The fifth annual APWG eCrime Researchers Summit once again will be held in conjunction with the 2010 APWG General Meeting between October 18-20, 2010 at Southern Methodist University in Dallas, TX. http://www.ecrimeresearch.org/2010/cfp.html eCRS 2010 will bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it, Topics of interests include (but are not limited to): * Phishing, rogue-AV, pharming, click-fraud, crimeware, extortion and emerging attacks. * Technical, legal, political, social and psychological aspects of fraud and fraud prevention. * Malware, botnets, ecriminal/phishing gangs and collaboration, or money laundering. * Techniques to assess the risks and yields of attacks and the success rates of countermeasures. * Delivery techniques, including spam, voice mail and rank manipulation; and countermeasures. * Spoofing of different types, and applications to fraud. * Techniques to avoid detection, tracking and takedown; and ways to block such techniques. * Honeypot design, data mining, and forensic aspects of fraud prevention. * Design and evaluation of user interfaces in the context of fraud and network security. * Best practices related to digital forensics tools and techniques, investigative procedures, and evidence acquisition, handling and preservation. Accepted papers will appear in the IEEE Digital Library. In addition, cash awards will be given for the best paper overall and the best student co-authored paper. A limited number of cash travel awards will also be made to student authors of papers and posters. Instructions for Authors Submissions should be in English, in PDF format with all fonts embedded, formatted using the the IEEE conference template, found here: http://www.ieee.org/web/publications/authors/transjnl/index.html. Submissions should include author names, affiliations and acknowledgments. They should not exceed 12 letter-sized pages, not counting the bibliography and appendices. Papers should begin with a title, abstract, and an introduction that clearly summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Papers should contain a scholarly exposition of ideas, techniques, and results, including motivation, relevance to practical applications, and a clear comparison with related work. Committee members are not required to read appendices, and papers should be intelligible without them. Submitted papers risk being rejected without consideration of their merits if they do not follow all the above guidelines. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings. Authors will be asked to indicate whether their submissions should be considered for the best student paper award; any paper co-authored by a full-time student is eligible for this award. Authors of accepted papers must guarantee that their paper will be presented at the conference. A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are given priority to receive such assistance. Requests for stipends should be addressed to the general chair after August 10. Full papers have to be submitted via EDAS through the following short link: http://edas.info/N8471. First, papers have to be registered, then authors can upload their papers. A successful submission can be viewed in EDAS, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up. Research In Progress (RIP) A special category is available in the paper submission system for Research in Progress (RIP). This category allows for research that is not yet ready for publication but would be of interest to other researchers for presentation and discussion. For consideration in this category please submit an extensive abstract via the paper submission system. RIPs have to be submitted via EDAS through the following short link: http://edas.info/N8471. First, RIPs have to be registered, then authors can upload their papers. A successful submission can be viewed in EDAS, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up. Posters We also seek poster abstracts describing recent or ongoing research or experience in all areas related to the prevention of electronic crime. Submission of late breaking results and work in progress is especially encouraged. Posters will not be published, and thus may substantially overlap published papers or papers simultaneously submitted to a conference or journal. Submissions should follow the same formatting instructions as refereed papers, but should be at most two pages and need not be blinded or include abstracts, keywords, copyright boxes, etc. The conference will include a poster session in which authors will exhibit their posters. Note, poster abstracts should be formatted like short papers, not like posters. Authors of accepted posters will be sent information about how to prepare and format posters for the conference. Poster abstracts have to be submitted via EDAS through the following short link: http://edas.info/N8471. First, poster abstracts have to be registered, then authors can upload their abstracts. A successful submission can be viewed in EDAS, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up. Important Dates All submissions due by 11:59pm US EDT * Full paper submissions due: May 30, 2010 * RIP paper submissions due: June 13, 2010 * Paper notification: Aug 1, 2010 * Poster submissions due: August 29, 2010 * Poster notifications: September 5, 2010 * Conference: October 18-20, 2010 * Camera ready due: October 27, 2010 Organizing Committee General Chair: Randy Vaughn, Baylor University Program Co-Chairs: * Suku Nair, Southern Methodist University * Paul Watters, University of Ballarat Steering Committee: * Don M. Blumenthal, Global Cyber Risk LLC * Jay Brennan, Mitre * Markus Jakobsson, Palo Alto Research Center * Oliver Friedrichs, Immunet * Susanne Wetzel, Stevens Institute of Technology Technical Program Committee: * Saeed Abu-Nimeh, Websense Security Labs * Don Blumenthal, DMB Associates, LLC * Jay Brennan, Mitre * Hakki Cankaya, University of Texas at Dallas * John Carlson, Baylor University * Ebrima Ceesay, Booz Allen Hamilton * Ebru Celikel, University of North Texas * Madhusudhanan Chandrasekaran, Amazon * Senthil Cheetancheri, SonicWall * Thomas Chen, Swansea University * Michael Collins, RedJack * Oliver Friedrichs, Immunet * Markus Jakobsson, PARC * Ponnurangam Kumaraguru, IIIT Delhi * Tyler Moore, Harvard University * Thomas Morris, Mississippi State University * Steven Myers, Indiana University * Padmaraj Nair, Fujitsu Limited * Dario Nappa, TriQuint Semiconductor * Jose Nazario, Arbor Networks * Bryan Parno, Carnegie Mellon University * Steve Sheng, ICAAN * Gary Warner, University of Alabama at Birmingham * Susanne Wetzel, Stevens Institute of Technology