CYSARM 2019: Workshop on Cyber-Security Arms Race 2019 |
Website | https://www.cysarm.org/ |
Submission link | https://easychair.org/conferences/?conf=cysarm2019 |
CYSARM 2019: 1st Workshop on Cyber-Security Arms Race, November 15, 2019, London, UK, co-located with the 26th ACM Conference on Computer and Communications Security.
Overview
Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. The goal of CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-offs of cybersecurity and how new security technologies and algorithms might impact the security of existing or future security models.
Submission Guidelines
We invite the following types of papers:
Regular paper submissions should be at most 12 pages in double-column ACM format including the references and appendices (the latest sigconf template is available at: https://www.acm.org/publications/proceedings-template -- authors should not change the font or the margins of the ACM format). Regular papers should describe original work that is not previously published or concurrently submitted elsewhere.
The workshop will also consider short research paper submissions of up to 6 pages, using the same template. Research papers aim at fostering discussion and collaboration by presenting preliminary research activities, work in progress and/or industrial innovations. Research papers may summarize research results published elsewhere or outline new emerging ideas.
Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made on EasyChair. You will be requested to upload the file of your paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN. Each accepted paper must be presented by an author, who will have to register by the early-bird registration deadline.
List of Topics
Topics of interest include but are not limited to:
- Arms races and trade-offs in cyber-security (e.g., attackers vs defenders, security vs privacy, security vs trust, security vs usability, etc.)
- Double-edged sword techniques in cyber-security (e.g., artificial intelligence)
- Impact of quantum computing on cyber-security (not limited to cryptography)
- Intrusion detection and evasion, and counter-evasion (also applied to malware analysis)
- Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact
- Novel attacks and protection solutions in mobile, IoT and Cloud
- Post-quantum cryptography and advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy)
- Security analysis of protocols, including use of formal techniques
- Standardization of cyber security and trust techniques
- Validation of cyber-security technologies
Important Dates
- Submission deadline: 22 July 2019, 11:59 PM (AoE, UTC-12) [Extended]
- Notification of acceptance: 7 August 2019
- Camera-ready papers: 30 August 2019 (hard deadline)
- Workshop date: 15 November 2019
Committees
General Chairs
- Liqun Chen (University of Surrey, UK)
- Chris Mitchell (Royal Holloway, University of London, UK)
Program Co-Chairs
- Thanassis Giannetsos (Technical University of Denmark, DK)
- Daniele Sgandurra (Royal Holloway, University of London, UK)
Program Committee:
- Martin Albrecht (Royal Holloway, University of London)
- Frederik Armknecht (University of Mannheim)
- Sébastien Canard (Orange Labs)
- Ronald Cramer (CWI, Amsterdam, The Netherlands)
- Tassos Dimitriou (Department of Computer Engineering, Kuwait University)
- Pierre-Alain Fouque (Université de Rennes)
- Andrea Höller (Infineon AT)
- Linzhi Jiang (University of Surrey, UK)
- Ghassan Karame (NEC Research Labs, Germany)
- Ioannis Krontiris (Huwaei Technologies, Germany)
- Mark Manulis (University of Surrey, UK)
- Melek Önen (Eurecom)
- David Oswald (University of Birmingham, UK)
- Thomas Poeppelmann (Infineon Technologies AG)
- Matteo Repetto (CNIT, IT)
- Mark D. Ryan (University of Birmingham, UK)
- Peter Y A Ryan (University of Luxembourg)
- Riccardo Sisto (Politecnico di Torino, IT)
- Oriol Farras Ventura (Rovira i Virgili University)
- Christos Xenakis (University of Piraeus, GR)
Venue
The conference will be held in London, UK (co-located with the 26th ACM Conference on Computer and Communications Security).
Contact
All questions about submissions should be emailed to contact@cysarm.org
Sponsors
- FutureTPM: https://futuretpm.eu/ (GA: 779391)
- PROMETHEUS: http://prometheuscrypt.gforge.inria.fr/ (GA:780701)
- ASTRID: https://www.astrid-project.eu/ (GA: 786922)
- PAPAYA: https://www.papaya-project.eu/ (GA: 786767)