Commentary and Opinion
Sven Dietrich's review of Rootkits and Bootkits - Reversing Modern Malware and Next Generation Threats by Alex Matrosov, Eugene Rodionov, and Sergey Bratus
NewsBits: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Postings new since Cipher E148
Posted May 2019
Stony Brook Univeristy Computer Science and National Security Institute
Stony Brook, NY, USA
Two Senior Tenured Postions in both Cyber Security and Systems
Closes May 2021
URL of position descriptions:
Posted May 2019
University of Twente
Positions for Assistant/Associate/Full Professors in Security and Privacy
Closes May 25, 2019
URL of position descriptions:
Updated May 2019
Vrije Universiteit Amsterdam
PhD/Postdoc in systems security
Job Highlights: https://www.vusec.net/join/
Information: email@example.com (mention VUseek in subject)
Updated May 2019
Department of Computer Science, TU Darmstadt
PostDoc Position in Cybersecurity:
We will consider applications until the positions are filled.
Conference and Workshop Announcements
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
new calls or announcements added since Cipher E148 (the calls-for-papers and the calendar announcements may differ slightly in content or time of update):
SP 2020 41st IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 18-20, 2020. (Submissions are due first day of each month)
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
ACM Transactions on Cyber-Physical Systems (TCPS), Special Issue on Security and Privacy for Connected Cyber-Physical Systems, (Submissions are due 30 June 2019)
Guest Editors: Moreno Ambrosin (Intel Labs, USA), Mauro Conti (University of Padua, Italy),
Riccardo Lazzeretti (Sapienza University of Rome, Italy),
and Chia-Mu Yu (National Chung Hsing University, Taiwan).
This special issue focuses on security & privacy aspects of emerging trends and applications involving Machine-to-Machine Cyber Physical Systems (M2M CPSs) in both generic and specific domain of interests, such as, but not limited to, Safety-Critical Infrastructures, Autonomous Systems, Smart Cities, Intelligent Vehicles, Smart-Health, etc. We invite original research articles proposing innovative solutions to improve IoT security and privacy, taking in account the low resource characteristics of CPS components, the distributed nature of CPSs, and connectivity constraints of IoT devices. Special topics include, but are not limited to, the following:
GameSec 2019 10th Conference on Decision and Game Theory for Security, Stockholm, Sweden, October 30 - November 1, 2019. (Submissions are due 3 June 2019)
As we close the second decade of the 21st century, modern societies are becoming dependent on information, automation, and communication technologies more than ever. Managing security in the resulting systems, many of which are safety critical, poses significant challenges. The 10th Conference on Decision and Game Theory for Security focuses on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. GameSec 2019 invites novel, high-quality theoretical and practically-relevant contributions, which apply decision and game theory, as well as related techniques such as optimization, machine learning, dynamic control and mechanism design, to build resilient, secure, and dependable networked systems. The goal of GameSec 2019 is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connections between game theory, control, distributed optimization, machine learning, economic incentives and real-world security, reputation, trust and privacy problems. Topics of interest include:
MLCS 2019 1st Workshop on Machine Learning for CyberSecurity, Co-located with the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD 2019), Wurzburg, Germany, September 20, 2019. (Submissions are due 7 June 2019)
The last decade has been a critical one regarding cybersecurity, with studies estimating the cost of cybercrime to be up to 0.8 percent of the global GDP. The capability to detect, analyse, and defend against threats in (near) real-time conditions is not possible without employing machine learning techniques and big data infrastructures. This gives rise to cyberthreat intelligence and analytic solutions, such as (informed) machine learning on big data and open-source intelligence, to perceive, reason, learn, and act against cyber adversary techniques and actions. Moreover, organisations' security analysts have to manage and protect systems and deal with the privacy and security of all personal and institutional data under their control. The aim of this workshop is to provide researchers with a forum to exchange and discuss scientific contributions, open challenges and recent achievements in machine learning and their role in the development of secure systems.
ISPEC 2019 15th International Conference on Information Security Practice and Experience, Kuala Lumpur, Malaysia, November 26-28, 2019. (Submissions are due 8 June 2019)
The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors. Areas of interest for ISPEC 2019 include, but are not limited to:
NDSS 2020 Network and Distributed System Security Symposium, San Diego, CA, USA, February 23-26, 2020. (Submissions are due 14 June 2019 and 13 September 2019)
The Network and Distributed System Security Symposium (NDSS) is a top venue
that fosters information exchange among researchers and practitioners of computer,
network and distributed system security. The target audience includes those interested in
practical aspects of network and distributed system security, with a focus on actual system
design and implementation. A major goal is to encourage and enable the Internet community to
apply, deploy, and advance the state of practical security technologies. Technical papers and
panel proposals are solicited. Authors are encouraged to write the abstract and introduction of
their paper in a way that makes the results accessible and compelling to a general computer-security
researcher. All submissions will be reviewed by the Program Committee and accepted submissions will
be published by the Internet Society in the Proceedings of NDSS 2020. The Proceedings will be made
freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all
or parts of papers for noncommercial purposes is granted provided that copies bear the Internet
Society notice included in the first page of the paper. The authors are therefore free to post the
camera-ready versions of their papers on their personal pages and within their institutional repositories.
Reproduction for commercial purposes is strictly prohibited and requires prior consent.
Paper Submission Information: New Submission Model: NDSS will have two review cycles in 2020: the first (Summer) with a submission deadline of June 14, 2019, and the second (Fall) with a submission deadline of September 13, 2019. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.
ETAA 2019 2nd International Workshop on Emerging Technologies for Authorization and Authentication, Held in conjunction with ESORICS 2019, Luxemburg, September 23-27, 2019. (Submissions are due 15 June 2019)
IT devices are day-by-day becoming more pervasive in several application fields and in the everyday life. The major driving factors are the ever increasing coverage of the Internet connectivity, the extreme popularity and capillarity of smartphones, tablets and wearables, together with the consolidation of the Internet of Things (IoT) paradigm. As a matter of fact, interconnected devices directly control and take decisions on industrial processes, regulate infrastructures and services in smart-cities, and manage quality-of-life and safety in smart-homes, taking decisions with user interactions or even autonomously. The involvement of these devices in so many applications, unfortunately introduces a set of unavoidable security and safety implications, related to both the criticality of the aforementioned applications and to the privacy of sensitive information produced and exploited in the process. To address these and other related issues, there is an increasing need of instruments to control the access and the right to perform specific actions on devices or data. These instruments need to be able to cope with the high complexity of the considered applications and environments, being flexible and adaptable to different contexts and architectures, from centralized to fully-distributed, able to handle a high amount of information as well as taking into account non-conventional trust assumptions. The considered technologies should regulate the actions of both human users and autonomous devices, being effective in enforcing security policies, still without introducing noticeable overhead, both on the side of performance and user experience. Hence, the design of secure and efficient mechanisms for continuous authentication, requiring limited-to-no active interaction is solicited. The ETAA workshop aims at being a forum for researchers and practitioners of security active in the field of new technologies for authenticating users and devices, and enforce security policies in new and emerging applications related to mobile/wearable devices and IoT.
DPM 2019 14th International Workshop on Data Privacy Management, Co-located with ESORICS 2019, Luxembourg, September 26-27, 2019. (Submissions are due 17 June 2019)
DPM is an annual international workshop covering research in data privacy management. The aim of this workshop is to discuss and exchange the ideas related to data privacy management. We invite papers from researchers and practitioners working in privacy, security, trustworthy data systems and related areas to submit their original papers in this workshop. Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.
CyberICPS 2019 5th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, Luxembourg, Luxembourg, September 23-27, 2019. (Submissions are due 24 June 2019)
CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015. Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS). These systems also include the emerging trend of Industrial Internet of Things (IIoT) that will be the central part of the fourth industrial revolution. As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber-space, by offering a forum for discussion on all issues related to their cyber security.
IDSC 2019 IEEE Conference on Dependable and Secure Computing, Hangzhou, China, November 18-20, 2019. (Submissions are due 30 June 2019)
The IEEE Conference on Dependable and Secure Computing (IDSC) solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to IDSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The IDSC conference will also include a submission category for experience and practice papers on new findings in the aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community's knowledge about how the security protection of known techniques fares in real-world operations.
ICISS 2019 15th International Conference on Information Systems Security, Hyderabad, India, December 16-19, 2019. (Submissions are due 12 July 2019)
The International Conference on Information Systems Security (ICISS) is a 15-year old forum for the dissemination of research results related to all areas of computer security and privacy. The conference is held annually in India. ICISS solicits previously unpublished research in all areas of security and privacy including building, experimenting with and attacking secure systems, techniques and tools for security analysis and theoretical topics related to security. We encourage submissions from academia, industry and government.
USENIX-Security 2020 29th USENIX Security Symposium, Boston, MA, USA, August 12-14, 2020. (Submissions are due 15 May 2019, 23 August 2019, 15 November, 2019, and 15 February 15 2020)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 10 and 11.
ACM-CCS 2019 26th ACM Conference on Computer and Communications Security, London, United Kingdom, November 11-15, 2019. (Submissions are due 31 January 2019, 15 May 2019, 1 September 2019)
The ACM Conference on Computer and Communications Security (CCS) is the
flagship annual conference of the Special Interest Group on Security, Audit and
Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference
brings together information security researchers, practitioners, developers, and
users from all over the world to explore cutting-edge ideas and results. It provides
an environment to conduct intellectual discussions. From its inception, CCS has
established itself as a high standard research conference in its area. The Conference
on Computer and Communications Security (CCS) seeks submissions presenting
novel contributions related to all real-world aspects of computer security and privacy.
Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper
in a way that makes the results accessible and compelling to a general computer-security
researcher. In particular, authors should bear in mind that anyone on the program
committee may be asked to give an opinion about any paper.
IMPORTANT: CCS will have three review cycles in 2019: the first with a submission deadline of January 31, the second with a submission deadline of May 15, and the third with a tentative submission deadline of September 1. The third review cycle is only for papers invited for resubmission from the first two cycles; no new submissions will be considered. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle.
BlockSys 2019 International Conference on Blockchain and Trustworthy Systems, Guangzhou, China, December 7-8, 2019. (Submissions are due 1 September 2019)
Blockchain has become a hot research area in academia and industry. The blockchain technology is transforming industries by enabling anonymous and trustful transactions in decentralized and trustless environments. As a result, blockchain technology and other technologies for developing trustworthy systems can be used to reduce system risks, mitigate financial fraud and cut down operational cost. Blockchain and trustworthy systems can be applied to many fields, such as financial services, social management and supply chain management. This conference provides scientists and engineers from both industry and academia a platform to present their ongoing work, relate their research outcomes and experiences, and discuss the best and most efficient techniques for the development of blockchain and trustworthy systems.
IFIP11.9-DF 2020 16th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 6-8, 2020. (Submissions are due 15 September 2019)
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately 100 participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the sixteenth volume in the well-known Research Advances in Digital Forensics book series (Springer, Cham, Switzerland) during the summer of 2020. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
Springer Human-centric Computing and Information Sciences, Thematic Issue on Security, trust and privacy for Human-centric Internet of Things, (Submissions are due 30 November 2019)
Guest Editors: Kim-Kwang Raymond Choo (University of Texas at San Antonio, USA),
Uttam Ghosh (Vanderbilt University, USA),
Deepak Tosh (University of Texas El Paso, USA),
Reza M. Parizi (Kennesaw State University, USA),
and Ali Dehghantanha (University of Guelph, Canada).
Cyber-physical system (CPS) integrates both cyber world and man-made physical world using sensors, actuators and other Internet of Things (IoT) devices, to achieve stability, security, reliability, robustness, and efficiency in a tightly coupled environment. Prevalence of such cyber-physical ecosystem (inherently of distributed nature) imposes exacting demands on architect models and necessitates the design of distributed solutions and other novel approaches. This is essential in order to suitably address the security and privacy concerns since CPS ecosystem involves humans as a part of its core. Blockchain technology offers a distributed and scalable solution to maintain a tamper-resistant ledger, which does not require a central authority. Thus, it can best fit the need of distributed solution to above mentioned security issues in CPS. However, the challenge in integrating Blockchain with CPS is yet to be addressed, which requires various cyber-physical nodes to work effectively and collaboratively in an asynchronous environment. The goal of this special issue is to bring together researchers from different sectors to focus on understanding security challenges and attack surfaces of modern cyber-physical systems, and architect innovative solutions with the help of cutting-edge blockchain related technologies. Potential topics include but are not limited to following:
Staying in touch....
IEEE Computer Society's Technical Committee on Security and Privacy
|TC home page||TC Officers|
|How to join the TCSP (or other TCs)||Open Access Proceedings|
|Cipher past issues archive|