CUING 2018

The Second International Workshop on Criminal Use of Information Hiding (CUING 2018)

to be held in conjunction with the 13th International Conference on Availability, Reliability and Security
(ARES 2018 – http://www.ares-conference.eu )

August 27 – August 30, 2018, Hamburg, Germany

With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected.

The aim of the Second International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding (e.g. steganography, covert channels), obfuscation techniques and underground networks (darknets) in order to present novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:

  • Information hiding techniques
  • Studies regarding the use of information hiding in cybercrime
  • Analysis of cybercrime cases related to CUIng
  • Large scale coordinated actions by LEAs from CUIng perspective
  • New steganographic & steganalysis methods
  • Local, air-gapped, and network covert channels
  • Novel countermeasures against information hiding techniques: detection, prevention, limitation
  • Evasion, obfuscation and anti-forensics techniques used by cybercriminals
  • Traffic type obfuscation techniques e.g. traffic morphing
  • Masking network attacks with another types of threats
  • Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
  • Impersonation of one cybercriminals groups by the other
  • Underground marketplaces and their business models
  • Botnet analysis from CUIng perspective
  • Methods for botnet detection and mitigation from CUIng perspective
  • Banking Trojans from CUIng perspective
  • IoT-botnets from CUIng perspective
  • Privacy enhancing techniques
  • Analysis of underground environments
  • Legal and technical aspects of Darknet research
  • Cybercrime and CPS from CUIng perspective
  • Future scenarios in cybercrime from CUIng perspective
  • Aspects and methods for sharing strategic intelligence
  • Abusing legitimate cloud-based services for masking criminal activities
  • Abusing legitimate social media services for masking criminal activities
IMPORTANT DATES
Submission Deadline May 27, 2018
Author Notification June 15, 2018
Proceedings Version June 29, 2018
Conference August 27 – August 30, 2018
WORKSHOP CHAIR

Phlipp Amann (Chair)
Europol, European Cybercrime Centre, The Netherlands
Philipp.Amann@europol.europa.eu

Jart Armin (Chair)
Cyber Defcon, The Netherlands
jart@cyberdefcon.com

Wojciech Mazurczyk (Chair)
Warsaw University of Technology, Poland
wmazurczyk@tele.pw.edu.pl

Angelo Consoli (Chair)
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
angelo.consoli@supsi.ch

Peter Kieseberg (Chair)
SBA Research, Austria
pkieseberg@sba-research.org

Joerg Keller (Chair)
FernUniversitaet in Hagen, Germany
Joerg.Keller@fernuni-hagen.de

PROGRAM COMMITTEE

Jean-Francois Lalande, CentraleSupélec, France
Steffen Wendzel, Worms University of Applied Sciences and Fraunhofer FKIE, Germany
Zbigniew Kotulski, Warsaw University of Technology, Poland
Daniel Lerch-Hostalot, Universitat Oberta de Catalunya, Spain
Mattia Epifani, CNR, Italy
Marco Cremonini, University of Milan, Italy
Hui Tian, National Huaqiao University, China
Julio Hernandez-Castro, School of Computing, University of Kent, UK
Paweł Korus, New York University, USA
Sebastian Zander, Murdoch University, Australia
Luca Caviglione, CNR, Italy
Marc Chaumont, LIRMM, France
Zeno Geradts, NFI, The Netherlands
Edgar Weippl, SBA Research, Austria
Jana Dittmann, Otto-von-Guericke University Magdeburg, Germany
Christian Kraetzer, Otto-von-Guericke University Magdeburg, Germany
Stefan Katzenbeisser, TU Darmstadt, Germany
Francesca Bosco, UNICRI, Italy
David Megias, Universitat Oberta de Catalunya, Spain
Shujun Li, University of Kent, UK
Felix Iglesias, Vienna University of Technology, Austria
Artur Janicki, Warsaw University of Technology, Poland
Avinash Srinivasan, Temple University, USA
Tanja Zseby, Vienna University of Technology, Austria
Krzysztof Cabaj, Warsaw University of Technology, Poland
Piotr Kijewski, Shadowserver, USA

Submission
The submission guidelines valid for the CUING workshop are the same as for the ARES conference. It is necessary that all papers submitted to EasyChair are anonymized (no names or affiliations of authors should be visible in the paper) . They can be found >>here<<.
Papers accepted by the workshop will be published in the Conference Proceedings of ARES 2018 that will be published by the International Conference Proceedings Series published by ACM (ACM ICPS).
Moreover, the extended versions of all accepted papers will be considered for publication in a special issue of the Journal of Cyber Security and Mobility ( http://riverpublishers.com/journal.php?j=JCSM/5/1/jdes ).

CONTACT

In case of questions, please feel free to contact us via info@cuing.org .