posted by organizer: wmazurczyk || 2005 views || tracked by 2 users: [display]

CUING 2020 : Criminal Use of Information Hiding

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/workshops/cuing-2020/
 
When Aug 24, 2020 - Aug 28, 2020
Where Dublin, Ireland
Submission Deadline Jun 5, 2020
Notification Due Jun 20, 2020
Final Version Due Jul 5, 2020
Categories    information hiding   steganography   data hiding   cybersecurity
 

Call For Papers

The 4th International Workshop on Criminal Use of Information Hiding (CUING 2020)
to be held in conjunction with the 15th International Conference on Availability, Reliability and Security (ARES 2020 – http://www.ares-conference.eu)

August 24 – August 28, 2020, University College Dublin, Dublin, Ireland

ARES 2020 – switches to all-digital conference
Due to the COVID-19 situation all around the globe we decided to switch to an all-digital conference experience.

Papers accepted by the workshop will be published in the Conference Proceedings of ARES 2020 that will be published by the International Conference Proceedings Series published by ACM (ACM ICPS).

Moreover, the extended versions of all accepted papers will be considered for publication in a special issue of the Journal of Cyber Security and Mobility (Indexed in Scopus, http://riverpublishers.com/journal.php?j=JCSM/5/1/jdes) or Applied Sciences (IF=2.217) special issue on Data Hiding and Its Applications: Digital Watermarking and Steganography (https://www.mdpi.com/journal/applsci/special_issues/Digital_Watermarking_Steganography).

With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. This poses a lot of new challenges for digital forensics analysts, academics, law enforcement agencies (LEAs), and security professionals.

The aim of the Third International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding. However data hiding is understood here in a wider manner than in the academic world i.e. all techniques that pertain to camouflaging/masking/hiding various types of data (e.g. identities, behavior, communication, etc.) are included here. This means not only digital steganography/covert channels but also obfuscation/anti-forensics techniques and even underground networks (darknets) or activities related to behavior impersonation or mimicking. This will allow to present a more complete picture on novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

Moreover, this year the CUING workshop is co-organized with the SIMARGL (Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware) H2020 project.
Topics of interest include, but are not limited to:

- Information hiding techniques
- Studies regarding the use of information hiding in cybercrime
- Analysis of cybercrime cases related to CUIng
- Large scale coordinated actions by LEAs from CUIng perspective
- New steganographic & steganalysis methods
- Local, air-gapped, and network covert channels
- Side channels and less obvious usage of information hiding techniques
- Novel countermeasures against information hiding techniques: detection, prevention, limitation
- Evasion, obfuscation and anti-forensics techniques used by cybercriminals
- Traffic type obfuscation techniques e.g. traffic morphing
- Masking network attacks with another types of threats
- Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
- Impersonation of one cybercriminals groups by the other
- Underground marketplaces and their business models
- Botnet analysis from CUIng perspective
- Methods for botnet detection and mitigation from CUIng perspective
- Banking Trojans from CUIng perspective
- IoT-botnets from CUIng perspective
- Privacy enhancing techniques
- Analysis of underground environments
- Legal and technical aspects of Darknet research
- Cybercrime and CPS from CUIng perspective
- Future scenarios in cybercrime from CUIng perspective
- Aspects and methods for sharing strategic intelligence
- Abusing legitimate cloud-based services for masking criminal activities
- Abusing legitimate social media services for masking criminal activities

Important Dates
Submission Deadline June 05, 2020 (EXTENDED!)
Author Notification June 15, 2020
Proceedings Version July 05, 2020
ARES EU Symposium August 24, 2020
Conference August 24 – August 28, 2020

Submission Guidelines

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at https://www.ares-conference.eu/conference/submission/.

Workshop Chairs

Wojciech Mazurczyk (Chair)
Warsaw University of Technology, Poland
wmazurcz@ii.pw.edu.pl

Philipp Amann (Chair)
Europol, European Cybercrime Centre, The Netherlands
Philipp.Amann@europol.europa.eu

Jart Armin (Chair)
CyberDefcon, The Netherlands
jart@cyberdefcon.com

Angelo Consoli (Chair)
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
angelo.consoli@supsi.ch

Peter Kieseberg (Chair)
SBA Research, Austria
pkieseberg@sba-research.org

Joerg Keller (Chair)
FernUniversitaet in Hagen, Germany
Joerg.Keller@fernuni-hagen.de

Related Resources

CUING 2024   8th International Workshop on Cyber Use of Information Hiding
FLAIRS 2025   Florida Artificial Intelligence Research Society
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
ICITA 2025   19th International Conference on Information Technology and Applications
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex