- Stefan Katzenbeisser (TU-Darmstadt, DE)
- Christopher Kruegel (UC Santa Barbara, US)
You may contact the chairs at: firstname.lastname@example.org
Pre-Conference Workshops on Monday, November 4, 2013
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2013 Workshop, held in conjunction with the ACM CCS conference, is the twelfth in a yearly forum for papers on all the different aspects of privacy in today’s electronic society
This workshop considers selected aspects of cyber physical systems and their environments. It aims at bringing together experts from academia, research institutes, industry and government for discussing and investigating problems, challenges and some recent scientific and technological developments in this field.
The security and privacy topics within the ACM CCS scope are highly relevant for and impacted by computerized, complex and connected modern vehicles as well as their complex supply chains. This workshop offers an opportunity to trigger the transfer of the accumulated knowledge by the ACM CCS community to the car industry while taking into account typical automotive constraints such as interoperability, reliability, dependability, quality, resource constraints or complex supply chain.
This workshop is to facilitate an exchange of ideas between these AI and Security and promote security and privacy solutions that leverage AI technologies. Topics of interest include, but are not limited to AI-informed approaches to: Spam and botnet detection, malware identification, insider threat detection, incentives in security/privacy systems, phishing, and others.
Privacy enhancing technologies (PETs) are necessary when untrusted platforms compute on sensitive data, for example in a distributed setting or in cloud computing. Cryptography offers a rich set of PETs for such privacy-preserving computations, including secure multi-party computation (SMC) and zero-knowledge (ZK) protocols. These systems enable distrusting parties to collectively compute over their private inputs without revealing their data to the other parties. With the wide availability of distributed systems, social media, and cloud computing, there is a pressing need to make these technologies usable in practice. PETShop is located at the crossroads of security, programming languages, compiler construction, and program verification and aims to bring together researchers from these different communities to exchange ideas and research results to improve the practicality of state of the art cryptographic PETs.