To: cipher@mailman.xmission.com Subject: IEEE CIPHER, Issue 85, July 19, 2008 --text follows this line-- ----------------------------------------------------------------------- Subject: Electronic CIPHER, Issue 85, July 19, 2008 _/_/_/_/ _/_/_/ _/_/_/_/ _/ _/ _/_/_/_/ _/_/_/_/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/_/_/_/ _/_/_/_/ _/_/ _/_/_/_/ _/ _/ _/ _/ _/ _/ _/ _/ _/_/_/_/ _/_/_/ _/ _/ _/ _/_/_/_/ _/ _/ ============================================================================ Newsletter of the IEEE Computer Society's TC on Security and Privacy Electronic Issue 85 July 19, 2008 Hilarie Orman, Editor Sven Dietrich, Assoc. Editor cipher-editor @ ieee-security.org cipher-assoc-editor @ ieee-security.org Yong Guan Book Review Editor Calendar Editor cipher-bookrev @ ieee-security.org cipher-cfp @ ieee-security.org ============================================================================ The newsletter is also at http://www.ieee-security.org/cipher.html Cipher is published 6 times per year Contents: * Letter from the Editor * Commentary and Opinion o Richard Austin's review of Crimeware: Understanding New Attacks and Defenses by M. Jakobsson and Z. Ramzan o Review of the Computer Security Foundations Symposium (CMU, Pittsburgh, Pennsylvania, USA, June 23-25, 2008) by Kumar Avijit o Book reviews, Conference Reports and Commentary and News items from past Cipher issues are available at the Cipher website * Conference and Workshop Announcements o Upcoming calls-for-papers and events * List of Computer Security Academic Positions, by Cynthia Irvine * Staying in Touch o Information for subscribers and contributors o Recent address changes * Links for the IEEE Computer Society TC on Security and Privacy o Becoming a member of the TC o TC Officers o TC publications for sale ==================================================================== Letter from the Editor ==================================================================== Dear Readers: The two major events of the Technical Committee year have finished, and this Cipher issue features a report on the talks at the Computer Security Foundations Symposium from Avijit Kumar. The symposium explores many of the theoretical questions arising from work done in more general conferences and are valuable resources for researchers. Kumar's summaries give us an inviting glimpse into current trends. Richard Austin's book review gives us another glimpse, this one into the criminal and greedy minds that lurk at the edges of our network connected computers, looking for ways to separate the unwary user from his money. I ran across an interesting news story just today that has a delightful twist on computer theft. An instructor's computer vanished from a college classroom on the day a visitor had been present. There was no kind of security monitor in the room, but the instructor was able to give police what they needed to recover the computer and arrest the visitor. It seems that the computer had a built-in webcam and was configured to upload images to a website. When the suspect's picture appeared on the website, the police knocked on his door. Where will mote cameras show up next? I sing "tiny cameras, in the wine, tiny cameras, make me feel fine." If no malware be icumen in, lhude sing cuccu, Happy Summer, Hilarie Orman cipher-editor @ ieee-security.org ==================================================================== Commentary and Opinion ==================================================================== Book reviews from past issues of Cipher are archived at http://www.ieee-security.org/Cipher/BookReviews.html, and conference reports are archived at http://www.ieee-security.org/Cipher/ConfReports.html ____________________________________________________________________ Book Review By Richard Austin 7/15/08 ____________________________________________________________________ Crimeware: Understanding New Attacks and Defenses by M. Jakobsson and Z. Ramzan Addison-Wesley 2008. ISBN 978-0-321-50195-0 Amazon.com USD 49.99 Bookpool.com USD 42.95 ____________________________________________________________________ There's a worrisome fact about malware revealed by recent threat reports, intelligence summaries, etc. that track malware development and prevalence: its motivation has changed. The days of general maliciousness, curiosity and 15-minutes-of-Internet-fame are gone, only to be replaced by a calculated focus on financial gain. The authors reflect this change in their term "crimeware" which they define as "malware written by criminals whose goals are not fame but wealth, and whose software does not constitute practical jokes to the victims but loss of money, information" (p.515). The book opens its frightening journey into crimeware with an introductory chapter that surveys the subject through a menagerie of crimeware types (keyloggers, rootkits, etc), distribution vectors and how crimeware is used in its nefarious practice. The second chapter, contributed by Gary McGraw, provides a useful taxonomy of coding errors that give rise to the vulnerabilities which crimeware authors are quick to exploit. His organization of the problems into a "Trinity of Trouble" (connectivity, complexity and extensibility) and "The Seven Pernicious Kingdoms" are valuable organizing principles that I hope other authors will adopt. The next 14 chapters are written by various authors, giving rise to some unevenness in writing style and quality as well as duplication of material, but it does allow each topic to be covered by experts in the field. In addition to coverage of the "usual suspects" such as botnets, browser crimeware and rootkits, there are chapters covering emerging topics such as "Crimeware in firmware" (Chapter 5) and "Virtual Worlds and Fraud" (Chapter 9). An especially interesting chapter is "Crimeware Business Models" (Chapter 12) which describes how the business side of crimeware works and explains how crimeware infections are translated into the cold, hard cash rewards for its creators. Chapter 13 on "The Educational Aspect of Security" takes a hard look at why security education efforts fail and presents a cartoon-based approach that holds promise in advancing awareness training for the masses beyond today's poorly understood lists of "do's and don'ts" to an educational message that just might affect how people behave. The final chapter covers "The Future of Crimeware" and looks forward to how crimeware might extend into areas such as terrorware, exploit social networking as its preferred infection vector and take aim at critical pieces of infrastructure. There is a bibliography of almost 500 references that provide a wealth of further information and additional details on its topics. Although this is a profoundly disturbing book, it is one that practicing security professionals would do well to read and understand. We have become desensitized to malware and may think that anti-virus, anti-spyware, and a good awareness makes us immune to its effects. The message that shines clearly through this book is that there are a large number of talented and creative computing professionals out there who are deeply cognizant of the types of defenses we have put in place. They are continually probing and innovating to find ways to slip their creations past our barriers in pursuit of direct monetary rewards. Thanks to Jakobsson and Ramzan, we have been warned. -------- Before beginning life as an itinerant university instructor and security consultant, Richard Austin was the storage network security architect for a Fortune 25 company. He welcomes your thoughts and comments at rda7838 at Kennesaw dot edu ____________________________________________________________________ Review of Computer Security Foundations Symposium CMU, Pittsburgh, Pennsylvania, USA, June 23-25, 2008 by Kumar Avijit ____________________________________________________________________ Day 1 Paper 1 Riccardo Focardi started the conference proceedings with his paper titled "Language based secure communication". He presented a process calculus with abstractions for expressing secret and authenticated communications, and argued that these abstractions were easier to implement in the real world than both the low-level primitives of spi-calculus as well as the abstract private channels of pi-calculus. He then presented a model of the network in the form of a low-level calculus to account for adversaries that can intercept, store, duplicate and forward messages. The main idea here was to introduce an extra binder in the input forms to represent the network view of a message; thus a secret message can only be interpreted as bytes by an adversary. The rest of the talk was about formalizing the semantics as a labeled transition system and characterizing observational equivalence as a bisimilarity thereby allowing coinductive proof techniques for observational equivalence. Paper 2 The next paper titled "Refinement types for secure implementations" was presented by Cedric Fournet. He presented a concurrent functional programming language with refinement types which can be used to write programs adhering to a security policy. Refinement types were used to capture properties of program values as a first-order logic formula. The security policy is embedded in the program code at various points by means of 'assert' clauses that check to see if a logical formula holds at a program point. Typechecking ensures that no assertion fails at runtime. Fournet then described an extension to model adversaries by adding a type denoting public data. As examples showing the expressiveness of the language, Fournet described implementations of various cryptographic primitives and protocols in the language. He compared the implementation of the typechecker to a previous approach that used ProVerif. Paper 3 The next talk was about a paper on "A trust management approach for flexible policy management in security-typed languages" presented by Sruthi Bandhakavi. She presented a language called RTI which allowed decentralized control over security policies while maintaining the privacy requirements of principals. RTI is based on the RT language for defining role membership. The language has imperative commands for adding or deleting policy statements, and those for branching on policy queries. In addition to variables, RTI protects policy statements also by assigning security labels to them. It is ensured that the branching construct does not leak information about the security policy. This is implemented by selecting only that part of the policy to make a query decision which is allowed by the current security level of the computation. Thus an adversary cannot learn about a private policy of other individual by executing an if statement. A dual condition ensures integrity. A non-interference theorem stating that low computation does not depend on any changes to the high part of the policy is proved. Paper 4 Michael Clarkson gave an exciting presentation about his joint work with Fred Schneider on "Hyperproperties". He started off with a bit of history about the classification of properties of traces as safety and liveness, and the theorem about all properties of traces being expressible in terms of safety and liveness properties. He then motivated his work by saying that most security properties studied today, e.g. non-interference are not properties of traces but those of sets of traces, and hence inexpressible as safety or liveness. This was followed by the analogues of safety and liveness for hyperproperties (properties of sets of traces) and the comment that hyperproperties are expressive enough to capture higher order properties, due to the analogous result for second order logic. Clarkson then mentioned important differences between simple properties and hyperproperties such as the latter not being closed under refinement. Just like properties, all hyperproperties are intersection of a hypersafety and a hyperliveness property. Clarkson mentioned that it is easy to extend hyperproperties to probabilistic hyperproperties. He finished his talk by illustrating a 'world map' of classification of various security properties. Paper 5 Next was the presentation by R. Ann Miura-Ko on her paper titled "Security decision-making among interdependent organizations". This paper was in a different vein than the rest because it did not aim at formal techniques applying directly to security, but was rather about modeling the impact of security decisions made by organizations on the security of other organizations, using approaches from Economics. Miura-Ko started by presenting a tempting example that consisted of web users using the same passwords across sites thereby creating security dependencies between services offered by the web sites. She then described how to model this dependence by used weighted directed edges between sites. Here the negative weights denoted that increase in security at the source leads to an increased security hazard at the destination, whereas the positive weights denoted the destination benefiting from increased security investment at the source. She then extended the model for the investment in security made by each node and obtained a utility function that translates the effective investment made by an organization to the total benefit it obtains. Finally she described a free-riding index which measured how much a site can reduce its investment due to positive influence from other sites. Iliano Cervasato noted that the security of a site could also depend on the adversary intent, and asked how this would affect the model. In response, Miura-Ko mentioned that attack graphs may be used to model the path that an adversary takes through the network, but that this is a new dimension and complicates the problem. Paper 6 The next paper was titled "Tractable enforcement of declassification properties". This paper introduces a notion on non-interference in presence of declassification which is called delimited non-disclosure. It defines this property as a bisimulation between program states, where the simulation relation is actually a family of relations indexed by the policy at the program point represented by the states involved. This takes into account that declassification introduces local policies, and that all the intermediate states should also be taken into account while defining a non-interference policy in such cases. The paper then defines an 'abstract' type system for enforcing delimited non-disclosure in terms of a type system for plain non-interference, and presents a case study of typing JVM. Paper 7 The final paper for this day's session was on "End-to-end enforcement of erasure and declassification" which was presented by Stephen Chong. He started off by noting that plain non-interference is in general not an adequate/usable property because the confidentiality of information often changes as the program execution proceeds. He gave examples of situations where declassification or weakening of confidentiality is needed, and others where erasure or strengthening is called for. The policies specify erasure and declassification from one security level to another conditionally on the values of program expressions. Stephen showed how declassification and erasure policies can be enforced by a combination of static typechecking and runtime checks. Erasure is ensured at runtime at all points in the program where memory is updated. At such points, all those variables whose policies require erasure are set to zero. Declassification is done at runtime by the guarded declassify command. The runtime checks ease the burden on static typechecking and allow for more expressive conditions. The type system presented was the one common for non-interference with an additional rule for guarded declassification. Finally Stephen showed an example of implementation of a secure remote voting system Civitas that uses erasure and declassification constructs. Day 2 The second day started with a joint CSF-LICS invited talk by David Basin on his work with Christoph Sprenger on "Cryptographically-sound protocol model abstractions". The first session of this day was joint with LICS. Paper 8 Rohit Chadha presented his paper of the session titled "Expressiveness and complexity of randomization in finite state machines" . The problem was to determine the expressive power of finite state randomized monitors on non-probabilistic systems. Chadha started the motivation by discussing the class of languages accepted by randomized monitors with infinite state. From a previous result this class is exactly the countable unions of safety properties, also termed as Almost Safety properties. After formalizing a notion of acceptance by a randomized finite state machine with probabilities associated with each transition (a Markov chain), Chadha developed a hierarchy of languages based on the upper bound of the probability of acceptance of the language by any such machine. One of the attendees noted the absence of non-determination in the automata discussed, and Chadha acknowledged that this was another possible consideration. Paper 9 Next Henry DeYoung presented his work on "An authorization logic with explicit time". He motivated the general trend of using a logic for expressing policies giving arguments such as precision of expression, flexibility in management of policies, and amenability to policy analysis. Next he motivated by an example how using explicit time in the policy is required in social situations. He gave compelling reasons for why traditional approaches which do not have a notion of time, are inadequate by citing that correct proofs may be rejected because of expired credentials. He also noted why even temporal logic seems inadequate because policies often want to use specific time intervals. Next he presented his logic which treated time interval as a modality. He presented a sequent calculus and described various favorable meta-theoretic properties of his logic. Lastly he discussed extending his calculus with linearity to model consumable credentials. Paper 10 Yuri Gurevich was the next speaker and his paper was on DKAL which is a distributed-knowledge authorization language. He began with a similar motivation as the previous talk about using logic for access control. After describing a little history of languages starting from Datalog to Binder to SecPAL, he moved on to a brief primer on Datalog highlighting the absence of functions and negation. He then discussed the modifications to SecPAL made in DKAL such as the directional nature of 'says' which now includes the principal for which a statement is being issued. This prevents information leakage by probing attacks. Another modification was that 'can say' was given a first order status as being a function in its own right, rather than using it in conjunction with 'says' as a ternary relation. This enables writing more complex policies which have nested occurrences of 'can say'. In addition, there is a notion of a knowledge of a principal captured by the 'knows' predicate, and that of trust between principals. Finally, the worst case complexity for satisfying a query is polynomial in the lengths of policy and the query, each raised to a power linear in depth and width of quotations. Paper 11 The next talk was by Glenn Bruns on using Belnap logic for composing access control policies. In contrast with the previous two talks, this paper considered a more abstract view of access control policies as being predicates on access requests. This abstraction was suitable for their paper since they were reasoning about policy composition. Glenn started by motivating using the four-valued Belnap logic for distinguishing between denial and undefinedness of the policy on access requests. In a two-valued world, conflicts in the composed policy cannot be expressed as the outcome of composition - since the result of the composition should either be true or false. In such a case having four truth values namely true, false, undefined and conflict seem natural. Glenn showed how these values can be arranged in two different lattices, one based on truth and the other on information content. The policies themselves can the ordered using point-wise extension of these orders. Glenn then talked about a propositional query language over policies with the order relations giving rise to predicates. He briefly mentioned that such queries can be translated into first-order logic formulae. Paper 12 Next Jeffery Vaughan gave an exciting talk about his work entitled "Evidence-based audit". The setting of this work was distributed authorization and the paper presented a dependently typed language for writing programs for such environments. Jeff came up with three problems that plague the security of systems, namely: The implementation of the reference monitors may be buggy. Here the reference monitors are being considered as part of a trusted computing base. The policy language may not be expressive enough to capture the institutional policy. The system may be configured with an inherently bad policy. This could happen for various reasons, such as the administrators not understanding the complex policy language completely. Jeff then highlighted the main features of their language called "Aura_0", explaining how each of the above problems could be mitigated to various extents. He noted that in conventional systems, the whole system ends up being trusted because critical security decisions depend on various factors starting right at the time of compilation (using configuration options). This could be mitigated by making reference monitors independent of applications. The API for these monitors would now require an additional proof object denoting compliance with policy, along with a traditional request. The second problem is mitigated by using dependently typed DCC as the underlying logic. Lastly, problem 3 could be recognized and the failure points pin-pointed if the reference monitors log all the proofs. Jeff then showed that the language was strongly normalizing by translating it to calculus of constructions with dependent pairs. Paper 13 Post-lunch, the first paper titled "Automated verification of remote electronic voting protocols in applied pi-calculus" was presented by Catalin Hritcu. Catalin started by presenting a big list of properties desired for protocols for remote voting and noted that some of them seemed conflicting. The paper focused on a subset of these properties like voter eligibility, non-reusability and unalterability in the category of soundness properties, and receipt-freeness, immunity to simulation attacks, forced-abstention attacks and randomization attacks in the category of coercion-resistance. For each of the above properties, Catalin then presented how to formalize these properties in applied pi-calculus using the notion of observational equivalence. For the coercion-resistance, their novel approach used dummy voters as balancers in parallel to registered voters in order to achieve the necessary indistinguishability in the final election results. It was showed that coercion resistance implied receipt-freeness. An attendee asked if coercion-resistance and checkability of votes were conflicting properties. Catalin responded that a voter could always fake when the coercer asks him/her to show that he cast a vote. Paper 14 The next paper to be presented was titled "Specifying secure transport layers". This paper deals with characterizing confidentiality and authentication properties of protocols in terms of trace properties in the CSP language, the motivation being to analyze layered architectures. First the paper defines an abstract model of the network dividing it into three layers - application, secure transport and network. Agents are allowed to create messages in application layer only, but an intruder is given extra capability to 'get' and 'put' transport layer messages as well. An intruder can only manufacture messages based on its knowledge, the definition of which is left open in the paper. A hierarchy of confidentiality and authentication properties of single messages as well as of sessions is defined by considering various combinations of properties of message traces. For instance, a trace in which the intruder cannot fake a message and cannot re-ascribe a message as coming from a honest agent provides sender-authentication. Several examples of protocols are given that are believed to satisfy the properties characterized in the paper. Paper 15 Next Jean Goubault-Larrecq presented his paper titled "Towards producing formally checkable security proofs, automatically". He first showed that extracting formal proofs from verification tools such as ProVerif was hard, in fact harder than the process of verification itself. Then he showed that if one uses model-checking of finite models to establish security properties, then one can instrument the model-checker to emit formal proofs automatically. Paper 16 The next paper was on "Composition of password based protocols" presented by Mark Ryan. The motivating example for this paper was that of two password-based protocols each of which was resistant to guessing attacks independently, but not so when composed together. The processes were formalized in applied pi-calculus. Next, passive guessing attacks were formalized using indistinguishability of the situation where the attacker could guess the correct password, with respect to one where he guessed the wrong password. Since the attacker did not insert/remove packets, this is the case of a passive adversary. It was shown that frames resistant to passive guessing attacks are closed under composition. For the case of active adversaries, it was shown that well-tagged processes were closed under such guessing attacks. In the end a simple transformation to well-tagged processes was defined. The idea was to enclose each occurrence of the secret under a hash function. Paper 17 Dominique Unruh was the next speaker and his paper was titled "Computational soundness of symbolic zero-knowledge proofs against active attackers". The paper discussed what properties a cryptographic zero-knowledge proof needs to satisfy in order for it to be a computationally sound zero-knowledge proof in the Dolev-Yao model. Paper 18 The last talk of the day was on "Joint state theorems for public-key encryption and digital signature functionalities with local computation". Joint state theorems are theorems about composition of protocols where the composed protocols are allowed to share state. The paper discusses limitations with an earlier work on joint-state theorems, and presents a new theorem using the IITM model. Further, it discusses joint-state realizations of public-key encryption and signature functionalities. Day 3 The last day of CSF started with a joint CSF-LICS invited talk by Dexter Kozen. He talked about formalizing flowcharts with non-local control flow in terms of Kleene algebra with tests with equational reasoning. He started off by highlighting a previous result by Bohm and Jacopini about expressibility of deterministic flowcharts as while programs requiring auxiliary variables, and another result by Ashcroft and Manna that these auxiliary variables are necessary. This was followed by a short tutorial of some results on Kleene algebra. A boolean subalgebra of the Kleene algebra was then introduced to define Kleene algebra with tests. Every deterministic automaton for Kleene algebra with tests is equivalent to a while program. Finally he presented a translation from arbitrary flowcharts to strictly deterministic automata. Paper 19 The first talk of this session was on "Type systems for observational determinism" by Takio Terauchi. As is clear from the title, the talk presented a type system for ensuring that a non-deterministic program is observationally deterministic with respect to some set of secure and public variables. Observational determinism means that even in presence of a scheduler, an attacker should not be able to infer the pattern of high inputs by looking at the low output. Terauchi divided the type checking into three phases: The program is sliced to throw away the part that does not affect the low variables. It is then checked if the sliced program mentions any high variables. Finally, fractional capabilities are used to determine if the sliced program is deterministic. The main idea behind using fractional capabilities is to assign a write capability to each variable. This capability is used up when there is a write to that variable. Capabilities cannot be duplicated. This prevents non-deterministic programs where concurrent writes happen to the same variable. This is ensured by the type checking rule for spawning threads in which capabilities are split between the spawning process and the spawned thread. In the case of a channel I/O, capabilities can be passed because of the deterministic nature of the communication. The type system could accept non-confluent programs. Steve Zdancevic asked if adding confluence-checking would affect the complexity of the algorithm to which Terauchi responded that the algorithm would still be polynomial time. Paper 20 The next talk was titled "Information flow in systems with schedulers" and was presented by Chenyi Zhang. The speaker talked about extending various information flow properties such as non-deducibility of High actions from Low views for the case when the high and low processes are interleaved by a scheduler. Paper 21 The final session of the conference was about two papers describing the use of existing proof technologies in real-world applications. The first talk was about "A correctness proof of a mesh-security architecture" presented by Doug Kuhlman. Doug gave a brief overview of the protocol used in the mesh wireless network, and then described using PCL for verifying correctness of the protocol. Paper 22 The last talk was about "Formal analysis of PKCS#11". The speaker talked about attacks on PKCS#11 API that could lead to leakage of keys, and described a language in which to model such mutable storage based APIs as PKCS#11. ==================================================================== News Briefs ==================================================================== News briefs from past issues of Cipher are archived at http://www.ieee-security.org/Cipher/NewsBriefs.html ==================================================================== Conference and Workshop Announcements ==================================================================== The complete Cipher Calls-for-Papers is located at http://www.ieee-security.org/CFP/Cipher-Call-for-Papers.html The Cipher event Calendar is at http://www.ieee-security.org/Calendar/cipher-hypercalendar.html ____________________________________________________________________ Cipher Event Calendar ____________________________________________________________________ Calendar of Security and Privacy Related Events maintained by Hilarie Orman Date (Month/Day/Year), Event, Locations, web page for more info. 7/13/08- 7/16/08: IFIP-DAS, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK; http://seclab.dti.unimi.it/~ifip113/2008/ 7/14/08- 7/16/08: ACISP, 13th Australasian Conference on Information Security and Privacy, Wollongong, Australia; http://www.uow.edu.au/conferences/acisp%202008/index.html 7/15/08: IWDW 2008, 7th International Workshop on Digital Watermarking, Busan, Korea; http://multimedia.korea.ac.kr/iwdw2008; Submissions are due 7/15/08: DSSC 2008, 1st International Workshop on Dependable and Secure Services Computing, Held in conjunction with IEEE APSCC 2008, Yilan, Taiwan; http://6book.niu.edu.tw/DSSC08; Submissions are due 7/18/08: SKM 2008, Workshop on Secure Knowledge Management, Richardson, Texas, USA; http://cs.utdallas.edu/skm2008/call_for_papers.htm; Submissions are due 7/19/08: ICISS 2008, 4th International Conference on Information Systems Security, Hyderabad, India; http://www.seclab.cs.sunysb.edu/iciss08/; Submissions are due 7/23/08: NordSec 2008, 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark; http://lbt.imm.dtu.dk/nsd08/nordsec08/; Submissions are due 7/23/08- 7/25/08: SOUPS, Symposium On Usable Privacy and Security, Carnegie Mellon University, Pittsburgh, PA, USA; http://cups.cs.cmu.edu/SOUPS/ 7/28/08- 8/ 1/08: USENIX-Security, 17th USENIX Security Symposium, San Jose, California, USA; http://www.usenix.org/sec08/cfpa/ 7/28/08- 8/ 1/08: IWSSE, 2nd International Workshop on Security in Software Engineering, Held in conjunction with the IEEE COMPSAC 2008, Turku; http://www.sis.pitt.edu/%7Elersais/IWSSE/IWSSE08.html 8/ 1/08: IEEE Network Magazine, Special Issue on Recent Developments in Network Intrusion Detection; http://www.comsoc.org/dl/net/ntwrk/special.html; Submissions are due 8/ 1/08: MidSec 2008, 1st International Workshop on Middleware Security, Held in conjunction with the 9th ACM International Middleware Conference (MIDDLEWARE 2008), Leuven, Belgium; http://www.cs.kuleuven.be/conference/MidSec2008/; Submissions are due 8/10/08- 8/13/08: ICITS, International Conference on Information Theoretic Security, Calgary, Canada; http://iqis.org/events/icits2008 8/11/08- 8/13/08: DFRWS, 8th Annual Digital Forensic Research Workshop, Baltimore, MD, USA; http://www.dfrws.org/2008/ 8/16/08: SAC-TREK 2009, 24th ACM Symposium on Applied Computing (SAC 2009), Trust, Reputation, Evidence and other Collaboration Know-how (TRECK) Track, Honolulu, Hawaii, USA; http://tech.groups.yahoo.com/group/trustcomp/; Submissions are due 8/16/08: SAC-SEC 2009, 24th ACM Symposium on Applied Computing (SAC 2009), Computer Security Track, Honolulu, Hawaii, USA; http://www.dmi.unict.it/~giamp/sac/09cfp.html; Submissions are due 8/18/08- 8/21/08: PODC, 27th Annual ACM SIGACT-SIGOPS Symposium on the Principles of Distributed Computing; Toronto, Canada; http://www.podc.org/podc2008 8/20/08: Inscrypt 2008, 4th International Conferences on Information Security and Cryptology, Beijing, China; http://www.inscrypt.cn/inscrypt/; Submissions are due 8/25/08: ICIT 2009, IEEE International Conference on Industrial Technology, Special Session on Wireless Bluetooth Technologies and Cyber Security, Churchill, Victoria, Australia; http://www.ieee-icit09.org/specialsessions.php; Submissions are due 9/ 1/08- 9/ 3/08: Pairing, 2nd International Conference on Pairing-based Cryptography, Egham, UK; http://www.pairing-conference.org/ 9/ 4/08: ICIW 2009, 4th International Conference on Information Warfare and Security, Breakwater Lodge, Cape Town, South Africa; http://academic-conferences.org/iciw/iciw2009/iciw09-home.htm; Submissions are due 9/ 8/08: ESSoS 2009, International Symposium on Engineering Secure Software and Systems; Leuven, Belgium; http://distrinet.cs.kuleuven.be/events/essos2009/; Submissions are due 9/ 8/08- 9/11/08: CARDIS, 8th Smart Card Research and Advanced Application Conference, Royal Holloway, University of London, Egham, Surrey, UK; http://www.scc.rhul.ac.uk/CARDIS/ 9/12/08: NDSS 2009, 16th Annual Network and Distributed System Security Symposium, San Diego, California, USA; http://www.isoc.org/isoc/conferences/ndss/09/; Submissions are due 9/15/08- 9/17/08: RAID, 11th International Symposium on Recent Advances in Intrusion Detection; Cambridge, Massachusetts, USA; http://www.ll.mit.edu/IST/RAID2008/ 9/15/08- 9/18/08: ISC, Information Security Conference, Taipei, Taiwan; http://isc08.twisc.org/ 9/22/08- 9/25/08: NSPW, New Security Paradigm Workshop, Olympic Valley, CA, USA; http://www.nspw.org 9/30/08: Wiley's Security and Communication Networks Journal, Special Issue on Security in Mobile Wireless Networks; http://www3.interscience.wiley.com/cgi-bin/jtoc/114299116/; Submissions are due 10/ 1/08: EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security; http://www.hindawi.com/journals/wcn/si/wpls.html; Submissions are due 10/ 6/08-10/ 8/08: ESORICS, 13th European Symposium on Research in Computer Security, Malaga, Spain; http://www.isac.uma.es/esorics08 10/ 9/08-10/10/08: NordSec 2008, 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark; http://lbt.imm.dtu.dk/nsd08/nordsec08/ 10/15/08: IFIP-DF 2009, 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA; http://www.ifip119.org; Submissions are due 10/17/08: FC 2009, 13th International Conference on Financial Cryptography and Data Security, Accra Beach, Barbados; http://fc09.ifca.ai/; Submissions are due 11/ 3/08-11/ 4/08: SKM 2008, Workshop on Secure Knowledge Management, Richardson, Texas, USA; http://cs.utdallas.edu/skm2008/call_for_papers.htm 11/10/08-11/12/08: IWDW 2008, 7th International Workshop on Digital Watermarking, Busan, Korea; http://multimedia.korea.ac.kr/iwdw2008 11/25/08-11/27/08: IWSEC, 3rd International Workshop on Security, Kagawa, Japan; http://www.iwsec.org 11/30/08-12/ 4/08: Globecom-CCNS, Computer and Communications Network Security Symposium, Held in conjunction with the IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LA, USA; http://www.comsoc.org/confs/globecom/2008/symposium/compcom.html 12/ 2/08: MidSec 2008, 1st International Workshop on Middleware Security, Held in conjunction with the 9th ACM International Middleware Conference (MIDDLEWARE 2008), Leuven, Belgium; http://www.cs.kuleuven.be/conference/MidSec2008/ 12/ 9/08-12/12/08: DSSC 2008, 1st International Workshop on Dependable and Secure Services Computing, Held in conjunction with IEEE APSCC 2008, Yilan, Taiwan; http://6book.niu.edu.tw/DSSC08 12/14/08-12/17/08: Inscrypt 2008, 4th International Conferences on Information Security and Cryptology, Beijing, China; http://www.inscrypt.cn/inscrypt/ 12/16/08-12/20/08: ICISS 2008, 4th International Conference on Information Systems Security, Hyderabad, India; http://www.seclab.cs.sunysb.edu/iciss08/ 1/25/09- 1/28/09: IFIP-DF 2009, 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA; http://www.ifip119.org 2/ 4/09- 2/ 6/09: ESSoS 2009, International Symposium on Engineering Secure Software and Systems, Leuven, Belgium; http://distrinet.cs.kuleuven.be/events/essos2009/ 2/ 8/09- 2/11/09: NDSS 2009, 16th Annual Network and Distributed System Security Symposium, San Diego, California, USA; http://www.isoc.org/isoc/conferences/ndss/09/ 2/10/09- 2/13/09: ICIT 2009, IEEE International Conference on Industrial Technology, Special Session on Wireless Bluetooth Technologies and Cyber Security, Churchill, Victoria, Australia; http://www.ieee-icit09.org/specialsessions.php 2/23/09- 2/26/09: FC 2009, 13th International Conference on Financial Cryptography and Data Security, Accra Beach, Barbados; http://fc09.ifca.ai/ 3/ 8/09- 3/12/09: SAC-TREK 2009, 24th ACM Symposium on Applied Computing Trust, Reputation, Evidence and other Collaboration Know-how (TRECK) Track, Honolulu, Hawaii, USA; http://tech.groups.yahoo.com/group/trustcomp/ 3/ 8/09- 3/12/09: SAC-SEC 2009, 24th ACM Symposium on Applied Computing Computer Security Track, Honolulu, Hawaii, USA; http://www.dmi.unict.it/~giamp/sac/09cfp.html 3/26/09- 3/27/09: ICIW 2009, 4th International Conference on Information Warfare and Security, Breakwater Lodge, Cape Town, South Africa; http://academic-conferences.org/iciw/iciw2009/iciw09-home.htm ____________________________________________________________________ Journal, Conference and Workshop Calls-for-Papers (new since Cipher E84) Maintained by Yong Guan ___________________________________________________________________ ------------------------------------------------------------------------- IWDW 2008 7th International Workshop on Digital Watermarking, Busan, Korea, November 10-12, 2008. (Submissions due 15 July 2008) http://multimedia.korea.ac.kr/iwdw2008 IWDW 2008 is the seventh of a series of international work-shops focusing on digital watermarking and relevant techniques. It will provide an excellent opportunity for researchers and practitioners to present as well as to keep abreast with the latest developments in watermarking technologies. IWDW 2008 aims to provide a high quality forum for dissemination of research results. Areas of interest include, but are not limited to: - Mathematical modeling of embedding and detection - Information theoretic, stochastic aspects of data hiding - Security issues, including attacks and counter-attacks - Combination of data hiding and cryptography - Optimum watermark detection and reliable recovery - Estimation of watermark capacity - Channel coding techniques for watermarking - Large-scale experimental tests and benchmarking - New statistical and perceptual models of content - Reversible data hiding - Data hiding in special media - Data hiding and authentication - Steganography and steganalysis - Data forensics - Copyright protection, DRM, and forensic watermarking - Visual cryptography ------------------------------------------------------------------------- DSSC 2008 1st International Workshop on Dependable and Secure Services Computing Held in conjunction with IEEE APSCC 2008, Yilan, Taiwan, December 9-12, 2008. (Submissions due 15 July 2008) http://6book.niu.edu.tw/DSSC08 Service-Oriented Computing (SOC) is an emerging paradigm that puts Technology, Business, and People altogether. Since SOC is reshaping the modern business model and services industry, security and dependability are becoming crucial issues. The prime goal of DSSC lies in associating Services Computing with higher level of dependability and security. More specifically, we aim to provide a platform for researchers in the dependability and security communities to interact with researchers in the SOC community, so that efficacious cross pollination of ideas could occur between these areas. We encourage submissions from both industry and academia. The topics of interest of ISC include, but are not limited to, the following: System and Service Dependability - Architectural and Operating System Support for Services Computing - Self-Reconfiguration Systems for Services Computing - Architectural and System-Level Synthesis - System Dependability Modeling and Prediction - Scalable Techniques for Providing High Availability and Reliability - Verification and Validation Methodology for Services Computing - Time-Critical Services - Safety-Critical Services - Resource Management for Services Computing - Automated Failure Management - Middleware for Services Computing Security Issues and Concerns - Service Authentication - Service Authorization - Privacy And Anonymity in Services Computing - Intrusion Detection in Services Computing - Specification And Querying of Security Constraints - Cryptographic Protocols for Services Computing - Role Based Access Control for Services Computing - Identity Assertion and Service Auditing - Services and XML Based Security Standards - Access Control for Services Computing - Formal Methods for Security Deployment - Secure Service Deployment - Credential and Role Mapping for Services Computing Quality of Service - Performance Analysis, Evaluation, and Prediction - Benchmarking of Management Technologies - Service Auditing - Service Resource Provisioning - QoS Negotiation and Cost of Services (CoS) - Empirical Studies and Benchmarking of QoS - Autonomic Management of Service Levels - Monitoring for (Composed) Services - Return on Investment (ROI) Analysis - Validation of Service and Quality Claims - SLA and Policy Specification and Enactment - QoS-Aware Selection Model for Semantic Web Services - Real-Time Supply Chain Integration Applications of Dependable and Secure Services - E-Commerce Dependability - Firewall Technologies - Open/Dynamic Grid Service Architectures - Grid Service Deployment and Service Registries - Grid Computing and Services On-Demand - Peer-to-Peer Virtual Repository - Mobile, Ad-Hoc, and Peer-To-Peer Services - Secure Web Services ------------------------------------------------------------------------- SKM 2008 Workshop on Secure Knowledge Management, Richardson, Texas, USA, November 3-4, 2008. (Submissions due 18 July 2008) http://cs.utdallas.edu/skm2008/call_for_papers.htm Knowledge management is the methodology for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively capture and share data as well as use the knowledge of individuals within an organization. Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important. Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications. The proposed workshop in Secure Knowledge Management will help in raising the awareness of academics and practitioners in this critical area of research and develop important questions that need to be tackled by the research community. Topics of interest include, and are not limited to: - Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust) - Return of Investment on Secure Knowledge Systems - Digital Rights Management (Digital Policy Management) - Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index) - Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace) - Security and Privacy in Knowledge Management - Wireless security in the context of Knowledge Management ------------------------------------------------------------------------- ICISS 2008 4th International Conference on Information Systems Security, Hyderabad, India, December 16-20, 2008. (Submissions due 19 July 2008) http://www.seclab.cs.sunysb.edu/iciss08/ The ICISS 2008 encourages submissions from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas. Topics of interest include but are not limited to: - Application Security - Authentication and Access Control - Biometric Security - Data Security - Digital Forensics and Diagnostics - Digital Rights Management - Distributed System Security - Formal Methods in Security - Intrusion Detection, Prevention and Response - Intrusion Tolerance and Recovery - Key Management and Cryptographic Protocols - Language-based Security - Malware Analysis and Mitigation - Network Security - Operating System Security - Privacy and Anonymity - Security in P2P, Sensor and Ad Hoc Networks - Software Security - Vulnerability Detection and Mitigation - Web Security ------------------------------------------------------------------------- NordSec 2008 13th Nordic Workshop on Secure IT Systems, Copenhagen, Denmark, October 9-10, 2008. (Submissions due 23 July 2008) http://lbt.imm.dtu.dk/nsd08/nordsec08/ The NordSec workshops are focused on applied computer security and are intended to encourage interchange and cooperation between research and industry. NordSec 2008 is organized by the Technical University of Denmark. NordSec 2008 has a special focus on "Security for the Citizens"; papers and extended abstracts on this topic are especially welcome. Topics include, but are not limited to, the following areas of computer security: - Applied Cryptography - Commercial Security Policies and Enforcement - Communication and Network Security - Computer Crime and Information Warfare - Hardware and Smart Card Applications - Internet and Web Security - Intrusion Detection - Language-based Techniques for Security - New Ideas and Paradigms in Security - Operating System Security - PKI Systems and Key Escrow - Privacy and Anonymity - Security Education and Training - Security Evaluations and Measurements - Security Management and Audit - Security Models - Security Protocols - Social-Engineering and Phishing - Software Security, Attacks, and Defenses - Trust and Trust Management ------------------------------------------------------------------------- IEEE Network Magazine, Special Issue on Recent Developments in Network Intrusion Detection, 1st quarter of 2009. (Submission Due 1 August 2008) http://www.comsoc.org/dl/net/ntwrk/special.html. Guest editors: Thomas M. Chen (Swansea University, UK), Judy Fu (Motorola Labs, USA), Liwen He (BT Group, Chief Technology Office, UK), and Tim Strayer (BBN Technologies, USA) Internet-connected computers are constantly exposed to a variety of possible attacks through exploits, social engineering, password cracking, and malicious software. Networks allow intruders to reach a large number of potential targets quickly and remotely with relatively low risk of traceability. Public attention on cyber attacks has grown with post-9/11 concerns over vulnerabilities of critical infrastructures and new regulations increasing accountability of organizations for loss of private data. Concerns have also been heightened by the prevalence of hidden spyware and bots among PC users. Existing network-based intrusion detection methods depend on monitoring traffic and detecting evidence of attacks through known signatures or anomalous traffic behavior. However, intruders are continually changing their techniques to try new attack vectors and new ways to evade defenses. Network intrusion detection is challenged to adapt with new capabilities to recognize and respond to current attack methods. The goal of this special issue of IEEE Network is to share new research developments in network intrusion detection. Papers should add to current understanding of new attack vectors, advances in packet collection and analysis, and state-of-the-art techniques for recognizing, tracing, and responding to attacks. Papers should contain substantial tutorial content and be understandable to a broad general audience, not only security experts. Topics of interest include: - novel attacks and exploits - novel methods for traffic data collection and anomaly detection - network forensic techniques and best practices - intrusion prevention systems - deep packet inspection and classification at very high speeds/throughputs - event correlation - attack traceback and router support - automatic signature generation - detection of low intensity stealthy intrusions ------------------------------------------------------------------------- MidSec 2008 1st International Workshop on Middleware Security, Held in conjunction with the 9th ACM International Middleware Conference (MIDDLEWARE 2008), Leuven, Belgium, December 2, 2008. (Submissions due 1 August 2008) http://www.cs.kuleuven.be/conference/MidSec2008/ Modern applications are more and more predominantly built around distributed programming paradigms. Event-based systems, mobile agent frameworks, peer-to-peer networks, grid computing, and Web service applications are examples of architectures that are used by a large share of the present software base. These paradigms expose applications to new, ever-growing security threats. For this reason, middleware platforms have always been mindful about offering out-of-the-box security services like communication encryption, user authentication, and access control. Such features are now considered commodities in many middleware platforms, e.g., CORBA, Java EE, and .NET. However, focused research is still necessary to address advanced areas of security. Examples are identity management, privacy and anonymity, accountability, application protection, and so on. The goal of this workshop is to provide a venue for the security and the middleware communities to collaborate and create new momentum for the topic area. Original submissions are welcome from both academic and industry experts. The topics of interest include, but are not limited to: - Middleware security: middleware software is an asset on its own and has to be protected. - Security co-design: trade-off and co-design between application-based and middleware-based security. - Context-sensitive security middleware: advanced security services and features offered by the middleware layer to pervasive and situated systems. - Policy-based management: innovative support for policy-based definition and enforcement of security concerns. - Security features: interaction between security-specific and other middleware features, e.g., context-awareness. - Advanced identification and authentication mechanisms: e.g., means to capture application-specific constraints in defining and enforcing access control rules. - Availability: protection of availability of middleware services. - Security in agent-based platforms: protection for mobile code and platforms. - Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects. - Middleware-oriented security patterns: identification of patterns for sound, reusable security. - Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware. ------------------------------------------------------------------------- SAC-TREK 2009 24th ACM Symposium on Applied Computing (SAC 2009), Trust, Reputation, Evidence and other Collaboration Know-how (TRECK) Track, Honolulu, Hawaii, USA, March 8-12, 2009. (Submissions due 16 August 2008) http://tech.groups.yahoo.com/group/trustcomp/ The goal of the ACM SAC 2009 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications. The topics of interest include, but are not limited to: - Recommender and reputation systems - Trust management, reputation management and identity management - Pervasive computational trust and use of context-awareness - Mobile trust, context-aware trust - Web 2.0 reputation and trust - Trust-based collaborative applications - Automated collaboration and trust negotiation - Trade-off between privacy and trust - Trust/risk-based security frameworks - Combined computational trust and trusted computing - Tangible guarantees given by formal models of trust and risk - Trust metrics assessment and threat analysis - Trust in peer-to-peer and open source systems - Technical trust evaluation and certification - Impacts of social networks on computational trust - Evidence gathering and management - Real-world applications, running prototypes and advanced simulations - Applicability in large-scale, open and decentralised environments - Legal and economic aspects related to the use of trust and reputation engines - User-studies and user interfaces of computational trust and online reputation applications ------------------------------------------------------------------------- SAC-SEC 2009 24th ACM Symposium on Applied Computing (SAC 2009), Computer Security Track, Honolulu, Hawaii, USA, March 8-12, 2009. (Submissions due 16 August 2008) http://www.dmi.unict.it/~giamp/sac/09cfp.html Security is nowadays mandatory. However, it remains a tricky process including a variety of properties. The eigth edition of the Security Track strengthens its aims at bringing together researchers in any applied issues of computer and information security. The list of issues is vast, ranging from protocols to workflows. Topics of interest include but are not limited to: - software security (protocols, operating systems, etc.) - hardware security (smartcards, biometric technologies, etc.) - mobile security (properties for/from mobile agents, etc.) - network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.) - alternatives to cryptography (steganography, etc.) - security-specific software development practices (vulnerability testing, fault-injection resilience, etc.) - privacy and anonimity (trust management, pseudonimity, identity management, etc.) - safety and dependability issues (reliability, survivability, etc.) - cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.) - security management and usability issues (security configuration, policy management, usability trials etc.) - workflow and service security (business processes, web services, etc.) ------------------------------------------------------------------------- Inscrypt 2008 4th International Conferences on Information Security and Cryptology, Beijing, China, December 14-17, 2008. (Submissions due 20 August 2008) http://www.inscrypt.cn/inscrypt/ Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to: - Access Control - Authentication and Authorization - Biometric Security - Distributed System Security - Database Security - Electronic Commerce Security - Intrusion Detection - Information Hiding and Watermarking - Key Management and Key Recovery - Network Security - Security Protocols and Their Analysis - Security Modeling and Architectures - Provable Security - Secure Multiparty Computation - Foundations of Cryptography - Secret Key and Public Key Cryptosystems - Implementation of Cryptosystems - Hash Functions and MACs - Block Cipher Modes of Operation - Intellectual Property Protection - Mobile System Security - Operating System Security - Risk Evaluation and Security Certification - Prevention and Detection of Malicious Codes ------------------------------------------------------------------------- ICIT 2009 IEEE International Conference on Industrial Technology (ICIT 2009), Special Session on Wireless Bluetooth Technologies and Cyber Security, Churchill, Victoria, Australia, February 10-13, 2009. (Submissions due 25 August 2008) http://www.ieee-icit09.org/specialsessions.php Nowadays communication, entertainment, transportation, shopping and medicine have more and more relied on computers and the Internet. The widespread use of wireless computing, mobile devices and networks has raised security concerns. Cyber security aims at protection against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. We invite researchers, practitioners and others interested in wireless Bluetooth technologies and cyber security to submit original research paper or technical report to this Special Session on Wireless Bluetooth Technologies and Cyber Security conjunction with IEEE ICIT 2008. Topics are list as follows but are not limited to: - Bluetooth Enterprise Systems - Cellular Systems - Digital Pens - Multimedia communications over Wireless - Location Management - Wireless Networks Standards and Protocols - RFID Systems - Protocols for Mobile Networks - Security, Privacy and Authentication in Mobile Environments - Wireless Sensor Networks - Key Management in Wireless Networks - Key Distribution in Wireless Sensor Networks - Cross-layer Design and Optimization - Ad-hoc Wireless Networks - Mobile Internet - Bluetooth Internet - Ubiquitous Networks - Smart Sensors and Sensor Networks - Bluetooth Home Networks - 3G and 4G Wireless Networks ------------------------------------------------------------------------- ICIW 2009 4th International Conference on Information Warfare and Security, Breakwater Lodge, Cape Town, South Africa, March 26-27, 2009. (Submissions due 4 September 2008) http://academic-conferences.org/iciw/iciw2009/iciw09-home.htm Information warfare and security are at the forefront of modern defence strategies. Strong strands of research and interest are developing in the area, including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. The International Conference on Information Warfare and Security (ICIW) offers an opportunity for academics, practitioners and consultants from the US, North America and elsewhere who are involved in the study, management, development and implementation of systems and concepts related to information warfare or are interested in ways to improve information systems security, to come together and exchange ideas. This conference is continuing to establish itself as a key event for individuals working in the field from around the world. ------------------------------------------------------------------------- ESSoS 2009 International Symposium on Engineering Secure Software and Systems, Leuven, Belgium, February 4-6, 2009. (Submissions due 8 September 2008) http://distrinet.cs.kuleuven.be/events/essos2009/ The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security engineering communities, and promote cross-fertilization. The technical program includes an experience track for which the submission of highly informative case studies describing (un)successful secure software project experiences and lessons learned is explicitly encouraged. The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to): - scalable techniques for threat modeling and analysis of vulnerabilities - specification and management of security requirements and policies - security architecture and design for software and systems - model checking for security - specification formalisms for security artifacts - verification techniques for security properties - systematic support for security best practices - security testing - security assurance cases - programming paradigms, models and DLS's for security - program rewriting techniques - processes for the development of secure software and systems - security-oriented software reconfiguration and evolution - security measurement - automated development - trade-off between security and other non-functional requirements - support for assurance, certification and accreditation ------------------------------------------------------------------------- NDSS 2009 16th Annual Network and Distributed System Security Symposium, San Diego, California USA, February 8-11, 2009. (Submissions due 12 September 2008) http://www.isoc.org/isoc/conferences/ndss/09/ NDSS fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society. Submissions are solicited in, but not limited to, the following areas: - Security of Web-based applications and services. - Anti-malware techniques: detection, analysis, prevention. - Intrusion prevention, detection, and response. - Security for electronic voting. - Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques. - Privacy and anonymity technologies. - Network perimeter controls: firewalls, packet filters, application gateways. - Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, personal communication systems. - Security for peer-to-peer and overlay network systems. - Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing. - Implementation, deployment and management of network security policies. - Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management. - Integrating security services with system and application security facilities and protocols. - Public key infrastructures, key management, certification, and revocation. - Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost. - Security for collaborative applications: teleconferencing and video-conferencing. - Software hardening: e.g., detecting and defending against software bugs (overflows, etc.) - Security for large-scale systems and critical infrastructures. - Integrating security in Internet protocols: routing, naming, network management. ------------------------------------------------------------------------- Wiley's Security and Communication Networks Journal, Special Issue on Security in Mobile Wireless Networks, 4th quarter of 2009. (Submission Due 30 September 2008) http://www3.interscience.wiley.com/cgi-bin/jtoc/114299116/ Guest editors: Abderrahim Benslimane (University of Avignon, France), Chadi Assi (Concordia University, Montreal, Canada), Stamatios V. Kartalopoulos (University of Oklahoma, USA), and Fred Nen-Fu Huang (National Tsing Hua University, Taiwan) Security has become a primary concern in order to provide protected communication in mobile networks. Unlike the wired networks, the unique characteristics of mobile networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighbouring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. There are several components that contribute to this: adjacent channels, co-channels, Doppler shifts, multipath, and fading. This SI aims to identify and explore the different issues and challenges related to security aspects in mobile networks. What are the impacts (benefits or inconvenience) of mobility on security? What are the appropriate mobility models to have a good level of security? Are Classical IDS approaches appropriate for mobile environments? How can be managed security when Mobility pattern and/or behaviour prediction? The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction. Topics of interest include, but are not limited to, the following as they relate to mobile networks: - Secure mobile PHY/MAC protocols - Secure mobile routing protocols - Security under resource constraints (e.g., energy, bandwidth, memory, and computation constraints) - Performance and security tradeoffs in mobile networks - Secure roaming across administrative domains - Key management in mobile scenarios - Cryptographic Protocols - Authentication and access control in mobile networks - Intrusion detection and tolerance in mobile network - Trust establishment, negotiation, and management - Secure mobile location services - Secure clock distribution - Privacy and anonymity - Denial of service in mobile networks - Prevention of traffic analysis ------------------------------------------------------------------------- EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, April 1, 2009. (Submission Due 1 October 2008) http://www.hindawi.com/journals/wcn/si/wpls.html Guest editors: Mérouane Debbah (Supélec, France), Hesham El-Gamal (Ohio State University, USA), H. Vincent Poor (Princeton University, USA), and Shlomo Shamai (Technion, Israel) Security is a critical issue in multiuser wireless networks in which secure transmissions are becoming increasingly difficult to obtain in highly mobile and distributed environments. In his seminal works of the late 1940s, Shannon formalized the concepts of capacity (as a transmission efficiency measure) and equivocation (as a measure of secrecy). Together with Wyner's fundamental formulation of the wiretap channel in the 1970s, this work laid the groundwork for the area of wireless physical area security. Interest in this area has exploded in recent years, motivated by the rise of wireless networking in general and by the increasing interest in large mobile networks with light infrastructure, which are extremely difficult to secure by traditional methods. The objective of this special issue (whose preparation is carried out under the auspices of the EC Network of Excellence in Wireless Communications NEWCOM++) is to gather recent advances in the area of wireless physical layer security from the theoretical, such as the analysis of the secrecy capacity of various channel models, to more practical interests such as the development of codes and other communication schemes that can provide security in real networks. Suitable topics for this special issue dedicated to physical layer security include but are not limited to: - Opportunistic secrecy - The wiretap channel with feedback - Authentication over the wiretap channel - Information theoretic secrecy of fading channels - Secrecy through public discussion - Wireless key distribution - Multiuser channels with secrecy constraints - MIMO wiretap channels - Relay-eavesdropper channel - Scheduling for secure communications - Secure communication with jamming - Game theoretic approaches for secrecy - Codes for secure transmission - Secure compression - Cognitive approaches for secrecy - Physical Secrecy and Common Randomness - Secrecy with channel uncertainty ------------------------------------------------------------------------- IFIP-DF 2009 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 25-28, 2009. (Submissions due 15 October 2008) http://www.ifip119.org The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of digital forensics. The Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the fifth in the series entitled Research Advances in Digital Forensics (Springer) in the summer of 2009. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to: - Theories, techniques and tools for extracting, analyzing and preserving digital evidence - Network forensics - Portable electronic device forensics - Digital forensic processes and workflow models - Digital forensic case studies - Legal, ethical and policy issues related to digital forensics ------------------------------------------------------------------------- FC 2009 13th International Conference on Financial Cryptography and Data Security, Accra Beach, Barbados, February 23-26, 2009. (Submissions due 17 October 2008) http://fc09.ifca.ai/ At its 13th year edition, Financial Cryptography and Data Security (FC'09) is a well established and major international forum for research, advanced development, education, exploration, and debate regarding security in the context of finance and commerce. Original papers, surveys and presentations on all aspects of financial and commerce security are invited. Submissions must have a strong and visible bearing on financial and commerce security issues, but can be interdisciplinary in nature and need not be exclusively concerned with cryptography or security. Possible topics for submission to the various sessions include, but are not limited to: - Anonymity and Privacy - Auctions and Audits - Authentication and Identification - Biometrics - Certification and Authorization - Commercial Cryptographic Applications - Digital Cash and Payment Systems - Digital Incentive and Loyalty Systems - Digital Rights Management - Economics of Information Security - Financial Regulation and Reporting - Fraud Detection - Game Theoretic Approaches to Security - Identity Theft, Spam, Phishing and Social Engineering - Infrastructure Design - Legal and Regulatory Issues - Microfinance and Micropayments - Monitoring, Management and Operations - Reputation Systems - RFID-Based and Contactless Payment Systems - Risk Assessment and Management - Secure Banking and Financial Web Services - Securing Emerging Computational Paradigms - Security and Risk Perceptions and Judgments - Smart Cards and Secure Tokens - Transactions and Contracts - Trust Management - Underground-Market Economics - Virtual Economies - Voting Systems ------------------------------------------------------------------------- ==================================================================== Reader's Guide to Current Technical Literature in Security and Privacy ==================================================================== The Reader's Guide from Past issues of Cipher is archived at http://www.ieee-security.org/Cipher/ReadersGuide.html ==================================================================== Listing of academic positions available by Cynthia Irvine ==================================================================== (no new listings since May and Cipher E84) http://cisr.nps.edu/jobscipher.html -------------- This job listing is maintained as a service to the academic community. If you have an academic position in computer security and would like to have in it included on this page, send the following information: Institution, City, State, Position title, date position announcement closes, and URL of position description to: irvine@cs.nps.navy.mil ==================================================================== Information on the Technical Committee on Security and Privacy ==================================================================== ____________________________________________________________________ Information for Subscribers and Contributors ____________________________________________________________________ SUBSCRIPTIONS: Two options, each with two options: 1. To receive the full ascii CIPHER issues as e-mail, send e-mail to cipher-admin@ieee-security.org (which is NOT automated) with subject line "subscribe". OR send a note to cipher-request@mailman.xmission.com with the subject line "subscribe" (this IS automated - thereafter you can manage your subscription options, including unsubscribing, yourself) 2. To receive a short e-mail note announcing when a new issue of CIPHER is available for Web browsing send e-mail to cipher-admin@ieee-security.org (which is NOT automated) with subject line "subscribe postcard". OR send a note to cipher-postcard-request@mailman.xmission.com with the subject line "subscribe" (this IS automated - thereafter you can manage your subscription options, including unsubscribing, yourself) To remove yourself from the subscription list, send e-mail to cipher-admin@ieee-security.org with subject line "unsubscribe" or "unsubscribe postcard" or, if you have subscribed directly to the xmission.com mailing list, use your password (sent monthly) to unsubscribe per the instructions at http://mailman.xmission.com/cgi-bin/mailman/listinfo/cipher or http://mailman.xmission.com/cgi-bin/mailman/listinfo/cipher-postcard Those with access to hypertext browsers may prefer to read Cipher that way. It can be found at URL http://www.ieee-security.org/cipher.html CONTRIBUTIONS: to cipher @ ieee-security.org are invited. Cipher is a NEWSletter, not a bulletin board or forum. It has a fixed set of departments, defined by the Table of Contents. Please indicate in the subject line for which department your contribution is intended. Calendar and Calls-for-Papers entries should be sent to cipher-cfp @ ieee-security.org and they will be automatically included in both departments. To facilitate the semi-automated handling, please send either a text version of the CFP or a URL from which a text version can be easily obtained. For Calendar entries, please include a URL and/or e-mail address for the point-of-contact. For Calls for Papers, please submit a one paragraph summary. See this and past issues for examples. ALL CONTRIBUTIONS CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY. All reuses of Cipher material should respect stated copyright notices, and should cite the sources explicitly; as a courtesy, publications using Cipher material should obtain permission from the contributors. ____________________________________________________________________ Recent Address Changes ____________________________________________________________________ Address changes from past issues of Cipher are archived at http://www.ieee-security.org/Cipher/AddressChanges.html _____________________________________________________________________ How to become <> a member of the IEEE Computer Society's TC on Security and Privacy _____________________________________________________________________ You may easily join the TC on Security & Privacy by completing the on-line for at IEEE at http://www.computer.org/TCsignup/index.htm ______________________________________________________________________ TC Publications for Sale ______________________________________________________________________ IEEE Security and Privacy Symposium The 2007 proceedings are available in hardcopy for $30.00, the 28 year CD is $20.00, plus shipping and handling. The 2006 Symposium proceedings and 11-year CD are sold out. The 2005, 2004, and 2003 Symposium proceedings are available for $10 plus shipping and handling. Shipping is $4.00/volume within the US, overseas surface mail is $7/volume, and overseas airmail is $11/volume, based on an order of 3 volumes or less. The shipping charge for a CD is $1 per CD (no charge if included with a hard copy order). Send a check made out to the IEEE Symposium on Security and Privacy to the 2007 treasurer (below) with the order description, including shipping method, and send email to the 2007 Registration Chair (Yong Guan) (oakland07-registration @ ieee-security.org) with the shipping address, please. Terry Benzel Treasurer, IEEE Security and Privacy USC Information Sciences Institute 4676 Admiralty Way Marina Del Rey, CA 90292 (310) 822-1511 IEEE CS Press You may order some back issues from IEEE CS Press at http://www.computer.org/cspress/catalog/proc9.htm Computer Security Foundations Symposium Copies of the proceedings of the Computer Security Foundations Workshop (now Symposium) are available for $10 each. Copies of proceedings are available starting with year 10 (1997). Photocopy versions of year 1 are also $10. Contact Jonathan Herzog if interested in purchase. Jonathan Herzog Department of Computer Science Naval Postgraduate School 1 University Circle Monterey, CA 93943 jcherzog@nps.edu ______________________________________________________________________ TC Officer Roster ______________________________________________________________________ Chair: Security and Privacy Chair Emeritus: Prof. Cynthia Irvine Yong Guan U.S. Naval Postgraduate School Iowa State University Computer Science Department oakland08-chair@ieee-security.org Code CS/IC Monterey CA 93943-5118 (831) 656-2461 (voice) irvine@nps.edu Vice Chair: Chair, Subcommittee on Academic Affairs: Hilarie Orman Prof. Cynthia Irvine Purple Streak, Inc. U.S. Naval Postgraduate School 500 S. Maple Dr. Computer Science Department, Code CS/IC Salem, UT 84653 Monterey CA 93943-5118 hilarie @purplestreak.com (831) 656-2461 (voice) irvine@nps.edu Treasurer: Chair, Subcomm. on Security Conferences: Terry Benzel Jonathan Millen USC Information Sciences Intnl The MITRE Corporation, Mail Stop S119 4676 Admiralty Way, Suite 1001 202 Burlington Road Rte. 62 Los Angeles, CA 90292 Bedford, MA 01730-1420 (310) 822-1511 (voice) 781-271-51 (voice) tbenzel @isi.edu jmillen@mitre.org Security and Privacy Symposium Newsletter Editor 2009 General Chair: Hilarie Orman David Du Purple Streak, Inc. oakland09-chair@ieee-security.org 500 S. Maple Dr. Salem, UT 84653 cipher-editor@ieee-security.org ________________________________________________________________________ BACK ISSUES: Cipher is archived at: http://www.ieee-security.org/cipher.html Cipher is published 6 times per year