--------------------------------------------------------- 14th International Workshop on Information Security Applications (WISA 2013) August 19-21, 2013, Jeju Island, Korea PC Co-Chairs: Yongdae Kim (KAIST), Heejo Lee (Korea Univ), Adrian Perrig (ETH) http://www.wisa.or.kr/ --------------------------------------------------------- IMPORTANT DATES (subject to change): Submissions due: May 31, 2013 Papers assigned: June 3, 2013 Reviews due: July 3, 2013 Notification: July 17, 2013 OVERVIEW: Asian Version of USENIX Sec + WOOT! The 14th International Workshop on Information Security Applications (WISA 2013) will be held on Jeju Island, Korea on August 19-21, 2013. It is hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics & Telecommunications Research Institute (ETRI) and the Korea Internet & Security Agency (KISA), and sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC). This year's program committee chairs decide to convert WISA to be a venue for discussing system security and offensive technology issues among researchers in Asia. More specifically, it will resemble two well-known conferences: USENIX Security and WOOT. The primary focus of WISA 2013, therefore, is on systems and network security, and the secondary focus is on offensive technology. Accordingly, the workshop will be composed of two tracks: regular and OT (Offensive Technology). Regular paper submissions are solicited in all areas relating to systems and network security, including: - Analysis of network and security protocols - Anonymity and censorship-resistant technologies - Applications of cryptographic techniques - Authentication and authorization of users, systems, and applications - Automated tools for source code/binary analysis - Botnet defense - Critical infrastructure security - Cryptographic implementation analysis and construction - Denial-of-service attack countermeasures - Embedded systems security - Forensics - Hardware and physical security - Human-computer interaction, security, and privacy - Intrusion/anomaly detection and prevention - Malware analysis - Mobile/wireless/cellular system security - Network infrastructure security - Operating system security - Physical security - Security architectures - Security in heterogeneous and large-scale environments - Security in ubiquitous computing environments - Security policy - Storage and file system security - Techniques for developing secure systems - Trustworthy computing - Web security, including client-side and server-side security OT paper submissions are solicited in all areas relating to offensive technology in systems and network security (i.e., written versions of presentation at hacking conferences such as Blackhat are welcomed!), including: - Vulnerability research (software auditing, reverse engineering) - Penetration testing - Exploit techniques and automation - Network-based attacks (routing, DNS, IDS/IPS/firewall evasion) - Reconnaissance (scanning, software, and hardware fingerprinting) - Malware design and implementation (rootkits, viruses, bots, worms) - Denial-of-service attacks - Web and database security - Weaknesses in deployed systems (VoIP, telephony, wireless, games) - Practical cryptanalysis (hardware, DRM, etc.) SYSTEMAZATION of KNOWLEDGE PAPERS (SOK) The goal of call for Systematization of Knowledge Papers (SoK) is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers can provide a high value to our community but may not be accepted because of a lack of novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Submissions are encouraged to analyze the current research landscape: identify areas that have enjoyed much research attention, point out open areas with unsolved challenges, and present a prioritization that can guide researchers to make progress on solving important challenges. Submissions must be distinguished by a checkbox on the submission form. In addition, the paper title must have the prefix "SoK:". They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the workshop and included in the proceedings. GENERAL GUIDELINES for AUTHORS There is no arbitrary minimum or maximum length imposed on research papers. Rather, reviewers will be instructed to weigh the contribution of a paper relative to its length. Papers should be succinct but thorough in presenting the work. Typical research papers are 615 pages long, but papers can be shorter if the contribution is smaller. While we will review papers longer than 15 pages, the contributions must warrant the extra length. Shorter, more focused papers are encouraged and will be reviewed like any other paper. Papers whose length is not commensurate with its contribution will be rejected. The paper should be prepared according to the "Authors Instruction for LNCS" (http://www.springer.de/comp/lncs/authors.html). Please number the pages. ELECTRONIC SUMBMISSION: http://wisa2013.kaist.ac.kr/ POLICIES and CONTACT INFORMATION Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. WISA, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. Note: Work presented at industry conferences, such as BlackHat, is not considered to have been "previously published" for the purposes of WISA '13. We strongly encourage the submission of such work to WISA, particularly work that is well suited to a more formal and complete treatment in a published, peer-reviewed setting. In your submission, please do note any previous presentations of the work. Authors uncertain whether their submission meets WISA 2013's guidelines should contact the program co-chairs at wisa2013@kaist.ac.kr. PROGRAM COMMITTEE MEMBERS Man Ho Au, Univ. of Wollongong (Australia) Srdjan Capkun, ETH (Switzerland) Sang Kil Cha, CMU (USA) Haibo Chen, Shanghai Jiao Tong U (China) Xiabo Chen, McAfee (USA) Byung-Gon Chun, Microsoft Research (USA) Xuhua Ding, SMU (Singapore) Nico Golde, Technical Univ. of Berlin (Germany) Guofei Gu, Texas A&M (USA) Thorsten Holz, Ruhr-Univ. Bochum (Germany) Nicholas J. Hopper, Univ. of Minnesota - Twin Cities (USA) Brent Kang, George Mason U. (USA) Syed Ali Khayam, NUST (Pakistan) Hiroaki Kikuchi, Meiji univ. (Japan) Jong Kim, Postech (Korea) Seungjoo Kim, Korea Univ (Korea) Taesoo Kim, MIT (USA) Taekyoung Kwon, Yonsei Univ (Korea) Sangjin Lee, Korea Univ (Korea) Seungjin Lee, Grayhash Inc. (Korea) Yingjiu Li, SMU (Singapore) Zhenkai Liang, NUS (Singapore) Zhen Ling, Southeast Univ. (China) Tarjei Mandt, Azimuth (Norway) Kazuhiro Minami. Institute of Statistical Mathematics (Japan) Collin Mulliner, Northeastern Univ. (USA) Jung-Chan Na, ETRI (Korea) Jon Oberheide, Duo security (USA) Kyoungsoo Park, KAIST (Korea) Junghwan Rhee, NEC Lab (USA) Julianor Rizzo, Independent researcher (Argentina) Stuart Schechter, MSR (USA) Kiwook Sohn, NSRI (Korea) Yuji Ukai, Fourteenforty Research Institute (Japan) Eugene Vasserman, Kansas State Univ (USA) Xiaofeng Wang, Indiana Univ. (USA) Tielei Wang, Georgia Tech (USA) Ralf-Philipp Weinmann, Univ. of Luxembourg (Germany) Yoojae Won, KISA (Korea) Wenyuan Xu, Univ. of South Carolina (USA) Bo-Yin Yang, Academia Sinica (Taiwan) Jeong Hyun Yi, Soongsil Univ. (Korea)