CSET 2009

From Openresearch
Revision as of 17:05, 27 February 2009 by (talk) (Event created)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
CSET 2009
CyberSecurity Experimentation and Test
Dates Aug 10, 2009 (iCal) - Aug 10, 2009
Homepage: www.usenix.org/events/cset09/cfp
Location: Montreal, Canada
Loading map...

Important dates
Submissions: May 15, 2009
Camera ready due: Jul 15, 2009
Table of Contents

2nd Workshop on Cyber Security Experimentation and Test (CSET '09)

August 10, 2009
Montreal, Canada

CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.

Important Dates

    * Submissions due: May 15, 2009, 11:59 p.m. PDT
    * Notification to authors: June 30, 2009
    * Electronic files due: July 15, 2009

Workshop Organizers

General Chair
Terry V. Benzel, USC Information Sciences Institute (ISI)

Program Co-Chairs
Jelena Mirkovic, USC Information Sciences Institute (ISI)
Angelos Stavrou, George Mason University

Program Committee
Paul Barford, University of Wisconsin
Andy Bavier, Princeton University
Matt Bishop, University of California, Davis
Thomas Daniels, Iowa State University
Sonia Fahmy, Purdue University
Carrie Gates, Computer Associates
Alefiya Hussain, SPARTA Inc.
Vern Paxson, ICSI
Sean Peisert, University of California, Davis
Peter Reiher, University of California, Los Angeles
Rob Ricci, University of Utah
Mark Stamp, San Jose State University
Kashi Vishwanath, Microsoft Research
Vinod Yegneswaran, SRI International


Effective cyber security and network experimentation is challenging for today's network testbeds for a number of reasons. Among these are:

    * Scale: Experiments that involve complicated composite behaviors, rare event detection, or emergent effects may need to be quite large and complex to be accurate or indicative.

    * Multi-party nature: Most interesting cyber security experiments involve more than one logical or physical party, due to the adversarial nature of the problem as well as the distributed, decentralized nature of the networked systems environment.

    * Risk: Cyber security experiments by their fundamental nature may involve significant risk if not properly contained and controlled. At the same time, these experiments may well require some degree of interaction with the larger world to be useful.

Meeting these challenges requires both transformational advance in capability and transformational advance in usability of the underlying research infrastructure. The second annual Workshop on Cyber Security Experimentation and Test (CSET '09) invites submissions on the design, architecture, construction, operation, and use of cyber security experiments in network testbeds and infrastructures. While we are particularly interested in works that relate to emulation testbeds, we invite all works relevant to cyber security experimentation and evaluation (e.g., simulation, deployment, traffic models).

Topics of interest include but are not limited to:

    * Security experimentation
          o Positive or negative experiences from past experiments
          o Novel experimentation approaches
    * Testbeds and methodologies
          o Tools, methodologies, and infrastructure that support risky and/or realistic experimentation
          o Supporting experimentation at a large scale (virtualization, federation, high-fidelity scale down)
          o Experience in designing or deploying secure testbeds
          o Realistic traffic and topology generators
          o Instrumentation and automation of experiments; their archiving, preservation, and visualization
          o Diagnosis of and methodologies for dealing with experimental artifacts
          o Fair sharing of testbed resources
    * Hands-on security education
          o Experiences teaching security classes that use hands-on security experiments for homework, in-class demonstrations, or class projects
          o Experiences from red team/blue team exercises


Submissions must be no longer than six 8.5" x 11" pages—including tables, figures, and references—in two-column format in 10-point type on 12-point (single-spaced) leading, with the text block being 6.5" wide by 9" deep. Text outside the 6.5" x 9" block will be ignored. Submit your paper in PDF format via the Web submission form.

We encourage authors to follow the U.S. National Science Foundation's guidelines for preparing PDF grant submissions:

    * https://www.fastlane.nsf.gov/documents/pdf_create/pdfcreate_01.jsp

Each submission should have a contact author who should provide full contact information (email, phone, fax, mailing address). One author of each accepted paper will be required to present the work at the workshop.

All papers will be available online to registered attendees prior to the workshop and will be available online to everyone starting on August 10, 2009. If your accepted paper should not be published prior to the event, please notify production@usenix.org.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitute dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chair, take action against authors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to ensure the integrity of papers under consideration. If a violation of these principles is found, sanctions may include, but are not limited to, barring the authors from submitting to or participating in USENIX conferences for a set period, contacting the authors' institutions, and publicizing the details of the case. Note that the above does not preclude the submission of a regular full paper that overlaps with a previous short paper or workshop paper. However, any submission that derives from an earlier workshop paper must provide a significant new contribution, for example, by providing a more complete evaluation.

Authors uncertain whether their submission meets USENIX's guidelines should contact the program chairs, cset09chairs@usenix.org, or the USENIX office, submissionspolicy@usenix.org.

Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX CSET '09 Web site; rejected submissions will be permanently treated as confidential.

This CfP was obtained from WikiCFP

Facts about "CSET 2009"
AcronymCSET 2009 +
Camera ready dueJuly 15, 2009 +
End dateAugust 10, 2009 +
Event typeConference +
Has coordinates45° 31' 5", -73° 33' 3"Latitude: 45.518127777778
Longitude: -73.550875
Has location cityMontreal +
Has location countryCategory:Canada +
Homepagehttp://www.usenix.org/events/cset09/cfp +
IsAEvent +
Start dateAugust 10, 2009 +
Submission deadlineMay 15, 2009 +
TitleCyberSecurity Experimentation and Test +