CSET'24
https://cset24.isi.edu/cfp.html
csetchairs@gmail.com
Call for Papers

CSET 2024 is sponsored by the USC Information Sciences Institute. We
plan to hold the workshop in hybrid format on Tuesday, August 13,
preceding USENIX Security Symposium 2024.

Important Dates:

    Paper submissions due: May 17, 2024
    Notification to authors: June 21, 2024
    Final paper files due: July 12, 2024
    Workshop: Tuesday, August 13, 2024 - hybrid participation 

Overview

For 16 years, the Workshop on Cyber Security Experimentation and Test
(CSET) has been an important and lively space for discussing all
encompassing cybersecurity topics related to reliability, validity,
reproducibility, transferability, ethics, and scalability — in
practice, in research, and in education. Submissions are particularly
encouraged to employ a scientific approach to cybersecurity and
demonstrably grow community resources.  Invited Topics

For CSET '24, we solicit exciting work across a broad range of areas
relevant to security and privacy. A list of topics of interest
(broadly interpreted):

    Cybersecurity research methods: designing and conducting large and
    complex system evaluations in the context of cybersecurity, i.e.,
    experiences and discussions of qualitative and quantitative
    methods, what are the models and tools that facilitate research.

    Measurement and metrics: measurement required to understand
    performance and optimization of cybersecurity systems and defining
    appropriate metrics, i.e., valid metrics, test cases, and
    benchmarks, effectiveness of metric in evaluation, impact of
    measurement on evaluation.

    Data sets: collection, analysis, and interpretation of data for
    cyber security, i.e., what makes good data sets and how do we
    compare data sets, methods to collect, generate, or derive new
    ones, historical impact of a dataset.

    Experimental infrastructure: testbeds, simulations, emulations,
    and virtualizations, i.e., designing, orchestrating, and deploying
    testbeds, tools for improving testbed operation and maintenance,
    usage and impact studies of experimentation infrastructure.

    Education: surveys, tools, and techniques for cyber security
    education and training, i.e., evaluating and presenting
    educational approaches to cybersecurity, approaches that leverage
    datasets, utilize testbeds, apply experiential learning
    principles, or promote awareness of research methods and sound
    measurement approaches.

    High consequence cyber systems: rigorous experimental
    methodologies, i.e., appropriate design of experiments, parameter
    sampling strategies, quantifying uncertainties with confidence
    intervals, ensuring reproducibility, and validating models.

    Ethics in cybersecurity: tussle between security and privacy,
    i.e., experiences balancing stakeholder considerations,
    participant privacy, frameworks for evaluating the ethics of
    cybersecurity experiments, and illustrative experiment samples for
    ethical conduct that upholds the code outlined in [].

    Evaluating real-world security controls: measurements of deployed
    security frameworks, i.e., evaluation methodologies for real-world
    security performance, user-related characteristics (behavior,
    demographics) modeling, cybersecurity and social media.

Proceedings

CSET 2024 proceedings will be published through ACM’s International
Conference Proceedings Series (ICPS). See ACM's new Open Access
Guidance for ICPS Authors.  Sharing Research Artifacts

CSET is focused on advancing the state-of-the-art and the
state-of-the-practice in cybersecurity in practice, research, and
education. Authors are strongly encouraged to share artifacts whenever
possible in order to enable transparency (e.g., analysis or
validation) and to facilitate the accumulation of resources for the
cybersecurity community. Sharing will be taken into account by
reviewers; however, it is not a requirement for acceptance. If the
research presented in a paper produced research artifacts (e.g., code,
data), authors should include in the paper an artifact-sharing
statement describing whether some or all of the artifacts will be made
available to the community, and if so, how they will be shared (e.g.,
web site). This statement should be present during both submission and
in the final version of the paper.

Submission Length Options

Page length limits vary by the type of submission:

    Short Paper: Submissions must be no longer than four pages. Short
    papers should provide enough context and background for the reader
    to understand the contribution. We envision that short papers will
    be preliminary work or extended work papers, but this is not a
    hard requirement.

    Long Paper: Submissions must be no longer than eight pages. We
    envision that long papers will be the more traditional type of
    CSET research paper, but this is not a hard requirement.

Submissions should use (2-column) ACM proceedings templates. The page
length limits include the space allowed for all tables and
figures. References and appendices are excluded from page limits,
however reviewers are not required to view the appendices when
evaluating submissions.

Submission Types

During the submission process, authors will be asked to categorize
their submission as either a research paper, position paper,
experience paper, preliminary work paper, or extended work
paper. While reviewers can see this categorization, the review process
for all submission types will be identical. For all submissions, the
program committee will give greater weight to papers that lend
themselves to interactive discussion among workshop attendees.

    Research Paper: make a novel contribution in line with one of the
    topics of interest.

    Position Paper: discuss new or provocative ideas of interest to
    the CSET community.

    Experience Paper: describe activities and recount lessons learned
    (e.g., from experiments or deployments) that might help
    researchers in the future.

    Preliminary Work Paper: describe early results from interesting
    and new ideas. We anticipate that such works-in-progress papers
    may eventually be extended as full papers for publication at a
    conference.

    Extended Work Paper: expand upon unpublished aspects of a previous
    work (published in any venue). We welcome papers that provide a
    compelling addition to a previously developed approach, method,
    tool, measurement, benchmark, data set, simulation/emulation,
    evaluation results, etc. Note that submissions in this category
    can extend the work of others (e.g., using a previously published
    tool in a new way). Submissions in this category should clearly
    explain which sections are novel compared to prior work.

Anonymization and the Review Process

The review process will be double-blind; all submissions should be
anonymized so as not to reveal the authors’ names or affiliations
during the review process.

Ethics & Human Subjects

Submissions that have potential ethical implications must include a
section on ethics. Any submission that introduces research or results
related to human subjects (including their data) must include a
statement on its review by the appropriate institutional review
boards.

Respectful and Inclusive Terminology

Please refer to the ACM’s list of charged terminology and use
alternatives in your submissions.

Submitting

All anonymized papers must be submitted in PDF format via the
submission system https://cset24.hotcrp.com/. Please do not email
submissions.

The following templates are available for preparing your submission:

    Overleaf: The ACM LaTeX template on Overleaf platform is available
    to all ACM authors at this link. Please use
    "\documentclass[sigconf, screen, review]{acmart}" to achieve
    double-column format.

    LaTeX: Please use the latest version of the Primary Article
    Template - LaTeX (1.83; published February 22, 2022) to create
    your article submission. Use the "\documentclass[sigconf, screen,
    review]{acmart}" call to create a double column format. Please
    review the LaTeX documentation and ACM’s LaTeX best practices
    guide should you have any questions.

    Microsoft Word: Write your paper using the Submission Template
    (Review Submission Format). Follow the embedded instructions to
    apply the paragraph styles to your various text elements. Please
    apply double-column style.

Please see ACM's Open Access Guidance for ICPS Authors for information
about production charges, as you may be required to make a payment for
your publication if it is accepted into the workshop proceedings.
Further Notes

At least one author from every accepted paper must register for the
workshop and present the paper. Fraud and dishonesty are prohibited,
including: simultaneous submission of the same work to multiple
venues, submission of previously published work, and
plagiarism. Papers accompanied by nondisclosure agreement forms will
not be considered.

Committees

Please see the Committees page.