[Tccc] CFP: International Workshop on Information Security Applications (WISA 2013)
Zhen Ling
lingzhen1982atgmail.com
Thu Apr 11 12:26:50 EDT 2013
---------------------------------------------------------
14th International Workshop on Information Security Applications (WISA 2013)
August 19-21, 2013, Jeju Island, Korea
PC Co-Chairs: Yongdae Kim (KAIST), Heejo Lee (Korea Univ), Adrian
Perrig (ETH) (Alphabetical order)
http://www.wisa.or.kr/
---------------------------------------------------------
IMPORTANT DATES (subject to change):
Submissions due: May 31, 2013
Papers assigned: June 3, 2013
Reviews due: July 3, 2013
Notification: July 17, 2013
OVERVIEW: Asian Version of USENIX Sec + WOOT!
The 14th International Workshop on Information Security Applications
(WISA 2013) will be held on Jeju Island, Korea on August 19-21, 2013.
It is hosted by the Korea Institute of Information Security and
Cryptology (KIISC), supported by the Electronics & Telecommunications
Research Institute (ETRI) and the Korea Internet & Security Agency
(KISA), and sponsored by the Ministry of Public Administration and
Security (MoPAS) and the Korea Communications Commission (KCC). This
years program committee chairs decide to convert WISA to be a venue
for discussing system security and offensive technology issues among
researchers in Asia. More specifically, it will resemble two
well-known conferences: USENIX Security and WOOT. The primary focus of
WISA 2013, therefore, is on systems and network security, and the
secondary focus is on offensive technology. Accordingly, the workshop
will be composed of two tracks: regular and OT (Offensive Technology).
Regular paper submissions are solicited in all areas relating to
systems and network security, including:
- Analysis of network and security protocols
- Anonymity and censorship-resistant technologies
- Applications of cryptographic techniques
- Authentication and authorization of users, systems, and applications
- Automated tools for source code/binary analysis
- Botnet defense
- Critical infrastructure security
- Cryptographic implementation analysis and construction
- Denial-of-service attack countermeasures
- Embedded systems security
- Forensics
- Hardware and physical security
- Human-computer interaction, security, and privacy
- Intrusion/anomaly detection and prevention
- Malware analysis
- Mobile/wireless/cellular system security
- Network infrastructure security
- Operating system security
- Physical security
- Security architectures
- Security in heterogeneous and large-scale environments
- Security in ubiquitous computing environments
- Security policy
- Storage and file system security
- Techniques for developing secure systems
- Trustworthy computing
- Web security, including client-side and server-side security
OT paper submissions are solicited in all areas relating to offensive
technology in systems and network security (i.e., written versions of
presentation at hacking conferences such as Blackhat are welcomed!),
including:
- Vulnerability research (software auditing, reverse engineering)
- Penetration testing
- Exploit techniques and automation
- Network-based attacks (routing, DNS, IDS/IPS/firewall evasion)
- Reconnaissance (scanning, software, and hardware fingerprinting)
- Malware design and implementation (rootkits, viruses, bots, worms)
- Denial-of-service attacks
- Web and database security
- Weaknesses in deployed systems (VoIP, telephony, wireless, games)
- Practical cryptanalysis (hardware, DRM, etc.)
SYSTEMAZATION of KNOWLEDGE PAPERS (SOK)
The goal of call for Systematization of Knowledge Papers (SoK) is to
encourage work that evaluates, systematizes, and contextualizes
existing knowledge. These papers can provide a high value to our
community but may not be accepted because of a lack of novel research
contributions. Suitable papers include survey papers that provide
useful perspectives on major research areas, papers that support or
challenge long-held beliefs with compelling evidence, or papers that
provide an extensive and realistic evaluation of competing approaches
to solving specific problems. Submissions are encouraged to analyze
the current research landscape: identify areas that have enjoyed much
research attention, point out open areas with unsolved challenges, and
present a prioritization that can guide researchers to make progress
on solving important challenges. Submissions must be distinguished by
a checkbox on the submission form. In addition, the paper title must
have the prefix "SoK:". They will be reviewed by the full PC and held
to the same standards as traditional research papers, except instead
of emphasizing novel research contributions the emphasis will be on
value to the community. Accepted papers will be presented at the
workshop and included in the proceedings.
GENERAL GUIDELINES for AUTHORS
There is no arbitrary minimum or maximum length imposed on research
papers. Rather, reviewers will be instructed to weigh the contribution
of a paper relative to its length. Papers should be succinct but
thorough in presenting the work. Typical research papers are 615
pages long, but papers can be shorter if the contribution is smaller.
While we will review papers longer than 15 pages, the contributions
must warrant the extra length. Shorter, more focused papers are
encouraged and will be reviewed like any other paper. Papers whose
length is not commensurate with its contribution will be rejected. The
paper should be prepared according to the "Authors Instruction for
LNCS" (http://www.springer.de/comp/lncs/authors.html). Please number
the pages.
ELECTRONIC SUMBMISSION:http://wisa2013.kaist.ac.kr/
POLICIES and CONTACT INFORMATION
Simultaneous submission of the same work to multiple venues,
submission of previously published work, or plagiarism constitutes
dishonesty or fraud. WISA, like other scientific and technical
conferences and journals, prohibits these practices and may take
action against authors who have committed them.
Note: Work presented at industry conferences, such as BlackHat, is not
considered to have been previously published for the purposes of
WISA 13. We strongly encourage the submission of such work to WISA,
particularly work that is well suited to a more formal and complete
treatment in a published, peer-reviewed setting. In your submission,
please do note any previous presentations of the work. Authors
uncertain whether their submission meets WISA 2013s guidelines should
contact the program co-chairs atwisa2... at kaist.ac.kr.
PROGRAM COMMITTEE MEMBERS
Man Ho Au, Univ. of Wollongong (Australia)
Srdjan Capkun, ETH (Switzerland)
Sang Kil Cha, CMU (USA)
Haibo Chen, Shanghai Jiao Tong U (China)
Xiabo Chen, McAfee (USA)
Byung-Gon Chun, Microsoft Research (USA)
Xuhua Ding, SMU (Singapore)
Nico Golde, Technical Univ. of Berlin (Germany)
Guofei Gu, Texas A&M (USA)
Thorsten Holz, Ruhr-Univ. Bochum (Germany)
Nicholas J. Hopper, Univ. of Minnesota - Twin Cities (USA)
Brent Kang, George Mason U. (USA)
Syed Ali Khayam, NUST (Pakistan)
Hiroaki Kikuchi, Meiji univ. (Japan)
Jong Kim, Postech (Korea)
Seungjoo Kim, Korea Univ (Korea)
Taesoo Kim, MIT (USA)
Taekyoung Kwon, Yonsei Univ (Korea)
Sangjin Lee, Korea Univ (Korea)
Seungjin Lee, Grayhash Inc. (Korea)
Yingjiu Li, SMU (Singapore)
Zhenkai Liang, NUS (Singapore)
Zhen Ling, Southeast Univ. (China)
Tarjei Mandt, Azimuth (Norway)
Kazuhiro Minami. Institute of Statistical Mathematics (Japan)
Collin Mulliner, Northeastern Univ. (USA)
Jung-Chan Na, ETRI (Korea)
Jon Oberheide, Duo security (USA)
Kyoungsoo Park, KAIST (Korea)
Junghwan Rhee, NEC Lab (USA)
Julianor Rizzo, Independent researcher (Argentina)
Stuart Schechter, MSR (USA)
Kiwook Sohn, NSRI (Korea)
Yuji Ukai, Fourteenforty Research Institute (Japan)
Eugene Vasserman, Kansas State Univ (USA)
Xiaofeng Wang, Indiana Univ. (USA)
Tielei Wang, Georgia Tech (USA)
Ralf-Philipp Weinmann, Univ. of Luxembourg (Germany)
Yoojae Won, KISA (Korea)
Wenyuan Xu, Univ. of South Carolina (USA)
Bo-Yin Yang, Academia Sinica (Taiwan)
Jeong Hyun Yi, Soongsil Univ. (Korea)
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
More information about the Tccc
mailing list