posted by user: leonkersten || 1511 views || tracked by 1 users: [display]

WACCO 2022 : EuroS&P IEEE Fourth Workshop on Attackers and Cyber-Crime Operations

FacebookTwitterLinkedInGoogle

Link: https://wacco-workshop.org/
 
When Jun 6, 2022 - Jun 6, 2022
Where Genoa
Submission Deadline Mar 1, 2022
Notification Due Apr 8, 2022
Final Version Due Apr 22, 2022
Categories    computer security   criminology   economy   sociology
 

Call For Papers

The emergence and commoditization of cyber-criminal activities calls for new empirical methods, measures, and technologies to quantify and understand offender operations across all forms of cyber-crime: from malware engineering and attack delivery, to running underground operations trading illegal goods such as drugs and illegal pornography, to spreading disinformation and planning (cyber-)terrorism operations. Without appropriate scientific measures of cyber-offender and attacker operations, capabilities, and resources, it remains impossible to derive sound policies, strategies and technologies that appropriately address realistic and evidence-based attacker and offender models.
WACCO 2022 calls for all contributions aiming at providing methods, measures, metrics, and technologies or tools to quantitatively or qualitatively evaluate cyber-offenders and attackers from technical and non-technical angles. The workshop invites contributions from, but not limited to, the fields of computer science and computer security, criminology, psychology, law, and economics addressing this issue.

Topics of interest include, but are not limited to:
● Empirical studies on attacker operations and communities
● Novel methods to perform attacker measurements at scale across several communities
● Cooperation and trust as a source of attackers’ effectiveness
● Attackers’ skill set
● Attackers’ operational security
● Measuring the spread of false information campaigns on social media
● Quantitative and qualitative methods to measure, track, and counter cybercrime
● Cybercrime measurement and networks
● Cybercrime policy
● Economics of cybercrime
● Profiling of cybercriminals
● Security metric design and evaluation
● Security patch measurement
● Statistical exploration and prediction of security incidents
● Open Source INTelligence (OSINT) and digital footprints

---Review model---

Open reports: WACCO promotes an open and transparent review process. Reviews of accepted papers will be published together with the papers and archived in a public github repository associated with WACCO. A link to that repository must be included in all accepted submissions. The reasons why WACCO implements an open report model are the following:
- It documents why the paper was considered positively to contribute to the larger scientific domain it pertains to;
- It provides a critique useful to better delineate research limitations and scope, which can be of particular benefit to young researchers and students alike;
- It provides a structural incentive for reviewers to write constructive and clear reviews;
- It provides a structural incentive for authors to implement reviewer recommendations for the camera-ready version of their paper;
- It provides a critical viewpoint for future work and research follow-ups;
- It provides additional transparency to the quality of the adopted review process and its outcomes.

---Submission Types---

WACCO encourages submission of full papers and position papers from academia, industry, and government. They should present interesting results for both theory and experimentation in the area of attacker and cyber-crime operations. We also particularly welcome independent reproduction of previous studies or experiments or negative results. We expect full papers to be of 10 pages in length (IEEE Format). Longer papers that document extensive experimentation are full in scope (which could be described in annex of the main body of the paper). Position papers of around 4 pages in length should present new open and interesting questions that the community should address or open questions that past research papers have not yet addressed. We expect position papers to be presented in panels or poster-platform sessions.

---Anonymous submissions---

Papers should be fully anonymized before review: author names or affiliations may not appear or be revealed in the text. Previous work of the authors should be referred to the third person. In the unusual case that an anonymous reference is not possible, the authors should blind the reference (e.g. “[x] Blinded citation to preserve submission anonymity”). Papers that are not properly anonymized may be desk rejected.

Submission of work that has been previously presented at conferences without proceedings, even if that work is associated with the names of the authors, or is published on online repositories such as ArXiv.org or SSRN, is allowed as long as the submission is fully anonymized. PC members that may recognize the work and its authors are asked to declare conflict on that paper and will not be assigned to it.

---Publications---

All papers will be published by IEEE CS and posted on the IEEE digital libraries. All authors of accepted papers are expected to present their paper at the workshop.

---Submission site---

Please submit your paper through EasyChair here.

---Organizers---

Luca Allodi, Eindhoven University of Technology, the Netherlands (l.allodi@tue.nl)
Alice Hutchings, Cambridge University, United Kingdom (alice.hutchings@cl.cam.ac.uk)
Sergio Pastrana, University Carlos III of Madrid, Spain (spastran@inf.uc3m.es)

---Programme Committee---

• Maria Bada, Queen Mary University of London
• Benoît Dupont, University of Montreal
• Rutger Leukfeldt, NSCR
• Rebekah Overdorf, École Polytechnique Fédérale de Lausanne
• Sasha Romanosky, RAND
• Marleen Weulen Kranenbarg, Vrije Universiteit Amsterdam
• Dmitry Zhdanov, Georgia State University
• Will Scott, University of Michigan
• Carlos Gañán, Delft University of Technology
• Tom Van Goethem, KU Leuven
• Jorge Blasco Alís, Royal Holloway University of London
• Ben Collier, University of Edinburgh
• Daniel R. Thomas, University of Strathclyde
• Giorgio Di Tizio, University of Trento
• Veronica Valeros, Czech Technical University in Prague
• Jonathan Lusthaus, Oxford University
• Jeroen van der Ham, NCSC
• Yi Ting Chua, University of Alabama
• Matthew Edwards, University of Bristol
• Rolf van Wegberg, TU Delft
• Anita Lavorgna, University of Southampton
• Maria Grazia Porcedda, Trinity College Dublin
• Zinaida Benenson, Friedrich-Alexander-Universität

Related Resources

CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
BDACCIP 2025   The 7th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
SECRYPT 2025   22nd International Conference on Security and Cryptography
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
WLEC 2025   16th Women's Leadership and Empowerment Conference
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
EuroS&P 2025   10th IEEE European Symposium on Security and Privacy