- Sponsor:
- sigsac
It is our great pleasure to welcome you to the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation -- SafeConfig'14. SafeConfig 2014 offers a unique opportunity by bringing together researchers from academic, industry as well as government agencies to discuss challenges, exchange experiences, and propose plans for promoting research and development in this important area. SafeConfig Workshop solicits the submission of original unpublished ideas in 8-page long papers and 4-page short papers on cyber security analytics, intelligence and automation area, which includes provable synthesis, refinement, validation, and tuning of configurations parameters, such as polices and rules in order to support assurable, secure, andsustainable networked services.
The call for papers attracted submissions from Asia, Europe, and the United States. SafeConfig 2014 received 11 submissions, from which 3 were accepted as full papers (acceptance ratio 50%), and 3 were accepted as short papers.
We also encourage attendees to attend the keynote talk, Detecting Roles and Anomalies in Hospital Access Audit Logs. This valuable and insightful talk can and will guide us to a better understanding of the future. Dr. Carl Gunter, who is currently a professor in the Computer Science Department and a professor in the College of Medicine at UIUC, will talk about research on balancing access controls with audit in medical record systems and discuss broader implications for other areas.
Proceeding Downloads
Detecting Roles and Anomalies in Hospital Access Audit Logs
There is significant risk in denying access to a healthcare provider who seeks to examine a patient's medical record. For this reason, hospital access control systems are generally based on optimistic security in which providers are given broad ...
Security Analysis of the Chinese Web: How well is it protected?
As the web rapidly expands and gets integrated into the daily lives of more and more people, so does the number of cyber attacks against it. To defend against attackers, website operators can utilize a wide range of defense mechanisms, both at the ...
Improving Efficiency of Spam Detection using Economic Model
Economic lifting has made email spam a scathing threat to the society due to its related exploits. Many spam detection schemes have been proposed employing the tendency of spam to alter the normal statistical behavior of mail traffic. Threshold tuning ...
Secure and Tamper Proof Code Management
In this paper, we present an additional layer of security to source code repositories by combining Keyless Signature Infrastructure (KSI) with Git to protect against insider threats as well as provide security even in the event of a private key ...
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems
The risk of cyberattacks have become increasingly daunting as most of our socioeconomic activities have gone cyber-based. Comprehensive automated risk management is becoming necessity in today's dynamic networks. In this paper, we present an objective ...
Protecting Enterprise Networks through Attack Surface Expansion
Attack surface is a valuable metric that help administrators of enterprise networks to evaluate the risk and security of the entire network. In this paper, we first distinguish the internal attack surface observed by the network administrators from the ...
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network
Targeted attacks exploiting a zero-day vulnerability are serious threats for many organizations. One reason is that generally available attack tools are very powerful and easy-to-use for attackers. In this paper, we propose n-ROPdetector that detects ...
Index Terms
- Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SafeConfig '17 | 10 | 5 | 50% |
SafeConfig '16 | 13 | 6 | 46% |
SafeConfig '15 | 27 | 8 | 30% |
SafeConfig '14 | 11 | 3 | 27% |
Overall | 61 | 22 | 36% |