征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Ensuring correctness and integrity of system configurations and associated policies are key to proper functioning, accessibility, security, privacy and resilience of modern information systems and services. However, this is a daunting in large enterprise systems that may contain millions of physical and/or virtual components that must be properly configured and secured from unauthorized access. Furthermore, the configuration variables often have explicit or hidden interdependencies that must be understood in order to ensure proper end to end behavior.

The new sophisticated cyber security threats demand new security techniques and approaches that offer proactive, intelligent and a holistic security analytics based on analyzing the system artifacts including system traces, configurations, logs, incident reports, alarms and network traffic. Scalable analytics techniques are essential to handle large volumes of data and to normalize, model, integrate, analyze and respond to threats in real time. As the current technology moves toward "smart" cyber infrastructure and open networking platforms (e.g. OpenFlow and virtual computing) and integration of large variety of sensors, the need for large-scale security analytics and automation becomes essential to enable intelligent response, automated defense, and network resilience and agility.

This workshop offers a unique opportunity by bringing together researchers from academia, industry as well as government agencies to discuss the challenges listed above, to exchange experiences, and to propose joint plans for promoting research and development in this area. SafeConfig is a one day forum that includes invited talks, technical presentations of peer-reviewed papers, poster/demo sessions, and joint panels on research collaboration. SafeConfig was started in 2009 and has been continuously running since then. It provides a unique forum to explore theoretical foundations, algorithmic advances, modeling, and evaluation of configuration related challenges for large scale cyber and cyberphysical systems. This installment of SafeConfig is being run in conjunction with the CCS (Computing and Communications Security) conference, to be held Nov 3-7, 2014 in Scottsdale, Arizona.

征稿信息

重要日期

2014-08-04
初稿截稿日期

征稿范围

Topics (but are not limited to)
· Big data analytics for cyber security. 
· Attack prediction and attribution. 
· Security metrics. 
· Formal semantics of security policies. 
· Model composition and integration. 
· Autonomic proactive defense. 
· Cyber Agility. 
· Theory of defense-of-depth. 
· Security games. 
· Security analytics under uncertainty.
· Automated configuration verification. 
· Configuration testing, forensics, debugging and evaluation. 
· Automated analytics of attacks motive and attribution. 
· Security policy management. 
· Accountability and provenance. 
· Attack forensics and automated incident analysis. 
· Automated security hardening and optimization. 
· Security synthesis and planning. 
· Health-inspired security. 
· Risk-aware and context-aware security.
· Cyber agility and moving target defense.
· Security configuration economics.
· Continuous monitoring.
· Usability issues in security management.

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 11月03日

    2014

    会议日期

  • 08月04日 2014

    初稿截稿日期

  • 11月03日 2014

    注册截止日期

主办单位
ACM
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询