First IEEE International Workshop on
Security and Forensics in Communication Systems (SFCS 2012)

In conjunction with IEEE ICC 2012

Ottawa, Canada 
10-15 June 2012

Digital attacks are continuing to increase at an alarming rate. They
target a wide variety of protocols and communication systems ranging
from servers and end-user machines to wireless and mobile networks and
devices. The absence of supporting evidence and technically sound
methods may prevent administrators from: proving the identity of the
guilty party, identifying the root vulnerability to prevent a future
occurrence of a similar incident, and understanding the attacker's
motivation for an efficient design of security solutions. In this
context, digital forensic engineering is emerging as a disciplined
science in charge of developing novel scientific and theoretical
methods, techniques, and approaches to collect, process, and analyze
information retrieved from systems affected by security incidents and
generate conclusive descriptions.

The SFCS 2012 Workshop will bring together researchers, scientists,
engineers and practitioners involved in research in the fields of
communication systems security and forensics, to present their latest
research findings, ideas, and developments.

Topics of interest include, but are not limited to:
- Formal aspects of network security
- Theoretical techniques of digital forensics
- Embedded and handled devices forensic
- Evidence preservation, management, storage, reassembly, and analysis
- Anti-forensics prevention detection and analysis
- Development of Investigation processes and procedures
- Automated analysis of evidence
- Forensics in multimedia and communication protocols
- Security and Investigation techniques in wireless and mobile
  communication systems
- Risk analysis and management in communication systems
- Social networks security and forensics
- Collaborative and distributed digital investigation
- Hypothetical reasoning in forensics and incident response
- Legal and policy issues in digital forensics
- Intrusion Detection, incident response, and evidence handling
- Vulnerability analysis and assessment, and analysis of malware
- Cryptography and forensics techniques in multimedia communication
- Data hiding, extraction, and recovery techniques
- Techniques for Tracking and traceback of attacks in systems and networks
- Availability, privacy, authentication, and anonymity
- Secure e-services, e-government, e-learning, e-voting, and
  m-commerce applications
- File systems memory analysis
- Infrastructure protection, and Virtual Private Networks security
- Storage system protection and forensics
- Physical and Biometric security

Authors are invited to submit papers representing original work, which
must not be published previously or under consideration for
publication elsewhere. All submissions should be written in English
with a maximum paper length of five (5) printed pages (IEEE style),
but one additional page is allowed with additional publication
fee. All papers will be peer reviewed by TPC members and other experts
in the field of security and digital forensics. A detailed description
of papers submission procedure is available in the ICC 2012 web
site. Papers submission is handled via EDAS.

Paper Submission Deadline:             November 30, 2011
Acceptance/Rejection Notification:     January 30, 2012
Camera Ready Submission Deadline:      February 15, 2012