Nippon-European Cyberdefense-Oriented Multilayer threat Analysis

Student internship at IBM Research Zurich

23 April 2015

Intern Position Available in Systems Security for Cloud Storage systems

The cloud storage & security research team at IBM Research - Zurich is looking for outstanding graduate students in the area of systems security. Candidates should have a good understanding of Operating Systems architecture, distributed systems and C/C++ system programming skills. Knowledge of memory corruption prevention and fuzz testing techniques is beneficial. During the  six month internship the successful candidate will develop novel techniques for vulnerability detection in distributed operating system components.

Contact eug@zurich.ibm.com for more information.

 

Professor in Cyber Security and Privacy at Edinburgh

21 April 2015

Informatics at Edinburgh is recruiting a new (full) professor in the general area of Cyber Security and Privacy.  Specific topics of interest include systems security, network security, applied cryptography, but experts in other areas are encouraged to apply.

Starting date: 1st October 2015 or later by negotiation.
Closing date:  11th May 2015.
Full details http://secpriv.inf.ed.ac.uk/chair

The department is the largest, most research productive Informatics and Computer Science department in the UK; we are also one of the top places for undergraduate teaching.  We are looking for an outstanding research leader and educator who can help us grow our expertise in the security and privacy area.

PhD/Post-doc openings at TU Darmstadt

02 March 2015

The DEEDS group at TU Darmstadt (www.deeds.informatik.tu-darmstadt.de/deeds) researches themes of Trustworthy Systems/Software/Cloud covering both security and dependability.
We have multiple PhD/Post-doc openings (basic research, EC projects, DFG) in the area of Cloud Software and Security covering:

  • Software/Security Testing: Experimental fault injection, static analysis, formal verification…
  • Cloud Security Design/Quantification: SLA’s, Monitoring, Negotiation, Metrics …
  • Threat Analysis, Threat Profiling …

If you have a strong security/dependability background and passion for innovative research, please send your application including:

  1. Complete and detailed CV
  2. Complete educational transcripts including grades/degrees awarded
  3. A write-up describing your interests and potential alignment with the topics mentioned above.

Contact persons:

www.deeds.informatik.tu-darmstadt.de/deeds/openings-jobs-theses/post-docphd/

Postdoctoral Researcher Positions at FORTH

18 August 2014

The Foundation for Research and Technology (FORTH) invites talented and motivated candidates with appropriate expertise to express their interest in the positions available in the project “Developing the foundations for modeling and analysis of spectrum markets” (CoRLAB), funded by a Research Excellence grant (GSRT/ΑΡΙΣΤΕΙΑ). 

2 Positions of Postdoctoral Researcher

The work focuses on the analysis and assessment of wireless network markets and services. Topics include modeling the quality of experience of telecom services, analysis of incentives for adopting certain services/technologies, evaluation of partnerships between service providers and/or users, analysis of resource sharing mechanisms, assessment of the knowledge of quality of experience of a service on a market. 

Require qualifications 

  • B.Sc/B.S in Computer Science or in a related field
  • Ph.D. in Computer Science or in a related field
  • Completed military service (for male candidates)
  • In-depth understanding of wireless networks and communications (e.g., in the design and analysis of network systems)
  • Experience with EU projects (e.g., participation and proposal writing)
  • Knowledge of network economics
  • Good knowledge of programming 

Employment 

The successful postdoctoral candidate(s) will be offered a contract for one year. 

Application 

Interested parties are invited to submit their application by August 31st, 2014.

Their application should include the following documents:

  • Curriculum vitae (CV)
  • Copy of their academic diplomas/certificates
  • Letters of recommendation
  • Certificates of work experience

The application should be sent via email to Ms. Chrysoula Iliaki (chrys@ics.forth.gr)
For more information about the position and the application, please email to chrys@ics.forth.gr

More information about the technical aspects of CoRLAB can be found at:
http://www.ics.forth.gr/mobile/

PhD Studentship in Privacy-friendly Computation

10 June 2014

PhD Supervisor: Dr G Danezis
Application Deadline: Friday, June 27, 2014

Applications are invited for a PhD position in the field of privacy enhancing technologies and cryptographic engineering at the Information Security Group of the UCL Department of Computer Science. The position is funded partly by Microsoft Research (MSR) and will be co-supervised by an MSR researcher.

We expect a candidate to have at least a strong 2:1 degree in Computer Science, Engineering, Mathematics or a related MSc course. A good engineering mathematics background and a willingness to become fluent with modern cryptographic constructions are necessary. A solid software engineering, compilers, or distributed systems background is desirable.

The successful applicant will study the engineering of tools and services to enable the wide deployment of privacy friendly computation techniques. A number of techniques in theoretical cryptography allow for computations to be performed on encrypted or otherwise obscured private data (including homomorphic encryption, secure multi-party computation and zero-knowledge proofs). The aim of this project is to make those techniques practical and usable by non-cryptographers. Key challenges include a thorough understanding of the cryptographic primitives, but most importantly engineering innovation through the creation of both infrastructures (web services, trusted parties) and tools (compilers, libraries, languages) that implement the theoretical techniques, and provide a usable interface for non-experts to use them.

How to Apply:

Please follow the link to the online application form here: http://prism.ucl.ac.uk/pgadmissions/apply/new?advert=66
You should mark the name of the studentship clearly on your personal statement.
The vacancy closing date is the 27th June 2014.
General enquiries about the application process should be directed to Melanie Johnson at melanie.johnson@ucl.ac.uk.
Questions regarding academic aspects of the project should be directed to George Danezis at g.danezis@ucl.ac.uk.

Funding Notes:

The studentship is open to all but only fully covers UK/EU fees. In addition a tax free stipend of £15,863 per year is provided.

Call for Papers: eCrime 2014

05 June 2014

The ninth Symposium on Electronic Crime Research (eCrime) 2014 once again will be held in conjunction with the 2014 APWG General Meeting between September 23-25, 2014 in Birmingham, Alabama.

eCrime 2014 consist of two full days which bring together academic researchers, security practitioners, and law enforcement to discuss all aspects of electronic crime and ways to combat it. Topics of interests include (but are not limited to):

  •     Case studies of current attack methods, including phishing, malware, rogue antivirus, pharming, crimeware, botnets, and emerging techniques
  •     Case studies of online advertising fraud, including click fraud, malvertising, cookie stuffing, and affiliate fraud
  •     Case studies of large-scale take-downs, such as coordinated botnet disruption
  •     Technical, legal, political, social and psychological aspects of fraud and fraud prevention
  •     Economics of online crime, including measurement studies of underground economies and models of e-crime
  •     Uncovering and disrupting online criminal collaboration and gangs
  •     Financial infrastructure of e-crime, including payment processing and money laundering
  •     Techniques to assess the risks and yields of attacks and the effectiveness of countermeasures
  •     Delivery techniques, including spam, voice mail, social network and web search manipulation; and countermeasures
  •     Techniques to avoid detection, tracking and take-down; and ways to block such techniques
  •     Best practices for detecting and avoiding damages to critical internet infrastructure, such as DNS and SCADA, from electronic crime activities

Accepted papers will be published in proceedings. In addition, cash awards will be given for the best paper overall and the best student co-authored paper. A limited number of cash travel awards will also be made to student authors of papers and posters.
 
Instructions for Authors
eCrime has adopted the IEEE publication format. Submissions should be in English, in PDF format with all fonts embedded, formatted using the the IEEE conference template, found here: http://www.ieee.org/conferences_events/conferences/publishing/templates.html. Submissions should include author names, affiliations and acknowledgments. They should not exceed 12 letter-sized pages, not counting the bibliography and appendices. Papers should begin with a title, abstract, and an introduction that clearly summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Papers should contain a scholarly exposition of ideas, techniques, and results, including motivation, relevance to practical applications, and a clear comparison with related work. Committee members are not required to read appendices, and papers should be intelligible without them. Submitted papers risk being rejected without consideration of their merits if they do not follow all the above guidelines. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings.

Authors will be asked to indicate whether their submissions should be considered for the best student paper award; any paper co-authored by a full-time student is eligible for this award.

Authors of accepted papers must guarantee that their paper will be presented at the conference. A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are given priority to receive such assistance. Requests for stipends should be addressed to the general chair after August 20.

Full papers have to be submitted via easychair: https://www.easychair.org/conferences/?conf=ecrs2014. First, papers have to be registered, then authors can upload their papers. A successful submission can be viewed in EasyChair, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.

Case Studies
A special category is available in the paper submission system for Case Studies. This category allows for industrial research and case studies that do not qualify as full academic papers. Note though that papers submitted to this category are highly technical. For consideration in this category please submit your case study via easychair: https://www.easychair.org/conferences/?conf=ecrime2014. First, Case Studies have to be registered, then authors can upload their papers. A successful submission can be viewed in EasyChair, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.

Important Dates: (11:59pm US EDT)

  •     Full Papers and Case Studies registration and submission due: June 13, 2014 (extended)
  •     Paper Notifications due: July 18, 2014
  •     Camera ready due: August 18, 2014
  •     Conference: September 23-25, 2014

 

Organizing Committee
General Chair:

  • Saeed Abu-Nimeh, Seclytics

Program Co-Chairs

  • Manos Antonakakis, Georgia Tech
  • Roberto Perdisci, University of Georgia

Steering Committee

  • Don M. Blumenthal, Public Interest Registry
  • Jay Brennan, Mitre
  • Manel Medina, Univers. Polit. Catalunya, Barcelona, Spain
  • Markus Jakobsson, PayPal
  • Oliver Friedrichs, Immunet
  • Tyler Moore, SMU
  • Susanne Wetzel, Stevens Institute of Technology

Technical Program Committee

  • Marco Balduzzi (Trend Micro)
  • Davide Balzarotti (Eurecom)
  • Juan Caballero (IMDEA)
  • Lorenzo Cavallaro (Royal Holloway)
  • Nicolas Christin (CMU CyLab)
  • Guofei Gu (Texas A&M)
  • Sotiris Ioannidis (ICS Forth)
  • Christian Kreibich (ICSI)
  • Andrea Lanzi (University of Milano)
  • Kang Li (University of Georgia)
  • Long Lu (Stony Brook)
  • Damon McCoy (George Mason University)
  • Konrad Rieck (University of Gottingen)
  • Kapil Singh (IBM TJ Watson)
  • Brett Stone-Gross (Dell SecureWorks)
  • Junjie Zhang (Wright State University)
  • Michalis Polychronakis (Columbia University)
  • George Portokalidis (Stevens Institute of Technology)
  • Raheem A. Beyah, (Georgia Institute of Technology)
  • Gritzalis Stefanos, (University of the Aegean)

NECOMA paper got Registered

14 May 2014

Our paper "Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware" was featured in the popular tech-news aggregator The Register.

 

Droid malware cloak outwits Google Bouncer and friends • The Register 2014-05-14 17-59-46.png

Call for Papers: QASA 2014

05 May 2014

3rd International Workshop on Quantitative Aspects in Security Assurance
Affiliated workshop with ESORICS 2014
Wroclow, Poland, September 10-11, 2014
http://www.iit.cnr.it/qasa2014/


Overview

There is an increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems & services, e.g., from requirements elicitation to run-time operation and maintenance. The aim of this workshop is to bring together researchers and practitioners interested in these research topics with a particular emphasis techniques for service oriented architectures. The scope of the workshop, is intended to be broad, including aspects as dependability, privacy, risk and trust.

The list of topics includes, but it is not limited to:

  •         Probabilistic/stochastic model checking
  •         Quantitative information flow analysis
  •         Quantitative issues in access and usage control
  •         Security testing techniques
  •         Static/Dynamic code analysis techniques
  •         Metrics for security, trust and privacy
  •         Incremental/modular security assurance analysis
  •         Process compliance assurance techniques
  •         Tool support for quantitative techniques for security assurance
  •         Simulation techniques
  •         Model-driven techniques for security, trust, risk and privacy
  •         Assurance cases modelling and analysis


Important dates:

Submission deadline for paper:        June 21 2014
Notification:                                         July 28 2014

Workshop Organizers:

  •     Alessandro Aldini, U. of Urbino
  •     Fabio Martinelli, IIT-CNR
  •     Neeraj Suri, TU Darmstadt

Program Committee:

  •     Lujo Bauer, CMU
  •     Frédéric Cuppens, ENST-Bretagne
  •     Jesus Luna, CSA
  •     Charles Morisset, U. of Newcastle
  •     Pierangela Samarati, U. of Milan
  •     Andrei Sabelfeld, Chalmers
  •     Herbert Wiklicky, ICL
  •     Jorge Cuellar, SIEMENS
  •     Javier Lopez, U. of Malaga
  •     Cathy Meadows, NRL
  •     Flemming Nielson, DTU
  •     Reijo Savola, VTT
  •     Ketil Stoelen, SINTEF
  •     Lorenzo Strigini, City Univ. London

Programme and Proceedings:

The program will consist of invited speakers as well as of submitted papers. The workshop post-proceedings will be published with LNCS Springer, in cooperation with DPM/SETOP workshops.

Sponsors:

The workshop is sponsored by the EU FP7 projects Network of Excellence


Contact: qasa2014@iit.cnr.it

 

Call for Papers: AIDP 2014

04 April 2014

Advanced Intrusion Detection and  Prevention Workshop (AIDP'14)            

Co-located with IFIP SEC 2014

Marrakech, Morocco, June 4-5, 2014

http://adax.boun.edu.tr/aidp2014/
**************************************************************************

Scope:

The workshop will provide a focused and outstanding forum opportunity for researchers, technologists and network engineers to discuss new and emerging technologies in the field of network security and intrusion detection/prevention.

Topics:

* Analysis and management of risks
* Intrusion detection algorithms
* Specification of security and privacy requirements and policies
* Testing for security
* Countermeasure selection methodologies
* DDoS mitigation
* Anomaly detection and event correlation for IDS/IPS
* Intrusion detection and prevention for M2M
* Intrusion detection and prevention for 5G networks
* Intrusion detection and prevention for financial systems
* IDS/IPS for mobile security
* IDS/IPS for e-commerce
* IDS/IPS for adaptive cyber security
* IDS/IPS in cloud computing environments
* IDS/IPS for DDoS
* IDS/IPS for emerging malware
* Detection and prevention of coordinated/complex attacks
* Visual analytics for intrusion detection and prevention
* Threat modelling
* Security assessment for intrusion detection and prevention
* Privacy and IDS/IPS
* Countermeasure simulation and impact analysis

Paper Submission:

Authors must submit their papers using the following link:

http://www.easychair.org/conferences/?conf=aidp2014

Full Technical Papers should be at most 15 pages (using 11-point font), excluding the bibliography and well-marked appendices.
Committee members are not required to read the appendices, so the paper should be intelligible without them. Short papers should be at most 15 pages, including the bibliography and appendices. All submissions must be written in English. All papers will be refereed.

Accepted papers should be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper.

Contributed Talk Abstracts should be at most 2 pages (using 11-point font). Submissions must be written in English. They will be reviewed as oral presentations. Accepted abstract authors will be invited to present their research at the workshop. For those presentations that are meritorious, the Committee will recommend them to submit extended versions for their publication in the revised selected papers post-proceedings. All extended versions will be refereed. The submitted paper (in PDF format) should follow the latex template indicated at the following link:

http://style.eptcs.org/

Papers must start with a title, a short abstract, names and affiliations of the authors, and a list of keywords.

All the accepted contributions will be published in the Electronic Proceedings in Theoretical Computer Science series (DOI:
10.4204/EPTCS; ISSN: 2075-2180).

Contributions from academia and industry are welcome. Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.

Important Dates:

* Paper Submission: April 13, 2014 (11:59 PM UTC-11)
* Paper Acceptance Notification: May 12, 2014
* Camera Ready Version: May 26, 2014

========================================================================

Program Committee Co-Chairs:

* Joaquin Garcia-Alfaro (Telecom SudParis, France)
* Gurkan Gur (Provus, Turkey)

Program Committee:

* Diala Abihaidar (Dar Al Hekma College, Saudi Arabia)
* Sahin Albayrak (TU Berlin, Germany)
* Serif Bahtiyar (Provus, Turkey)
* Gregory Blanc (Telecom SudParis, France)
* Summerjit Das (Carnegie Mellon University, USA)
* Ernesto Damiani (University of Milan, Italy)
* Thomas Dean (Queen's University, Canada)
* Damien Deville (Netasq, France)
* Christian Duncan (Quinnipiac University, USA)
* Stefanos Gritzalis (University of the Aegean, Greece)
* Vincenzo Gulisano (Chalmers University of Technology, Sweden)
* Dina Hadziosmanovic (Delft University of Technology, The Netherlands)
* Sotiris Ioannidis (FORTH-ICS, Greece)
* Ulas C. Kozat (DOCOMO Innovations, USA)
* Gunes Karabulut (Istanbul Technical University, Turkey)
* Giovanni Livraga (University of Milan, Italy)
* Yao Liu (University of South Florida, USA)
* Guillermo Navarro (Autonomous University of Barcelona, Spain)
* Balaji Palanisamy (University of Pittsburgh, USA)
* Andreas Pashalidis ( K.U.Leuven, Belgium)
* Christophe Ponchel (Cassidian Cybersecurity, France)
* Silvio Ranise (FBK, Security and Trust Unit, Italy)
* Indrajit Ray (Colorado State University, USA)
* Jean-Marc Robert (Ecole de Technologie Superieure, Canada)
* Christian Rossow (Vrije Universiteit, The Netherlands)
* Thierry Sans (Carnegie Mellon University, Qatar)
* Ibrahim Sogukpinar (Gebze Institute of Tech, Turkey)
* Chamseddine Talhi (Ecole de Technologie Superieure, Canada)
* Jouni Viinikka (6cure, France)
* Isaac Woungang (Ryerson University, Canada)

Advisory Committee:

* Fatih Alagoz (Bogazici University, Turkey)
* Adrien Becue (Cassidian Cybersecurity, France)
* Bulent Yener (Rensselaer Polytechnic Institute, USA)
* Frederic Cuppens (Institut Mines-Telecom, France)
* Nora Cuppens-Boulahia (Institut Mines-Telecom, France)


=======================================
FURTHER INFORMATION
=======================================

Additional information about paper submission and conference topics and events can be found at the AIDP'2014 web site:

http://adax.boun.edu.tr/aidp2014/

PhD Position in "Internet of Things and Big Data" at Chalmers

07 March 2014

PhD Position in "Internet of Things and Big Data" at Chalmers University of Technology, Gothenburg, Sweden

Application deadline: April 15, 2014

http://www.chalmers.se/en/about-chalmers/vacancies/Pages/default.aspx?rmpage=job&rmjob=1963

As PhD student you will join the Networks and Systems division and work at the intersection of Internet of Things (IoT) and Big Data Analysis. The Internet of Things enables an increasing connectivity of everyday devices and objects. These connected devices provide us with new insights into our daily life and we rely on Big Data Analysis to extract these insights. The overall aim of this PhD position is to develop new mechanisms and applications for the Internet of Things and combine these with Big Data Analysis to enable, for example, sustainable living in future, smart cities. A special focus shall be put on Internet of Things at metropolitan-scale, information security and privacy, near real-time data-stream analysis and energy-efficient networks.

Your major responsibility as a PhD student is to pursue your own doctoral studies. You are expected to develop your own scientific concepts and communicate the results of your research verbally and in writing. The position generally also includes teaching on Chalmers' undergraduate level or performing other duties corresponding to 20 per cent of working hours.

To qualify as a PhD student, you must have a master's level degree corresponding to at least 240 higher education credits in Computer Science, Computer Engineering, or in a related discipline. As for all PhD studies, a genuine interest and curiosity in the subject matter and excellent analytical and communication skills, both oral and written, are needed.

The ideal candidate for the position has a strong background in distributed and networked systems. Further background in cyber physical systems, information security, or data science is helpful. You may apply even if you have not completed your degree, but expect to do so before the position starts. Knowledge of Swedish is not a prerequisite for applying since English is our working language for research, and we publish internationally. Both Swedish and English are used in undergraduate courses. Our researchers and PhD students at the department come from more than 30 different countries.

Salary for the position is as specified in Chalmers' general agreement for PhD student positions. Currently the starting salary is 26,250SEK per month before tax. The position is limited to a maximum of five years. The position is intended to start in summer 2014, but a different start could also be arranged.

Gothenburg is often referred to as the "heart of Scandinavia". The video below gives an impression what it's like to live and study in Gothenburg: http://youtu.be/0WrlGlSyS1c

Please see here for a detailed position description, contact details, and information on how to apply:
http://www.chalmers.se/en/about-chalmers/vacancies/Pages/default.aspx?rmpage=job&rmjob=1963

2nd NECOMA consortium meeting

17 February 2014

The 2nd consortium meeting took place in Kyoto, Japan on January 27-28, 2014.

Call for Papers: Trust 2014

25 January 2014

TRUST 2014 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.


Important dates:

  •     Submission due: 7 March 2014
  •     Notification: 7 April 2014
  •     Camera ready: 21 April 2014
  •     Conference: 30 June - 2 July 2014


The conference solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.


Two types of submissions are solicited:

  •     Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results
  •     Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress

Topics of interest include, but are not limited to:
Technical Strand:

  •     Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
  •     Trust, Security and Privacy in embedded systems
  •     Trust, Security and Privacy in social networks
  •     Trusted mobile platforms and mobile phone security
  •     Implementations of trusted computing (hardware and software)
  •     Applications of trusted computing
  •     Trustworthy infrastructures and services for cloud computing (including resilience)
  •     Attestation and integrity verification
  •     Cryptographic aspects of trusted and trustworthy computing
  •     Design, implementation and analysis of security hardware
  •     Security hardware with cryptographic and security functions, physically unclonable functions (PUFs)
  •     Intrusion resilience in trusted computing
  •     Virtualization for trusted platforms
  •     Secure storage
  •     Security policy and management of trusted computing
  •     Access control for trusted platforms
  •     Privacy aspects of trusted computing
  •     Verification of trusted computing architectures
  •     Usability and end-user interactions with trusted platforms
  •     Limitations of trusted computing

Social and Socio-economic Strand:

  •     The role of trust in human-computer interactions
  •     Usability and user perceptions of trustworthy systems and risks
  •     Patterns of trust practices in human-computer interactions
  •     Effects of trustworthy systems upon user, corporate, and governmental behavior
  •     The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
  •     The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
  •     The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
  •     Game theoretical approaches to modeling or designing trustworthy systems
  •     Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
  •     Economic drivers for trustworthy systems in corporate environment
  •     Experimental economics studies of trustworthiness
  •     The interplay between privacy, privacy enhancing technologies and trustworthy systems
  •     Evaluation of research methods used in the research of trustworthy and trusted computing
  •     Critiques of trustworthy systems
  •     Metrics of trust
  •     Privacy Aspects of Trust Computing
  •     Engineering Processes for Trustworthy Computing


Submissions must be in LNCS format subject to the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.


General Chair:

    Ioannis Askoxylakis, FORTH-ICS, GR

Program Chairs - Socio-economic Strand

    Daniel J. Weitzner, MIT, USA

Program Chairs - Technical Strand

    Sotiris Ioannidis, FORTH-ICS, GR
    Thorsten Holz, Ruhr-Uni­ver­si­ty Bo­chum, DE

 

 

Postdoctoral Researcher in Network Security

16 December 2013

Call for Postdoctoral Researcher in Network Security 

ETH Zurich


The network security group lead by Adrian Perrig at ETH in Zurich is
seeking to fill a postdoctoral researcher position in the general area
of network security to work on the SCION next-generation Internet
architecture. The candidate will collaborate with a group of 10
committed researchers on the design, analysis, implementation, and
evaluation of a next-generation Internet system. The starting date is
negotiable (but the sooner the better) and the position is for 1-3
years.

More information about the SCION next-generation Internet architecture:
http://www.netsec.ethz.ch/research/projects/scion

More information about the network security group:
http://www.netsec.ethz.ch/

Aim and Scope

In the SCION project we are designing and building a prototype for a
highly available and secure next-generation Internet architecture. We
are researching a multitude of issues, including: DDoS defense, trust
establishment, censorship resilience, user privacy and anonymous
communication, economic aspects, reliability, high performance and
scalable networking systems, etc. The goal of the project is to
design, build, and deploy a highly available and viable
next-generation Internet architecture.

Candidate Profile

The ideal candidate should have an PhD in CS, EE, or related
discipline, and combine a solid theoretical background with strong
systems building skills.
       
The following skills are advantageous:
- Security, applied cryptography, and networking.
- Strong publication track record in security or applied cryptography.
- Interests in systems design, analysis, simulation, implementation,
  and evaluation.
- Knowledge of economic aspects of networking.
- Familiarity with ISP operations.
- Experience with real-world deployments.
- Formal protocol analysis.
- Design and analysis of security protocols.
- Experience with low-level programming and debugging.

Application and Inquiries

Interested candidates should send their CV to Adrian Perrig
<aperrig@inf.ethz.ch>. Questions about the position may be
sent to the same address.

Location

The position is at ETH in Zurich, Switzerland. Knowledge of German is
not required as Zurich is an international city. CS courses at ETH are
taught in English, and English is spoken almost exclusively throughout
the department, as well as in meetings, talks, etc. Although Zurich is
a highly desirable place to live in, the generous remuneration more
than adequately compensates for the high cost of living.
 

Call for Papers: DIMVA 2014

06 December 2013

Call for Papers: DIMVA 2014

11th International Conference on Detection of Intrusions and Malware &
Vulnerability Assessment

Royal Holloway London, Egham, UK
July 10-11, 2014

 

About DIMVA

The annual DIMVA conference serves as a premier forum for advancing the
state of the art in intrusion detection, malware detection, and
vulnerability assessment. Each year, DIMVA brings together international
experts from academia, industry, and government to present and discuss
novel research in these areas.  DIMVA is organized by the special interest
group "Security - Intrusion Detection and Response" (SIDAR) of the German
Informatics Society (GI).  The conference proceedings will appear as a
volume in the Springer Lecture Notes in Computer Science (LNCS) series
(approval pending).

Important Dates

Paper submission deadline: February 8, 2014
Notification of paper acceptance: March 26, 2014
Final paper camera-ready copies due: April 26, 2014
Conference: July 10-11, 2014

 

Website: http://www.dimva.org/dimva2014

Call for Papers: EuroSec 2014

04 December 2013

Call for Papers: EuroSec 2014
7th European Workshop on Systems Security

 

http://www.syssec-project.eu/eurosec-2014/
http://bit.ly/eurosec14

About EuroSec
----------------------------------------
The seventh European Workshop on Systems Security (EuroSec) aims to
bring together researchers, practitioners, system administrators,
system programmers, and others interested in the latest advances in
the security of computer systems and networks. The objective of the
workshop is to discuss novel, practical, systems-oriented work.

EuroSec 2014 will be held on the 13th of April, 2014, in Amsterdam,     
The Netherlands. The workshop will precede the main EuroSys 2014        
conference.                                                             

Important Dates
----------------------------------------
    * Paper submission: February 15, 2014
    * Acceptance notification: March 10, 2014
    * Final paper due: March 28, 2014
    * Workshop: April 13, 2014