Held in conjunction with 22nd ACM Conference on Computer and
Communications Security (CCS),
in Denver, Colorado, USA.  
Oct. 12, 2015

Sharing of cyber-security related information is believed to greatly
enhance the ability of organizations to defend themselves against
sophisticated attacks. If one organization detects a breach sharing
associated security indicators (such as attacker IP addresses, domain
names, file hashes etc.) provides valuable, actionable information to
other organizations. The analysis of shared security data promises
novel insights into emerging attacks. Sharing higher level
intelligence about threat actors, the tools they use and mitigations
provides defenders with much needed context for better preparing and
responding to attacks. In the US and the EU major efforts are underway
to strengthen information sharing.

Yet, there are a number of technical and policy challenges to
realizing this vision. Which information exactly should be shared? How
can privacy and confidentiality be protected? How can we create
high-fidelity intelligence from shared data that minimizes false

The 2nd Workshop on Information Sharing and Collaborative Security
(WISCS 2015) aims to bring together experts and practitioners from
academia, industry and government to present innovative research, case
studies, and legal and policy issues. The workshop solicits original
research papers in these areas, both full and short papers. Workshop
proceedings will be published in the ACM Digital Library. Topics of
interest for the workshop include, but are not limited to:

   Collaborative intrusion detection
   Case studies of information sharing
   Domain name and IP address blacklists 
   Collaborative approaches to spear‐phishing, DDoS and other attacks
   Privacy and confidentiality
   Data deidentification
   Cryptographic protocols for collaborative security
   Scalable security analysis on shared data
   Ontologies and standards for sharing security data 
   UX and behavioral aspects of collaborating
   Policy and legal issues
   Surveillance issues 
   Trust models 
   Attacks on information sharing
   Economics of security collaboration

Paper submission due:  June 22, 2015 (extended) 
Author notification:  July 19, 2015
Camera ready copies due:  July 29, 2015
Workshop:  October 12, 2015.  

Tomas Sander, HP
Richard Struse, DHS
Moti Yung, Columbia University and Google 

Tomas Sander, HP
Moti Yung, Columbia University and Google

Alessandro Acquisti, Carnegie Mellon University   
Ross Anderson, University of Cambridge
Matt Bishop, UC Davis
Sarah Brown, Fox-IT   
Jerry Bryant, Microsoft
Eric Burger, Georgetown University
Scott Coull, Redjack
James Dempsey, UC Berkeley
Julien Freudiger, PARC
Carol Fung, Virginia Commonwealth University    
Panos Kampanikis, CISCO  
Florian Kerschbaum, SAP   
Tom Millar, US CERT
Fabian Monrose, University of North Carolina     
Kathleen Moriarty, EMC
Eric Osterweil, Verisign
Christos Papadopoulos, Colorado State  University    
Ravi Sandhu, UT San Antonio
Oscar Serrano, NATO Communication and Information Agency   
Stuart Shapiro, MITRE   
Abhi Shelat, University of Virginia
Salvatore Stolfo, Columbia University
Jose Such, Lancaster University
Paul Vixie, Farsight Security    
Bulent Yener, Rensselaer Polytechnic Institute


Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. Regular submissions should be at most 10
pages in the ACM double-column format including bibliography, but
excluding well-marked appendices, and at most 12 pages
total. Committee members are not required to read the appendices, and
so the paper should be intelligible without them. Submissions should
not be anonymized. The workshop will also consider short submissions
of up to 4 pages for case studies, results that are preliminary or
that require only a few pages to describe. Authors of regular
submitted papers will indicate at the time of submission whether they
would like their paper to also be considered for publication as a
short paper (4 proceedings pages).

Submissions are to be made to the Easy Chair submission web site at  You will be
requested to upload the file of your paper (in PDF format
only). Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of June 8, 2015 to be considered. Notification of acceptance or
rejection will be sent to authors by July 19, 2015. The camera ready
version must be prepared by July 29, 2015 (firm). Proceedings of the
workshop will be published by ACM on a CD, available to the workshop
attendees. Papers will be included in the ACM Digital Library, with a
specific ISBN. Each accepted paper must be presented by an author, who
will have to be registered by the early-bird registration deadline.

Please contact the program co-chairs Tomas Sander and Moti Yung
( with any questions.