CCSW 2012: The ACM Cloud Computing Security Workshop
in conjunction with the ACM Conference on Computer and Communications Security (CCS)
October 19, 2012, Sheraton Raleigh Hotel, Raleigh, NC.



NOTE: CCSW is being held at the Raleigh Convention Center (room 301A) across Salisbury St from the conference hotel (the Sheraton Raleigh Hotel).

Check out CCSW 2013 !

Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
  • practical cryptographic protocols for cloud security
  • secure cloud resource virtualization mechanisms
  • secure data management outsourcing (e.g., database as a service)
  • practical privacy and integrity mechanisms for outsourcing
  • foundations of cloud-centric threat models
  • secure computation outsourcing
  • remote attestation mechanisms in clouds
  • sandboxing and VM-based enforcements
  • trust and policy management in clouds
  • secure identity management mechanisms
  • new cloud-aware web service security paradigms and mechanisms
  • cloud-centric regulatory compliance issues and mechanisms
  • business and security risk models and clouds
  • cost and usability models and their interaction with security in clouds
  • scalability of security in global-size clouds
  • trusted computing technology and clouds
  • binary analysis of software for remote attestation and cloud protection
  • network security (DOS, IDS etc.) mechanisms for cloud contexts
  • security for emerging cloud programming models
  • energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

Student Stipends
Student stipends are available to attend CCSW. Please apply on the CCS website and mention CCSW as your target workshop. We plan on awarding 5-10 student travel grants (a function also of the quality of the applications). Don't forget to mention CCSW as your workshop of choice if you'd like to be considered by us. Also please explain why you are a good fit to attend the workshop.

Important Dates
Submissions due: July 16, 2012 (23:59 UTC)
Submission time in major cities
Author notification: August 13, 2012
Camera-ready: August 24, 2012
Workshop: October 19, 2012

Submissions
CCSW is soliciting full papers of up to 12 pages and short papers of up to 6 pages. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates, available at
the ACM website. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

Both research and position/vision/white papers are invited. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All authors and their affiliations must be listed. Each accepted paper must be presented by one registered author. Please submit your paper here.

Keynote Speakers



Dr. Burt Kaliski, Jr.
Senior Vice President and Chief Technology Officer
Verisign

As senior vice president and chief technology officer, Dr. Burt Kaliski Jr. is responsible for the company’s long-term technology vision. He is the leader of Verisign Labs, which focuses on applied research, university collaboration, industry thought leadership, and intellectual property strategy. He also facilitates the technical community within Verisign.

Prior to joining Verisign in 2011, Kaliski served as the founding director of the EMC Innovation Network, the global collaboration among EMC’s research and advanced technology groups and its university partners. He joined EMC from RSA Security, where he served as vice president of research and chief scientist. Kaliski started his career at RSA in 1989, where as the founding scientist of RSA Laboratories, his contributions included the development of the Public-Key Cryptography Standards (PKCS), now widely deployed in internet security.

Kaliski has held appointments as a guest professor at Wuhan University's College of Computer Science, and as a guest professor and member of the international advisory board of Peking University's School of Software and Microelectronics. He has also taught at Stanford University and Rochester Institute of Technology.

Kaliski is a trustee emeritus of the Massachusetts Technology Leadership Council, and a member of the Institute of Electrical and Electronics Engineers (IEEE) Computer Society and Tau Beta Pi. Kaliski holds a Bachelor of Science in computer science and engineering, Master of Science in electrical engineering and computer science and doctorate in electrical engineering and computer science from the Massachusetts Institute of Technology, where his research focused on cryptography.


Dr. Kristin Lauter
Principal Researcher and Head of the Cryptography Group
Microsoft Research

Kristin Lauter is a Principal Researcher, a member of the Senior Leadership Team for the XCG lab, and the head of the Cryptography group at Microsoft Research. She directs the group's research activities in theoretical and applied cryptography and in the related math fields of number theory and algebraic geometry. Her personal research interests include algorithmic number theory, elliptic curve cryptography, hash functions, and cloud security and privacy, including privacy for healthcare.

Lauter is also an Affiliate Professor in the Department of Mathematics at the University of Washington. She received her BA, MS, and PhD, all in mathematics, from the University of Chicago, in 1990, 1991, and 1996, respectively. She was T.H. Hildebrandt Assistant Professor of Mathematics at the University of Michigan (1996-1999), and a Visiting Scholar at Max Planck Institut fur Mathematik in Bonn, Germany (1997), and at Institut de Mathematiques Luminy in France (1999). In 2008, Lauter, together with her coauthors, was awarded the Selfridge Prize in Computational Number Theory. She serves on the Executive Committee of the Association for Women in Mathematics, and on the Editorial Boards for Journal of Algebra and Its Applications and International Journal of Information and Coding Theory. She was a co-founder of the Women In Numbers Network, a research collaboration community for women in number theory. She serves on the Advisory Board for SHARPS, the Strategic Healthcare IT Advanced Research Projects on Security.


Dr. Howard Shrobe
Program Manager
DARPA

Dr. Howard Shrobe joined DARPA as a Program Manager in 2010 where he is in charge of the Mission-oriented Resilient Clouds (MRC) program among others. His research and development interests relate to Cyber Resilience, Computer Architectures, Software Technologies and Artificial Intelligence with his initial focus being on new computer system architectures for secure and resilient computing.

Shrobe joined DARPA from MIT's Computer Science and Artificial Intelligence Laboratory, with which he has been affiliated since 1978, and for which he served as Associate Director of the Artificial Intelligence Laboratory from 1997 to 1998. Shrobe also has a previous tour with DARPA as a Chief Scientist in the Information Technology Office (1994 to 1997).

Shrobe holds Doctor of Philosophy and Master of Science degrees in Computer Science from the Massachusetts Institute of Technology and a Bachelor of Science in Mathematics from Yale College.

Program
CCSW is being held at the Raleigh Convention Center (room 301A) across Salisbury St from the conference hotel (the Sheraton Raleigh Hotel).

       
Schedule  
  08:20 Welcome
The Organizers
  Session: Virtualization   Chair: Ahmad-Reza Sadeghi  
  08:30-08:55 Detecting Co-Residency with Active Traffic Analysis Techniques.
Adam Bates, Ben Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin Butler
  8:55-09:20 Fast Dynamic Extracted Honeypots in Cloud Computing
Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser
  09:20-09:40 Are AES x86 Cache Timing Attacks Still Feasible?
Keaton Mowery, Hovav Shacham, Sriram Keelveedh.
  09:40-10:00 Towards a Richer Model of Cloud App Markets
Abhinav Srivastava, Vinod Ganapathy
  10:00-10:20 Break
  Session: Cloud-Assisted Security   Chair: Ruby Lee  
  10:20-10:40 Unity: Secure and Durable Personal Cloud Storage
Beom Heyn Kim, Wei Huang, David Lie
  10:40-11:00 Exploiting Split Browsers for Efficiently Protecting User Data
Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos Keromytis
  11:00-11:25 Babel: A Secure Computer is a Polyglot
John Aycock, Daniel De Castro, Michael Locasto, Chris Jarabek
  Keynote I   Chair: Srdjan Capkun  
  11:25-12:10 What If We Got A Do-Over?
Howard Shrobe (DARPA)
  12:10-13:30 Lunch
  Keynote II   Chair: Radu Sion  
  13:30-14:15 Practical Applications of Homomorphic Encryption
Kristin Lauter (Microsoft Research)
  Session: Cryptographic Protocols   Chair: Charalampos Papamanthou  
  14:15-14:40 LoSt: Location Based Storage
Gaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, Shrivaramakrishnan Narayan
  14:40-15:05 Efficient Query Integrity for Outsourced Dynamic Databases
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
  15:05-15:30 Towards an Interpreter for Efficient Encrypted Computation
Christopher Fletcher, Marten van Dijk, Srini Devadas
  15:30-16:00 Break
  Keynote III   Chair: Seny Kamara  
  16:00-16:45 Revisiting DNS and WHOIS in the Cloud Era
Burt Kaliski (Verisign)
  Session: Increasing Trust Chair: Elli Androulaki  
  16:45-17:05 CloudFilter: Practical Control of Sensitive Data Propagation to the Cloud
Ioannis Papagiannis, Peter Pietzuch
  17:05-17:30 Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees
Jesus Luna Garcia, Robert Langenberg, Neeraj Suri
  17:30-17:55 Managing Trust and Secrecy in Identity Management Clouds
Apurva Kumar




Registration
Please register
here on the main CCS website.

Organizers

CHAIRS
Srdjan Capkun, ETH Zurich
Seny Kamara, Microsoft Research

COMMITTEE
Giuseppe Ateniese, Sapienza-University of Rome and Johns Hopkins University
Christian Cachin, IBM Research
Mihai Christodorescu, IBM Research
Emiliano de Cristofaro, PARC
Jeffrey Chase, Duke University
Byung-Gon Chun, Yahoo! Research
Reza Curtmola, New Jersey Institute of Technology
George Danezis, Microsoft Research
Leendert van Doorn, AMD
Nick Feamster, Georgia Tech
Bryan Ford, Yale Univeristy
Xiaohui (Helen) Gu, North Carolina State University
Amir Herzberg, Bar Ilan University
Navendu Jain, Microsoft Research
Ari Juels, RSA Laboratories
Ghassan Karame, NEC Laboratories Europe
Farinaz Koushanfar, Rice University
Ruby Lee, Princeton University
Jonathan McCune, Carnegie Mellon University
Peng Ning, NC State University
Cristina Nita-Rotaru, Purdue University
Alina Oprea, RSA Laboratories
KyoungSoo Park, KAIST
Bryan Parno, Microsoft Research
Mariana Raykova, Columbia University
Kui Ren, Illinois Institute of Technology
Thomas Ristenpart, University of Wisconsin
Ahmad-Reza Sadeghi, Ruhr-University Bochum
Matthias Schunter, Intel Research
Elaine Shi, UC Berkeley
Alexander Shraer, Yahoo! Research
Abhinav Srivastava, AT&T Labs -- Research
Radu Sion, Stony Brook University
Dongyan Xu, Purdue University


STEERING
Kristin Lauter, Microsoft
Adrian Perrig, Carnegie Mellon
Radu Sion, Stony Brook (chair)
Gene Tsudik, UC Irvine
Moti Yung, Google Inc.

GENERAL CHAIR
Ting Yu, NCSU


Sponsorship
Interested in sponsoring CCSW (this or next year)? Please
contact us directly.

Gold Sponsor



Bronze Sponsor




Previous Workshops
CCSW 2009, CCSW 2010, CCSW 2011.




Updated: October 5, 2012

© 2009-2012 NSAC Lab.

All Rights Reserved.