| |||||||||||||||
eCrime 2018 : IEEE 13th Symposium on Electronic Crime Research | |||||||||||||||
Link: http://apwg.org/apwg-events/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The thirteenth Symposium on Electronic Crime Research (eCrime) 2018 will be held between May 14th - 16th 2018 in San Diego, CA.
eCrime 2018 consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it. This conference has two publication tracks to help attract research covering applied, industrial cybercrime research as well as applied and/or theoretical cybercrime academic research. To further strengthen the confidence in each track, there have been two managing chairs and committees appointed for reviewing and selecting papers for each track of the cybercrime conference. The conference offers travel grants to students who are having issues finding the funding to attend the conference. Note that there is a set final date for requesting the stipend so please get your requests in as soon as possible after hearing back about your paper’s acceptance. eCrime 2018 also has a best paper and runner-up award that is accompanied by a cash reward for the top papers submitted to the academic track only. For paper submissions in 2018 please register an account then use the New Submission option at https://ecrime18.hotcrp.com/. Important Dates: (11:59pm US EDT) Full Papers registration and submission due: March 16 2018 12am EDT (Thursday 15 Mar 2018 8pm PST) Paper Notifications due: March 30 2018 Request for a stipend: April 6th, 2018 Camera ready due: May 1st, 2018 Conference: May 14th-16th, 2018 Academic Track Topics of interests include (but are not limited to): Economics of online crime - Measurement studies of underground economies - Models of e-crime - Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet. - Uncovering and disrupting online criminal collaboration and gangs Security-related risk assessments - The risks and yields of attacks - Effectiveness of countermeasures - Metrics standards - Conventions in the establishment of tests of efficacy Attack delivery strategies and countermeasures - Spam - DNS - Mobile Apps - Social engineering - Instant messaging - Web browser search manipulation Crypto Currency Cybercrime Tools and Responses - Hardware devices to protect encryption keys - Protections for multisig wallets, failures, new ideas - Management and protection of cold storage wallets - Anti-Phishing protections for crypto currencies - Out of band authentication for transactions - Multi-party authentication concepts Malware - Detection - Identification of malware families - Polymorphic malware detection - Mobile malware - Ransomware - Techniques to circumvent detection and sandboxes Security assessments of the mobile devices - Mobile App stores and ecosystems - Mobile App privacy - Risk prevention issues Financial infrastructure of e-crime - Criminal payment processing options - Money laundering strategies - Use of crypto-currencies - Underground marketplaces Technical, legal, political, social and psychological aspects of fraud and fraud prevention Industrial Track Topics of interests include (but are not limited to): Case studies of current attack methods - System and network intrusions - Phishing - Malware (rogue antivirus, botnets, ransomware, etc…) - Spam - Pharming - Crimeware toolkits - Emerging threats to mobile devices Open source intelligence - Data collection and correlation - Strategies and tools Case studies of online advertising fraud - Click fraud - Malvertising - Cookie stuffing - Affiliate fraud Case studies of large-scale take-downs - Coordinated botnet disruption - Phishing takedown - Bullet proof hosting services Economics of online crime - Measurement studies of underground economies - Models of e-crime - Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet. Crypto Currency Cybercrime Tools and Responses - Hardware devices to protect encryption keys - Protections for multisig wallets, failures, new ideas - Management and protection of cold storage wallets - Anti-Phishing protections for crypto currencies - Out of band authentication for transactions - Multi-party authentication concepts Uncovering and disrupting online criminal collaboration and gangs Longitudinal study of eCrime related activities and their evolutions Security assessments of the mobile devices - Mobile App stores and ecosystems - Mobile malware - Mobile App privacy Risk prevention issues - Security-related risk assessments - The risks and yields of attacks - Effectiveness of countermeasures - Metrics standards - Conventions in the establishment of tests of efficacy Organizing Committee General Chair: Brad Wardman, PayPal Academic Track PC Chairs: Gianluca Stringhini, University College London Nick Nikiforakis, Stony Brook University Academic Track Program Committee: Sadia Afroz, ICSI Luca Allodi, TU Eindhoven Manos Antonakakis, Georgia Tech Marco Balduzzi, Trendmicro Juan Caballero, IMDEA Jeremy Clark, Concordia University Adam Doupe, ASU Shuang Hao, UT Dallas Alice Hutchings, University of Cambridge Chris Kanich, UIC Alexandros Kapravelos, NCST Engin Kirda, Northeastern Nektarios Leontiadis, Facebook Kirill Levchenko, UCSD Federico Maggi, Trendmicro Damon McCoy, NYU Tyler Moore, University of Tulsa Jason Polakis, University of Illinois at Chicago Peter Snyder, UIC Guillermo Suarez-Tangil, UCL Gang Wang, Virginia Tech Ben Zhao, University of Chicago Nataliia Bielova, Inria, France Industry Track Program Committee: Yu Cai, Michigan Technological University Wei Ding, Amazon.com Shibing Liu, Hyperloop One Tongbo Luo, Palo Alto Networks Mengfan Tang, Amazon.com Brian Wallace, Cylance, Inc Yunfeng Xi, DataVisor Inc John Brock, Cylance, Inc Holly Stewart, Microsoft, Inc James Wan, Comcast Shaohua Xiang, Shenzhen Technology University Anirban Das, Samsung Research America |
|