活动简介
We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.
Social networks have become part of the business and personal fabric of the world. The growth and advancement of social media faces risks of attackers targeting users as well as users concerns about personal privacy. Mobile security has become increasingly important when more and more users and businesses use smartphones as communication tools but also as means of planning and organizing their work and private life. Some common security threats on PC platform have jumped to mobile platforms of Android and iOS. For example, Zitmo, a variant of Zeus Trojan has got wide spreading on Android devices in 2012. Clouds bring us new application and various XaaSs along with new vulnerabilities that we have to investigate. Assessing, managing and controlling the risks associated with cloud computing such as identity, privacy, data integrity, and tenant isolation, are critical to the adoption of cloud technologies.
CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.
Authors of CSP workshop 2013 are promoted to freely enjoy CyberC 2013 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.
留言