http://www.cs.stevens.edu/~spock/waccc2013/cfp.html
The research community's understanding of attacker methodology is poor, and we are forced to rely on newspaper articles or hypotheticals in order to discuss defenses. Recent botnets and advanced persistent threats have posed serious challenges to the research community from both the reverse engineering and applied cryptography perspectives. Conversely, there is strong evidence that the hypotheticals we discuss are too complex, unreliable or arcane for attacker purposes. This workshop is focused on studying attacker behavior as it takes place now, through examining malware, occupied systems or by logs of actual attacks. This is a complex multidisciplinary task involving studying executable code, network communications and deceiving tools that actively try to thwart analysis. This workshop will focus on understanding the methods and tools used by current adversaries to author, distribute, and control malware. Relevant topics include communications techniques, cryptography, defeating reverse engineering and any other approach used by attackers here and now to evade defenders and analysts. Submissions must address current malware and attack experiences, hypothetical designs or future developments are not in scope. While we focus on sharing prior experiences and experiments in malware research, successful or not, we tap into topics in network security, computer security, and applied cryptography. This workshop will favor discussions among participants, in order to advance the field for both cryptographers, network analysts, and security practitioners. It will be co-located with the Seventeenth International Conference on Financial Cryptography and Data Security 2013. Program Co-Chairs: Sven Dietrich, Stevens Institute of Technology Michael Collins, RedJack Program Committee: Jon Callas, Entrust Jean Camp, Indiana University at Bloomington Richard Clayton, University of Cambridge Dave Dittrich, University of Washington, APL Christian Kreibich, ICSI & Lastline Ulrich Flegel, HFT Stuttgart Yong Guan, Iowa State University Shawn Hernan, Microsoft Yongdae Kim, University of Minnesota Jose Nazario, Invincea Labs Vern Paxson, UC Berkeley and ICSI Angelos Stavrou, George Mason University Rob Thomas, Team Cymru Lenore Zuck, University of Illinois at Chicago Submissions WACCC 2013 solicits submissions in three categories: Three categories: 1) Position papers Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Position paper submission should not exceed 6 pages in length, excluding bibliography and well-marked appendices. Accepted submissions will appear both in a pre-proceedings, available at the workshop, and in a formal proceedings. After receiving feedback from the workshop, authors will have the opportunity to revise their papers before submitting a camera-ready draft for the final proceedings. 2) Case studies Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Case studies should not exceed 12 pages in length, excluding bibliography and well-marked appendices. Accepted submissions will appear both in a pre-proceedings, available at the workshop, and in a formal proceedings. After receiving feedback from the workshop, authors will have the opportunity to revise their papers before submitting a camera-ready draft for the final proceedings. 3) Panel proposals Submitted panel proposals should list the panel topic, a moderator, and a list of confirmed panelists, along with a short biography of the participants. The composition should be adequately selected as to generate copious discussion. Panelists will be given an opportunity to submit a position statement in the final proceedings. Submission instructions Paper submissions must be formatted in the style of the Springer Publications format for Lecture Notes in Computer Science (LNCS). For complete details, see Springer's Author Instructions. The authors are expected to sign the IFCA Copyright Agreement, which can be found on the IFCA website. Papers, case studies, and panel proposals must be submitted electronically through the conference submission website: https://www.easychair.org/conferences/?conf=waccc2013. All submissions must be in PDF (Adobe's Portable Document Format) format. Submissions will not be accepted in any other format. Proceedings The WACCC 2013 Proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) in conjunction with the FC'13 proceedings. Authors are expected to sign the IFCA Copyright Form (not the Springer Copyright Form), which can be found here. Important Dates: Paper Submission: January 15, 2013 Author Notification: February 15, 2013 Camera-ready for Pre-Proceedings: March 15, 2013 WACCC 2013: April 1, 2013 Final version for Post-Proceedings: ' April 30, 2013 _______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
