posted by user: mirkovic || 1305 views || tracked by 3 users: [display]

CSET 2009 : CyberSecurity Experimentation and Test

FacebookTwitterLinkedInGoogle

Link: http:// http://www.usenix.org/events/cset09/cfp/
 
When Aug 10, 2009 - Aug 10, 2009
Where Montreal, Canada
Submission Deadline May 15, 2009
Notification Due Jun 30, 2009
Final Version Due Jul 15, 2009
 

Call For Papers

2nd Workshop on Cyber Security Experimentation and Test (CSET '09)

August 10, 2009
Montreal, Canada

CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.

Important Dates

* Submissions due: May 15, 2009, 11:59 p.m. PDT
* Notification to authors: June 30, 2009
* Electronic files due: July 15, 2009

Workshop Organizers

General Chair
Terry V. Benzel, USC Information Sciences Institute (ISI)

Program Co-Chairs
Jelena Mirkovic, USC Information Sciences Institute (ISI)
Angelos Stavrou, George Mason University

Program Committee
Paul Barford, University of Wisconsin
Andy Bavier, Princeton University
Matt Bishop, University of California, Davis
Thomas Daniels, Iowa State University
Sonia Fahmy, Purdue University
Carrie Gates, Computer Associates
Alefiya Hussain, SPARTA Inc.
Vern Paxson, ICSI
Sean Peisert, University of California, Davis
Peter Reiher, University of California, Los Angeles
Rob Ricci, University of Utah
Mark Stamp, San Jose State University
Kashi Vishwanath, Microsoft Research
Vinod Yegneswaran, SRI International

Overview

Effective cyber security and network experimentation is challenging for today's network testbeds for a number of reasons. Among these are:

* Scale: Experiments that involve complicated composite behaviors, rare event detection, or emergent effects may need to be quite large and complex to be accurate or indicative.

* Multi-party nature: Most interesting cyber security experiments involve more than one logical or physical party, due to the adversarial nature of the problem as well as the distributed, decentralized nature of the networked systems environment.

* Risk: Cyber security experiments by their fundamental nature may involve significant risk if not properly contained and controlled. At the same time, these experiments may well require some degree of interaction with the larger world to be useful.

Meeting these challenges requires both transformational advance in capability and transformational advance in usability of the underlying research infrastructure. The second annual Workshop on Cyber Security Experimentation and Test (CSET '09) invites submissions on the design, architecture, construction, operation, and use of cyber security experiments in network testbeds and infrastructures. While we are particularly interested in works that relate to emulation testbeds, we invite all works relevant to cyber security experimentation and evaluation (e.g., simulation, deployment, traffic models).

Topics of interest include but are not limited to:

* Security experimentation
o Positive or negative experiences from past experiments
o Novel experimentation approaches
* Testbeds and methodologies
o Tools, methodologies, and infrastructure that support risky and/or realistic experimentation
o Supporting experimentation at a large scale (virtualization, federation, high-fidelity scale down)
o Experience in designing or deploying secure testbeds
o Realistic traffic and topology generators
o Instrumentation and automation of experiments; their archiving, preservation, and visualization
o Diagnosis of and methodologies for dealing with experimental artifacts
o Fair sharing of testbed resources
* Hands-on security education
o Experiences teaching security classes that use hands-on security experiments for homework, in-class demonstrations, or class projects
o Experiences from red team/blue team exercises

Submissions

Submissions must be no longer than six 8.5" x 11" pages—including tables, figures, and references—in two-column format in 10-point type on 12-point (single-spaced) leading, with the text block being 6.5" wide by 9" deep. Text outside the 6.5" x 9" block will be ignored. Submit your paper in PDF format via the Web submission form.

We encourage authors to follow the U.S. National Science Foundation's guidelines for preparing PDF grant submissions:

* https://www.fastlane.nsf.gov/documents/pdf_create/pdfcreate_01.jsp

Each submission should have a contact author who should provide full contact information (email, phone, fax, mailing address). One author of each accepted paper will be required to present the work at the workshop.

All papers will be available online to registered attendees prior to the workshop and will be available online to everyone starting on August 10, 2009. If your accepted paper should not be published prior to the event, please notify production@usenix.org.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitute dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chair, take action against authors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to ensure the integrity of papers under consideration. If a violation of these principles is found, sanctions may include, but are not limited to, barring the authors from submitting to or participating in USENIX conferences for a set period, contacting the authors' institutions, and publicizing the details of the case. Note that the above does not preclude the submission of a regular full paper that overlaps with a previous short paper or workshop paper. However, any submission that derives from an earlier workshop paper must provide a significant new contribution, for example, by providing a more complete evaluation.

Authors uncertain whether their submission meets USENIX's guidelines should contact the program chairs, cset09chairs@usenix.org, or the USENIX office, submissionspolicy@usenix.org.

Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX CSET '09 Web site; rejected submissions will be permanently treated as confidential.

Related Resources

CSET 2024   Cyber Security Experimentation and Test (CSET)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
C3AI 2024   The International Conference on Computing, Communication, Cybersecurity & AI
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ACM-Ei/Scopus-SCDMC 2024   2024 International Conference on Soft Computing, Data Mining and Cybersecurity (SCDMC 2024)
CCCI 2024   2024 International Conference on Communications, Computing, Cybersecurity, and Informatics
SEA 2024   Symposium on Experimental Algorithms (SEA) 2024
NiDS 2024   International Conference on Novel and Intelligent Digital Systems
BIoT 2024   5th International Conference on Block chain and Internet of Things