Workshops

Workshop Chairs

  • Stefan Katzenbeisser (TU-Darmstadt, DE)
  • Christopher Kruegel (UC Santa Barbara, US)

You may contact the chairs at: ccs-workshops@trust.cased.de

Overview of all Workshops

Pre-Conference Workshops on Monday, November 4, 2013

  • Workshop on Privacy in the Electronic Society (WPES)

    The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2013 Workshop, held in conjunction with the ACM CCS conference, is the twelfth in a yearly forum for papers on all the different aspects of privacy in today’s electronic society

  • Trustworthy Embedded Devices (TrustED)

    This workshop considers selected aspects of cyber physical systems and their environments. It aims at bringing together experts from academia, research institutes, industry and government for discussing and investigating problems, challenges and some recent scientific and technological developments in this field.

  • Workshop on Security, Privacy and Dependability for Cyber Vehicles (CyCAR)

    The security and privacy topics within the ACM CCS scope are highly relevant for and impacted by computerized, complex and connected modern vehicles as well as their complex supply chains. This workshop offers an opportunity to trigger the transfer of the accumulated knowledge by the ACM CCS community to the car industry while taking into account typical automotive constraints such as interoperability, reliability, dependability, quality, resource constraints or complex supply chain.

  • Artificial Intelligence and Security (AISec)

    This workshop is to facilitate an exchange of ideas between these AI and Security and promote security and privacy solutions that leverage AI technologies. Topics of interest include, but are not limited to AI-informed approaches to: Spam and botnet detection, malware identification, insider threat detection, incentives in security/privacy systems, phishing, and others.

  • Language Support for Privacy-Enhancing Technologies (PETShop)

    Privacy enhancing technologies (PETs) are necessary when untrusted platforms compute on sensitive data, for example in a distributed setting or in cloud computing. Cryptography offers a rich set of PETs for such privacy-preserving computations, including secure multi-party computation (SMC) and zero-knowledge (ZK) protocols. These systems enable distrusting parties to collectively compute over their private inputs without revealing their data to the other parties. With the wide availability of distributed systems, social media, and cloud computing, there is a pressing need to make these technologies usable in practice. PETShop is located at the crossroads of security, programming languages, compiler construction, and program verification and aims to bring together researchers from these different communities to exchange ideas and research results to improve the practicality of state of the art cryptographic PETs.

Post-Conference Workshops on Friday, November 8, 2013

  • Cloud Computing Security Workshop (CCSW)

    Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing.

  • Security and Privacy in Smartphones and Mobile Devices (SPSM)

    Mobile devices such as smartphones and Internet tablets have achieved computing and networking capabilities comparable to traditional personal computers. The operating systems supporting these new devices have both advantages and disadvantages with respect to security. On one hand, they use application sandboxing to contain exploits and limit privileges given to malware. On the other hand, they routinely collect and organize many forms of security- and privacy-sensitive information and make that information easily accessible to third-party applications.This workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas. The workshop will deepen our understanding of various security and privacy issues on smartphones.

  • Smart Energy Grid Security Workshop (SEGS)

    The Smart Energy Grid Security (SEGS) Workshop aims to foster innovative research and discussion about smart energy grid security and privacy challenges, issues, approaches, and solutions. The scope of the workshop encompasses all aspects of the smart grid, including distribution, transmission, generation, metering, e-mobility, and integration of distributed energy resources. The scope of the workshop encompasses all aspects of the smart grid, including distribution, transmission, generation, metering, e-mobility, and integration of distributed energy resources.

  • Digital Identity Management (DIM)

    This workshop will explore crucial issues concerning interoperable identity management technologies for the information society.