The CCSW workshop aims to
bring together researchers and practitioners in all security aspects of
cloud-centric and outsourced computing, including:
· Secure cloud resource virtualization mechanisms
· Secure data management outsourcing
· Practical privacy and integrity mechanisms for outsourcing
· Foundations of cloud-centric threat models
· Secure computation outsourcing
· Remote attestation mechanisms in clouds
· Sandboxing and VM-based enforcements
· Trust and policy management in clouds
· Secure identity management mechanisms
· New cloud-aware web service security paradigms and
mechanisms
· Cloud-centric regulatory compliance issues and mechanisms
· Business and security risk models and clouds
· Cost and usability models and their interaction with
security in clouds
· Scalability of security in global-size clouds
· Trusted computing technology and clouds
· Binary analysis of software for remote attestation and
cloud protection
· Network security (DOS, IDS etc.) mechanisms for cloud
contexts
· Security for emerging cloud programming models
· Cloud based side-channel attacks and countermeasures
· Applied cryptographic schemes and protocols for the cloud
We would like
to especially encourage novel paradigms and controversial ideas that are not
on the above list. The workshop is to act as a fertile ground for creative
debate and interaction in security-sensitive areas of computing impacted by
clouds.
Programme
09:00 Chairs'
Welcome
09:15 Keynote Talk - Lattice-Based Cryptography: from Protocol Design
to Fast and Secure Implementation
Abstract: Lattice-based cryptography is one of the
most promising candidates for designing post-quantum cryptographic algorithms
that resist emerging quantum computing attacks. The recently published NIST
PQC standards provide practical lattice-based algorithms for basic
cryptographic functionalities (namely digital signature and public-key
encryption). However, these basic algorithms are not sufficient for
transitioning to post-quantum security many applications that require more
advanced privacy-preserving security functionalities, or have stringent
implementation requirements, in terms of performance or security against
side-channel attacks. We discuss recent work on the design of practical
lattice-based post-quantum privacy-preserving cryptographic tools, in particular
zero-knowledge proofs and their applications to post-quantum
privacy-preserving cryptographic protocols. We then move to discuss our
recent work on high performance and side-channel resistant implementations of
lattice-based digital signatures.
Speaker’s Bio: Ron Steinfeld received his Ph.D. degree in Computer
Science in 2003 from Monash University, Australia. Since 2020, he is an
Associate Professor at the Department of Software Systems and Cybersecurity,
Monash University, Australia.
Following his Ph.D. Ron worked as a postdoctoral research fellow in
cryptography and information security at Macquarie University, Australia,
holding the positions of Macquarie University Research Fellow in cryptography
and information security (2007-2009), and ARC Australian Research Fellow in
cryptography and information security (2009-2012). Ron completed his ARC
Research Fellowship at Monash University (2012-2014), where he was Senior
Lecturer until 2019. His main research interests are in the design and
analysis of cryptographic algorithms and protocols, and in particular in the area of quantum-safe cryptography and its
applications. He has over 20 years of research experience in cryptography and
information security. He has published more than 90 research papers in
international refereed conferences and journals, more than 17 of which have
each been cited over 100 times. He received the ASIACRYPT 2015 best paper
award. He has served on the technical Program Committee of numerous
international conferences in cryptography, including as Program Co-Chair of
ASIACRYPT 2023, is an editorial board member of the journal ‘Designs Codes
and Cryptography’, and has consulted in cryptography design for the software
industry.
10:30 Coffee break
Session 1: Evaluating and Scaling up Cryptography solutions in the
Cloud
11:00 Energy Analysis of Cryptographic Algorithms in Server Environment
11:20 Evaluating Leakage Attacks Against Relational Encrypted Search
11:40 Single-Server Delegation of NTT with Application to Crystals-Kyber
12:00 Lunch break
Session 2: Software Security Attacks and Defences
at the Servers Environment
13:30 Advancing Software Security and Reliability in Cloud Platforms through
AI-based Anomaly Detection
13:50 Binsweep: Reliably Restricting Untrusted
Instruction Streams with Static Binary Analysis and Control-Flow Integrity
14:10 Time Machine: An Efficient and Backend-Migratable Architecture for
Defending Against Ransomware in the Hypervisor
14:30 SafeBPF: Hardware-assisted Defense-in-depth
for eBPF Kernel Extensions
15:00 Coffee break
15:30 Panel - Scaling up advanced security and privacy-enhancing
technologies in the cloud
16:30 Closing statements
Important
Dates
Submissions due: 22nd
July 2024 4th
August 2024 AoE (Extended)
Author notification: 26th August 2024 29th August 2024 AoE (Extended)
Camera-ready:
5th September 2024
Workshop: 18th October 2024
Submissions
Submit your paper here.
CCSW is
soliciting full papers of up to 12 pages which will be judged based on the
quality and not on their length. Thus, high-quality papers are encouraged
even with smaller than 12 pages length. Submissions must be single PDF files,
no more than 12 pages long in double-column ACM format (the sigconf template
from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), excluding the bibliography,
well-marked appendices, and supplementary material. Note that reviewers are
not required to read the appendices or any supplementary material. Authors
should not change the font or the margins of the ACM format. Submissions not
following the required format may be rejected without review. Submissions not
meeting these guidelines risk rejection without consideration of their
merits. Accepted papers will be published by the ACM Press and/or the ACM
Digital Library.
Submissions must be anonymous, and authors
should refer to their previous work in the third-person. Submissions must not
substantially overlap with papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Each
accepted paper must be presented by one registered author. Submissions not
meeting these guidelines risk immediate rejection. For questions about these
policies, please contact the chairs.
Proposals for panels
are also solicited. The proposals are to be concise, up to 2 pages in length
(at least 10 point font, two columns), describe the handled topics, name
potential panelists and briefly scope the panel for CCSW. Disruptive and
controversial panels are particularly encouraged.
PC CHAIRS
Apostolos Fournaris, Industrial Systems Institute/Research
Center ATHENA, Greece
Paolo Palmieri,
University College Cork, Ireland
PROGRAM COMMITTEE
Alessandro
Brighente, University of Padua
Chenglu Jin, CWI Amsterdam
Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
Erik-Oliver Blass, Airbus
Fei Chen, Shenzhen University
Francesco Regazzoni, University of Amsterdam and Università della Svizzera
italiana
Giorgos Vasiliadis, Hellenic Mediterranean University and FORTH
Guoxing Chen, Shanghai Jiao Tong University
Hoda Maleki, Augusta University
Mayank Varia, Boston University
Michael Zohner, Hochschule Fulda
Nicolas Alhaddad, Boston University
Sean Smith, Dartmouth College
Sisi Duan, Tsinghua University
Subhadeep Banik, Università della Svizzera italiana
STEERING
Srdjan Capkun, ETH Zurich
Emiliano De Cristofaro, University College
London
Marten van Dijk, Centrum Wiskunde
& Informatica
Kristin Lauter, Meta
Radu Sion, Stony Brook University
Yinqian Zhang, Southern
University of Science and Technology (chair)
Previous
Workshops
2009, 2010,
2011, 2012,
2013, 2014,
2015, 2016, 2017, 2019,
2020, 2021, 2022, 2023.
|