Call
for Papers
The static nature of current computing systems has made them easy to attack and
harder to defend. Adversaries have an asymmetric advantage in that they have the
time to study a system, identify its vulnerabilities, and choose the time and
place of attack to gain the maximum benefit. The idea of moving-target defense
(MTD) is to impose the same asymmetric disadvantage on the attacker by making
systems dynamic and harder to predict. With a constantly changing system and its
ever adapting attack surface, the attacker will have to deal with a great deal
of uncertainty just like defenders do today. The ultimate goal is to level the
cybersecurity playing field for defenders versus attackers.
This workshop seeks to bring together researchers from academia, government, and
industry to report on the latest research efforts on moving-target defense, and
to have productive discussion and constructive debate on this topic. We solicit
submissions on original research in the broad area of MTD, with possible topics
such as those listed below. Since this is still a research area in a nascent
stage, the list should only be used as a reference. We welcome all works that
fall under the broad scope of moving target defense, including research that
shows negative results.
- System randomization
- Artificial diversity
- Cyber maneuver
- Bio-inspired defenses
- Dynamic network configuration
- Moving target in the cloud
- System diversification techniquesk
- Dynamic compilation techniques
- Adaptive defenses
- Analytical models for MTD
- Large-scale MTD (using multiple techniques)
- …
Paper Submissions
Submitted papers must not substantially overlap papers that have been published
or that are simultaneously submitted to a journal or a conference with
proceedings. Submissions including references should be at most 10 pages in the ACM double-column
format, excluding well-marked appendices, and at most 12 pages in total.
Submissions are not required to be anonymized.
Submissions are to be made to the submission web site at
https://www.easychair.org/conferences/?conf=mtd20140. Only PDF files will be accepted. Submissions
not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 22, 2014 to be
considered. Notification of acceptance or rejection will be sent to authors by
August 22, 2014. Authors of accepted papers must guarantee that one of the
authors will register and present the paper at the workshop. Proceedings of the
workshop will be available on a CD to the workshop attendees and will become
part of the ACM Digital Library.
Important Dates
Keynote
Speakers
George Cybenko, Dartmouth College
Patrick D. McDaniel,
Pennsylvania State University
Program
8:25 - 8: 30 |
Welcome Message |
|
Keynote |
8:30 - 9:15 |
No Free Lunch in Cyber Security George Cybenko
slides |
9:15 - 10:00 |
Security and Science of Agility Patrick D. McDaniel
slides |
|
Technical Session I |
10:00 - 10:30 |
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses
Kevin Carter, James Riordan and Hamed Okhravi |
10:30 - 11:00 |
Coffee Break
|
11:00 - 11:30 |
Towards A Theory of Moving Target Defense
Rui Zhuang, Scott A. Deloach and Xinming Ou
|
11:30 - 12:00 |
On the Challenges of Effective Movement
Thomas Hobson, Hamed Okhravi, David Bigelow, Robert Rudd and William Streilein
|
12:00 - 13:00 |
Lunch Break |
|
Technical Session II |
13:00 - 13:30 |
Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Minghui Zhu, Zhisheng Hu and Peng Liu
|
13:30 - 14:00 |
Moving Target Defense for Hardening the Security of the Power System State Estimation
Mohammad Rahman, Rakesh B. Bobba and Ehab Al-Shaer
|
14:00 - 14:30 |
Spatiotemporal Address Mutation for Proactive Cyber Agility Against Sophisticated Attackers
Jafar Haadi Jafarian, Ehab Al-Shaer and Qi Duan
|
14:30 - 15:00 |
Coffee Break |
|
Technical Session III |
15:00 - 15:30 |
Software Security and Randomization through Program Partitioning and Circuit Variation
Todd Andel, Lindsey Whitehurst and Jeffrey McDonald
slides
|
15:30 - 16:00 |
Software Profiling Options and Their Effects on Security Based Code Diversification
Mark Murphy, Per Larsen, Stefan Brunthaler and Michael Franz
|
16:00 - 16:30 |
Comparing Different Moving Target Defense Techniques
Jun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu and Peng
Liu |
16:30 - 17:00 |
Wrap up |
Organizers
PC Chairs
Sushil Jajodia, George Mason
University
Kun Sun, College of William and Mary
Program Committee
Massimiliano Albanese, George Mason
University
Ehab Al-Shaer,
University of North Carolina - Charlotte
George Cybenko, Dartmouth College
Alessandra De
Benedictis, University of Naples
Scott DeLoach, Kansas State
University
Yuval Elovici, Ben-Gurion University
Rob Erbacher, Army Research Laboratory
Michael Franz, University of
California, Irvine
Dijiang Huang, Arizona State
University
Angelos Keromytis, Columbia
University
Jason Li, Intelligent Automation, Inc
Peng Liu, Pennsylvania State
University
Tom Longstaff, National Security Agency
Patrick McDaniel, Pennsylvania State
University
Prasant Mohapatra, University
of California, Davis
Sanjai Narain, Applied
Communication Sciences
Hamed Okhravi, MIT Lincoln Laboratory
Xinming Ou, Kansas State
University
Radha Poovendran,
University of Washington
Kui Ren, State University of
New York at Buffalo
Vipin Swarup, The MITRE Corporation
Cliff Wang, Army Research Office
Zhan Wang, Chinese Academy
of Sciences
Publicity Chair
Sara Foresti, University of
Milan
Web Chair
Chong Guan, Chinese Academy of Sciences