14th International Workshop on Information Security Applications (WISA 2013)
August 19-21, 2013, Jeju Island, Korea
PC Co-Chairs: Yongdae Kim (KAIST), Heejo Lee (Korea Univ), Adrian Perrig

IMPORTANT DATES (subject to change):
   Submissions due:       May 31, 2013
   Papers assigned:             June 3, 2013
   Reviews due:                 July 3, 2013
   Notification:                July 17, 2013

OVERVIEW: Asian Version of USENIX Sec + WOOT!
The 14th International Workshop on Information Security Applications
(WISA 2013) will be held on Jeju Island, Korea on August 19-21, 2013.
It is hosted by the Korea Institute of Information Security and
Cryptology (KIISC), supported by the Electronics & Telecommunications
Research Institute (ETRI) and the Korea Internet & Security Agency
(KISA), and sponsored by the Ministry of Public Administration and
Security (MoPAS) and the Korea Communications Commission (KCC). This
year's program committee chairs decide to convert WISA to be a venue
for discussing system security and offensive technology issues among
researchers in Asia. More specifically, it will resemble two
well-known conferences: USENIX Security and WOOT. The primary focus of
WISA 2013, therefore, is on systems and network security, and the
secondary focus is on offensive technology. Accordingly, the workshop
will be composed of two tracks: regular and OT (Offensive Technology).

Regular paper submissions are solicited in all areas relating to
systems and network security, including:
- Analysis of network and security protocols
- Anonymity and censorship-resistant technologies
- Applications of cryptographic techniques
- Authentication and authorization of users, systems, and applications
- Automated tools for source code/binary analysis
- Botnet defense
- Critical infrastructure security
- Cryptographic implementation analysis and construction
- Denial-of-service attack countermeasures
- Embedded systems security
- Forensics
- Hardware and physical security
- Human-computer interaction, security, and privacy
- Intrusion/anomaly detection and prevention
- Malware analysis
- Mobile/wireless/cellular system security
- Network infrastructure security
- Operating system security
- Physical security
- Security architectures
- Security in heterogeneous and large-scale environments
- Security in ubiquitous computing environments
- Security policy
- Storage and file system security
- Techniques for developing secure systems
- Trustworthy computing
- Web security, including client-side and server-side security

OT paper submissions are solicited in all areas relating to offensive
technology in systems and network security (i.e., written versions of
presentation at hacking conferences such as Blackhat are welcomed!),
- Vulnerability research (software auditing, reverse engineering)
- Penetration testing
- Exploit techniques and automation
- Network­-based attacks (routing, DNS, IDS/IPS/firewall evasion)
- Reconnaissance (scanning, software, and hardware fingerprinting)
- Malware design and implementation (rootkits, viruses, bots, worms)
- Denial­-of-­service attacks
- Web and database security
- Weaknesses in deployed systems (VoIP, telephony, wireless, games)
- Practical cryptanalysis (hardware, DRM, etc.)

The goal of call for Systematization of Knowledge Papers (SoK) is to
encourage work that evaluates, systematizes, and contextualizes
existing knowledge. These papers can provide a high value to our
community but may not be accepted because of a lack of novel research
contributions. Suitable papers include survey papers that provide
useful perspectives on major research areas, papers that support or
challenge long-held beliefs with compelling evidence, or papers that
provide an extensive and realistic evaluation of competing approaches
to solving specific problems. Submissions are encouraged to  analyze
the current research landscape: identify areas that have enjoyed much
research attention, point out open areas with unsolved challenges, and
present a prioritization that can guide researchers to make progress
on solving important challenges. Submissions must be distinguished by
a checkbox on the submission form. In addition, the paper title must
have the prefix "SoK:". They will be reviewed by the full PC and held
to the same standards as traditional research papers, except instead
of emphasizing novel research contributions the emphasis will be on
value to the community. Accepted papers will be presented at the
workshop and included in the proceedings.

There is no arbitrary minimum or maximum length imposed on research
papers. Rather, reviewers will be instructed to weigh the contribution
of a paper relative to its length. Papers should be succinct but
thorough in presenting the work. Typical research papers are 6–15
pages long, but papers can be shorter if the contribution is smaller.
While we will review papers longer than 15 pages, the contributions
must warrant the extra length. Shorter, more focused papers are
encouraged and will be reviewed like any other paper. Papers whose
length is not commensurate with its contribution will be rejected. The
paper should be prepared according to the "Authors Instruction for
LNCS" (http://www.springer.de/comp/lncs/authors.html). Please number
the pages.

ELECTRONIC SUMBMISSION: http://wisa2013.kaist.ac.kr/

Simultaneous submission of the same work to multiple venues,
submission of previously published work, or plagiarism constitutes
dishonesty or fraud. WISA, like other scientific and technical
conferences and journals, prohibits these practices and may take
action against authors who have committed them.
Note: Work presented at industry conferences, such as BlackHat, is not
considered to have been "previously published" for the purposes of
WISA '13. We strongly encourage the submission of such work to WISA,
particularly work that is well suited to a more formal and complete
treatment in a published, peer-reviewed setting. In your submission,
please do note any previous presentations of the work. Authors
uncertain whether their submission meets WISA 2013's guidelines should
contact the program co-chairs at wisa2013@kaist.ac.kr.

Man Ho Au, Univ. of Wollongong (Australia)
Srdjan Capkun, ETH (Switzerland)
Sang Kil Cha, CMU (USA)
Haibo Chen, Shanghai Jiao Tong U (China)
Xiabo Chen, McAfee (USA)
Byung-Gon Chun, Microsoft Research (USA)
Xuhua Ding, SMU (Singapore)
Nico Golde, Technical Univ. of Berlin (Germany)
Guofei Gu, Texas A&M (USA)
Thorsten Holz, Ruhr-Univ. Bochum (Germany)
Nicholas J. Hopper, Univ. of Minnesota - Twin Cities (USA)
Brent Kang, George Mason U. (USA)
Syed Ali Khayam, NUST (Pakistan)
Hiroaki Kikuchi, Meiji univ. (Japan)
Jong Kim, Postech (Korea)
Seungjoo Kim, Korea Univ (Korea)
Taesoo Kim, MIT (USA)
Taekyoung Kwon, Yonsei Univ (Korea)
Sangjin Lee, Korea Univ (Korea)
Seungjin Lee, Grayhash Inc. (Korea)
Yingjiu Li, SMU (Singapore)
Zhenkai Liang, NUS (Singapore)
Zhen Ling, Southeast Univ. (China)
Tarjei Mandt, Azimuth (Norway)
Kazuhiro Minami. Institute of Statistical Mathematics (Japan)
Collin Mulliner, Northeastern Univ. (USA)
Jung-Chan Na, ETRI (Korea)
Jon Oberheide, Duo security (USA)
Kyoungsoo Park, KAIST (Korea)
Junghwan Rhee, NEC Lab (USA)
Julianor Rizzo, Independent researcher (Argentina)
Stuart Schechter, MSR (USA)
Kiwook Sohn, NSRI (Korea)
Yuji Ukai, Fourteenforty Research Institute (Japan)
Eugene Vasserman, Kansas State Univ (USA)
Xiaofeng Wang, Indiana Univ. (USA)
Tielei Wang, Georgia Tech (USA)
Ralf-Philipp Weinmann, Univ. of Luxembourg (Germany)
Yoojae Won, KISA (Korea)
Wenyuan Xu, Univ. of South Carolina (USA)
Bo-Yin Yang, Academia Sinica (Taiwan)
Jeong Hyun Yi, Soongsil Univ. (Korea)