Universite Paul Sabatier
August 24- 28, 2015
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.
Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.
This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.
The aim of 4th International Workshop on Cyber Crime is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.
The workshop will be accessible to both non-experts interested
in learning about this area and experts interesting in hearing about new
research and approaches.
Topics of interest include, but are not limited to:
- Cyber crimes: evolution, new trends and detection
- Cyber crime related investigations
- Computer and network forensics
- Digital forensics tools and applications
- Digital forensics case studies and best practices
- Privacy issues in digital forensics
- Network traffic analysis, traceback and attribution
- Incident response, investigation and evidence handling
- Integrity of digital evidence and live investigations
- Identification, authentication and collection of digital evidence
- Anti-forensic techniques and methods
- Watermarking and intellectual property theft
- Social networking forensics
- Steganography/steganalysis and covert/subliminal channels
- Network anomalies detection
- Novel applications of information hiding in networks
- Political and business issues related to digital forensics and anti-forensic techniques
SUBMISSIONS AND REGISTRATION
Authors are invited to submit
Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English.
Authors are invited to submit their papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.
Authors are invited to submit Regular Papers (maximum 8 pages) via EasyChair. Failure to adhere to the page limit and formatting requirements will be grounds for rejection.
Papers accepted by the workshop will be published by Conference Publishing Services (CPS).
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
The extended versions of all papers accepted for IWCC will be published in a special issue of the Security and Communication Networks, Wiley (confirmed!)
or EURASIP Journal on Information Security (confirmed!). The decision to which journal authors of the extended version of the accepted paper will be invited depends on the quality of the paper and quality of the presentation at IWCC. The final decision will be made by co-chairs after the workshop.
The registration system, online hotel booking, travel and visa information and our special Air France and KLM flight offer can be found here on the ARES 2015 website.
April 20, 2015 (EXTENDED) Regular Paper Submission [submission closed!]
May 15, 2015: Notification Date
June 8, 2015: Registration Deadline
June 15, 2015: Camera-Ready Paper Deadline
(2) Jason Clark, Matt Collins and Jeremy Strozer. Malicious Insiders with Ties to the Internet Underground Community
(3) Murdoch Watney. Intensifying state surveillance of electronic communications: a legal solution in addressing extremism or not?
(4) Jaspreet Kaur, Steffen Wendzel and Michael Meier. Countermeasures for Covert Channel-internal Control Protocols
(7) Wien Hong, Tung-Shou Chen, Yuan-Bo Ma, Jeanne Chen and Quan-Si Wen. An Error-Free Reversible Data Hiding in Encrypted Images Using Histogram Modification
(8) Geumhwan Cho, Junsung Cho, Youngbae Song and Hyoungshick Kim. An empirical study of click fraud in mobile advertising networks
(9) Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao and Zhu Guang. A Landmark Calibration Based IP Geolocation Approach
(10) Pavol Sokol, Martin Husak and Frantisek Liptak. Deploying Honeypots and Honeynets: Issue of Privacy
(13) Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos and Baptiste Magnier. Color Images Steganalysis Using Correlation Between RGB Channels
(15) Yi Zhang, Xiangyang Luo, Chunfang Yang and Fenlin Liu. A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients
(16) Tejas Dakve, Jason Hiney, Krzysztof Szczypiorski and Kris Gaj. Using Facebook for Image Steganography
(18) Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser and Edgar Weippl. Gradually Improving the Forensic Process
(19) Hang Cheng, Xinpeng Zhang, Jiang Yu and Fengyong Li. Markov Process Based Retrieval for Encrypted JPEG Images
(20) Wojciech Fraczek and Krzysztof Szczypiorski. StegBlocks: ensuring perfect undetectability of network steganography
(22) Artur Janicki. Novel Method of Hiding Information in IP Telephony Using Pitch Approximation
(23) Hui Tian, Yanpeng Wu, Yongfeng Huang, Yonghong Chen, Tian Wang and Yiqiao Cai. Steganalysis of Low bit-rate Speech Based on Statistic Characteristics of Pulse Positions
(25) Martin Husak, Milan Cermak, Tomas Jirsik and Pavel Celeda. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting
Wojciech Mazurczyk, Warsaw University of Technology, Poland (General Chair)
Krzysztof Szczypiorski, Warsaw University of Technology, Poland (General Co-chair)
Artur Janicki, Warsaw University of Technology, Poland (Publicity and Publication Chair)
Elias Bou-Harb, National Cyber Forensics and Training Alliance (NCFTA) & Concordia University, Canada
Patrizio Campisi, University of ROMA TRE, Italy
Luca Caviglione, ISSIA, CNR, Italy
Eric Chan-Tin, Oklahoma State University, USA
Marc Chaumont, Nimes/Montpellier University, France
Alessandro Checco, Trinity College, Ireland
Xiaofeng Chen, Xidian University, China
Michal Choras, University of Technology and Life Sciences, Poland
Frederic Cuppens, TELECOM Bretagne, France
Jana Dittmann, Uni Magdeburg, Germany
Bela Genge, University of Tg. Mures, Romania
Zeno Geradts, Netherlands Forensic Institute, Netherlands
Guoqi Luo, Stevens Institute of Technology, USA
Amir Houmansadr, University of Massachusetts Amherst, USA
Artur Janicki, Warsaw University of Technology, Poland
Stefan Katzenbeisser, Technische Universitat Darmstadt, Germany
Jerzy Konorski, Gdansk University of Technology, Poland
Maciej Korczynski, Delft University of Technology, The Netherlands
Igor Kotenko, SPIIRAS, Russia
Zbigniew Kotulski, Warsaw University of Technology and IPPT PAN, Poland
Christian Kraetzer, Otto-von-Guericke University of Magdeburg, Germany
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Jean-Francois Lalande, Inria, Univ. Rennes 1, INSA Centre Val de Loire, Univ. Orlaeans, France
Guangjie Liu, Nanjing University of Science and Technology, China
Prateek Mittal, Princeton University, USA
Giancarlo Pellegrino, Saarland University, Germany
Josef Pieprzyk, Macquarie University, Australia
Michalis Polychronakis, Stony Brook University, USA
Pedro Prospero-Sanchez, Science and Technology University of Sao Paulo, Brazil
Nabil Schear, Massachusetts Institute of Technology, USA
Hamid Sharif-Kashani, University of Nebraska - Lincoln, USA
Johnson Thomas, Oklahoma State University, USA
Hui Tian, National Huaqiao University, China
Wei Wei, Xi'an University of Technology, China
Zachary Weinberg, Carnegie Mellon University, USA
George Weir, University of Strathclyde, UK
Steffen Wendzel, Fraunhofer FKIE, Germany
David Wolinsky, Yale University, USA
Jozef Wozniak, Gdansk University of Technology, Poland
Dengpan Ye, Wuhan University, China
Sebastian Zander, Swinburne University of Technology Melbourne, Australia
Contact IWCC 2015 Chair using this email address: firstname.lastname@example.org.