Nippon-European Cyberdefense-Oriented Multilayer threat Analysis

Call for Papers: eCrime 2014

05 June 2014

The ninth Symposium on Electronic Crime Research (eCrime) 2014 once again will be held in conjunction with the 2014 APWG General Meeting between September 23-25, 2014 in Birmingham, Alabama.

eCrime 2014 consist of two full days which bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it. Topics of interests include (but are not limited to):

  •     Case studies of current attack methods, including phishing, malware, rogue antivirus, pharming, crimeware, botnets, and emerging techniques
  •     Case studies of online advertising fraud, including click fraud, malvertising, cookie stuffing, and affiliate fraud
  •     Case studies of large-scale take-downs, such as coordinated botnet disruption
  •     Technical, legal, political, social and psychological aspects of fraud and fraud prevention
  •     Economics of online crime, including measurement studies of underground economies and models of e-crime
  •     Uncovering and disrupting online criminal collaboration and gangs
  •     Financial infrastructure of e-crime, including payment processing and money laundering
  •     Techniques to assess the risks and yields of attacks and the effectiveness of countermeasures
  •     Delivery techniques, including spam, voice mail, social network and web search manipulation; and countermeasures
  •     Techniques to avoid detection, tracking and take-down; and ways to block such techniques
  •     Best practices for detecting and avoiding damages to critical internet infrastructure, such as DNS and SCADA, from electronic crime activities

Accepted papers will be published in proceedings. In addition, cash awards will be given for the best paper overall and the best student co-authored paper. A limited number of cash travel awards will also be made to student authors of papers and posters.
Instructions for Authors
eCrime has adopted the IEEE publication format. Submissions should be in English, in PDF format with all fonts embedded, formatted using the the IEEE conference template, found here: Submissions should include author names, affiliations and acknowledgments. They should not exceed 12 letter-sized pages, not counting the bibliography and appendices. Papers should begin with a title, abstract, and an introduction that clearly summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Papers should contain a scholarly exposition of ideas, techniques, and results, including motivation, relevance to practical applications, and a clear comparison with related work. Committee members are not required to read appendices, and papers should be intelligible without them. Submitted papers risk being rejected without consideration of their merits if they do not follow all the above guidelines. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings.

Authors will be asked to indicate whether their submissions should be considered for the best student paper award; any paper co-authored by a full-time student is eligible for this award.

Authors of accepted papers must guarantee that their paper will be presented at the conference. A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are given priority to receive such assistance. Requests for stipends should be addressed to the general chair after August 20.

Full papers have to be submitted via easychair: First, papers have to be registered, then authors can upload their papers. A successful submission can be viewed in EasyChair, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.

Case Studies
A special category is available in the paper submission system for Case Studies. This category allows for industrial research and case studies that do not qualify as full academic papers. Note though that papers submitted to this category are highly technical. For consideration in this category please submit your case study via easychair: First, Case Studies have to be registered, then authors can upload their papers. A successful submission can be viewed in EasyChair, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.

Important Dates: (11:59pm US EDT)

  •     Full Papers and Case Studies registration and submission due: June 13, 2014 (extended)
  •     Paper Notifications due: July 18, 2014
  •     Camera ready due: August 18, 2014
  •     Conference: September 23-25, 2014


Organizing Committee
General Chair:

  • Saeed Abu-Nimeh, Seclytics

Program Co-Chairs

  • Manos Antonakakis, Georgia Tech
  • Roberto Perdisci, University of Georgia

Steering Committee

  • Don M. Blumenthal, Public Interest Registry
  • Jay Brennan, Mitre
  • Manel Medina, Univers. Polit. Catalunya, Barcelona, Spain
  • Markus Jakobsson, PayPal
  • Oliver Friedrichs, Immunet
  • Tyler Moore, SMU
  • Susanne Wetzel, Stevens Institute of Technology

Technical Program Committee

  • Marco Balduzzi (Trend Micro)
  • Davide Balzarotti (Eurecom)
  • Juan Caballero (IMDEA)
  • Lorenzo Cavallaro (Royal Holloway)
  • Nicolas Christin (CMU CyLab)
  • Guofei Gu (Texas A&M)
  • Sotiris Ioannidis (ICS Forth)
  • Christian Kreibich (ICSI)
  • Andrea Lanzi (University of Milano)
  • Kang Li (University of Georgia)
  • Long Lu (Stony Brook)
  • Damon McCoy (George Mason University)
  • Konrad Rieck (University of Gottingen)
  • Kapil Singh (IBM TJ Watson)
  • Brett Stone-Gross (Dell SecureWorks)
  • Junjie Zhang (Wright State University)
  • Michalis Polychronakis (Columbia University)
  • George Portokalidis (Stevens Institute of Technology)
  • Raheem A. Beyah, (Georgia Institute of Technology)
  • Gritzalis Stefanos, (University of the Aegean)

Call for Papers: QASA 2014

05 May 2014

3rd International Workshop on Quantitative Aspects in Security Assurance
Affiliated workshop with ESORICS 2014
Wroclow, Poland, September 10-11, 2014


There is an increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems & services, e.g., from requirements elicitation to run-time operation and maintenance. The aim of this workshop is to bring together researchers and practitioners interested in these research topics with a particular emphasis techniques for service oriented architectures. The scope of the workshop, is intended to be broad, including aspects as dependability, privacy, risk and trust.

The list of topics includes, but it is not limited to:

  •         Probabilistic/stochastic model checking
  •         Quantitative information flow analysis
  •         Quantitative issues in access and usage control
  •         Security testing techniques
  •         Static/Dynamic code analysis techniques
  •         Metrics for security, trust and privacy
  •         Incremental/modular security assurance analysis
  •         Process compliance assurance techniques
  •         Tool support for quantitative techniques for security assurance
  •         Simulation techniques
  •         Model-driven techniques for security, trust, risk and privacy
  •         Assurance cases modelling and analysis

Important dates:

Submission deadline for paper:        June 21 2014
Notification:                                         July 28 2014

Workshop Organizers:

  •     Alessandro Aldini, U. of Urbino
  •     Fabio Martinelli, IIT-CNR
  •     Neeraj Suri, TU Darmstadt

Program Committee:

  •     Lujo Bauer, CMU
  •     Frédéric Cuppens, ENST-Bretagne
  •     Jesus Luna, CSA
  •     Charles Morisset, U. of Newcastle
  •     Pierangela Samarati, U. of Milan
  •     Andrei Sabelfeld, Chalmers
  •     Herbert Wiklicky, ICL
  •     Jorge Cuellar, SIEMENS
  •     Javier Lopez, U. of Malaga
  •     Cathy Meadows, NRL
  •     Flemming Nielson, DTU
  •     Reijo Savola, VTT
  •     Ketil Stoelen, SINTEF
  •     Lorenzo Strigini, City Univ. London

Programme and Proceedings:

The program will consist of invited speakers as well as of submitted papers. The workshop post-proceedings will be published with LNCS Springer, in cooperation with DPM/SETOP workshops.


The workshop is sponsored by the EU FP7 projects Network of Excellence



Call for Papers: AIDP 2014

04 April 2014

Advanced Intrusion Detection and  Prevention Workshop (AIDP'14)            

Co-located with IFIP SEC 2014

Marrakech, Morocco, June 4-5, 2014


The workshop will provide a focused and outstanding forum opportunity for researchers, technologists and network engineers to discuss new and emerging technologies in the field of network security and intrusion detection/prevention.


* Analysis and management of risks
* Intrusion detection algorithms
* Specification of security and privacy requirements and policies
* Testing for security
* Countermeasure selection methodologies
* DDoS mitigation
* Anomaly detection and event correlation for IDS/IPS
* Intrusion detection and prevention for M2M
* Intrusion detection and prevention for 5G networks
* Intrusion detection and prevention for financial systems
* IDS/IPS for mobile security
* IDS/IPS for e-commerce
* IDS/IPS for adaptive cyber security
* IDS/IPS in cloud computing environments
* IDS/IPS for DDoS
* IDS/IPS for emerging malware
* Detection and prevention of coordinated/complex attacks
* Visual analytics for intrusion detection and prevention
* Threat modelling
* Security assessment for intrusion detection and prevention
* Privacy and IDS/IPS
* Countermeasure simulation and impact analysis

Paper Submission:

Authors must submit their papers using the following link:

Full Technical Papers should be at most 15 pages (using 11-point font), excluding the bibliography and well-marked appendices.
Committee members are not required to read the appendices, so the paper should be intelligible without them. Short papers should be at most 15 pages, including the bibliography and appendices. All submissions must be written in English. All papers will be refereed.

Accepted papers should be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper.

Contributed Talk Abstracts should be at most 2 pages (using 11-point font). Submissions must be written in English. They will be reviewed as oral presentations. Accepted abstract authors will be invited to present their research at the workshop. For those presentations that are meritorious, the Committee will recommend them to submit extended versions for their publication in the revised selected papers post-proceedings. All extended versions will be refereed. The submitted paper (in PDF format) should follow the latex template indicated at the following link:

Papers must start with a title, a short abstract, names and affiliations of the authors, and a list of keywords.

All the accepted contributions will be published in the Electronic Proceedings in Theoretical Computer Science series (DOI:
10.4204/EPTCS; ISSN: 2075-2180).

Contributions from academia and industry are welcome. Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.

Important Dates:

* Paper Submission: April 13, 2014 (11:59 PM UTC-11)
* Paper Acceptance Notification: May 12, 2014
* Camera Ready Version: May 26, 2014


Program Committee Co-Chairs:

* Joaquin Garcia-Alfaro (Telecom SudParis, France)
* Gurkan Gur (Provus, Turkey)

Program Committee:

* Diala Abihaidar (Dar Al Hekma College, Saudi Arabia)
* Sahin Albayrak (TU Berlin, Germany)
* Serif Bahtiyar (Provus, Turkey)
* Gregory Blanc (Telecom SudParis, France)
* Summerjit Das (Carnegie Mellon University, USA)
* Ernesto Damiani (University of Milan, Italy)
* Thomas Dean (Queen's University, Canada)
* Damien Deville (Netasq, France)
* Christian Duncan (Quinnipiac University, USA)
* Stefanos Gritzalis (University of the Aegean, Greece)
* Vincenzo Gulisano (Chalmers University of Technology, Sweden)
* Dina Hadziosmanovic (Delft University of Technology, The Netherlands)
* Sotiris Ioannidis (FORTH-ICS, Greece)
* Ulas C. Kozat (DOCOMO Innovations, USA)
* Gunes Karabulut (Istanbul Technical University, Turkey)
* Giovanni Livraga (University of Milan, Italy)
* Yao Liu (University of South Florida, USA)
* Guillermo Navarro (Autonomous University of Barcelona, Spain)
* Balaji Palanisamy (University of Pittsburgh, USA)
* Andreas Pashalidis ( K.U.Leuven, Belgium)
* Christophe Ponchel (Cassidian Cybersecurity, France)
* Silvio Ranise (FBK, Security and Trust Unit, Italy)
* Indrajit Ray (Colorado State University, USA)
* Jean-Marc Robert (Ecole de Technologie Superieure, Canada)
* Christian Rossow (Vrije Universiteit, The Netherlands)
* Thierry Sans (Carnegie Mellon University, Qatar)
* Ibrahim Sogukpinar (Gebze Institute of Tech, Turkey)
* Chamseddine Talhi (Ecole de Technologie Superieure, Canada)
* Jouni Viinikka (6cure, France)
* Isaac Woungang (Ryerson University, Canada)

Advisory Committee:

* Fatih Alagoz (Bogazici University, Turkey)
* Adrien Becue (Cassidian Cybersecurity, France)
* Bulent Yener (Rensselaer Polytechnic Institute, USA)
* Frederic Cuppens (Institut Mines-Telecom, France)
* Nora Cuppens-Boulahia (Institut Mines-Telecom, France)


Additional information about paper submission and conference topics and events can be found at the AIDP'2014 web site:

Call for Papers: Trust 2014

25 January 2014

TRUST 2014 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.

Important dates:

  •     Submission due: 7 March 2014
  •     Notification: 7 April 2014
  •     Camera ready: 21 April 2014
  •     Conference: 30 June - 2 July 2014

The conference solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.

Two types of submissions are solicited:

  •     Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results
  •     Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress

Topics of interest include, but are not limited to:
Technical Strand:

  •     Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
  •     Trust, Security and Privacy in embedded systems
  •     Trust, Security and Privacy in social networks
  •     Trusted mobile platforms and mobile phone security
  •     Implementations of trusted computing (hardware and software)
  •     Applications of trusted computing
  •     Trustworthy infrastructures and services for cloud computing (including resilience)
  •     Attestation and integrity verification
  •     Cryptographic aspects of trusted and trustworthy computing
  •     Design, implementation and analysis of security hardware
  •     Security hardware with cryptographic and security functions, physically unclonable functions (PUFs)
  •     Intrusion resilience in trusted computing
  •     Virtualization for trusted platforms
  •     Secure storage
  •     Security policy and management of trusted computing
  •     Access control for trusted platforms
  •     Privacy aspects of trusted computing
  •     Verification of trusted computing architectures
  •     Usability and end-user interactions with trusted platforms
  •     Limitations of trusted computing

Social and Socio-economic Strand:

  •     The role of trust in human-computer interactions
  •     Usability and user perceptions of trustworthy systems and risks
  •     Patterns of trust practices in human-computer interactions
  •     Effects of trustworthy systems upon user, corporate, and governmental behavior
  •     The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
  •     The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
  •     The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
  •     Game theoretical approaches to modeling or designing trustworthy systems
  •     Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
  •     Economic drivers for trustworthy systems in corporate environment
  •     Experimental economics studies of trustworthiness
  •     The interplay between privacy, privacy enhancing technologies and trustworthy systems
  •     Evaluation of research methods used in the research of trustworthy and trusted computing
  •     Critiques of trustworthy systems
  •     Metrics of trust
  •     Privacy Aspects of Trust Computing
  •     Engineering Processes for Trustworthy Computing

Submissions must be in LNCS format subject to the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

General Chair:

    Ioannis Askoxylakis, FORTH-ICS, GR

Program Chairs - Socio-economic Strand

    Daniel J. Weitzner, MIT, USA

Program Chairs - Technical Strand

    Sotiris Ioannidis, FORTH-ICS, GR
    Thorsten Holz, Ruhr-Uni­ver­si­ty Bo­chum, DE



Call for Papers: DIMVA 2014

06 December 2013

Call for Papers: DIMVA 2014

11th International Conference on Detection of Intrusions and Malware &
Vulnerability Assessment

Royal Holloway London, Egham, UK
July 10-11, 2014



The annual DIMVA conference serves as a premier forum for advancing the
state of the art in intrusion detection, malware detection, and
vulnerability assessment. Each year, DIMVA brings together international
experts from academia, industry, and government to present and discuss
novel research in these areas.  DIMVA is organized by the special interest
group "Security - Intrusion Detection and Response" (SIDAR) of the German
Informatics Society (GI).  The conference proceedings will appear as a
volume in the Springer Lecture Notes in Computer Science (LNCS) series
(approval pending).

Important Dates

Paper submission deadline: February 8, 2014
Notification of paper acceptance: March 26, 2014
Final paper camera-ready copies due: April 26, 2014
Conference: July 10-11, 2014



Call for Papers: EuroSec 2014

04 December 2013

Call for Papers: EuroSec 2014
7th European Workshop on Systems Security

About EuroSec
The seventh European Workshop on Systems Security (EuroSec) aims to
bring together researchers, practitioners, system administrators,
system programmers, and others interested in the latest advances in
the security of computer systems and networks. The objective of the
workshop is to discuss novel, practical, systems-oriented work.

EuroSec 2014 will be held on the 13th of April, 2014, in Amsterdam,     
The Netherlands. The workshop will precede the main EuroSys 2014        

Important Dates
    * Paper submission: February 15, 2014
    * Acceptance notification: March 10, 2014
    * Final paper due: March 28, 2014
    * Workshop: April 13, 2014


Call for Papers: Annual Privacy Forum 2014

04 December 2013

Annual privacy forum 2014: Closing the loop from research to policy

20th and 21st of May in Athens

Commission Directorate General for Communications Networks, Content and Technology (DG CONNECT), the European Union Agency for Network and Information Security (ENISA) and, as local host, the Systems Security Laboratory (SSL) of the University of Piraeus organizes a two day event with the objective to provide a forum to academia, industry and policy makers in the field of privacy technology and legislation. For the scientific track of the event, the PC of the APF calls for original papers.


Important Dates

Full paper submission: December 16, 2013

Notification: February 03, 2014

Camera-ready paper submission: March 03, 2014