| |||||||||||
RTIGeo 2023 : 1st Workshop on Robust and Trusted Internet Geolocation | |||||||||||
Link: https://cyber.bgu.ac.il/rtigeo2023/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
##################################################################
CALL FOR PAPERS Workshop on Robust and Trusted Internet Geolocation (RTIGeo) 2023 co-located with ACM CCS 2023 November 30, 2023, Copenhagen, Denmark ################################################################## Workshop Website: https://cyber.bgu.ac.il/rtigeo2023/ Call -------------------------------------- The Internet connects hosts from all around the world. Sometimes it is valuable to know where, geographically, a particular host or data is located. Informally, Internet geolocation, a.k.a. IP geolocation, is used to solve the problem of determining or validating the physical location of an Internet user or device. The development of Internet geolocation technology is being driven by many practical use cases such as advertising, zero-trust security, privacy regulations, marketing, location-aware services, and more. For example, websites often tailor content and ads based on geographic location. Content delivery networks (CDN) redirect requests to nearby servers based on geolocation. Validating authenticity from a geographical viewpoint may also help with detecting impersonation attempts. Robust and trusted Internet geolocation is related to the concepts of Trust-Enhanced Networking (TEN), and the Quality of Trust (QoT). TEN uses reliable information about physical attributes of real-world entities to improve users’ trust in the overall network. QoT is a logical continuation of Quality of Service (QoS) and Quality of Experience (QoE). Verified geographical location of network entities can be used to increase the QoT in a network. Location in the context of the Internet usually means an IP address. However, the granularity of geographic location is often important, with implications on the ability to verify the identity of the target and secure data from theft. Furthermore, while Global Positioning System (GPS) is well-known as a method for tracking geographic location, GPS information is vulnerable to spoofing. There are also a number of approaches for inferring target location based on real-time active measurements via networks (such approaches are referred to as active geolocation methods). Physical attributes are usually obscured when performing activities in cyberspace, however robust and trusted Internet geolocation may shed light on the physical attributes of entities involved in communication in cyberspace in this setting. This workshop aims to bring together the latest cyber security research related to geolocation in the Internet. Important information -------------------------------------- Submission link: https://rtigeo23.hotcrp.com Paper submission deadline: July 14, 2023 Acceptance notification: August 15, 2023 Camera ready due: August 30, 2023 Workshop: November 30, 2023 Topics of interest -------------------------------------- Topics of interest include, but are not limited to: - Passive geolocation (whois, location feeds, etc.) - Active geolocation (delays, traceroute, probing, etc.) - Data on the move (route hijacking, route bending, etc.) - Trust in location or other physical attributes of a communication target - Location spoofing attacks and defenses - Location database poisoning - Location leakage - Proof of location - Geolocation of data (GDPR, cloud, named data networking, etc.) - Network tomography in context of IP geolocation - Network topology obfuscation - Mobile geolocation - Location privacy (consent, controls, tools, etc.) - Trustable location aware networking - Quality of Trust (QoT) in context of location - Trust propagation in context of location Submissions -------------------------------------- Submitted papers can be up to 12 (long papers) or 6 pages (short papers) excluding appendices and references. Submissions must use the ACM SIG Proceedings Templates. Only PDF files will be accepted. Accepted papers will be published as online proceedings through the ACM Digital Library. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews. All submitted papers will be evaluated based on their relevance to the workshop scope, novelty, merits, quality of execution, and presentation. Submitted papers may be rejected for being out of scope, at the discretion of the PC chairs. Each accepted paper must be presented by a registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs. Committee -------------------------------------- Workshop Chairs - Rami Puzis, Ben-Gurion University of the Negev - Yuval Elovici, Ben-Gurion University of the Negev - Asaf Shabtai, Ben-Gurion University of the Negev - Junichi Suga, Fujitsu - Motoyoshi Sekiya, Fujitsu |
|