8th SafeConfig (Workshop on Automated Decision Making for Active Cyber Defense)
Co-located with ACM CCS 2015

[Submission Deadline: June 19, 2015]

Workshop Venue: The Denver Marriot City Center, Denver, Colorado, USA
Workshop Date: October 12, 2015
Workshop Website: http://www.cyberdna.uncc.edu/safeconfig/2015/
Co-located Conference Website: http://www.sigsac.org/ccs/CCS2015/

1. Workshop Agenda:

SafeConfig workshop selects each year a new workshop theme to offer a
unique opportunity to researchers form academic, industry as well as
government agencies to come together, discuss these challenges,
exchange experiences, and propose plans for promoting novel research
in this area. This year the title of the workshop is 'Automated
Decision Making for Active Cyber Defense'. Cyber security requires
automated and scalable analytics in order to normalize, model,
integrate, and analyze large and complex data to make correct
decisions on time about security measures against threats. The
automated decision making goals is to determine and improve the
security and resiliency of cyber systems and services. As the current
technology moves toward 'smart' cyber-physical infrastructures as well
as open networking platforms (e.g., software defined networking and
virtual/cloud computing), the need for large-scale security analytics
and automation for decision making significantly increases. SafeConfig
workshop is a one-day program that includes invited talks, technical
presentations of peer-reviewed papers, poster/demo sessions, and joint
panels on research collaboration. This installment of SafeConfig is
being run in conjunction with the CCS (Computing and Communications
Security) conference, to be held on October 12-16, 2015 in Denver,
Colorado. Automated security decision making for new emerging
application domains, such as clouds and data centers, cyber-physical
systems, software defined networking, and Internet of things are of
particular interest to SafeConfig community.

Topics (but are not limited to):
- Analytics of attacks motive and attribution.
- Accountability and provenance.
- Attack prediction and attribution.
- Attack forensics and automated incident analysis.
- Big data analytics for cyber security
- Configuration testing, forensics, debugging and evaluation.
- Continuous monitoring and response.
- Cyber agility and moving target defense.
- Cyber resiliency.
- Cyber-physical systems security.
- Formal semantics of security policies.
- Formal security analytics.
- Bio-inspired security.
- Model composition and integration.
- Risk-aware and context-aware security.
- Software defined networking and cloud computing security.
- Security configuration verification and economics.
- Security hardening and optimization.
- Security games.
- Security metrics.
- Security policy management.
- Theory of defense-of-depth.

2: Submission Guidelines
Papers must present original work and must be written in English. We
require that the authors use the ACM format for papers, using one of
the ACM Proceeding Templates. We solicit two types of papers, regular
papers and position papers. The length of the regular papers in the
proceedings format should not exceed 6 pages for long papers, 3 pages
for short papers, and 1 page for posters, excluding well-marked
references and appendices. Committee members are not required to read
the appendices, so papers must be intelligible without them. Papers
are to be submitted electronically as a single PDF file through EDAS
(submission link: http://edas.info/newPaper.php?c=20715). Authors of
accepted papers must guarantee that their papers will be presented at
the workshop.

3. Important Dates
Abstract Registration Deadline: June 12, 2015
Manuscript Submission: June 19, 2015
Review Notification: July 20, 2015
Camera Ready: July 31, 2015

4. Program chair(s)
Ehab Al-Shaer, UNC Charlotte, USA
Christopher Oehmen, Pacific Northwest National Laboratory, USA
Mohammad Ashiqur Rahman, UNC Charlotte, USA (mrahman4@uncc.edu)

5. Technical Program Committee

6. Contact Info: