- Sponsor:
- sigsac
It is our great pleasure to welcome you to the 1st Workshop on Cyber-Security Arms Race (CYSARM). This year marks the first edition of this workshop, and we are thrilled to start fostering collaboration among researchers and practitioners to discuss the various facets and trade-offs of cyber-security. CYSARM is the first workshop of its kind, and thus will benefit the cyber-security community by fostering discussions on novel (and often controversial) topics in cyber-security, such as trade-offs and double-edged sword techniques. Beyond the study of cyber-security, privacy and trust as standalone components, it is also important to look at how to balance their trade-offs especially when it comes to several contradicting requirements, such as security vs privacy, security vs trust, and security vs usability. This workshop will consider all complex facets and double-edged sword aspects of the cyber-security ecosystem, in particular, how new technologies and algorithms might impact the cyber-security of existing or future models and systems.
The CYSARM'19 call for papers attracted submissions from 13 countries, from a wide variety of academic and corporate institutions. In total, we received 21 valid submissions, of which 4 papers were selected as Full Papers and 1 paper was accepted as Short Paper after a double-blind review by our program committee, leading to a full acceptance rate of 19% and an overall acceptance rate of 23.8%.
Proceeding Downloads
Winning Against any Adversary on Commodity Computer Systems
The axioms of insecurity on commodity computer systems [1] suggest that an adversary will have an asymmetric advantage over any defender forever. This implies that the defender-adversary arms race on such systems always favors the adversary, as often ...
hTPM: Hybrid Implementation of Trusted Platform Module
Hardware-based TPM provides hardware-backed security solutions and a root of trust for various mission critical applications. However, hardware-based TPM has several intrinsic problems such as extremely low performance, off-chip security vulnerability, ...
Bootstrapping Trust in a "Trusted" Virtualized Platform
The Trusted Platform Module (TPM) can be used to establish trust in the software configuration of a computer. Virtualizing the TPM is a logical next step towards building trusted cloud environments and providing a virtual TPM to a virtual machine ...
A Framework for Efficient Lattice-Based DAA
Currently standardized Direct Anonymous Attestation (DAA) schemes have their security based on the factoring and the discrete logarithm problems, and are therefore insecure against quantum attackers. This paper presents a quantum-safe lattice-based ...
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off
Governments and other bodies stockpile a significant number of zero-day vulnerabilities for offense. But at the same time, they could also have the incentive to help private and commercial organizations patch these vulnerabilities, yet doing so will ...
Data Log Management for Cyber-Security Programmability of Cloud Services and Applications
In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet ...
- Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race