VizSEC 2007 Workshop on Visualization for Computer Security October 29, 2007 Sacramento, CA USA In conjunction with IEEE Vis 2007 and IEEE InfoVis 2007 Sponsored by NSA's National Information Assurance Research Laboratory (NIARL) http://vizsec.org/workshop2007/ Call for Participation: The VizSEC 2007 Workshop on Visualization for Computer Security will provide a forum for new research in visualization for computer security. Building on the success of the previous three VizSEC workshops, we will again be meeting in conjunction with the IEEE Vis and InfoVis Conferences. The workshop will be held in Sacramento, CA USA on October 29, 2007. Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems. As a result of previous VizSEC workshops, we have seen both the application of existing visualization techniques to security problems and the development of novel security visualization approaches. However, while security visualization research has addressed the development of applications there has only been limited coverage of user needs and designing visualization to support those needs. To address this shortcoming, the theme of this year's workshop will be on applying user-centered design to VizSEC research, focusing on integrating users' needs, visualization design, and evaluation. This year's workshop will be an incubator for new ideas related to security visualization, a forum for garnering feedback from peers, and a place to identify and meet potential collaborators. Paper Submission: We solicit papers that report results on visualization techniques and systems in solving all aspects of cyber security problems. Topics include, but are not limited to: o Visualization of Internet routing for security o Visualization of packet traces and network flows for security o Visualization of security vulnerabilities and attack paths o Visualization of intrusion detection alerts o Visualization of application processes for security o Visualization for forensic analysis o Visualization for correlating events o Visualization for computer network defense training o Visualization for offensive information operations o Visualization for feature selection o Visualization for detecting anomalous activity o Deployment and field testing of VizSEC systems o Evaluation and user testing of VizSEC systems o User and design requirements for VizSEC systems o Lessons learned from VizSEC systems development and deployment Papers should be no more than 10 pages, including bibliography and high resolution, color images. All submissions must be in PDF format and should not be blinded. All submitted papers will be peer-reviewed. Accepted papers will be published in an edited book by Springer after the workshop. Important Dates: September 14, 2007: Full paper due (up to 10 pages) October 5, 2007: Paper acceptances announced October 29, 2007: Workshop Workshop Chair: John Goodall, Secure Decisions division of Applied Visions, Inc. Program Co-Chairs: Kwan-Liu Ma, University of California at Davis Gregory Conti, United States Military Academy Program Committee: Kulsoom Abdullah, Georgia Institute of Technology Jim Agutter, University of Utah Stefan Axelsson, Blekinge Institute of Technology Anita D'Amico, Secure Decisions Deborah Frincke, Pacific Northwest National Laboratory John Gerth, Stanford University Patrick Hertzog, NEXThink S.A. Kiran Lakkaraju, University of Illinois at Urbana-Champaign Yarden Livnat, University of Utah Raffael Marty, Splunk Daniel Keim, University of Konstanz Stephen North, AT&T Research Penny Rheingans, UMBC Walt Tirenin, Air Force Research Laboratory Soon Tee Teoh, San Jose State University Kirsten Whitley, Department of Defense