ECTCM
2013

First International Workshop on
Emerging Cyberthreats and Countermeasures

Co-located with  ARES 2013, International Conference on Availability, Reliability and Security,
September 2-6, 2013, Regensburg, Germany

Important Dates

Submission:
Deadline Extended!
March 30th, 2013
April 10th, 2013
Author Notification: May 9th, 2013
May 15th, 2013
Author Registration: May 18th, 2013
Proceedings Version: June 1st, 2013
June 14th, 2013
Workshop/Conference:
Workshop:
Sept 2nd-6th, 2013
Sept 4th, 2013

First International Workshop on
Emerging Cyberthreats and Countermeasures

Co-located with  ARES 2013, International Conference on Availability, Reliability and Security,
September 2-6, 2013, Regensburg, Germany
http://www.ectcm.net

Call for Papers

PDF | TXT

The First International Workshop on Emerging Cyberthreats and Countermeasures (co-located with the International Conference on Availability, Reliability and Security, ARES 2013) aims at bringing together researchers and practitioners working in different areas related to cybersecurity. After organizing three informal workshops on Early Warning Systems in IT in the past three years, we strongly believe that the next step is to give the workshop a more formal structure in context of an internationally acclaimed scientific conference. The focus of this year's workshop is on IT Early Warning, Malware Detection and Analysis, Targeted Attacks, Cryptanalysis, and Privacy Protection. Contributions demonstrating both current weaknesses and threats as well as new countermeasures are welcome!

Topics

Topics of interest include, but are not limited to:

  • IT Early Warning
  • Cooperative Aspects of IT Early Warning
  • Intrusion Detection and Prevention
  • Anomaly Detection
  • IDS Event Correlation
  • Malware Detection and Analysis
  • Botnet Detection, Analysis and Mitigation
  • Targeted Attacks
  • Novel Attacks against Computers and Networks
  • Underground Economy
  • Honeypots and Honeynets
  • Cyberwarfare, Cyberespionage
  • Network Security
  • Wireless Security
  • Mobile Device Security
  • Practical Cryptanalysis
  • Analysis of Cryptographic Protocols
  • Protection of Critical IT Infrastructures
  • Anonymity
  • Privacy and Privacy Preserving Techniques
  • Legal and Social Issues
Important dates
Submission Deadline:March 30th, 2013 April 10th, 2013
Author Notification:May 9th, 2013
Author Registration:May 18th, 2013
Proceedings Version:June 1st 2013
Conference / Workshop:September 2nd-6th, 2013
Submission guidelines

Authors are invited to submit papers in Conference Publishing Services (CPS) Proceedings Manuscripts style (two columns, single-spaced, including figures and references, using 10 pt fonts, and number each page). Please consult the  CPS Author Guidelines for more information!

We solicit the submission of research and application papers (8 pages) representing original, previously unpublished work. Submitted papers will be evaluated based on originality, significance, technical soundness, and clarity of exposition. We also encourage submission of work in progress (currently not finished and/or evaluated) to get feedback and discussions on new research ideas.

Duplicate submissions are not allowed. A submission is considered to be a duplicate submission if it has been submitted to (or if it has been already accepted to be published in) other conferences/workshops/journals. Duplicate submissions thus will be automatically rejected without review.

Contact author must provide the following information: Paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Paper registration and submission is done through the  ARES Paper Management System.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the ARES conference and present the paper in the workshop. Guidelines in preparing and submitting the final manuscript(s) will be given after the notification of acceptance.

This workshop requires anonymized submissions, so please make sure that submitted papers contain neither author names nor affiliations. Papers should avoid revealing their authors identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else.

Publication

All accepted papers of ARES 2012 and associated workshops were published as ISBN proceedings published by Conference Publishing Services (CPS):  http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6329167

Organizing committee

Markus Zeilinger, University of Applied Sciences Upper Austria
Peter Schoo, Fraunhofer AISEC
Dieter Vymazal, University of Applied Sciences Upper Austria

Enquiries to the organizing committee may be sent to chair[at]ectcm[dot]net.

Program committee

Henk Birkholz, TZi Bremen, Germany
Pavel Celeda, Masaryk University Brno, Czech Republic
Gerhard Eschelbeck, Sophos, UK
Simone Fischer-Hübner, Karlstad University, Sweden
Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Steven Furnell, University of Plymouth, UK
Jürgen Fuss, University of Applied Sciences Upper Austria, Austria
Rüdiger Grimm, University Koblenz-Landau, Germany
Eckehard Hermann, University of Applied Sciences Upper Austria, Austria
Thorsten Holz, Ruhr-Universität Bochum, Germany
Heiko Kirsch, Cassidian, Germany
Harald Lampesberger, Johannes Kepler University Linz, Austria
Otmar Lendl, CERT.at, Austria
Martina Lindorfer, TU Vienna, iSecLab, Austria
Michael Meier, University of Bonn, Germany
Manuel Nedbal, McAfee, US
Evangelos Ouzounis, ENISA, Greece
Norbert Pohlmann, Westfälische Hochschule, Germany
Christian Rechberger, Technical University of Denmark, Lyngby, Denmark
Timo Steffens, BSI, Germany
Edgar Weippl, SBA, Austria
Philipp Winter, Karlstad University, Sweden