RAID 2010 - The 13th International Symposium on Recent Advances in Intrusion Detection RAID 2010
Topics/Call fo Papers
Topics:
This symposium, the 13th in an annual series, brings together leading
researchers and practitioners from academia, government, and industry
to discuss issues and technologies related to intrusion detection and
defense. The Recent Advances in Intrusion Detection (RAID)
International Symposium series furthers advances in intrusion defense
by promoting the exchange of ideas in a broad range of topics. As in
previous years, all topics related to intrusion detection, prevention
and defense systems and technologies are within scope, including but
not limited to the following:
* Network and host intrusion detection and prevention
* Anomaly and specification-based approaches
* IDS cooperation and event correlation
* Malware prevention, detection, analysis and containment
* Web application security
* Insider attack detection
* Intrusion response, tolerance, and self protection
* Operational experience and limitations of current approaches
* Intrusion detection assessment and benchmarking
* Attacks against IDS including DoS, evasion, and IDS discovery
* Formal models, analysis, and standards
* Deception systems and honeypots
* Vulnerability analysis, risk assessment, and forensics
* Adversarial machine learning for security
* Visualization techniques
* Special environments, including mobile and sensor networks
* High-performance intrusion detection
* Legal, social, and privacy issues
* Network exfiltration detection
* Botnet analysis, detection, and mitigation
Important Dates:
Paper submission deadline (extended): April 21, 2010
Paper acceptance or rejection: June 7, 2010
Final paper camera ready copy: June 20, 2010
Poster abstract submission deadline: June 20, 2010
Poster acceptance or rejection: June 28, 2010
Submissions:
RAID 2010 invites two types of submissions:
1. Full papers presenting mature research results or summarizing
operational experience protecting or monitoring large real-world
networks. Papers can be 10-20 pages long and, if accepted, they will
be presented and included in the RAID 2010 proceedings published by
Springer Verlag in its Lecture Notes in Computer Science
(http://www.springer.de/comp/lncs/index.html) series. Papers must be
formatted according to the instructions provided by Springer Verlag
(http://www.springer.de/comp/lncs/authors.html), and include an
abstract and a list of keywords.
2. Posters describing innovative ideas not mature enough for a full
paper and works in progress. A two-page poster abstract formatted as
a full paper with an abstract must be submitted. If accepted, it
will be published in the proceedings and the poster will be presented.
All submissions (papers and poster abstracts) must be submitted
electronically; details will be provided on the conference
web site. Papers should list all authors and their affiliations; in case
of multiple authors, the contact author must be indicated (RAID does not
require anonymized submissions). For accepted papers, it is required
that at least one of the authors attends the conference to present the
paper. Further questions on the submission process may be sent to the
program chair. Submissions must not substantially duplicate work that
any of the authors has published elsewhere or has submitted in parallel
to a journal or to any other conference or workshop with proceedings.
Simultaneous submission of the same work to multiple venues, submission
of previously published work, and plagiarism constitute dishonesty or
fraud. RAID, like other scientific and technical conferences and journals,
prohibits these practices and may, on the recommendation of the program
chair, take action against authors who have committed them.
Organizing Committee:
General Chair: Frédéric Massicotte (Communications Research Centre Canada. frederic.massicotte-AT-crc.gc.ca)
Program Chair: Somesh Jha (University of Wisconsin, Madison, USA. jha-AT-cs.wisc.edu)
Program Co-Chair: Robin Sommer (ICSI/LBNL. robin-AT-icir.org)
Sponsorship Chair: Luc Beaudoin (Defence Research and Development Canada, Luc.Beaudoin-AT-drdc-rddc.gc.ca)
Publication Chair: Christian Kreibich (International Computer Science Institute. christian-AT-icir.org)
Publicity Chair: Thorsten Holz (Technical University Vienna, Austria. tho-AT-iseclab.org)
Steering Committee:
Chair: Marc Dacier (Symantec Research Europe)
Herve Debar (France Telecom R&D)
Deborah Frincke (Pacific Northwest National Lab, USA)
Ming-Yuh Huang (The Boeing Company, USA)
Erland Jonsson (Chalmers)
Wenke Lee (Georgia Institute of Technology)
Ludovic Me (Supelec)
Alfonso Valdes (SRI International)
Giovanni Vigna (University of California, Santa Barbara)
Andreas Wespi (IBM Research, Switzerland)
S. Felix Wu (University of California, Davis)
Diego Zamboni (IBM Research, Switzerland)
Christopher Kruegel (University of California, Santa Barbara)
Program Committee:
Michael Bailey, University of Michigan, USA
Davide Balzarotti, Eurecom, France
Adam Barth, UC-Berkeley
David Brumley, Carnegie Mellon University, USA
Mihai Christodorescu, IBM T.J. Watson, USA
Manuel Costa, Microsoft Research, Cambridge, UK
Jonathan Giffin, Georgia Institute of Technology, USA
Guofei Gu, Texas A & M University
Thorsten Holz, Technical University Vienna, Austria
Somesh Jha, University of Wisconsin, Madison (chair)
Jaeyeon Jung, Intel Research, USA
Christian Kreibich, ICIR
Wenke Lee, Georgia Institute of Technology, USA
Corrado Leita, Symantec Research Europe, France
Gregor Maier, TU Berlin / Deutsche Telekom Laboratories
Benjamin Morin, Central Directorate for Information System Security
Phil Porras, SRI
Anil Somayaji, Carleton University, Canada
Robin Sommer, ICSI/LBNL (co-chair)
V.N. Venkatkrishnan, Univeirsity of Illinois (Chicago)
Charles Wright, MIT Lincoln Laboratory
Vinod Yegnewswaran, SRI
This symposium, the 13th in an annual series, brings together leading
researchers and practitioners from academia, government, and industry
to discuss issues and technologies related to intrusion detection and
defense. The Recent Advances in Intrusion Detection (RAID)
International Symposium series furthers advances in intrusion defense
by promoting the exchange of ideas in a broad range of topics. As in
previous years, all topics related to intrusion detection, prevention
and defense systems and technologies are within scope, including but
not limited to the following:
* Network and host intrusion detection and prevention
* Anomaly and specification-based approaches
* IDS cooperation and event correlation
* Malware prevention, detection, analysis and containment
* Web application security
* Insider attack detection
* Intrusion response, tolerance, and self protection
* Operational experience and limitations of current approaches
* Intrusion detection assessment and benchmarking
* Attacks against IDS including DoS, evasion, and IDS discovery
* Formal models, analysis, and standards
* Deception systems and honeypots
* Vulnerability analysis, risk assessment, and forensics
* Adversarial machine learning for security
* Visualization techniques
* Special environments, including mobile and sensor networks
* High-performance intrusion detection
* Legal, social, and privacy issues
* Network exfiltration detection
* Botnet analysis, detection, and mitigation
Important Dates:
Paper submission deadline (extended): April 21, 2010
Paper acceptance or rejection: June 7, 2010
Final paper camera ready copy: June 20, 2010
Poster abstract submission deadline: June 20, 2010
Poster acceptance or rejection: June 28, 2010
Submissions:
RAID 2010 invites two types of submissions:
1. Full papers presenting mature research results or summarizing
operational experience protecting or monitoring large real-world
networks. Papers can be 10-20 pages long and, if accepted, they will
be presented and included in the RAID 2010 proceedings published by
Springer Verlag in its Lecture Notes in Computer Science
(http://www.springer.de/comp/lncs/index.html) series. Papers must be
formatted according to the instructions provided by Springer Verlag
(http://www.springer.de/comp/lncs/authors.html), and include an
abstract and a list of keywords.
2. Posters describing innovative ideas not mature enough for a full
paper and works in progress. A two-page poster abstract formatted as
a full paper with an abstract must be submitted. If accepted, it
will be published in the proceedings and the poster will be presented.
All submissions (papers and poster abstracts) must be submitted
electronically; details will be provided on the conference
web site. Papers should list all authors and their affiliations; in case
of multiple authors, the contact author must be indicated (RAID does not
require anonymized submissions). For accepted papers, it is required
that at least one of the authors attends the conference to present the
paper. Further questions on the submission process may be sent to the
program chair. Submissions must not substantially duplicate work that
any of the authors has published elsewhere or has submitted in parallel
to a journal or to any other conference or workshop with proceedings.
Simultaneous submission of the same work to multiple venues, submission
of previously published work, and plagiarism constitute dishonesty or
fraud. RAID, like other scientific and technical conferences and journals,
prohibits these practices and may, on the recommendation of the program
chair, take action against authors who have committed them.
Organizing Committee:
General Chair: Frédéric Massicotte (Communications Research Centre Canada. frederic.massicotte-AT-crc.gc.ca)
Program Chair: Somesh Jha (University of Wisconsin, Madison, USA. jha-AT-cs.wisc.edu)
Program Co-Chair: Robin Sommer (ICSI/LBNL. robin-AT-icir.org)
Sponsorship Chair: Luc Beaudoin (Defence Research and Development Canada, Luc.Beaudoin-AT-drdc-rddc.gc.ca)
Publication Chair: Christian Kreibich (International Computer Science Institute. christian-AT-icir.org)
Publicity Chair: Thorsten Holz (Technical University Vienna, Austria. tho-AT-iseclab.org)
Steering Committee:
Chair: Marc Dacier (Symantec Research Europe)
Herve Debar (France Telecom R&D)
Deborah Frincke (Pacific Northwest National Lab, USA)
Ming-Yuh Huang (The Boeing Company, USA)
Erland Jonsson (Chalmers)
Wenke Lee (Georgia Institute of Technology)
Ludovic Me (Supelec)
Alfonso Valdes (SRI International)
Giovanni Vigna (University of California, Santa Barbara)
Andreas Wespi (IBM Research, Switzerland)
S. Felix Wu (University of California, Davis)
Diego Zamboni (IBM Research, Switzerland)
Christopher Kruegel (University of California, Santa Barbara)
Program Committee:
Michael Bailey, University of Michigan, USA
Davide Balzarotti, Eurecom, France
Adam Barth, UC-Berkeley
David Brumley, Carnegie Mellon University, USA
Mihai Christodorescu, IBM T.J. Watson, USA
Manuel Costa, Microsoft Research, Cambridge, UK
Jonathan Giffin, Georgia Institute of Technology, USA
Guofei Gu, Texas A & M University
Thorsten Holz, Technical University Vienna, Austria
Somesh Jha, University of Wisconsin, Madison (chair)
Jaeyeon Jung, Intel Research, USA
Christian Kreibich, ICIR
Wenke Lee, Georgia Institute of Technology, USA
Corrado Leita, Symantec Research Europe, France
Gregor Maier, TU Berlin / Deutsche Telekom Laboratories
Benjamin Morin, Central Directorate for Information System Security
Phil Porras, SRI
Anil Somayaji, Carleton University, Canada
Robin Sommer, ICSI/LBNL (co-chair)
V.N. Venkatkrishnan, Univeirsity of Illinois (Chicago)
Charles Wright, MIT Lincoln Laboratory
Vinod Yegnewswaran, SRI
Other CFPs
Last modified: 2010-06-04 19:32:22