ACM CCS 2015

22nd ACM Conference on Computer and Communications Security

The Denver Marriot City Center, Denver, Colorado, US

October 12-16, 2015

  • Aspens
  • Pikes Peak
  • Denver Skyline
  • Welcome to Colorado
  • Denver Museum of Nature and Science
  • Denver Zoo
  • Garden of the Gods
  • Rocky Mountain National Park

Pre-Conference Workshops

Workshop Chairs:
Xiaofeng Wang
Indiana University, USA
Kui Ren
SUNY Buffalo, USA

Workshop Abstracts

  • International Workshop on Security and Privacy in Smartphones and Mobile Devices (CCS-SPSM 2015)
    Mobile devices such as smartphones and Internet tablets have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. On one hand, they use application sandboxing to contain exploits and limit privileges given to malware. On the other hand, they routinely collect and organize many forms of security- and privacy-sensitive information and make that information easily accessible to third-party applications. Recognizing smartphone security and privacy as an emerging area, this workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas.
  • Workshop on Privacy in the Electronic Society (WPES 2015)
    The increased power and interconnectivity of computer systems available today, as well as the ever-increasing use of third parties for storing and processing information, requires advanced technological solutions to ensure privacy of confidential or sensitive information. This workshop aims at discussing privacy problems and solutions in the emerging contexts of today’s globally interconnected society. The workshop seeks submissions from academia, industry, and government, presenting novel research on all theoretical and practical aspects of electronic privacy.
  • Workshop on Automated Decision Making for Active Cyber Defense (SafeConfig 2015)
    The high growth of cyber connectivity significantly increases the potential and sophistication of cyber-attacks. The new capabilities based on active cyber defense (ACD) are required to offer automated, intelligently-driven, agile, and resilient cyber defense. Both accurate "sense-making" based security analytics of the system artifacts (e.g., traces, configurations, logs, incident reports, alarms and network traffic), and provably-effective "decision-making" based on robust reasoning are required to enable ACD for cyber security and resiliency. SafeConfig workshop solicits novel contributions to support ACD, particularly, for new emerging cyber technologies, including clouds/data centers, cyber-physical systems, software defined networking, and Internet of things.
  • Workshop on Information Sharing and Collaborative Security (WISCS 2015)
    Sharing of security related information between organizations is believed to greatly enhance their ability to defend themselves against sophisticated attacks. However there are a number of technical and policy challenges for realizing this vision. This workshop aims to bring together experts and practitioners from academia, industry and government to present innovative research, case studies, as well as legal and policy issues. WISCS plans to address a broad range of topics relevant to sharing security and threat related information.
  • ACM Workshop on Moving Target Defense (MTD 2015)
    The static nature of current computing systems has made them easy to attack and harder to defend. Adversaries have an asymmetric advantage in that they have the time to study a system, identify its vulnerabilities, and choose the time and place of attack to gain the maximum benefit. The idea of moving-target defense (MTD) is to impose the same asymmetric disadvantage on attackers by making systems dynamic and therefore harder to explore and predict. With a constantly changing system and its ever adapting attack surface, attackers will have to deal with a great deal of uncertainty just like defenders do today. The ultimate goal of MTD is to increase the attackers¹ workload so as to level the cybersecurity playing field for both defenders and attackers - hopefully even tilting it in favor of the defender.