posted by organizer: wmazurczyk || 1897 views || tracked by 2 users: [display]

CUING 2024 : 8th International Workshop on Cyber Use of Information Hiding

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/cuing/
 
When Jul 30, 2024 - Aug 2, 2024
Where Vienna, Austria
Submission Deadline May 14, 2024
Notification Due May 29, 2024
Final Version Due Jun 18, 2024
Categories    information hiding   covert channels   data hiding   security
 

Call For Papers

CUING 2024

The 8th International Workshop on Criminal Use of Information Hiding (CUING 2024)
to be held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024 – http://www.ares-conference.eu)

Location: University of Vienna, Austria
DATES: July 30 – August 02, 2024

CUING website: https://www.ares-conference.eu/cuing/

IMPORTANT DATES
Submission Deadline: May 14, 2024 (firm!)
Author Notification: May 29, 2024
Proceedings Version (hard deadline): June 18, 2024

OVERVIEW
The increasing number of Internet users, availability of storage and network resources, and proliferation of as-a-Service frameworks, leads to a new-wave of offensive campaigns targeting the virtual world. With the diffusion of improved defensive methods, attackers now utilize more and more sophisticated techniques to perform their malicious activities. In recent years, information hiding has emerged as one of the most sophisticated and effective mechanisms for launching attacks. Threat actors now regularly use information hiding to elude countermeasures and prevent reversing the attack chain. More recently, hiding techniques have been deployed to create covert channels, i.e., parasitic communications paths nested in network traffic and digital objects, mainly to cloak command & control communications. Unfortunately, detection and mitigation of threats taking advantage of information hiding are hard tasks that pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding techniques when used in cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop are not limited to classic digital steganography applications or the creation and mitigation of covert communications. Therefore, CUIng also welcomes works that pertain to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of processes, and communication flows. To present a more complete picture of the novel research on hiding methods and their utilization by the attackers, submissions dealing with impersonation or mimicking are encouraged as well, especially to address information hiding in a complete manner, for instance, to discuss ideas for fighting misuse of privacy-enhancing technologies.

This year the CUING workshop is co-organized together with DISSIMILAR (Detection of fake newS on SocIal MedIa pLAtfoRms) project.

Moreover, the extended versions of all accepted papers will be considered for publication in a special issue of the Journal of Cyber Security and Mobility (indexed in Scopus, URL: https://journals.riverpublishers.com/index.php/JCSANDM/index).

Topics of interest include, but are not limited to:
- Cyber information hiding techniques
- Studies regarding the use of information hiding in cybercrime
- Analysis of cybercrime cases related to information hiding
- New steganographic & steganalysis methods
- Local, air-gapped, and network covert channels
- Side channels and less obvious usage of information hiding techniques
- Digital watermarking of multimedia content and network traffic
- Stegomalware-related research, including techniques and detection
- Novel countermeasures against information hiding techniques: detection, prevention, limitation
- Evasion, obfuscation, and anti-forensics techniques used in cyberattacks
- Traffic type obfuscation techniques, e.g., traffic morphing
- Hiding covert communication within network attacks, e.g., DDoS, SPAM, etc.
- Underground marketplaces and their business models (e.g., legal and technical aspects of darknet)
- Information-hiding-based botnets and their mitigation
- Information hiding based on adversarial learning and generative AI
- Utilization of AI/ML techniques for improved data hiding techniques and detection methods
- Information hiding in AI/ML models and datasets
- Utilization of information hiding techniques to fight disinformation
- Privacy enhancing techniques
- Aspects and methods for sharing strategic intelligence
- Abusing legitimate social media, cloud-based services, etc. for information hiding purposes

WORKSHOP CHAIRS

Wojciech Mazurczyk
Warsaw University of Technology, Poland

Philipp Amann
Europol, European Cybercrime Centre, The Netherlands

Luca Caviglione
CNR – IMATI, Italy

Angelo Consoli
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland

Peter Kieseberg
FH St. Pölten, Austria

Joerg Keller
FernUniversität in Hagen, Germany


Submission Guidelines

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at https://www.ares-conference.eu/submission-guidelines/.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
COIT 2025   5th International Conference on Computing and Information Technology
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex