posted by organizer: shabtaiasaf || 819 views || tracked by 1 users: [display]

RTIGeo 2023 : 1st Workshop on Robust and Trusted Internet Geolocation

FacebookTwitterLinkedInGoogle

Link: https://cyber.bgu.ac.il/rtigeo2023/
 
When Nov 30, 2023 - Nov 30, 2023
Where Copenhagen, Denmark
Submission Deadline TBD
Categories    internet geolocation   cyber security   machine learning
 

Call For Papers

##################################################################

CALL FOR PAPERS

Workshop on Robust and Trusted Internet Geolocation (RTIGeo) 2023
co-located with ACM CCS 2023

November 30, 2023, Copenhagen, Denmark

##################################################################

Workshop Website:
https://cyber.bgu.ac.il/rtigeo2023/


Call
--------------------------------------

The Internet connects hosts from all around the world. Sometimes it is valuable to know where, geographically, a particular host or data is located. Informally, Internet geolocation, a.k.a. IP geolocation, is used to solve the problem of determining or validating the physical location of an Internet user or device. The development of Internet geolocation technology is being driven by many practical use cases such as advertising, zero-trust security, privacy regulations, marketing, location-aware services, and more. For example, websites often tailor content and ads based on geographic location. Content delivery networks (CDN) redirect requests to nearby servers based on geolocation. Validating authenticity from a geographical viewpoint may also help with detecting impersonation attempts.

Robust and trusted Internet geolocation is related to the concepts of Trust-Enhanced Networking (TEN), and the Quality of Trust (QoT). TEN uses reliable information about physical attributes of real-world entities to improve users’ trust in the overall network. QoT is a logical continuation of Quality of Service (QoS) and Quality of Experience (QoE). Verified geographical location of network entities can be used to increase the QoT in a network.

Location in the context of the Internet usually means an IP address. However, the granularity of geographic location is often important, with implications on the ability to verify the identity of the target and secure data from theft. Furthermore, while Global Positioning System (GPS) is well-known as a method for tracking geographic location, GPS information is vulnerable to spoofing. There are also a number of approaches for inferring target location based on real-time active measurements via networks (such approaches are referred to as active geolocation methods).

Physical attributes are usually obscured when performing activities in cyberspace, however robust and trusted Internet geolocation may shed light on the physical attributes of entities involved in communication in cyberspace in this setting.

This workshop aims to bring together the latest cyber security research related to geolocation in the Internet.


Important information
--------------------------------------

Submission link: https://rtigeo23.hotcrp.com
Paper submission deadline: July 14, 2023
Acceptance notification: August 15, 2023
Camera ready due: August 30, 2023
Workshop: November 30, 2023


Topics of interest
--------------------------------------

Topics of interest include, but are not limited to:

- Passive geolocation (whois, location feeds, etc.)
- Active geolocation (delays, traceroute, probing, etc.)
- Data on the move (route hijacking, route bending, etc.)
- Trust in location or other physical attributes of a communication target
- Location spoofing attacks and defenses
- Location database poisoning
- Location leakage
- Proof of location
- Geolocation of data (GDPR, cloud, named data networking, etc.)
- Network tomography in context of IP geolocation
- Network topology obfuscation
- Mobile geolocation
- Location privacy (consent, controls, tools, etc.)
- Trustable location aware networking
- Quality of Trust (QoT) in context of location
- Trust propagation in context of location


Submissions
--------------------------------------

Submitted papers can be up to 12 (long papers) or 6 pages (short papers) excluding appendices and references. Submissions must use the ACM SIG Proceedings Templates.
Only PDF files will be accepted. Accepted papers will be published as online proceedings through the ACM Digital Library.

Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings.
All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews.

All submitted papers will be evaluated based on their relevance to the workshop scope, novelty, merits, quality of execution, and presentation.
Submitted papers may be rejected for being out of scope, at the discretion of the PC chairs.

Each accepted paper must be presented by a registered author.
Submissions not meeting these guidelines risk immediate rejection.
For questions about these policies, please contact the chairs.


Committee
--------------------------------------
Workshop Chairs
- Rami Puzis, Ben-Gurion University of the Negev
- Yuval Elovici, Ben-Gurion University of the Negev
- Asaf Shabtai, Ben-Gurion University of the Negev
- Junichi Suga, Fujitsu
- Motoyoshi Sekiya, Fujitsu

Related Resources

STRAI 2025   International Workshop on Secure, Trustworthy, and Robust AI
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
SPIE-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
ICDM 2025   The 25th IEEE International Conference on Data Mining
IEEE SmartIoT 2025   The 9th IEEE International Conference on Smart Internet of Things (SmartIoT 2025)
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
SI_Fault_IoV_OTJ 2025   SI on Tools, Techniques, and Applications for Fault Tolerant and Reliable Vehicular Ad-hoc Networks (VANET) and Internet of Vehicles (IoV), The Open Transportation Journal
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE ICEIT 2026   IEEE--2026 the 15th International Conference on Educational and Information Technology (ICEIT 2026)
MLMI 2025   2025 The 8th International Conference on Machine Learning and Machine Intelligence (MLMI 2025)