The First ACM Workshop on AISec October 27, 2008 http://www.aisec.info Hilton Alexandria Mark Center in Alexandria, VA The ubiquitous nature of information and communication today is often cited as the cause of many security and privacy problems including identity and reputation management, viruses/worms and phishing/pharming. There is strong evidence, however, that this abundance of information and communication has at least as many security and privacy benefits as costs. Consider for example, the use of machine learning algorithms to detect network intrusions, crowd-based approaches to anonymous communication and the use of data mining algorithms to determine content sanitization. All of these efforts benefit from recent advances in AI, which have often been driven by increases in the amount of available data. To fully realize the security and privacy benefits of today's ubiquitous information, the security community needs expertise in the tools and techniques for managing that information, namely, artificial intelligence technology, and the AI community needs an understanding of security and privacy problems. To facilitate an exchange of ideas between these two communities, we are holding the first workshop in "AISec" in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS), the new field of security and privacy solutions that leverage AI technologies. Our full-day workshop will be a mix of technical papers and position papers with ideas for AISec's future. Topics of interest include, but are not limited to: --Spam detection --Fraud detection --Botnet detection --Intrusion detection --Malware identification --Insider threat detection --Privacy-preserving data mining --Inference detection and control --Phishing detection and prevention --Design and analysis of CAPTCHAs --AI approaches to trust and reputation --Machine learning techniques for optimizing user experience --Vulnerability testing through intelligent probing (e.g. fuzzing) --Content-driven security policy management & access control --Techniques and methods for generating training and test sets Paper Submission: We invite original research papers describing significant results using AI techniques to address security and/or privacy problems. We also invite position papers discussing the role of AI in security and privacy. Research submissions should be at most 12 pages excluding the bibliography and well-marked appendices using single-column, 11-point font and reasonable margins on letter-size paper, and at most 15 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Position papers should be at most 3 pages long in total using the same guidelines as above. Submissions need not be anonymized. Details on the submission process will be posted here soon. Dates: Submission deadline: May 9, 2008 Author notifications: July 3, 2008 Camera ready papers due: August 10, 2008 (Firm deadline) Proceedings delivered: 3rd week of October 2008 Workshop: October 27, 2008 Publication: Authors of accepted papers are expected to give full presentations at the workshop. Proceedings will be published by the ACM. Organizing Committee: Program Chairs: Dirk Balfanz (Google) and Jessica Staddon (PARC) Program Committee: Doug Aberdeen, Google Adam Barth, Stanford Alvaro Cardenas, U. C. Berkeley Monica Chew, Google Luca de Alfaro, U. C. Santa Cruz Lisa Getoor, University of Maryland Philippe Golle, PARC Natalie Glance, Google Virgil Griffith, California Institute of Technology Aleksandra Korolova, Stanford Kevin McCurley, Google Zulfikar Ramzan, Symantec Dawn Song, U. C. Berkeley Paul Thompson, Dartmouth