Cybercrime and Trustworthy Computing Conference
Massey University, 27-28 November 2014
The Cybercrime and Trustworthy Computing Conference (CTC-2014), a workshop designed to link industry, government and academia to help solve problems in the cybercrime space. This workshop was run to great success in 2013, and we are hoping to see everyone in 2014's event.
Following on from the successful workshop in Sydney in 2013, CTC-2014 will be held from 27-28th November 2014, and will be hosted by Massey University in New Zealand.
The official call for papers for both academic and industry talks will be released in June 30 2014.
Prof Paul A. Watters (Massey University), Prof Josef Pieprzyk (Queensland University of Technology) Dr Stephen McCombie (RSA), Dr Robert Layton (Federation University Australia), Mr Simon Brown (Westpac).
Cybercrime continues to be a growth industry, assisted by a combination of technical factors, such as non-secure hardware and software platforms, and psychological factors, such as user error or naivety. The objective of this workshop is to bring together two distinct groups to encourage further collaboration - those who are working on researching cybercrime activity, such as phishing and malware, and those who are working on technical countermeasures.
The scope of the workshop is very narrow, to ensure a complementary match between capability and need. Papers should either be empirically or rationally based explorations of problems in cybercrime, or propose solutions and/or countermeasures to the most pressing cybercrimes.
The conference will be composed of two days. The first is an academic conference with peer reviewed, published proceedings and presentations. The second day is a collection of industry focused presentations focusing on real life problems and solutions to cybercrime without the requirement of publication.
Example topic areas on the cybercrime theme might include
- New techniques for identifying phishing, malware and botnet attacks
- New approaches for attributing attacks to specific individuals or groups
- Analysis of scams, including advance fee fraud, romance scams etc
- Identity theft including recovery processes
- Modelling of the cost of cybercrime to the Australian economy
- Novel forensic techniques to identify crimeware
For the countermeasures side, topic areas might include:
- User education and/or psychological operations
A major theme of the event will be to plan future research interactions and relationships between industry and academia.
*Refereed papers* All submissions are to be made using the Easychair system. At least one author of each accepted paper is required to register and present their work at the conference, otherwise the paper will not be included in the proceedings. Presentations will be 30 minutes in length (20 minutes talk, 10 minutes for questions). The workshop proceedings will be published as an academic proceedings. Papers should be written using the CPS style, with up to 12 pages. All papers should be submitted for double-blind review, ie, no contact or author details should appear on the submitted paper.
Submissions can be made via EasyChair at: https://easychair.org/conferences/?conf=ctc2014
*Industry demonstrations* Participants are invited to give practical demonstrations on cutting-edge technologies, or illustrations of difficult problems that currently do not have good solutions. Please e-mail the organisers if you wish to give a demonstration - we strongly encourage industry participants to do this.
- Call for papers released, 30 June 2014
- Paper submission deadline: 23 August 2014
- Paper status notification: 1 October 2014
- Final papers due in PDF format: 15 December 2014
Please note that the proceedings will be published after the event, allowing presenters to update their papers based on comments at the conference.
To be released 30 June 2014
Program committee members academic
- Prof Jemal Abawajy, Deakin University
- Dr Mamoun Alazab, Australian National University
- Mr Milton Baar, Macquarie University
- Prof Lynn Batten, Deakin University
- Dr Kim-Kwang Raymond Choo, University of South Australia
- Dr Richard Dazeley, Federation University Australia
- Prof Colin Fidge, Queensland University of Technology
- Dr Gaurav Gupta, Macquarie University
- Dr Julian Jang, CSIRO
- Dr Mohan Kankanhalli, National University of Singapore
- Dr Robert Layton, Federation University Australia
- Prof Chris Mitchell, Royal Holloway, University of London
- Dr Alex Ng, Federation University Australia
- A/Prof Nigel Phair, University of Canberra
- Prof Josef Pieprzyk, Queensland University of Technology
- Dr Man Qi, Canterbury Christchurch University
- Dr Matthew Sorell, University of Adelaide
- Prof Willy Susilo, University of Wollongong
- Dr Fergus Toolan, University College Dublin
- Dr Peter Vamplew, Federation University Australia
- Prof Vijay Varadharajan, Macquarie University
- Prof Wei Wang, Nanjing Normal University
- Prof Paul Watters, Massey University
- Dr George Weir, University of Strathclyde
- Prof Liu Wu, Tsinghua University
- Dr John Zic, CSIRO
- Mr Simon Brown, Westpac Banking Corporation
- Mr Peter Cassidy, Anti-Phishing Working Group (APWG)
- Mr Aaron Herps, Australian Screen Association
- Mr Stephen McCombie, RSA
- Mr Theo Nassiokas, Australia and New Zealand Banking Group
- Mr Sean Park, FireEye
- Mr Cameron Woolfe, IBM
- Mr Dan Xu, Australia and New Zealand Banking Group
- Mr Jarrad Lisman, Australian Federal Police
- Mr Robert Hanson, Australian Crime Commission
- Mr Alex Tilley, Australian Federal Police