posted by organizer: wmazurczyk || 663 views || tracked by 3 users: [display]

CUING 2017 : International Workshop on Criminal Use of Information Hiding

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/cuing-2017/
 
When Aug 29, 2017 - Sep 1, 2017
Where Reggio Calabria, Italy
Submission Deadline May 14, 2017
Notification Due Jun 6, 2017
Final Version Due Jun 20, 2017
Categories    information hiding   steganography   forensic   cybercrime
 

Call For Papers

CALL FOR PAPERS

The First International Workshop on Criminal Use of Information Hiding (CUING 2017)
to be held in conjunction with the 12th International Conference on Availability, Reliability and Security (ARES 2017 – http://www.ares-conference.eu)

August 29 - September 1, 2017, Reggio Calabria, Italy

CUING website: https://www.ares-conference.eu/conference/workshops/cuing-2017/

With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected.

The aim of the First International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding (e.g. steganography, covert channels), obfuscation techniques and underground networks (darknets) in order to present novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:

- Novel countermeasures against information hiding techniques: detection, prevention, limitation
- Evasion, obfuscation and anti-forensics techniques used by cybercriminals
- Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
- Abusing legitimate social media services for masking criminal activities
- Abusing legitimate cloud-based services for masking criminal activities
- Methods for botnet detection and mitigation from CUIng perspective
- Large scale coordinated actions by LEAs from CUIng perspective
- Studies regarding the use of information hiding in cybercrime
- Traffic type obfuscation techniques e.g. traffic morphing
- Impersonation of one cybercriminals groups by the other
- Aspects and methods for sharing strategic intelligence
- Masking network attacks with another types of threats
- Future scenarios in cybercrime from CUIng perspective
- Underground marketplaces and their business models
- Legal and technical aspects of Darknet research
- Local, air-gapped, and network covert channels
- Analysis of cybercrime cases related to CUIng
- New steganographic & steganalysis methods
- Cybercrime and CPS from CUIng perspective
- Botnet analysis from CUIng perspective
- Banking Trojans from CUIng perspective
- Analysis of underground environments
- IoT-botnets from CUIng perspective
- Information hiding techniques
- Privacy enhancing techniques

IMPORTANT DATES
Submission Deadline May 14, 2017
Author Notification June 06, 2017
Proceedings Version June 20, 2017
Conference August 29 - September 1, 2017

WORKSHOP CHAIRS

Philipp Amann (Chair)
Europol, European Cybercrime Centre, The Netherlands
Philipp.Amann@europol.europa.eu

Jart Armin (Chair)
CyberDefcon, The Netherlands
jart@cyberdefcon.com

Wojciech Mazurczyk (Chair)
Warsaw University of Technology, Poland
wmazurczyk@tele.pw.edu.pl

Angelo Consoli (Chair)
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
angelo.consoli@supsi.ch

Peter Kieseberg (Chair)
SBA Research, Austria
pkieseberg@sba-research.org

Joerg Keller (Chair)
FernUniversitaet in Hagen, Germany
Joerg.Keller@fernuni-hagen.de

SUBMISSION

The submission guidelines valid for the CUING workshop are the same as for the ARES conference. They can be found https://www.ares-conference.eu/conference/conference/submission/.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

CONTACT

In case of questions, please feel free to contact us via info@cuing.org.

Related Resources

IWDW2017:CUING 2017   Emerging threats of Criminal Use of Information Hiding (Special Session at IWDW2017)
ICITA 2018   International Conference on Information Technology and Applications
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)
COMIT 2017   International Conference on Computer Science and Information Technology
VSI: DL-Fusion 2018   Special issue On “Deep Learning for Information Fusion” - Information Fusion (Elsevier)
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
IEEE - ICBDA 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
eCrime 2018   13th Symposium on Electronic Crime Research
ICISDM--IEEE Xplore, Ei and Scopus 2018   2018 2nd International Conference on Information System and Data Mining (ICISDM 2018)--IEEE Xplore, Ei and Scopus