The Fairmont Hotel
San Jose, CA, USA
May 18, 2014
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.
Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.
This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.
The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.
The workshop will be accessible to both non-experts interested
in learning about this area and experts interesting in hearing about new
research and approaches.
Topics of interest include, but are not limited to:
- Cyber crimes: evolution, new trends and detection
- Cyber crime related investigations
- Computer and network forensics
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Privacy issues in digital forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Social networking forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Political and business issues related to digital forensics and anti-forensic techniques
SUBMISSIONS AND REGISTRATION
Authors are invited to submit
Regular Papers (maximum 8 pages) or Short Papers (maximum 4 pages)
via EasyChair. Papers accepted by the workshop will be published in the
Conference Proceedings published by IEEE Computer Society Press.
Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides.
The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing.
Authors are encouraged to use the IEEE conference proceedings templates found here.
Failure to adhere to the page limit and formatting requirements will be grounds for rejection.
The following is a URL link to the "Author's Final Paper Formatting and Submission Instructions" Webpage (Online Author Kit) for 2014 IEEE Security and Privacy Workshops (SPW 2014).
The extended versions of high-quality papers selected from the workshop will be published in a special issue of the EURASIP Journal on Information Security (confirmed!).
February 17, 2014: (EXTENDED) Regular & Short Paper Submission
March 16, 2014: Notification Date
March 31, 2014: Camera-Ready Paper Deadline
April 15, 2014: Early Registration Deadline (REGISTRATION IS OPEN !)
Acceptance rate: 50%
(1) Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna - The Tricks of the Trade: What Makes Spam Campaigns Successful?
(2) Bartosz Lipinski, Wojciech Mazurczyk and Krzysztof Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment
(6) Iwona Grabska and Krzysztof Szczypiorski - Steganography in Long Term Evolution Systems
(8) Jake Drew and Tyler Moore - Automatic Identification of Replicated Criminal Websites Using Consensus Clustering Methods
(10) Ebrahim Al Hanaei and Awais Rashid - DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations
(11) Haya Shulman and Michael Waidner - Towards Forensic Analysis of Attacks with DNSSEC
(12) Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan and Carl Fischer - iCOP: Automatically Identifying New Child Abuse Media in P2P Networks
(13) Yasemin Gokcen, Vahid Aghaei Foroushani and A. Nur Zincir-Heywood - Can we identify NAT behavior by analyzing Traffic Flows?
(14) Rubens Faria, Keiko Fonseca, Bertoldo Schneider Jr and Sing Kiong Nguang - Collusion and fraud detection on electronic energy meters: a use case of forensics investigation procedures
(17) Xin Hu, Ting Wang, Marc Stoecklin, Doug Schales, Jiyong Jang and Reiner Sailer - Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
(18) Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira and Damon McCoy - Constructing and Analyzing Criminal Networks
(22) Pratik Narang, Subhajit Ray, Chittaranjan Hota and Venkat Venkatakrishnan - PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations
Students can apply for the travel grants. More information available here.
We are deligthed to announce that this year keynote speech entitled "Combating Cybercrime via Network Science" will be given by Prateek Mittal from Princeton University.
Prateek Mittal is an Assistant Professor in the Department of
Electrical Engineering at Princeton University. At Princeton, he is also
affiliated with the Center for Information Technology Policy. His research
focuses on building secure and privacy-preserving systems, drawing on
techniques from applied cryptography, distributed systems, large scale
machine learning and network science. His work has influenced the design of
several widely used anonymity systems. He is the recipient of several
awards, including the M.E. Van Valkenburg research award, the Rambus
Computer Engineering fellowship, and the ACM CCS 2008 outstanding paper.
Prior to joining Princeton University, he was a postdoctoral scholar at UC
Berkeley, and earned his doctorate at University of Illinois, Urbana-Champaign.
IWCC 2014 PROGRAM
7:30 - 8:30 Breakfast
9:00 - 9:15 - Welcome & Opening Remarks
9:15 - 10:00 - Keynote - "Combating Cybercrime via Network Science", Prateek Mittal, Princeton University
10:00 - 10:30 - Morning coffee break
10:30 - 12:00 - Session I - Digital Forensics (20 minutes for each presentation)
Ebrahim Al Hanaei and Awais Rashid - DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations
Xin Hu, Ting Wang, Marc Stoecklin, Doug Schales, Jiyong Jang and Reiner Sailer - Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
Rubens Faria, Keiko Fonseca, Bertoldo Schneider Jr and Sing Kiong Nguang - Collusion and fraud detection on electronic energy meters: a use case of forensics investigation procedures
Haya Shulman and Michael Waidner - Towards Forensic Analysis of Attacks with DNSSEC
12:00 - 13:15 - Lunch
13:15 - 14:30 - Session II - Cyber Crimes Techniques (20 minutes for each presentation)
Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna - The Tricks of the Trade: What Makes Spam Campaigns Successful?
Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira and Damon McCoy - Constructing and Analyzing Criminal Networks
Iwona Grabska and Krzysztof Szczypiorski - Steganography in Long Term Evolution Systems
Bartosz Lipinski, Wojciech Mazurczyk and Krzysztof Szczypiorski - Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment
14:30 - 15:00 - Afternoon coffee break
15:00 - 16:30 - Session III - Cyber Crimes Prevention & Monitoring (20 minutes for each presentation)
Pratik Narang, Subhajit Ray, Chittaranjan Hota and Venkat Venkatakrishnan - PeerShark: Detecting Peer-to-Peer Botnets
Jake Drew and Tyler Moore - Automatic Identification of Replicated Criminal Websites Using Consensus Clustering Methods
Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan and Carl Fischer - iCOP: Automatically Identifying New Child Abuse Media in P2P Networks
Yasemin Gokcen, Vahid Aghaei Foroushani and A. Nur Zincir-Heywood - Can we identify NAT behavior by analyzing Traffic Flows?
4:45 - 5:00 - Closing Remarks & Best Paper Award
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Amir Houmansadr, University of Texas at Austin, USA
Hui Tian, National Huaqiao University, China
Elias Bou-Harb, National Cyber Forensics and Training Alliance (NCFTA) & Concordia University, Canada
Patrizio Campisi, University of ROMA TRE, Italy
Luca Caviglione, ISSIA, CNR, Italy
Marc Chaumont, Nimes/Montpellier University, France
Costas Constantinou, University of Birmingham, UK
Eric Chan-Tin, Oklahoma State University, USA
Frederic Cuppens, TELECOM Bretagne, France
Jana Dittmann, Uni Magdeburg, Germany
Zeno Geradts, Netherlands Forensic Institute, Netherlands
Chad Heitzenrater, DoD, USA
Stefan Katzenbeisser, Technische Universitat Darmstadt, Germany
Piotr Kijewski, NASK, Poland
Jerzy Konorski, Gdansk University of Technology, Poland
Igor Kotenko, SPIIRAS, Russia
Zbigniew Kotulski, Warsaw University of Technology and IPPT PAN, Poland
Christian Kraetzer, Otto-von-Guericke University of Magdeburg, Germany
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Guangjie Liu, Nanjing University of Science and Technology, China
Miroslaw Maj, Cybersecurity Foundation / ComCERT.PL, Poland
Josef Pieprzyk, Macquarie University, Australia
Michalis Polychronakis, Columbia University, USA
Pedro Prospero-Sanchez, Science and Technology University of Sao Paulo, Brazil
Christian Rossow, Ruhr University Bochum / VU Amsterdam, Germany / Netherlands
Nabil Schear, Massachusetts Institute of Technology, USA
Johnson Thomas, Oklahoma State University, USA
Wei Wei, Xi'an University of Technology, China
Zachary Weinberg, Carnegie Mellon University, USA
George Weir, University of Strathclyde, UK
Steffen Wendzel, Fraunhofer FKIE, Germany
David Wolinsky, Yale University, USA
Jozef Wozniak, Gdansk University of Technology, Poland
Sebastian Zander, Swinburne University of Technology Melbourne, Australia
Wojciech Mazurczyk, firstname.lastname@example.org
Krzysztof Szczypiorski, email@example.com