Updates Regarding the CyberHunt Workshop and the IEEE Big Data Conference
23 August 2020: The conference and the workshop will be held VIRTUALLY on 10-13 December, 2020.
The IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting (CyberHunt 2020) is organized by the Digital Security Research Group of the University of Oslo (Norway) in conjunction with the 2020 IEEE International Conference on Big Data (IEEE BigData 2020). The workshop will be held during Dec 10-13, 2020,
in Atlanta, GA, USA.
Workshop Chair: Vasileios Mavroeidis
PC Chair: Nils Gruschka
PC Chair Assistant: Mateusz Zych
|9:05-9:45||Keynote Presentation: The (new) attack surfaces of data-learned models - Adversarial attacks and defenses for ML models||Fabio Zennaro|
|9:45-10:10||CTI ANT: Hunting for Chinese Threat Intelligence (S01211)||Chia-En Tsai|
|10:10-10:35||Towards Fighting Cybercrime: Malicious URL Attack Type Detection using Multiclass Classification (S01212)||Tariro Manyumwa|
|10:35-11:00||Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF (S01207)||Meznah Alamro|
|11:00-11:25||An Approach to Combining Medical Device Fault Analysis with Trusted Computing Forensics (S01216)||Ian Oliver|
|11:40-12:05||The Applicability of Authorship Verification to Swedish Discussion Forums (S01209)||Lukas Lundmark|
|12:05-12:30||Firearm Detection via Convolutional Neural Networks: Comparing a Semantic Segmentation Model Against End-to-End Solutions (S01218)||Alexander Egiazarov|
|12:30-12:55||Assessment of Data Augmentation Techniques for Firearm Detection in Surveillance Videos (S01204)||Jacob Rose|
|12:55-13:20||Cyber Threat Hunting Through Automated Hypothesis and Multi-Criteria Decision Making (S01205)||Antonio Jose Horta Neto|
October 16, 2020October 30, 2020 Notifications Due: November 2, 2020November 11, 2020 Author Registration Deadline: November 15, 2020 Camera-ready Submission Deadline: November 20, 2020
Cyber-crimes against critical infrastructure, operational technology, IoT, and large organizations have become more sophisticated and are executed at machine speed. In response to that, cyber defenders transition from manual and reactive approaches to more automated and proactive. A key element for building a robust security posture against adversarial attacks is Cyber threat intelligence (CTI). CTI allows security teams to benefit from increased situational awareness and thus minimize their organizations attack surfaces. Based on the detection maturity of an organization, such intelligence can update cyber defense components in an automated manner based on the established trust between the entity sharing the intelligence and the entity consuming it, or in more proactive approaches such as threat hunting and risk assessment. For example, TTPs used in adversarial activities can support threat hunting efforts where the objective is to detect unidentified malicious activity that evaded existing security solutions. The CyberHunt workshop aims to present (potentially AI-focused) new research in the areas of cyber-threat hunting, cyber-threat intelligence, and security orchestration, automation, and response.
Any novel research related to cyber threat intelligence, incident and threat response, threat hunting, and security automation and orchestration is welcome.
Some suggested topics are:
- Cyber Threat Intelligence (strategic, operational, tactical, technical)
- Models for forecasting cyber-attacks and measuring impact
- Threat actor groups & techniques
- Semantic modeling, data representation and fusion for CTI
- Models that take into consideration Deception and Uncertainty in cyber-attack attribution
- Indicators of compromise and how to detect/mitigate
- Visualization techniques for intelligence analysis and investigation
- Legal, privacy and ethical factors in intelligence analysis
- Data analytics for security
- Threat Hunting
- Intrusion and anomaly detection and prevention
- Incident Response
- Monetization of cybercrime
- Open Source tools
- Relevant geopolitical cybersecurity research
- Security Automation
- Security Orchestration
CyberHunt 2020 invites full-length paper submissions that report ongoing or finished research (up to 10 pages), or short papers of early stage work (up to 6 pages).
Papers should be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines using Letter page format (8.5” x 11”).
All accepted papers will be included in the IEEE Big Data 2020 Conference Proceedings and forwarded for inclusion in the IEEE Xplore Digital Library. At least one author of each accepted paper must register for the conference and present the paper in order to include the paper in the proceedings.
Support or Contact
For general inquiries you can contact the workshop chair: Vasileios Mavroeidis vasileim(@)ifi.uio.no.
For PC-chair inquiries you can contact: Nils Gruschka nilsgrus(@)ifi.uio.no.
For technical inquiries you can contact the PC-chair assistant: Mateusz Zych mateusdz(@)ifi.uio.no.