LEET 2013 - 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats
Topics/Call fo Papers
Now in its fourth year, LEET continues to be a unique and leading forum for the discussion of threats to the confidentiality of our data, the integrity of digital transactions, and the dependability of the technologies we increasingly rely upon. We encourage submissions of papers that focus on the malicious activities themselves (e.g., reconnaissance, exploitation, privilege escalation, rootkit installation, attack), our responses as defenders (e.g., prevention, detection, and mitigation), or the social, political, and economic goals driving these malicious activities and the legal and ethical codes guiding our defensive responses. Topics of interest include but are not limited to:
Infection vectors for malware (worms, viruses, etc.)
Botnets, command and control channels
Spyware
Operational experience and case studies
Forensics
Click fraud
Measurement studies
New threats and related challenges
Boutique and targeted malware
Phishing
Spam
Underground economy
Miscreant counterintelligence
Carding and identity theft
Denial-of-service attacks
Hardware vulnerabilities
Legal issues
The arms race (rootkits, anti?anti-virus, etc.)
New platforms (cellular networks, wireless networks, mobile devices)
Camouflage and detection
Reverse engineering
Vulnerability markets and zero-day economics
Online money laundering
Understanding the enemy
Data collection challenges
Infection vectors for malware (worms, viruses, etc.)
Botnets, command and control channels
Spyware
Operational experience and case studies
Forensics
Click fraud
Measurement studies
New threats and related challenges
Boutique and targeted malware
Phishing
Spam
Underground economy
Miscreant counterintelligence
Carding and identity theft
Denial-of-service attacks
Hardware vulnerabilities
Legal issues
The arms race (rootkits, anti?anti-virus, etc.)
New platforms (cellular networks, wireless networks, mobile devices)
Camouflage and detection
Reverse engineering
Vulnerability markets and zero-day economics
Online money laundering
Understanding the enemy
Data collection challenges
Other CFPs
- 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections
- Workshop on Cybersecurity Experimentation and Test
- The Fifth NASA Formal Methods Symposium (NFM 2013)
- 26th Annual Symposium on the Application of Geophysics to Engineering and Environmental Problems (SAGEEP)
- 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy
Last modified: 2012-11-21 23:01:37