CDNG2020: Cyber Defence Next Generation Technology and Science Conference 2020 Customs House 399 Queen St, Brisbane City QLD 4000 Brisbane, Australia, March 24-25, 2020 |
Conference website | https://wp.csiro.au/cdng/ |
Submission link | https://easychair.org/conferences/?conf=cdng2020 |
Submission deadline | January 7, 2020 |
The Cyber Defence Next Generation Technology and Science Conference (CDNG), is a first of its kind scientific and technology focused Cyber Defence Conference to be held on 24 and 25 March, 2020 in Brisbane (QLD).
Scope: The aim is to have the community of Cyber-Security under the “Next Generation Defence Technologies | Cyber Research” program in collaboration with DST-Data61 and partner universities meet together, expose relevant research activities and discuss future collaborations.
The conference will be a venue for PhD students, postdocs and more generally Academics and industrials to share thoughts on what the future challenges in Cyber Security and Cyber Defence look like and how to address them, how best to collaborate, presenting ongoing work, work in Progress and Extended Summary of Recent work potentially published in 2018-2019-2020.
We think it is very valuable to have a forum where the wider community interested in cyber defence meets and unify different perspectives, to hopefully start discussions amongst different smaller communities interested in this problem, and hopefully foster fruitful long-term collaborations with DST, Data61 and the broader network.
Important Dates
- Call for Papers Announced: November 1, 2019.
- Submission system opens: November 7, 2019.
- Submission Deadline: Tuesday January 7, 2020 (AoE 11:59 pm)
- Notifications of Acceptance: January 28, 2020.
- Full Program announced: February 11, 2020.
- Conference Dates: March 24-25, 2020.
Submission Guidelines
We do accept submissions of Work in Progress (WiP), currently under review, or extended summary of recently published work (Work published from 2018 to 2020).
- The conference will not have formal proceedings, but authors of accepted abstracts can choose to have a link to arxiv or a pdf published on the conference webpage.
- Submissions in the form of extended abstracts must be at most 2 pages long (not including references), using the CCS format.
List of Topics
The call for papers is articulated across 6 Areas of Interests.
Trustworthy and Resilient Systems, Networked Systems Security
The ubiquity of the Internet allows us to connect all sorts of devices to the network and gain unprecedented access to a whole range of applications and services anytime, anywhere at the same time also makes it an attractive target for malicious actors to cause disruption to critical services. Design of Secure, Trustworthy and Resilient Systems remains a continual challenge given this ever increasing attack surface. We seek submissions which focus on new research into design, modeling and evaluation of secure systems that can detect attacks, work resiliently under attacks, take countermeasures to prevent or ameliorate potential attacks. Following topics are listed as a guideline but authors are requested to contact the area chair if in doubt.
- Fault-tolerant, secure, and safe middleware
- Intrusion detection and tolerance and Prevention, attack models
- Firewall technologies; authentication and authorization of users, systems, and applications
- Secure Network technologies, including protocols, routers, and switches
- Cryptographic protocols and algorithms applied to systems security
- Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
- File and File System Security
- Secure Cloud and distributed systems
- Secure Pervasive Systems, IoT, and Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)
- Operating System Support (for error/intrusion detection and/or tolerance)
- Dependable, Secure Protocols and Network Interfaces
Cyber AI and Autonomy
Defending the cyber systems and networks is becoming more difficult than ever. The number and complexity of the systems we need to defend continues to rapidly increase, in part because of the pervasive deployment of systems and devices. Attackers are becoming more technically sophisticated, increasingly well organised, and use better tradecraft than ever before. Artificial Intelligence (AI) and autonomous systems are two technologies that may provide an asymmetric advantage to our nation’s defence. By leveraging the recent transformational advances in machine learning and AI, we aim to develop new capabilities to defend our computer systems and networks more effectively and efficiently and minimise human effort. We provide a forum that brings together scientists and researchers to present their cutting-edge innovations in all aspects of the following:
- Vulnerabilities detection and AI
- AI-driven Cyber systems
- Data analytics for critical infrastructure
- Response and recovery
- Cyber attacks and Adversarial machine learning
Cryptography
Cryptography has been well known as the most fundamental primitives to enable secure systems. We seek contributions which address all aspects of cryptography. We welcome submissions presenting novel schemes, theories, techniques, opmitizations and tight reductions and implementations of cryptography for enabling such an efficient and secure system. Topics include but not limited to:
- Efficient schemes and variants
- Provable secure schemes
- Post-quantum cryptography
- Schemes with optimized security reductions
- New techniques on achieving security reductions
- Authentication
- Access Control
Formal Methods; Secure Software Engineering
Formal methods enable reasoning about the security of a software system from logical and mathematical specifications of the software’s behaviour. Such reasoning has the potential to rule out entire classes of security vulnerabilities. Secure programming language features, such as capabilities, also enable reasoning about security of software. We seek contributions which address, or reflect on, the use of formal methods and secure programming approaches in secure software development. Topics include:
- Formal models of access control, information flow, and authorization and trust
- Formal verification techniques for security
- Tool support for security analysis, including theorem proving, model checking, symbolic execution, and static and dynamic program analysis
- Language-based security, including type systems and capabilities
Cyber Situational Awareness
Cyber Situational Awareness (CSA) aims to advance the methods, practices and applications of CSA, including Data Analytics, Assessment, Network Defence, Cyber Warfare and Cyber Physical Systems. We promote military, industrial and academic collaboration across researchers and practitioners, thereby leveraging the practices and knowledge of industry and academia. Topics of interests include:
- Situational Awareness Analytics
- Situational Awareness Assessments
- Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance (C4ISR) and Situational Awareness
- Cyber Physical Systems (CPS)
- Situational Awareness Frameworks
- Human Factors in Situational Awareness
- Security Event and Information Management (SEIM)
- Tools and Techniques for Situational Awareness
Interoperability; autonomous decision making; Software systems and database security
The increasing trend towards integration of the software landscape into ever larger interoperable ecosystems creates new challenges for Cyber Defence. Establishing interoperability requires successful integration and interaction of Cyber Security solutions. The incorporation of autonomous decision making in such ecosystems creates opportunities for autonomous security management, but also raises the challenges of providing security at the level at which these autonomous systems interact with their environment, as demonstrated, for example, by well-known cases of chat bot "corruption". Protecting access and maintaining integrity of databases used throughout an ecosystem becomes a central security issue. We invite submissions on the interaction of Cyber Defence with Interoperability, Autonomy, and Databases, including, but not limited to the following:
- Digital Ecosystem security
- Security mechanism integration
- Security of autonomous agents and systems
- Testing and validation of autonomous decisions
- Autonomous decision making for cyber threat detection and countermeasures
- Cybersecurity for database and data warehouse operations
Committees
General Co-Chairs:
- Dali Kaafar (Macquarie University & CSIRO Data61)
- Ryan Ko (University of Queensland)
- Gareth Parker (Defence Science and Technology Organisation)
Local Arrangement Chair: A/Prof John Williams (University of Queensland)
Technical Program Committee:
- Trustworthy and Resilient Systems, Networked Systems Security:
- (Area Chair) Sanjay Jha (The University of New South Wales)
- Robin Ram Mohan Doss (Deakin University)
- Chris Leckie (The University of Melbourne)
- Vallipuram Muthukkumarasamy (Griffith University)
- Surya Nepal (CSIRO Data61)
- Vijay Varadharajan (University of Newcastle)
- Wanlei Zhou (University of Technology Sydney)
- Cyber AI and Autonomy:
- (Area Chair) Yang Xiang (Swinburne University of Technology)
- Jonathan Oliver (Trend Micro)
- Lei Pan (Deakin University)
- Hua Wang (Victoria University)
- Jiankun Hu (UNSW@Canberra)
- Chao Chen (Swinburne University)
- Jun Zhang (Swinburne University)
- Cryptography:
- (Area Chair) Willy Susilo (University of Wollongong)
- Fuchun Guo (University of Wollongong)
- Nan Li (University of Newcastle)
- Hui Cui (Murdoch University)
- Hassan Asghar (Macquarie University)
- Formal Methods; Secure Software Engineering:
- (Area Chair) Graeme Smith (University of Queensland & DST)
- Toby Murray (University of Melbourne)
- Annabelle McIver (Macquarie University)
- Alwen Tiu (Australian National University)
- Yi Lu (Queensland University of Technology)
- Cyber Situational Awareness:
- (Area Chair) Mike Johnstone (Edith Cowan University)
- Brett Biddington (Biddington Research Pty Ltd)
- Andrew Dowse (Edith Cowan University)
- Glenn Murray (Sapien Cyber)
- Tony Marceddo (Edith Cowan University)
- Ben Whitham (Penten Pty Ltd)
- Interoperability; autonomous decision making; Software systems and database security:
- (Area Chair) Markus Stumptner (University of South Australia)
- Aditya Ghose (University of Wollongong)
- Georg Grossmann (University of South Australia)
- Wolfgang Mayer (University of South Australia)
- Abdul Sattar (Griffith University)
- Michael Schrefl (Johannes Kepler University, Linz, Austria)
Submission Systems and Publications Co-Chairs:
- Jonathan Chan (CSIRO Data61)
- Ikram Muhammad (Macquarie University)
Web Administrator: Brigitte Biscotto (CSIRO Data61)
Contact
All questions about submissions should be emailed to Jonathan Chan (CSIRO Data61)