IWCC 2017

The 6th International Workshop Cyber Crime

to be held in conjunction with the 12th International Conference on Availability, Reliability and Security
(ARES 2017 – http://www.ares-conference.eu)

August 29 – September 1, 2017, Reggio Calabria, Italy

Today’s world’s societies are becoming more and more dependent on open networks such as the Internet – where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals.

Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders.

This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques, which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

Topics of interest comprise but are not limited to:
Political and business issues related to digital forensics and anti-forensic techniques

Identification, authentication and collection of digital evidence

Steganography/steganalysis and covert/subliminal channels

Incident response, investigation and evidence handling

Novel applications of information hiding in networks

Cybercrimes: evolution, new trends and detection

Network traffic analysis, traceback and attribution

Integrity of digital evidence and live investigations

Ransomware: evolution, functioning, types, etc.

Criminal abuse of clouds and social networks

Watermarking and intellectual property theft
Criminal use of IoT e.g. IoT-based botnets

Criminal to criminal (C2C) communications

Criminal to victim (C2V) communications

Anti-forensic techniques and methods

Cybercrime related investigations

Privacy issues in digital forensics

Novel techniques in exploit kits

Darknets and hidden services

Network anomalies detection

Crime-as-a-service

Mobile malware
Important Dates
Submission Deadline  May 14, 2017
Author Notification  May 26, 2017
Proceedings Version  June 20, 2017
Conference  August 29 – September 1, 2017
Workshop Chair

Artur Janicki
Warsaw University of Technology, Poland

Wojciech Mazurczyk
Warsaw University of Technology, Poland

Krzysztof Szczypiorski
Warsaw University of Technology, Poland

Program Committee

Marc Chaumont, LIRMM
Michal Choras, ITTI Ltd.
Xiaofeng Chen, Xidian University
Guangjie Liu, njust
Jozef Wozniak, Gdansk University of Technology
Frédéric Cuppens, TELECOM Bretagne
Prof. Dr. Jana Dittmann, Uni Magdeburg
Steffen Wendzel, Worms University of Applied Sciences and Fraunhofer FKIE
Stefan Katzenbeisser, TU Darmstadt
Joanna Œliwa, Military Communication Institute
Maciej Korczyñski, Delft University of Technology
Alessandro Checco, University of Sheffield
Nabil Schear, MIT Lincoln Laboratory
Bela Genge, Petru Maior University of Tg Mures, Romania
Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
Johnson Thomas, Oklahoma State University
Ewa Syta, Trinity College
Jean-Francois Lalande, INSA Centre Val de Loire
Christian Kraetzer, Dept. of Computer Science, Otto-von-Guericke University Magdeburg
Pedro Luis Prospero Sanchez, University of Sao Paulo
Zbigniew Kotulski, Warsaw University of Technology
Eric Chan-Tin, Oklahoma State University
Josef Pieprzyk, Queensland University of Technology
Luca Caviglione, CNR – ISSIA
Hui Tian, College of Computer Science and Technology, National Huaqiao University

Submission

Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English. Authors are invited to submit Regular Papers (maximum 6 pages) via EasyChair. Papers accepted by the workshop will be published in the Conference Proceedings of ARES 2017 that will be published by the International Conference Proceedings Series published by ACM (ACM ICPS).

The extended versions of high-quality papers selected from the workshop will be published in a special issue of the international journal. The more information about the submission guidlines can be found >>here<<.

invited speaker

Martin Gilje Jaatun, Senior Scientist at SINTEF Digital

Cyber Security in Critical Infrastructure Domains

Abstract: Cyber crime hits hardest when it affects critical infrastructures such as communications, electricity and water. This presentation will provide a brief overview with examples of cyberattacks in different critical infrastructure domains, and argue why it is important to build security into all software and hardware that we rely on in our daily lives.

Dr. Martin Gilje Jaatun is a Senior Scientist at SINTEF Digital. He graduated from the Norwegian Institute of Technology (NTH) in 1992, and received the Dr.Philos. degree from the University of Stavanger in 2015. Previous positions include scientist at the Norwegian Defence Research Establishment (FFI), and Senior Lecturer in information security at the Bodø Graduate School of Business. His research interests include software security, security in cloud computing, and security of critical information infrastructures. He is vice chairman of the Cloud Computing Association (cloudcom.org), vice chair of IEEE TCCLD, and a Senior Member of the IEEE. He is also an IEEE Cybersecurity ambassador, and Editor-in-Chief of the International Journal of Secure Software Engineering.