活动简介

For 2018 APWG's members will once again come together to bridge the gaps between cybersecurity operations, research and consumer messaging with our thirteenth Symposium on Electronic Crime Research (eCrime 2018).

eCrime 2018 will look at the operational challenges and development of common resources and best practices for first responders and forensic professionals. In addition, the conference will dive into current research projects and future areas of interest for cybercrime investigations, forensic techniques and infrastructure defense. including our peer-reviewed cybercrime published paper program with the IEEE-SA.

Operational and research insights for fighting electronic crime will be complimented and augmented with discussions on citizen awareness programs to help ensure a secure computing environment. This year's meeting will bring a focus on the shifting nature of cybercrime and the inherent challenges of managing that dynamic threatscape.

With eCrime 2018 we will review the development of response paradigms and resources for counter-cybercrime managers and forensic professionals in the private and public sectors. Presenters will review case studies of national and regional economies under attack, narratives of successful trans-national forensic cooperation, while considering models for cooperation against ecrime and examining resources for cybercrime response and forensic enterprise.

This program will be held on May 15th- 17th at the San Diego Marriott La Jolla in California, USA.

征稿信息

重要日期

2018-03-02
摘要截稿日期
2018-03-02
初稿截稿日期
2018-03-19
初稿录用日期
2018-05-01
终稿截稿日期

Topics of interests include (but are not limited to):

  • Economics of online crime
    • Measurement studies of underground economies
    • Models of e-crime
    • Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
    • Uncovering and disrupting online criminal collaboration and gangs
  • Security-related risk assessments
    • The risks and yields of attacks
    • Effectiveness of countermeasures
    • Metrics standards
    • Conventions in the establishment of tests of efficacy
  • Attack delivery strategies and countermeasures
    • Spam
    • DNS
    • Mobile Apps
    • Social engineering
    • Instant messaging
    • Web browser search manipulation
  • Malware
    • Detection
    • Identification of malware families
    • Polymorphic malware detection
    • Mobile malware
    • Ransomeware
    • Techniques to circumvent detection and sandboxes
  • Public Policy and Law
    • Cross-border and public-private law enforcement collaboration
    • Tension between cybercrime investigation and data privacy regulations (e.g., impact of GDPR on anti-abuse)
    • Legal and policy issues involving anti-abuse and counter-cybercrime efforts
    • Economic and incentive issues involving cybercrime
  • Security assessments of the mobile devices
    • Mobile App stores and ecosystems
    • Mobile App privacy
    • Risk prevention issues
  • User psychology / cognition / awareness
    • UI / UX architectures and their contributions to cybercrime suppression and cybercrime success
    • ICT user resilience / suspectibility to cybercrime
    • Measurement of user experiences before and during cybercrime events
    • Psychological and cognitive aspects of deception techniques delivered via ICT
    • Socio-Technical analyses of security incidents
    • Cognitive psychology of security, risk and trust and their influence on human behavior before and during cybercrime events
    • Awareness messaging/training/testing and efficacy measured by all relevant dimensions (e.g. longevity, applicability across exposures, etc.)
  • Financial infrastructure of e-crime
    • Criminal payment processing options
    • Money laundering strategies
    • Use of crypto-currencies
    • Underground marketplaces
  • Crypto Currency and Cybercrime Tools and Responses
    • Hardware devices to protect encryption keys
    • Protections for multisig wallets, failures, new ideas
    • Management and protection of cold storage wallets
    • Anti-Phishing protections for crypto currencies
    • Browser plug-ins
    • Out of band authentication for transactions
    • Multi-party authentication concepts
  • Technical, legal, political, social and psychological aspects of fraud and fraud prevention

Industrial TrackTopics of interests include (but are not limited to):

  • Case studies of current attack methods
    • System and network intrusions
    • Phishing
    • Malware (rogue antivirus, botnets, ransomware, etc…)
    • Spam
    • Pharming
    • Crimeware toolkits
    • Emerging threats to mobile devices
  • Open source intelligence
    • Data collection and correlation
    • Strategies and tools
  • Case studies of online advertising fraud
    • Click fraud
    • Malvertising
    • Cookie stuffing
    • Affiliate fraud
  • Case studies of large-scale take-downs
    • Coordinated botnet disruption
    • Phishing takedown
    • Bullet proof hosting services
  • Economics of online crime
    • Measurement studies of underground economies
    • Models of e-crime
    • Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
  • Uncovering and disrupting online criminal collaboration and gangs
  • Longitudinal study of eCrime related activities and their evolutions
  • Security assessments of the mobile devices
    • Mobile App stores and ecosystems
    • Mobile malware
    • Mobile App privacy
  • Risk prevention issues
    • Security-related risk assessments
    • The risks and yields of attacks
    • Effectiveness of countermeasures
    • Metrics standards
    • Conventions in the establishment of tests of efficacy
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    05月15日

    2018

    05月17日

    2018

  • 03月02日 2018

    摘要截稿日期

  • 03月02日 2018

    初稿截稿日期

  • 03月19日 2018

    初稿录用通知日期

  • 05月01日 2018

    终稿截稿日期

  • 05月17日 2018

    注册截止日期

承办单位
The Anti-Phishing Working Group - APWG
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询