IWCC 2017 - 6th International Workshop on Cyber Crime (IWCC 2017)
Topics/Call fo Papers
The 6th International Workshop on Cyber Crime (IWCC 2017) to be held in conjunction with the 12th International Conference on
Availability, Reliability and Security (ARES 2017 - http://www.ares-conference.eu)
August 29 - September 1, 2017, Reggio Calabria, Italy
Conference website:
https://www.ares-conference.eu/workshops/iwcc/
IMPORTANT DATES
Submission Deadline May 14, 2017 (EXTENDED!)
Author Notification May 26, 2017
Proceedings Version June 20, 2017
Conference August 29 - September 1, 2017
OVERVIEW
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities,
business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous
information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary
computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.
Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across
multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration
of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for
the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the
communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital
activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting
evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first
responders.
This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the
increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible
evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.
The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of
tools and techniques, which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors
to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.
TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:
- Criminal use of IoT e.g. IoT-based botnets
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Anti-forensic techniques and methods
- Cybercrime related investigations
- Privacy issues in digital forensics
- Novel techniques in exploit kits
- Network anomalies detection
- Crime-as-a-service
- Mobile malware
- Identification, authentication and collection of digital evidence
- Steganography/steganalysis and covert/subliminal channels
- Incident response, investigation and evidence handling
- Political and business issues related to digital forensics and anti-forensic techniques
- Novel applications of information hiding in networks
- Cybercrimes: evolution, new trends and detection
- Network traffic analysis, traceback and attribution
- Integrity of digital evidence and live investigations
- Ransomware: evolution, functioning, types, etc.
- Criminal abuse of clouds and social networks
- Watermarking and intellectual property theft
WORKSHOP CHAIRS
Artur Janicki
Warsaw University of Technology, Poland
Wojciech Mazurczyk
Warsaw University of Technology, Poland
Krzysztof Szczypiorski
Warsaw University of Technology, Poland
SUBMISSION
The submission guidelines valid for the IWCC workshop are the same as for the ARES conference. They can be found at:
https://www.ares-conference.eu/conference/conferen....
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in
the conference.
Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be
written in English. Authors are invited to submit Regular Papers (maximum 6 pages) via EasyChair. Papers accepted by the workshop
will be published in the Conference Proceedings of ARES 2017 that will be published by the International Conference Proceedings
Series published by ACM (ACM ICPS).
Availability, Reliability and Security (ARES 2017 - http://www.ares-conference.eu)
August 29 - September 1, 2017, Reggio Calabria, Italy
Conference website:
https://www.ares-conference.eu/workshops/iwcc/
IMPORTANT DATES
Submission Deadline May 14, 2017 (EXTENDED!)
Author Notification May 26, 2017
Proceedings Version June 20, 2017
Conference August 29 - September 1, 2017
OVERVIEW
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities,
business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous
information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary
computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.
Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across
multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration
of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for
the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the
communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital
activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting
evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first
responders.
This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the
increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible
evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.
The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of
tools and techniques, which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors
to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.
TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:
- Criminal use of IoT e.g. IoT-based botnets
- Criminal to criminal (C2C) communications
- Criminal to victim (C2V) communications
- Anti-forensic techniques and methods
- Cybercrime related investigations
- Privacy issues in digital forensics
- Novel techniques in exploit kits
- Network anomalies detection
- Crime-as-a-service
- Mobile malware
- Identification, authentication and collection of digital evidence
- Steganography/steganalysis and covert/subliminal channels
- Incident response, investigation and evidence handling
- Political and business issues related to digital forensics and anti-forensic techniques
- Novel applications of information hiding in networks
- Cybercrimes: evolution, new trends and detection
- Network traffic analysis, traceback and attribution
- Integrity of digital evidence and live investigations
- Ransomware: evolution, functioning, types, etc.
- Criminal abuse of clouds and social networks
- Watermarking and intellectual property theft
WORKSHOP CHAIRS
Artur Janicki
Warsaw University of Technology, Poland
Wojciech Mazurczyk
Warsaw University of Technology, Poland
Krzysztof Szczypiorski
Warsaw University of Technology, Poland
SUBMISSION
The submission guidelines valid for the IWCC workshop are the same as for the ARES conference. They can be found at:
https://www.ares-conference.eu/conference/conferen....
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in
the conference.
Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be
written in English. Authors are invited to submit Regular Papers (maximum 6 pages) via EasyChair. Papers accepted by the workshop
will be published in the Conference Proceedings of ARES 2017 that will be published by the International Conference Proceedings
Series published by ACM (ACM ICPS).
Other CFPs
Last modified: 2017-05-07 06:53:04