Pre-Conference Workshops (Nov. 9, 2009)
- Workshop on Assurable and Usable Security Configuration (SafeConfig 2009)
- Workshop on Digital Rights Management (DRM 2009)
- Workshop on Virtual Machine Security (VMSec 2009)
- Workshop on Security and Artificial Intelligence(AISec 2009)
- Workshop on Secure Execution of Untrusted Code (SecuCode 2009)
- Workshop on Privacy in the Electronic Society (WPES 2009)
The workshop will bring together academic as well as industry researchers to exchange experiences, discuss the major challenges and present future solutions to offer manageable and usable security. This includes topics from design, implementation, and evaluation for usability issues as well as verification, testing and optimization for assurance and correctness issues. This workshop will seek presentations on security configuration abstraction, verification, enforcement, distribution, optimization, testing, visualization and other related topics.
The ACM Workshop on Digital Rights Management is an international forum that serves as an interdisplinary bridge between areas that can be applied to solving the problem of Intellectual Property protection of digital content. These include: cryptography, software and computer systems design, trusted computing, information and signal processing, intellectual property law, policy-making, as well as business analysis and economics. Its purpose is to bring together researchers from the above fields for a full day of formal talks and informal discussions, covering new results that will spur new investigations regarding the foundations and practices of DRM.
This workshop, the first of its kind to deal exclusively with virtual machine security, will tackle the important research topics in virtualization security. This workshop aims to bring together leading researchers in the fields of virtualization and security to present the latest work on these topics.
This workshop is to facilitate an exchange of ideas between these AI and Security and promote security and privacy solutions that leverage AI technologies. Topics of interest include, but are not limited to AI-informed approaches to: Spam and botnet detection, malware identification, insider threat detection, incentives in security/privacy systems, phishing, and others.
The workshop aims at bringing together researchers and practitioners from industry and academia working on the protection of software systems against untrusted code. Untrusted applications should only access those resources and only call those functions that are considered as non-security-critical. Topics of interest include security for intermediate languages like Java or .NET and interpreted languages like Python or PHP, runtime monitoring, static analysis and security architectures.
The increased power and interconnectivity of computer systems available today create the ability to store and process large amounts of data, resulting in networked information accessible from anywhere at any time. It is becoming easier to collect, exchange, access, process, and link information. This global scenario has inevitably resulted in an increasing degree of awareness with respect to privacy. Privacy issues have been the subject of public debates, and the need for privacy-aware policies, regulations, and techniques has been widely recognized. The goal of this workshop is to discuss the problems of privacy in the global interconnected societies and possible solutions to them.
Last modified: 2009-07-09 10:14:45 EDT