![]() |
| |||||||||||||
APWG eCrime 2025 : Call for Posters | |||||||||||||
Link: https://ecrimeresearch.org/ecrime-symposium/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Abstract: A concise abstract of 250-300 words detailing the research, methods, findings, and significance of your work.
Keywords: A list of 3-5 keywords for easy categorization. Author Information: Names, affiliations, and email addresses for all co-authors. Poster Presentation: Accepted abstracts will be invited to create a poster for display and discussion at the conference. Posters should be visually engaging and present key information clearly and concisely. Aim for a maximum of 1000 words of text, using bullet points and clear visuals like charts and graphs. Submissions should engage the following topics and themes, consonant with the objectives of APWG eCrime 2025: Artificial Intelligence (AI) as criminal co-conspirator and defensive collaborator, such as: 1. Malicious AI agents employed to perform enhanced malware polymorphism, agentic spearphishing, reconnaissance, etc. 2. Development and maintenance of criminal co-pilots and the future of human-machine teaming, including hybridized human-crimebot cyber gangs. 3. Are malicious AI tools lowering the skills barrier to commit more advanced cybercrimes? 4. Adversarial AI (attacks directly against AIs and machine learning systems) as it relates to the furtherance of cybercrime or cyber-physical cybercrime — especially agents employed in security operations 5. Defensive AI Agents deployed as cybersecurity operations managers and (autonomous and semi-autonomous) counter-cybercrime managers 6. Design, deployment and assessment of multi-agent environments (MAEs) for enhancing resilience of infrastructure and systems to cybercrime 7. Design, deployment and assessment of defences related to AI systems themselves (jailbreaks, injections, etc.) 8. Actual, emerging or potential risks from AI systems deployed to animate cybercrimes against people, operational systems, IoT technologies, or physical spaces and objects 9. Abuse of cyber-physical systems and operational technologies and downstream manipulation (extant, emerging or potential) for furtherance of crimes with physical manifestations, including: -) Drone and robot hijacking and weaponization; -) Criminal abuses and weaponization of medical and surgical systems; -) Criminal abuses and weaponization of IoT for domestic and commercial targeting; -) Criminal abuses and weaponization of autonomous vehicles and delivery robots 10. AI and machine-learning system security to mitigate threats posed by advanced cybercriminal algorithms — and to guard against strategically misinforming and abusing them for criminal enterprises New research on policy, regulation, and law as they pertain to cybercrime of all types Topics of general interest for submissions to eCrime 2025 are listed below, under the heading “Solicited Research Topics for APWG eCrime 2025". Economic foundations of: cybercrime cyber-physical crimes; and other abuses of IT for criminal enterprise Behavioural and psychosocial aspects of cybercrime; and cyber-physical system victimization and prevention Emerging technological exposures, vulnerabilities, and risks Architectural vulnerabilities (of products, operational technologies, infrastructures and cyber-physical systems) that advantage criminal actors New or improved techniques to detect and respond to cybercrime and cyber-physical crimes of all types How to accurately measure and understand the health and resilience of systems, networks, infrastructures and users against cybercrime Addressing challenges of cybercrime’s increasing complexity (e.g. digital infrastructures, crime-fighting/forensic techniques, and the structure of the crimes themselves) Measuring and modelling of cybercrime/cyber-physical system crimes and related criminal enterprises for operational protection routines Measuring and modelling of cybercrime/cyber-physical system crimes and related criminal enterprises for informing rational underwriting instrumentation developed by commercial insurers Analysis and modelling of the cybercrime and abuse risk landscape Cybercrime/cyber-physical system crime payload delivery strategies and countermeasures (e.g. spam, mobile apps, social engineering, etc.) Application of public policy and law for the programmatic suppression of common cybercrimes; crimes against or involving cyber-physical systems and related abuses Policy and legal challenges as they relate to actually developing and sustaining anti-cybercrime practices and policies Cryptocurrency crimes and related cybercrimes, and the forensic tools and techniques required to measure, prevent, and counter these crimes Case studies of current cybercrime/cyber-physical system attack methods (e.g. phishing, malware, rogue antivirus programs, pharming, ransomware, crimeware, botnets, and emerging techniques) Detecting and preventing abuse of internet infrastructure to neutralize cybercrimes/cyber-physical system crimes and abuses Detecting and isolating cybercriminal gangs and their money laundering routines and enterprises Cybercrime’s evolution in specific verticals (e.g. financial services, e-commerce, health and energy, etc.) Cybercriminal cloaking techniques, and counter-cloaking tools and approaches Design and evaluation of UI/UXs to neutralize fraud and enhance user security and cybercrime awareness Novel methods for measuring cybercrime and related abuses for development of defensive routines and programs Please note the following, 1. We are not accepting posters from papers that have already been accepted into eCrime 2025. same authors can apply, but the poster must refer to a different research project/paper. 2. At least one author must physically attend the conference to present their poster. 3. We will not be providing printing services at the venue or otherwise, the authors must make their own arrangements. |
|