posted by organizer: wmazurczyk || 3347 views || tracked by 3 users: [display]

CUING 2017 : International Workshop on Criminal Use of Information Hiding

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/cuing-2017/
 
When Aug 29, 2017 - Sep 1, 2017
Where Reggio Calabria, Italy
Submission Deadline May 14, 2017
Notification Due Jun 6, 2017
Final Version Due Jun 20, 2017
Categories    information hiding   steganography   forensic   cybercrime
 

Call For Papers

CALL FOR PAPERS

The First International Workshop on Criminal Use of Information Hiding (CUING 2017)
to be held in conjunction with the 12th International Conference on Availability, Reliability and Security (ARES 2017 – http://www.ares-conference.eu)

August 29 - September 1, 2017, Reggio Calabria, Italy

CUING website: https://www.ares-conference.eu/conference/workshops/cuing-2017/

With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected.

The aim of the First International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding (e.g. steganography, covert channels), obfuscation techniques and underground networks (darknets) in order to present novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:

- Novel countermeasures against information hiding techniques: detection, prevention, limitation
- Evasion, obfuscation and anti-forensics techniques used by cybercriminals
- Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
- Abusing legitimate social media services for masking criminal activities
- Abusing legitimate cloud-based services for masking criminal activities
- Methods for botnet detection and mitigation from CUIng perspective
- Large scale coordinated actions by LEAs from CUIng perspective
- Studies regarding the use of information hiding in cybercrime
- Traffic type obfuscation techniques e.g. traffic morphing
- Impersonation of one cybercriminals groups by the other
- Aspects and methods for sharing strategic intelligence
- Masking network attacks with another types of threats
- Future scenarios in cybercrime from CUIng perspective
- Underground marketplaces and their business models
- Legal and technical aspects of Darknet research
- Local, air-gapped, and network covert channels
- Analysis of cybercrime cases related to CUIng
- New steganographic & steganalysis methods
- Cybercrime and CPS from CUIng perspective
- Botnet analysis from CUIng perspective
- Banking Trojans from CUIng perspective
- Analysis of underground environments
- IoT-botnets from CUIng perspective
- Information hiding techniques
- Privacy enhancing techniques

IMPORTANT DATES
Submission Deadline May 14, 2017
Author Notification June 06, 2017
Proceedings Version June 20, 2017
Conference August 29 - September 1, 2017

WORKSHOP CHAIRS

Philipp Amann (Chair)
Europol, European Cybercrime Centre, The Netherlands
Philipp.Amann@europol.europa.eu

Jart Armin (Chair)
CyberDefcon, The Netherlands
jart@cyberdefcon.com

Wojciech Mazurczyk (Chair)
Warsaw University of Technology, Poland
wmazurczyk@tele.pw.edu.pl

Angelo Consoli (Chair)
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
angelo.consoli@supsi.ch

Peter Kieseberg (Chair)
SBA Research, Austria
pkieseberg@sba-research.org

Joerg Keller (Chair)
FernUniversitaet in Hagen, Germany
Joerg.Keller@fernuni-hagen.de

SUBMISSION

The submission guidelines valid for the CUING workshop are the same as for the ARES conference. They can be found https://www.ares-conference.eu/conference/conference/submission/.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

CONTACT

In case of questions, please feel free to contact us via info@cuing.org.

Related Resources

CUING 2025   9th International Workshop on Cyber Use of Information Hiding
APWG eCrime 2025   APWG Symposium on Electronic Crime Research - November 4-7 - San Diego
Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
BioFor 2025   BioFor 2025 Workshop on Biometrics & Forensics
LLM4Sec 2025   Workshop on the use of Large Language Models for Cybersecurity
ITA 2026   International Congress on Information, Technology and Applications
IEEE-ADMIT 2025   2025 IEEE 4th International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2025)
IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
ICIM 2026   Springer--2026 the 12th International Conference on Information Management (ICIM 2026)
CVIE--EI 2026   2026 The 4th International Conference on Computer Vision and Information Engineering (CVIE 2026)