Conferences In Information Security

Conference Name 3rd Workshop on Cyber Security Experimentation and Test (CSET ’10)
Venue Washington, DC
URL http://www.usenix.org/events/cset10/cfp/cset10cfp.pdf
Submission Deadline 24-May-10
Conference Date 9-Aug-10
Sponsership/Publisher Secutity workshop of USENIX
Aim/Scope/Research Area Effective cyber security experimentation on network testbeds is challenging for a number of reasons:
Scale• : Experiments may need to be quite large and complex to accurately portray the phenomenon being investigated.
Multi-party nature• : Interesting experiments include humans,
drawn from several logical or physical parties, who either collaborate or compete with each other.
Risk• : Cyber security experiments naturally carry significant risk if not properly contained and controlled. At the same time, these experiments may well require some degree of interaction with the larger world to be useful.
Realism• : Experiments must faithfully recreate the relevant features of the phenomena they investigate in order to obtain
correct results, yet data about threats and the Internet landscape is sparse and often must undergo transformations
to reduce scale and sensitivity before being ported to testbeds. Hence careful reasoning about “realism” is required.
Rigor• : Repeatability and correctness must be ensured in any scientific experimentation. These are extremely hard to achieve on distributed network testbeds, due to testbed dynamics, sharing and unpredictability, and experimentation
scale and complexity that overwhelm humans.
Setup/scenario complexity• : Testbed experiments are very complex and evolve over time. Time investment needed for setup and manipulation of experiments that are realistic, correct, and repeatable is too large for a single user and requires community involvement. Tools and practices for sharing experiments and their components are lacking.
Meeting these challenges requires both transformational advance in capability and transformational advance in usability of the underlying research infrastructure. The 3rd Workshop on Cyber
Security Experimentation and Test (CSET ’10) invites submissions
on the science, design, architecture, construction, operation,
and use of cyber security experiments in network testbeds and infrastructures. While we are particularly interested in works that relate to emulation testbeds, we invite all work relevant to cyber security experimentation and evaluation (e.g., simulation, deployment, traffic models).

Topics
Topics of interest include but are not limited to:
Science of security/testbed experimentation•
Data and tools to achieve realistic experiment setup/°°scenarios
Diagnosis of and methodologies for dealing with experi°°
mental artifacts
Support for experimentation on a large scale (virtualiza°°
tion, federation, high fidelity scale-down)
Tools and methodologies to achieve, and metrics to °°measure, correctness, repeatability, and sharing of experiments
Testbeds and methodologies•
Tools, methodologies, and infrastructure that support °°risky experimentation
Support for experimentation in emerging security topics °°(cyber-physical systems, wireless, botnets, etc.)
Novel experimentation approaches (e.g., coupling of °°emulation and simulation)
Experience in designing or deploying secure testbeds°°
Instrumentation and automation of experiments; their °°archiving, preservation, and visualization
Fair sharing of testbed resources°°
Hands-on security education•
Experiences teaching security classes that use hands-on °°security experiments for homework, in-class demonstrations,
or class projects
Experiences from red team/blue team exercises

Back To Conferences List

Database Sections