posted by organizer: nmultari || 2261 views || tracked by 4 users: [display]

SafeConfig 2016 : SafeConfig 2016: Testing and Evaluation for Active & Resilient Cyber Systems


When Oct 24, 2016 - Oct 24, 2016
Where Vienna Austria
Submission Deadline Aug 5, 2016
Notification Due Sep 6, 2016
Final Version Due Sep 15, 2016
Categories    resilience   validation   testing

Call For Papers

SafeConfig 2016 : Testing and Evaluation for Active and Resilient Cyber Systems:
Identifying and understanding novel means of verifying and validating next generation cyber systems
(Collocated with ACM CCS 2016)
Hofburg Palace, Vienna, Austria
October 24, 2016
The premise of this year’s SafeConfig Workshop is that existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. For example, we contend that existing penetration testing tools, red team processes, and security testing are not able to cope with inherent nature of continuous and resilient systems. Existing tactics, techniques and procedures (TTP) by the adversary, and even existing penetration teams are often adequate to accomplish the job needed for their own specific purposes. However to increase the scientific validity, the validation of resilient systems is not a static nor one of breach of perimeter or exfiltration of data. Rather the objectives for this workshop are the exploration and discussion of scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and “test” the various resilient and active technologies. This adaptation, and change in focus necessitates at the very least modification, and at the most, wholesale new developments to ensure that resilient and agile aware security testing is available to the research community. These impediments will also include natural faults such as flooding, fire, or hardware failure, or even staff member negligence. They must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researcher’s and practitioners. The following topics (but are not limited to) are of interest of this workshop:
• Configuration testing, forensics, debugging and evaluation.
• Continuous monitoring and response.
• Cyber agility and moving target defense.
• Cyber resiliency.
• Cost effectiveness.
• Resilience/ agility effectiveness.
• Risk measurement.
• Testbeds.
• Research Infrastructure.
• Verification techniques.
• Validation techniques.
• Testing & evaluation methods.
• Cyber-physical systems security.
• Security configuration verification and economics.
• Security metrics - Adversarial Measures, User measures
• Mission metrics - Mission assurance, Mission measures, Conflicting mission management
• Security policy management
• Theory of defense-of-depth

Important Dates
Manuscript Submission: August 05, 2016
Acceptance Notification: September 06, 2016
Camera Ready: September 15, 2016
Conference Date: October 23, 2016

Submission Guidelines
Papers must present original work and must be written in English. We require that the authors use the ACM format for papers, using one of the ACM proceeding templates. We solicit two types of papers, regular papers and position papers. The length of the regular papers in the proceedings format should not exceed 6 pages for long papers, 3 pages for short papers, and 1 page for posters, excluding well-marked references and appendices. Committee members are not required to read the appendices, so papers must be intelligible without them. Papers are to be submitted electronically as a single PDF file at Authors of accepted papers must guarantee that their papers will be presented at the workshop.

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
BIENS 2021   5th International Conference on Biomedical Engineering and Science
MDPI-Electronics-SI-QualRiskDistribSys 2022   MDPI Electronics Special Issue on Quality Assurance and Risk Mitigation in Large-Scale Distributed Systems
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
AL4CFDD 2022   EAIS 2022 - Special Session on Active Learning for Concept and Feature Drift Detection
Shanghai--IC4M 2022   The 7th International Conference on Mechanical, Manufacturing, Modeling and Mechatronics (IC4M 2022)
ICST 2022   15th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2022
TVSEP Conference 2022   International TVSEP Conference on “Shocks and resilience in rural Southeast Asia”
ERI 2022   The 2nd IAFOR Conference on Educational Research & Innovation (ERI2022)
ISSTA 2022   International Symposium on Software Testing and Analysis