  We 
encourage participants to also make their workshop presentations available 
on the web site.  These submissions will not be considered “published” 
works, and as such, should not preclude publication elsewhere. 

Submissions will be via the EasyChair WAY 2016 web site: 
https://easychair.org/conferences/?conf=way2016

Question about submissions should be directed to: 
adventuresinauthenticat...@gmail.com. 

Workshop co-chairs: