CCSW 2024: The ACM Cloud Computing Security Workshop
in conjunction with the ACM Conference on Computer and Communications Security (CCS)

18th October 2024, Salt Lake City, U.S.A.


dates | submission | organizers

 


The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:

 

·      Secure cloud resource virtualization mechanisms

·      Secure data management outsourcing

·      Practical privacy and integrity mechanisms for outsourcing

·      Foundations of cloud-centric threat models

·      Secure computation outsourcing

·      Remote attestation mechanisms in clouds

·      Sandboxing and VM-based enforcements

·      Trust and policy management in clouds

·      Secure identity management mechanisms

·      New cloud-aware web service security paradigms and mechanisms

·      Cloud-centric regulatory compliance issues and mechanisms

·      Business and security risk models and clouds

·      Cost and usability models and their interaction with security in clouds

·      Scalability of security in global-size clouds

·      Trusted computing technology and clouds

·      Binary analysis of software for remote attestation and cloud protection

·      Network security (DOS, IDS etc.) mechanisms for cloud contexts

·      Security for emerging cloud programming models

·      Cloud based side-channel attacks and countermeasures

·      Applied cryptographic schemes and protocols for the cloud

 

We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

 

Programme

 

09:00 Chairs' Welcome
09:15 Keynote Talk - Lattice-Based Cryptography: from Protocol Design to Fast and Secure Implementation

 

Abstract: Lattice-based cryptography is one of the most promising candidates for designing post-quantum cryptographic algorithms that resist emerging quantum computing attacks. The recently published NIST PQC standards provide practical lattice-based algorithms for basic cryptographic functionalities (namely digital signature and public-key encryption). However, these basic algorithms are not sufficient for transitioning to post-quantum security many applications that require more advanced privacy-preserving security functionalities, or have stringent implementation requirements, in terms of performance or security against side-channel attacks. We discuss recent work on the design of practical lattice-based post-quantum privacy-preserving cryptographic tools, in particular zero-knowledge proofs and their applications to post-quantum privacy-preserving cryptographic protocols. We then move to discuss our recent work on high performance and side-channel resistant implementations of lattice-based digital signatures.
 
Speaker’s Bio: Ron Steinfeld received his Ph.D. degree in Computer Science in 2003 from Monash University, Australia. Since 2020, he is an Associate Professor at the Department of Software Systems and Cybersecurity, Monash University, Australia.
Following his Ph.D. Ron worked as a postdoctoral research fellow in cryptography and information security at Macquarie University, Australia, holding the positions of Macquarie University Research Fellow in cryptography and information security (2007-2009), and ARC Australian Research Fellow in cryptography and information security (2009-2012). Ron completed his ARC Research Fellowship at Monash University (2012-2014), where he was Senior Lecturer until 2019. His main research interests are in the design and analysis of cryptographic algorithms and protocols, and in particular in the area of quantum-safe cryptography and its applications. He has over 20 years of research experience in cryptography and information security. He has published more than 90 research papers in international refereed conferences and journals, more than 17 of which have each been cited over 100 times. He received the ASIACRYPT 2015 best paper award. He has served on the technical Program Committee of numerous international conferences in cryptography, including as Program Co-Chair of ASIACRYPT 2023, is an editorial board member of the journal ‘Designs Codes and Cryptography’, and has consulted in cryptography design for the software industry.

10:30 Coffee break

Session 1: Evaluating and Scaling up Cryptography solutions in the Cloud
11:00 Energy Analysis of Cryptographic Algorithms in Server Environment
11:20 Evaluating Leakage Attacks Against Relational Encrypted Search
11:40 Single-Server Delegation of NTT with Application to Crystals-Kyber

12:00 Lunch break

Session 2: Software Security Attacks and Defences at the Servers Environment
13:30 Advancing Software Security and Reliability in Cloud Platforms through AI-based Anomaly Detection
13:50 Binsweep: Reliably Restricting Untrusted Instruction Streams with Static Binary Analysis and Control-Flow Integrity
14:10 Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor
14:30 SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions

15:00 Coffee break

15:30 Panel - Scaling up advanced security and privacy-enhancing technologies in the cloud
16:30 Closing statements



Important Dates

 

Submissions due: 22nd July 2024  4th August 2024 AoE (Extended)

Author notification: 26th August 2024 29th August 2024 AoE (Extended)

Camera-ready:  5th September 2024

Workshop: 18th October 2024



Submissions

Submit your paper
here.  

CCSW is soliciting full papers of up to 12 pages which will be judged based on the quality and not on their length. Thus, high-quality papers are encouraged even with smaller than 12 pages length. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), excluding the bibliography, well-marked appendices, and supplementary material. Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please 
contact the chairs.

 

Proposals for panels are also solicited. The proposals are to be concise, up to 2 pages in length (at least 10 point font, two columns), describe the handled topics, name potential panelists and briefly scope the panel for CCSW. Disruptive and controversial panels are particularly encouraged.

PC CHAIRS

 

Apostolos Fournaris, Industrial Systems Institute/Research Center ATHENA, Greece

Paolo Palmieri, University College Cork, Ireland


PROGRAM COMMITTEE

Alessandro Brighente, University of Padua
Chenglu Jin, CWI Amsterdam
Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
Erik-Oliver Blass, Airbus
Fei Chen, Shenzhen University
Francesco Regazzoni, University of Amsterdam and Università della Svizzera italiana
Giorgos Vasiliadis, Hellenic Mediterranean University and FORTH
Guoxing Chen, Shanghai Jiao Tong University
Hoda Maleki, Augusta University
Mayank Varia, Boston University
Michael Zohner, Hochschule Fulda
Nicolas Alhaddad, Boston University
Sean Smith, Dartmouth College
Sisi Duan, Tsinghua University
Subhadeep Banik, Università della Svizzera italiana


STEERING

 

Srdjan Capkun, ETH Zurich
Emiliano De Cristofaro, University College London
Marten van Dijk, Centrum Wiskunde & Informatica
Kristin Lauter, Meta
Radu Sion, Stony Brook University
Yinqian Zhang, Southern University of Science and Technology (chair)

 

Previous Workshops

2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2019, 2020, 2021, 2022, 2023.