Export Citations
- Sponsor:
- sigsac
It is our great pleasure to welcome you to the 2016 ACM Workshop on Information Sharing and Collaborative Security -- WISCS'16. The mission of this workshop is to advance the scientific foundations for sharing threat and security-related data among organizations. The call for better information sharing continues to be a major theme in the security community and inspires exciting and diverse academic research. In addition commercial offerings by security vendors are by now operational, suggesting that we are reaching a stage where automated sharing is becoming more common. The public policy community is debating, sometimes vigorously, the privacy, civil liberties and liability issues involved. This year's workshop, the third in its series, aims to be at the forefront of these developments as the premier forum for the presentation of research results and practical case studies in collaborative security, privacy and confidentiality, as well as legal and policy issues.
The Call for Papers attracted submissions from Africa, Asia, Europe, and the United States and Canada. The program committee reviewed 24 submissions of which 8 were accepted as full papers and 1 as short papers. They cover a variety of topics including models for information sharing intelligence, tools for information sharing, real-world studies and many others. The program opens with the keynote 'Back to the Roots: Information Sharing Economics and What We Can Learn for Security' by Rainer Böhme, Professor at the University of Innsbruck (Austria) that will surely stimulate interesting discussions. Rainer is a leading scientist in the economics of security recognized not only in Europe, but world-wide. For his work published in WISCS'15 he and his co-author Stefan Laube received the Lloyd's Science of Risk Prize 2015.
Proceeding Downloads
Back to the Roots: Information Sharing Economics and What We Can Learn for Security
In a world where cybersecurity can be reduced to a race for information, defenders with different information sets can benefit from sharing what they observe and know. However, defenders supposedly share less than what is socially desirable, thereby ...
A Model for Secure and Mutually Beneficial Software Vulnerability Sharing
In this work we propose a model for conducting efficient and mutually beneficial information sharing between two competing entities, focusing specifically on software vulnerability sharing. We extend the two-stage game-theoretic model proposed by ...
Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing
Nowadays, both the amount of cyberattacks and their sophistication have considerably increased, and their prevention concerns many organizations. Cooperation by means of information sharing is a promising strategy to address this problem, but ...
Collaborative Incident Handling Based on the Blackboard-Pattern
Defending computer networks from ongoing security incidents is a key requirement to ensure service continuity. Handling incidents in real-time is a complex process consisting of the three single steps: intrusion detection, alert processing and intrusion ...
Private Sharing of IOCs and Sightings
Information sharing helps to better protect computer systems against digital threats and known attacks. However, since security information is usually considered sensitive, parties are hesitant to share all their information through public channels. ...
Managing Data Sharing in OpenStack Swift with Over-Encryption
- Enrico Bacis,
- Sabrina De Capitani di Vimercati,
- Sara Foresti,
- Daniele Guttadoro,
- Stefano Paraboschi,
- Marco Rosa,
- Pierangela Samarati,
- Alessandro Saullo
The sharing of large amounts of data is greatly facilitated by the adoption of cloud storage solutions. In many scenarios, this adoption could be hampered by possible concerns about data confidentiality, as cloud providers are not trusted to know the ...
MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform
The IT community is confronted with incidents of all kinds and nature, new threats appear on a daily basis. Fighting these security incidents individually is almost impossible. Sharing information about threats among the community has become a key ...
Privacy Risk in Cybersecurity Data Sharing
As information systems become increasingly interdependent, there is an increased need to share cybersecurity data across government agencies and companies, and within and across industrial sectors. This sharing includes threat, vulnerability and ...
Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice
In the last couple of years, organizations have demonstrated an increased willingness to participate in threat intelligence sharing platforms. The open exchange of information and knowledge regarding threats, vulnerabilities, incidents and mitigation ...
Measuring the Impact of Sharing Abuse Data with Web Hosting Providers
Sharing incident data among Internet operators is widely seen as an important strategy in combating cybercrime. However, little work has been done to quantify the positive benefits of such sharing. To that end, we report on an observational study of ...
Index Terms
- Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security