<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal"><span style="color:#1F497D">=========================== </span>
Call for Papers <span style="color:#1F497D">==============================<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal">8th SafeConfig (Workshop on Automated Decision Making for Active Cyber Defense),
<span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal">Co-located with ACM CCS 2015.<o:p></o:p></p>
<p class="MsoNormal">Manuscript Submission Deadline: June 19, 2015<o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">--------------------------------------------------------------------------------------------------------------<o:p></o:p></span></p>
<p class="MsoNormal">Workshop Venue: The Denver Marriot City Center, Denver, Colorado, USA<o:p></o:p></p>
<p class="MsoNormal">Workshop Date: October 12, 2015<o:p></o:p></p>
<p class="MsoNormal">Workshop Website: <a href="http://www.cyberdna.uncc.edu/safeconfig/2015/">
http://www.cyberdna.uncc.edu/safeconfig/2015/</a><o:p></o:p></p>
<p class="MsoNormal">Co-located Conference Website: <a href="http://www.sigsac.org/ccs/CCS2015/">
http://www.sigsac.org/ccs/CCS2015/</a><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal">Manuscript Submission Link: <a href="http://edas.info/newPaper.php?c=20715">
http://edas.info/newPaper.php?c=20715</a><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">--------------------------------------------------------------------------------------------------------------<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal">1. Workshop Agenda:<o:p></o:p></p>
<p class="MsoNormal">SafeConfig workshop selects each year a new workshop theme to offer a unique opportunity to researchers form academic, industry as well as government agencies to come together, discuss these challenges, exchange experiences, and propose
plans for promoting novel research in this area. This year the title of the workshop is 'Automated Decision Making for Active Cyber Defense'. The high growth of cyber connectivity significantly increases the potential and sophistication of cyber-attacks. The
new capabilities based on active cyber defense (ACD) are required to offer automated, intelligently-driven, agile, and resilient cyber defense. Both accurate "sense-making" based security analytics of the system artifacts (e.g., traces, configurations, logs,
incident reports, alarms and network traffic), and provably-effective "decision-making" based on robust reasoning are required to enable ACD for cyber security and resiliency. Cyber security requires automated and scalable analytics in order to normalize,
model, integrate, and analyze large and complex data to make correct decisions on time about security measures against threats. The automated decision making goals is to determine and improve the security and resiliency of cyber systems and services. As the
current technology moves toward ‘smart’ cyber-physical infrastructures as well as open networking platforms (e.g., software defined networking and virtual/cloud computing), the need for large-scale security analytics and automation for decision making significantly
increases. <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">SafeConfig workshop is a one-day program that includes invited talks, technical presentations of peer-reviewed papers, poster/demo sessions, and joint panels on research collaboration. This installment of SafeConfig is being run in conjunction
with the CCS (Computing and Communications Security) conference, to be held on October 12-16, 2015 in Denver, Colorado. Automated security decision making for new emerging application domains, such as clouds and data centers, cyber-physical systems, software
defined networking, and Internet of things are of particular interest to SafeConfig community.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Topics (but are not limited to):<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">- Analytics of attacks motive and attribution. <o:p></o:p></p>
<p class="MsoNormal">- Accountability and provenance. <o:p></o:p></p>
<p class="MsoNormal">- Attack prediction and attribution. <o:p></o:p></p>
<p class="MsoNormal">- Attack forensics and automated incident analysis.<o:p></o:p></p>
<p class="MsoNormal">- Big data analytics for cyber security <o:p></o:p></p>
<p class="MsoNormal">- Configuration testing, forensics, debugging and evaluation.
<o:p></o:p></p>
<p class="MsoNormal">- Continuous monitoring and response. <o:p></o:p></p>
<p class="MsoNormal">- Cyber agility and moving target defense.<o:p></o:p></p>
<p class="MsoNormal">- Cyber resiliency.<o:p></o:p></p>
<p class="MsoNormal">- Cyber-physical systems security.<o:p></o:p></p>
<p class="MsoNormal">- Formal semantics of security policies. <o:p></o:p></p>
<p class="MsoNormal">- Formal security analytics. <o:p></o:p></p>
<p class="MsoNormal">- Bio-inspired security. <o:p></o:p></p>
<p class="MsoNormal">- Model composition and integration. <o:p></o:p></p>
<p class="MsoNormal">- Risk-aware and context-aware security. <o:p></o:p></p>
<p class="MsoNormal">- Software defined networking and cloud computing security.<o:p></o:p></p>
<p class="MsoNormal">- Security configuration verification and economics. <o:p></o:p></p>
<p class="MsoNormal">- Security hardening and optimization.<o:p></o:p></p>
<p class="MsoNormal">- Security games. <o:p></o:p></p>
<p class="MsoNormal">- Security metrics. <o:p></o:p></p>
<p class="MsoNormal">- Security policy management. <o:p></o:p></p>
<p class="MsoNormal">- Theory of defense-of-depth.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">2: Submission Guidelines<o:p></o:p></p>
<p class="MsoNormal">Papers must present original work and must be written in English. We require that the authors use the ACM format for papers, using one of the ACM Proceeding Templates. We solicit two types of papers, regular papers and position papers.
The length of the regular papers in the proceedings format should not exceed 6 pages for long papers, 3 pages for short papers, and 1 page for posters, excluding well-marked references and appendices. Committee members are not required to read the appendices,
so papers must be intelligible without them. Papers are to be submitted electronically as a single PDF file through the workshop website. Authors of accepted papers must guarantee that their papers will be presented at the workshop.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal">3. Important Dates<o:p></o:p></p>
<p class="MsoNormal">Abstract Registration Deadline: June 12, 2015<o:p></o:p></p>
<p class="MsoNormal">Manuscript Submission: June 19, 2015<o:p></o:p></p>
<p class="MsoNormal">Review Notification: July 20, 2015<o:p></o:p></p>
<p class="MsoNormal">Camera Ready: July 31, 2015<span style="color:#1F497D">
</span><o:p></o:p></p>
<p class="MsoNormal">Conference Date: October 12, 2015<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">4. Program chair(s)<o:p></o:p></p>
<p class="MsoNormal">Ehab Al-Shaer, UNC Charlotte, USA<o:p></o:p></p>
<p class="MsoNormal">Christopher Oehmen, Pacific Northwest National Laboratory, USA<o:p></o:p></p>
<p class="MsoNormal">Mohammad Ashiqur Rahman, UNC Charlotte, USA (<a href="mailto:mrahman4@uncc.edu">mrahman4@uncc.edu</a>)<o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal">5. Technical Program Committee <o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><a href="http://www.cyberdna.uncc.edu/safeconfig/2015/committees.html">http://www.cyberdna.uncc.edu/safeconfig/2015/committees.html</a><o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal">6. Contact Info: <o:p></o:p></p>
<p class="MsoNormal"><a href="mailto:safeconfig@gmail.com">safeconfig@gmail.com</a><o:p></o:p></p>
<p class="MsoNormal"><a href="mailto:mrahman4@uncc.edu">mrahman4@uncc.edu</a><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">--------------------------------------------------------------------------------------------------------------<o:p></o:p></span></p>
<p class="MsoNormal">*** Please accept our apologies if you receive multiple copies of this CFP for SafeConfig 2015 ***<o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>