October 2014 Computational Cybersecurity in Compromised Environments (C3E) Workshop
Date: Oct 19, 2014 6:00 pm – Oct 22, 2014 11:30 am
Welcome to C3E 2014!
Now in our sixth year, we'll gather at the Georgia Tech Research Institute (GTRI) Conference Center in October to continue our exploration of work begun during the May 2014 mid-year event by focusing in two areas:
Security by Default: How can we flip the economics of cyberspace to favor the defenders, and disadvantage the attackers? As long as cybersecurity is something that requires users (individuals and organizations) to proactively take steps to secure their information, systems, and networks, we will continue to have major gaps in adoption of basic security procedures. How can we develop systems, networks, applications, and devices that are secure by default, so that users have to work to "turn off" security features? and;
Data Integrity: Data integrity relates to a broad set of issues affecting many disciplines, not the least of which is cyber security. For example, we are interested in data integrity as it relates to surprising change, not just routine corruption. How can we characterize changes in data that are deliberate, malicious, or accidental? How can we characterize malicious activities vice normal decay or corruption in data sets? What are "best practices" in identifying data integrity remedies and practices in other disciplines?
Given the value of the C3E Challenge Problems for the previous two workshops, we are introducing a Malware Discovery Problem for this year's event designed to invent and prototype approaches for identifying high interest, suspicious and likely malicious behaviors from meta-data that challenge the way we traditionally think about the cyber problem. At C3E, we value innovation and paradigm shifting approaches above incremental improvements to existing anomaly techniques.
In support of this Discovery Problem, the C3E Planning Team has identified several possible datasets in the Protected Repository for the Defense of Infrastructure against Cyber Threats (PREDICT) for cyber security research. PREDICT is supported by the Department of Homeland Security, Science & Technology Directorate. To access PREDICT go to https://www.predict.org. Further information for this year's Metadata-based Malicious Cyber Discovery Problem is available on our C3E website accessible via the Malicious Cyber Discovery tab.
Thank you for your continuing interest in C3E!
Submitted by Lisa Coote
on
Welcome to C3E 2014!
Now in our sixth year, we'll gather at the Georgia Tech Research Institute (GTRI) Conference Center in October to continue our exploration of work begun during the May 2014 mid-year event by focusing in two areas:
Security by Default: How can we flip the economics of cyberspace to favor the defenders, and disadvantage the attackers? As long as cybersecurity is something that requires users (individuals and organizations) to proactively take steps to secure their information, systems, and networks, we will continue to have major gaps in adoption of basic security procedures. How can we develop systems, networks, applications, and devices that are secure by default, so that users have to work to "turn off" security features? and;
Data Integrity: Data integrity relates to a broad set of issues affecting many disciplines, not the least of which is cyber security. For example, we are interested in data integrity as it relates to surprising change, not just routine corruption. How can we characterize changes in data that are deliberate, malicious, or accidental? How can we characterize malicious activities vice normal decay or corruption in data sets? What are "best practices" in identifying data integrity remedies and practices in other disciplines?
Given the value of the C3E Challenge Problems for the previous two workshops, we are introducing a Malware Discovery Problem for this year's event designed to invent and prototype approaches for identifying high interest, suspicious and likely malicious behaviors from meta-data that challenge the way we traditionally think about the cyber problem. At C3E, we value innovation and paradigm shifting approaches above incremental improvements to existing anomaly techniques.
In support of this Discovery Problem, the C3E Planning Team has identified several possible datasets in the Protected Repository for the Defense of Infrastructure against Cyber Threats (PREDICT) for cyber security research. PREDICT is supported by the Department of Homeland Security, Science & Technology Directorate. To access PREDICT go to https://www.predict.org. Further information for this year's Metadata-based Malicious Cyber Discovery Problem is available on our C3E website accessible via the Malicious Cyber Discovery tab.
Thank you for your continuing interest in C3E!