ACM CCS 2015

22nd ACM Conference on Computer and Communications Security

The Denver Marriot City Center, Denver, Colorado, US

October 12-16, 2015

  • Aspens
  • Pikes Peak
  • Denver Skyline
  • Welcome to Colorado
  • Denver Museum of Nature and Science
  • Denver Zoo
  • Garden of the Gods
  • Rocky Mountain National Park

Post-Conference Workshops

Workshop Chairs:
Xiaofeng Wang
Indiana University, USA
Kui Ren
SUNY Buffalo, USA

Workshop Abstracts

  • International Workshop on Managing Insider Security Threats (MIST 2015)
    Recently, information leakage caused by insiders who are legally authorized to have access to some corporate information is increasing dramatically. Information leakage caused by insiders occurs less frequently than information leakage caused by outsiders, but the financial damage is much greater. Countermeasures in terms of physical, managerial, and technical aspects are necessary to construct an integral security management system to protect companies' major information assets from unauthorized internal attackers. The objective of this workshop is to showcase the most recent challenges and advances in security technologies and management systems to prevent leakage of organizations' information caused by insiders.
  • Cloud Computing Security Workshop (CCSW 2015)
    Notwithstanding the latest buzzwords (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like deployment are the fastest growing computing infrastructures today. How exactly they will look like tomorrow is still for the markets to decide, yet one thing has already been identified: clouds have new, untested deployment, associated adversarial models and vulnerabilities and hence a very different threat landscape. It is essential that our community becomes involved in shaping the future security of cloud computing. The CCSW workshop aims to bring together researchers and practitioners in all security and privacy aspects of cloud-centric and outsourced computing.
  • Workshop of Artificial Intelligence and Security (AISec 2015)
    Artificial intelligence (AI), machine learning (ML), and data mining (DM) are related to a number of emerging security and privacy problems. The 2015 ACM Workshop on Artificial Intelligence and Security (AISec) provides a venue for presenting and discussing new developments in this fusion of security/privacy with AI and machine learning. We invite both original submissions and presentation-only papers, describing research at the intersection of AI or machine learning with security, privacy and related problems. We also invite original position and open problem papers. Finally we again welcome a ‘systematization of knowledge’ category of papers, which should distill the AI or machine learning contributions of a previously published series of security papers.
  • Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC 2015)
    The CPS Security and Privacy workshop encourages interdisciplinary research to innovate how we look at security and privacy problems in CPS. We welcome submissions from different fields of research including cryptography, human factors, networking, real-time systems, control theory, game theory, embedded systems, and Internet of Things, applied to security and privacy problems in different CPS domains like industrial control systems, transportation systems, the power grid, and healthcare.
  • International Workshop on Trustworthy Embedded Devices (TrustED 2015)
    TrustED considers selected security and privacy aspects of cyber physical systems and their environments, which influence trust and trust establishment in such environments. A major theme of TrustED 2015 will be security and privacy aspects of the Internet of Things Paradigm. The IoTs promises to make reality Mark Weisser’s vision of ubiquitous computation set out in his 1991 influential paper. Yet to make such vision successful, it is widely acknowledged that security of super large distributed systems has to be guaranteed and the privacy of the collected data protected. Submissions exploring new paradigms to assure security and privacy in the IoTs are thus strongly encouraged.