IoT-SCTI-23: Workshop on IoT Security and Cyber Threat Intelligence (IoT-SCTI) |
Website | https://www.acsac.org/2023/workshops/iot-scti/ |
Submission link | https://easychair.org/conferences/?conf=iotscti23 |
Abstract registration deadline | September 22, 2023 |
Submission deadline | September 22, 2023 |
The rapid proliferation of Internet of Things (IoT) devices has opened up new avenues for cyber attacks, making IoT security a critical concern. We invite researchers and practitioners to submit papers to our workshop focusing on IoT Security and IoT Cyber Threat Intelligence collection, analysis, validation, and application. The workshop aims to bring together experts and professionals to share their insights, discuss the latest findings, and explore novel techniques to enhance IoT Security and Cyber Threat Intelligence.
Submission Guidelines
We encourage original and high-quality contributions, preliminary work, and novel ideas on topics. Submissions should be 5-10 pages, using the double-column ACM proceedings format (acmart) template available at https://www.acm.org/publications/taps/word-template-workflow, with the [sigconf, anonymous] options. Two additional pages can be used for the Appendix. Note that the reviewers are not expected to read the Appendix.
All submissions must be anonymous.
List of Topics
- Data Collection
- IoT-specific honeypots and honeynets
- Network and host-based intrusion detection systems for IoT
- Web crawlers and scrapers for IoT threat information
- Cyber threat intelligence feeds focusing on IoT
- Darknet, social media, and other relevant source monitoring
- Static and dynamic malware analysis for IoT
- Data Analysis and Correlation
- Machine learning and data mining techniques for IoT threat analysis
- IoT-specific threat actor profiling and attribution
- Domain generation algorithms analysis for IoT malware
- Identifying trends and patterns in IoT attacks and vulnerabilities
- Correlating IoT threat data from multiple sources
- Data Validation
- Evaluating the reliability and accuracy of IoT CTI sources
- Addressing false positives and noise in IoT threat data
- Assessing the effectiveness of IoT-specific threat detection methods
- Data Application
- Developing and deploying countermeasures for IoT threats
- Real-time IoT threat monitoring and alerting systems
- Collaborative platforms for sharing and responding to IoT threats
- Use cases of successful IoT CTI application in organizations
Committees
Organizing committee
General & Program Co-Chairs:
- Omar Alrawi, Georgia Tech
- Mashael Al-Sabah, HBKU
Program Committee
-
Gong Chen, University of Georgia
-
Savio Sciancalepore, Eindhoven University of Technology (TU/e)
-
Afsah Anwar, University of New Mexico
-
Zane Ma, Georgia Tech
-
Yue Zhang, The Ohio State University
-
Tj Oconnor, Florida Institute of Technology
-
Sophie Stephenson, University of Wisconsin--Madison
-
Jeman Park, Georgia Tech
-
Berkay Celik, Purdue University
-
Adwait Nadkarni, William and Mary
-
David Mohaisen, University of Central Florida
-
Luyi Xing, Indiana University Bloomington
-
Hanan Hibshi, Carnegie Mellon University
-
Brendan Saltaformaggio, Georgia Tech
-
Amit Sikder, Georgia Tech
-
Sonu Shankar, Phosphorus Cybersecurity
-
Mohamed Nabeel, Qatar Computing Research Institute
-
Marco Balduzzi, Trend Micro
-
Xiaojing Liao, Indiana University Bloomington
Invited Speakers
- Chris Rouland, Phosphorus Cyber Security
Publication
IoT-SCTI-23 proceedings will be published in on the ACSAC Website (acsac.org)
Venue
The conference will be held at the AT&T Hotel and Conference Center in Austin, Texas.
Workshop Registration
If you are interested in attending, please check off the appropriate box on the conference registration form and add in the IoT Security and Cyber Threat Intelligence (IoT-SCTI) Workshop fee.
For accepted papers, at least one author must register and attend.
Contact
- Omar Alrawi, alrawi@gatech.edu
- Mashael Al-Sabah, msalsabah@hbku.edu.qa