EICAR 2012 : 21 th EICAR Annual Conference
Call For Papers
The conference committee is seeking submissions of papers for oral presentation at the conference in two major categories:
Peer reviewed papers – these papers will be selected on basis of blind peer review by members of the program committee and other independent reviewers (where necessary). Case studies, research in progress and full research papers including theoretical papers will be considered for the inclusion in the conference program. There is no definitive word limit for the submissions; however, it is anticipated that submissions will be between 3500 and 5500 words. The program committee will not accept research proposals for submission to the conference.
Other papers – these papers will not be peer reviewed. However, due to the considerable interest in the conference in the previous years, these papers will also be reviewed and selected for acceptance by the program committee. This category covers corporate papers, best practices, new technologies, policy issues etc and the conference committee are eager to obtain submissions from industry, government and other sectors for this category. However, marketing papers will not be accepted for the conference.
The conference committee can accept only a limited number of papers in each category and the acceptance ratio in the past few years was about 30-40% of submitted papers only. All accepted papers will be published in electronic form on the Conference CD-ROM and will be published in the printed version of the EICAR Conference Proceedings (book with ISBN). The best papers will be published in a special issue of the Journal in Computer Virology, a research journal published by Springer Verlag.
The best Paper will be awarded by the conference committee.
- Is the current industry driven approach to AV still the right one?
- Are governments required to be more proactive?
- Are new tools and/or regulations required?
- Does Law Enforcement need to use malware in an offensive way?
- Do we need “Threat – Levels” and respective continuation plans?
- What is the actual “Threat – Level” for the end user?
- What are the vulnerabilities against threats?
- How can the end user assess his risk?
- How do companies assess their risks?
- How do we manage IT and the associated risks?
In summary, the rapid evolution of technologies requires the adaptation of
human behaviour and in consequence leads to new needs for laws and
regulations of direct relevance to the users, in the perspective of a rapid
evolution of malware and attack techniques.
This call for scientific/technical/ industry papers invites therefore the submission
of full papers and abstracts on one or more topics devoted to malware and antimalware technologies, which may include but are not limited to:
• New trends in malicious codes and their side effects
• New trends in viruses and worms
• New trends in governmental use of malware
• New trend in e-Crime and e-Forensics
• Facts and techniques to evaluate the reality of the threat
• New trends in Cyber Terrorism
• Vulnerability Assessments
• Threat Assessments
• Risk management
• INFOSEC Management
• Identity Management
• ICT Security and Policy Management
• Emerging technologies (WiFi, RFID, biometrics…) with respect to malware.
• Malicious cryptography and steganography