skip to main content
10.1145/3338511acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CYSARM'19: Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security London United Kingdom 15 November 2019
ISBN:
978-1-4503-6840-7
Published:
15 November 2019
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 1st Workshop on Cyber-Security Arms Race (CYSARM). This year marks the first edition of this workshop, and we are thrilled to start fostering collaboration among researchers and practitioners to discuss the various facets and trade-offs of cyber-security. CYSARM is the first workshop of its kind, and thus will benefit the cyber-security community by fostering discussions on novel (and often controversial) topics in cyber-security, such as trade-offs and double-edged sword techniques. Beyond the study of cyber-security, privacy and trust as standalone components, it is also important to look at how to balance their trade-offs especially when it comes to several contradicting requirements, such as security vs privacy, security vs trust, and security vs usability. This workshop will consider all complex facets and double-edged sword aspects of the cyber-security ecosystem, in particular, how new technologies and algorithms might impact the cyber-security of existing or future models and systems.

The CYSARM'19 call for papers attracted submissions from 13 countries, from a wide variety of academic and corporate institutions. In total, we received 21 valid submissions, of which 4 papers were selected as Full Papers and 1 paper was accepted as Short Paper after a double-blind review by our program committee, leading to a full acceptance rate of 19% and an overall acceptance rate of 23.8%.

Skip Table Of Content Section
SESSION: Keynote Talk
keynote
Winning Against any Adversary on Commodity Computer Systems

The axioms of insecurity on commodity computer systems [1] suggest that an adversary will have an asymmetric advantage over any defender forever. This implies that the defender-adversary arms race on such systems always favors the adversary, as often ...

SESSION: Session 1: Trustworthy Computing
research-article
hTPM: Hybrid Implementation of Trusted Platform Module

Hardware-based TPM provides hardware-backed security solutions and a root of trust for various mission critical applications. However, hardware-based TPM has several intrinsic problems such as extremely low performance, off-chip security vulnerability, ...

research-article
Bootstrapping Trust in a "Trusted" Virtualized Platform

The Trusted Platform Module (TPM) can be used to establish trust in the software configuration of a computer. Virtualizing the TPM is a logical next step towards building trusted cloud environments and providing a virtual TPM to a virtual machine ...

research-article
A Framework for Efficient Lattice-Based DAA

Currently standardized Direct Anonymous Attestation (DAA) schemes have their security based on the factoring and the discrete logarithm problems, and are therefore insecure against quantum attackers. This paper presents a quantum-safe lattice-based ...

SESSION: Session 2: Vulnerability Management and Security Analysis
research-article
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off

Governments and other bodies stockpile a significant number of zero-day vulnerabilities for offense. But at the same time, they could also have the incentive to help private and commercial organizations patch these vulnerabilities, yet doing so will ...

short-paper
Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet ...

Contributors
  • Royal Holloway, University of London
  • Ubitech Ltd.
  • University of London
  1. Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race

    Recommendations