ECTCM
2014

Second International Workshop on
Emerging Cyberthreats and Countermeasures

Co-located with  ARES 2014, International Conference on Availability, Reliability and Security,
September 8-12, 2014, Fribourg, Switzerland

Important Dates

Submission: March 31st, 2014
April 13th, 2014
Author Notification: May 23rd, 2014
Author Registration: June 10th, 2014
Proceedings Version: June 16th, 2014
June 20th, 2014
Workshop/Conference: Sept 8th-12th, 2014

Previous Workshops

ECTCM 2013

Second International Workshop on
Emerging Cyberthreats and Countermeasures

Co-located with  ARES 2014, International Conference on Availability, Reliability and Security,
September 8-12, 2014, Fribourg, Switzerland
http://www.ectcm.net

Call for Papers

PDF | TXT

The Second International Workshop on Emerging Cyberthreats and Countermeasures (co-located with the International Conference on Availability, Reliability and Security, ARES 2014) aims at bringing together researchers and practitioners working in different areas related to cybersecurity. All unveilings regarding massive worldwide online surveillance in the past year led to a somewhat changed cyber world. We want to contribute to the current discussions about all technical aspects of this problem. Therefore this years' workshop focuses on new Targeted Attacks, Malware and all aspects of Privacy. Contributions demonstrating current weaknesses and threats as well as new countermeasures are warmly welcome.

Topics

Topics of interest include, but are not limited to:

Cyberthreats

  • Novel Attacks against Computers and Networks
  • Targeted Attacks
  • Malware Detection and Analysis
  • Mobile Malware
  • Botnet Detection, Analysis and Mitigation
  • Underground Economy
  • Cyberwarfare, Cyberespionage

Countermeasures:

  • Network Security
  • Mobile Device Security
  • Intrusion Detection and Prevention
  • Anomaly Detection
  • Honeypots and Honeynets
  • IT Early Warning
  • Practical Cryptanalysis
  • Anonymity
  • Privacy and Privacy Preserving Techniques
  • Privacy and Security in Cloud Environments
  • Censorship and Censorship Resistance
  • Protection of Critical IT Infrastructures
  • Information Security Risk Management
Important dates
Submission Deadline:March 31st, 2014
April 13th, 2014
Author Notification:May 23rd, 2014
Author Registration:June 10th, 2014
Proceedings Version:June 16th, 2014
Conference / Workshop:September 8th-12th, 2014
Submission guidelines

Authors are invited to submit papers in Conference Publishing Services (CPS) Proceedings Manuscripts style (two columns, single-spaced, including figures and references, using 10 pt fonts, and number each page). Please consult the  CPS Author Guidelines for more information!

We solicit the submission of research and application papers (8 pages) representing original, previously unpublished work. Submitted papers will be evaluated based on originality, significance, technical soundness, and clarity of exposition. We also encourage submission of work in progress (currently not finished and/or evaluated) to get feedback and discussions on new research ideas.

Duplicate submissions are not allowed. A submission is considered to be a duplicate submission if it has been submitted to (or if it has been already accepted to be published in) other conferences/workshops/journals. Duplicate submissions thus will be automatically rejected without review.

Contact author must provide the following information: Paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Paper registration and submission is done through the  ARES Paper Management System.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the ARES conference and present the paper in the workshop. Guidelines in preparing and submitting the final manuscript(s) will be given after the notification of acceptance.

This workshop requires anonymized submissions, so please make sure that submitted papers contain neither author names nor affiliations. Papers should avoid revealing their authors identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else.

Publication

All accepted papers of ARES 2013 and associated workshops were published as ISBN proceedings published by IEEE Conference Publishing Services (CPS):  http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6656131

Organizing committee

Markus Zeilinger, University of Applied Sciences Upper Austria
Eckehard Hermann, University of Applied Sciences Upper Austria
Dieter Vymazal, University of Applied Sciences Upper Austria

Enquiries to the organizing committee may be sent to chair[at]ectcm[dot]net.

Program committee

Pavel Celeda, Masaryk University Brno, Czech Republic
Gerhard Eschelbeck, Sophos, UK
Steven Furnell, University of Plymouth, UK
Jürgen Fuss, University of Applied Sciences Upper Austria, Austria
Thorsten Holz, Ruhr-Universität Bochum, Germany
Harald Lampesberger, Johannes Kepler University Linz, Austria
Otmar Lendl, CERT.at, Austria
Javier Lopez, University of Malaga, Spain
Martina Lindorfer, TU Vienna, iSecLab, Austria
Rene Mayrhofer, University of Applied Sciences Upper Austria, Austria
Michael Meier, University of Bonn, Germany
Yuko Murayama, Iwate Prefectural University, Japan
Norbert Pohlmann, Westfälische Hochschule, Germany
Peter Schoo, Huawei, Germany
Timo Steffens, BSI, Germany
Edgar Weippl, SBA, Austria
Fabian Yamaguchi, Göttingen University, Germany
Stefano Zanero, Politecnico di Milano, Italy