posted by user: mirkovic || 1134 views || tracked by 3 users: [display]

CSET 2009 : CyberSecurity Experimentation and Test


Link: http://
When Aug 10, 2009 - Aug 10, 2009
Where Montreal, Canada
Submission Deadline May 15, 2009
Notification Due Jun 30, 2009
Final Version Due Jul 15, 2009

Call For Papers

2nd Workshop on Cyber Security Experimentation and Test (CSET '09)

August 10, 2009
Montreal, Canada

CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.

Important Dates

* Submissions due: May 15, 2009, 11:59 p.m. PDT
* Notification to authors: June 30, 2009
* Electronic files due: July 15, 2009

Workshop Organizers

General Chair
Terry V. Benzel, USC Information Sciences Institute (ISI)

Program Co-Chairs
Jelena Mirkovic, USC Information Sciences Institute (ISI)
Angelos Stavrou, George Mason University

Program Committee
Paul Barford, University of Wisconsin
Andy Bavier, Princeton University
Matt Bishop, University of California, Davis
Thomas Daniels, Iowa State University
Sonia Fahmy, Purdue University
Carrie Gates, Computer Associates
Alefiya Hussain, SPARTA Inc.
Vern Paxson, ICSI
Sean Peisert, University of California, Davis
Peter Reiher, University of California, Los Angeles
Rob Ricci, University of Utah
Mark Stamp, San Jose State University
Kashi Vishwanath, Microsoft Research
Vinod Yegneswaran, SRI International


Effective cyber security and network experimentation is challenging for today's network testbeds for a number of reasons. Among these are:

* Scale: Experiments that involve complicated composite behaviors, rare event detection, or emergent effects may need to be quite large and complex to be accurate or indicative.

* Multi-party nature: Most interesting cyber security experiments involve more than one logical or physical party, due to the adversarial nature of the problem as well as the distributed, decentralized nature of the networked systems environment.

* Risk: Cyber security experiments by their fundamental nature may involve significant risk if not properly contained and controlled. At the same time, these experiments may well require some degree of interaction with the larger world to be useful.

Meeting these challenges requires both transformational advance in capability and transformational advance in usability of the underlying research infrastructure. The second annual Workshop on Cyber Security Experimentation and Test (CSET '09) invites submissions on the design, architecture, construction, operation, and use of cyber security experiments in network testbeds and infrastructures. While we are particularly interested in works that relate to emulation testbeds, we invite all works relevant to cyber security experimentation and evaluation (e.g., simulation, deployment, traffic models).

Topics of interest include but are not limited to:

* Security experimentation
o Positive or negative experiences from past experiments
o Novel experimentation approaches
* Testbeds and methodologies
o Tools, methodologies, and infrastructure that support risky and/or realistic experimentation
o Supporting experimentation at a large scale (virtualization, federation, high-fidelity scale down)
o Experience in designing or deploying secure testbeds
o Realistic traffic and topology generators
o Instrumentation and automation of experiments; their archiving, preservation, and visualization
o Diagnosis of and methodologies for dealing with experimental artifacts
o Fair sharing of testbed resources
* Hands-on security education
o Experiences teaching security classes that use hands-on security experiments for homework, in-class demonstrations, or class projects
o Experiences from red team/blue team exercises


Submissions must be no longer than six 8.5" x 11" pages—including tables, figures, and references—in two-column format in 10-point type on 12-point (single-spaced) leading, with the text block being 6.5" wide by 9" deep. Text outside the 6.5" x 9" block will be ignored. Submit your paper in PDF format via the Web submission form.

We encourage authors to follow the U.S. National Science Foundation's guidelines for preparing PDF grant submissions:


Each submission should have a contact author who should provide full contact information (email, phone, fax, mailing address). One author of each accepted paper will be required to present the work at the workshop.

All papers will be available online to registered attendees prior to the workshop and will be available online to everyone starting on August 10, 2009. If your accepted paper should not be published prior to the event, please notify

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitute dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chair, take action against authors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to ensure the integrity of papers under consideration. If a violation of these principles is found, sanctions may include, but are not limited to, barring the authors from submitting to or participating in USENIX conferences for a set period, contacting the authors' institutions, and publicizing the details of the case. Note that the above does not preclude the submission of a regular full paper that overlaps with a previous short paper or workshop paper. However, any submission that derives from an earlier workshop paper must provide a significant new contribution, for example, by providing a more complete evaluation.

Authors uncertain whether their submission meets USENIX's guidelines should contact the program chairs,, or the USENIX office,

Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX CSET '09 Web site; rejected submissions will be permanently treated as confidential.

Related Resources

Federated Learning in IOT Cybersecurity 2021   PeerJ Computer Science - Federated Learning for Cybersecurity in Internet of Things
DATE 2021   Design, Automation and Test in Europe Conference
DATE 2022   Design, Automation, and Test in Europe
AST 2022   3rd ACM/IEEE International Conference on Automation of Software Test
AI Meets Cybersecurity 2022   Call for Papers: AI Meets Cybersecurity from Journal of Intelligent Information Systems
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
TEST&E 2022   3rd Conference on Testing and Experimentation in Civil Engineering. Smart Technologies (Scopus, Springer)
Virtual Environments for Cybersecurity 2021   SIMULATION MODELLING PRACTICE AND THEORY - Special Issue on ''Virtual Environments for Cybersecurity''
SI-D2CSCAI 2021   CfP - Special Issue Data-Driven Cybersecurity and Safety for Critical Applications and Infrastructures (MDPI Sensors - IF= 3.275)
MADWeb 2022   Workshop on Measurements, Attacks, and Defenses for the Web