The First ACM Workshop on AISec
October 27, 2008

Hilton Alexandria Mark Center in Alexandria, VA

The ubiquitous nature of information and communication today is often
cited as the cause of many security and privacy problems including
identity and reputation management, viruses/worms and
phishing/pharming. There is strong evidence, however, that this
abundance of information and communication has at least as many
security and privacy benefits as costs. Consider for example, the use
of machine learning algorithms to detect network intrusions,
crowd-based approaches to anonymous communication and the use of data
mining algorithms to determine content sanitization. All of these
efforts benefit from recent advances in AI, which have often been
driven by increases in the amount of available data.

To fully realize the security and privacy benefits of today's
ubiquitous information, the security community needs expertise in the
tools and techniques for managing that information, namely, artificial
intelligence technology, and the AI community needs an understanding
of security and privacy problems. To facilitate an exchange of ideas
between these two communities, we are holding the first workshop in
"AISec" in conjunction with the 15th ACM Conference on Computer and
Communications Security (CCS), the new field of security and privacy
solutions that leverage AI technologies. Our full-day workshop will be
a mix of technical papers and position papers with ideas for AISec's

Topics of interest include, but are not limited to:

--Spam detection
--Fraud detection
--Botnet detection
--Intrusion detection
--Malware identification
--Insider threat detection
--Privacy-preserving data mining
--Inference detection and control
--Phishing detection and prevention
--Design and analysis of CAPTCHAs
--AI approaches to trust and reputation
--Machine learning techniques for optimizing user experience
--Vulnerability testing through intelligent probing (e.g. fuzzing)
--Content-driven security policy management & access control
--Techniques and methods for generating training and test sets

Paper Submission:

We invite original research papers describing significant results
using AI techniques to address security and/or privacy problems. We
also invite position papers discussing the role of AI in security and

Research submissions should be at most 12 pages excluding the
bibliography and well-marked appendices using single-column, 11-point
font and reasonable margins on letter-size paper, and at most 15 pages
total. Committee members are not required to read the appendices, and
so the paper should be intelligible without them. Position papers
should be at most 3 pages long in total using the same guidelines as
above. Submissions need not be anonymized.

Details on the submission process will be posted here soon.


Submission deadline: May 9, 2008
Author notifications: July 3, 2008
Camera ready papers due: August 10, 2008 (Firm deadline)
Proceedings delivered: 3rd week of October 2008
Workshop: October 27, 2008

Publication: Authors of accepted papers are expected to give full
presentations at the workshop. Proceedings will be published by the

Organizing Committee:

Program Chairs: Dirk Balfanz (Google) and Jessica Staddon (PARC)

Program Committee:
Doug Aberdeen, Google
Adam Barth, Stanford
Alvaro Cardenas, U. C. Berkeley
Monica Chew, Google
Luca de Alfaro, U. C. Santa Cruz
Lisa Getoor, University of Maryland
Philippe Golle, PARC
Natalie Glance, Google
Virgil Griffith, California Institute of Technology
Aleksandra Korolova, Stanford
Kevin McCurley, Google
Zulfikar Ramzan, Symantec
Dawn Song, U. C. Berkeley
Paul Thompson, Dartmouth