7th ACM CCS International Workshop on 
Managing Insider Security Threats
(In Conjunction with ACM CCS 2015)

The Denver Marriot City Center, Denver, Colorado, USA
October 12-16, 2015

[CFP][Overview][Topics][Workshop Organization][Important Dates]
[Program][Invited Talk][Registration][Author Instruction][Proceedings][Previous MISTs][Contact]


## News

- The workshop program is here.
- Submission Deadline is extended to
June 22, 2015
- MIST 2015 is accepted to take place in conjunction with ACM CCS 2015.

## Overview

During the past decades, information security developments have been mainly concerned with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware. However, according to a recent Gartner Research Report1), information leakage caused by insiders who are legally authorized to have access to some corporate information is increasing dramatically. These leakages can cause significant damages such as weakening the competitiveness of companies (and even countries). Information leakage caused by insiders occurs less frequently than information leakage caused by outsiders2), but the financial damage is much greater. Countermeasures in terms of physical, managerial, and technical aspects are necessary to construct an integral security management system to protect companies' major information assets from unauthorized internal attackers. The objective of this workshop is to showcase the most recent challenges and advances in security technologies and management systems to prevent leakage of organizations' information caused by insiders. It may also include state-of-the-art surveys and case analyses of practical significance. We expect that the workshop will be a trigger for further research and technology improvements related to this important subject.



## Topics (not limited to)

- Theoretical foundations and algorithms for addressing insider threats
- Insider threat assessment and modeling
- Security and cryptography technologies to prevent, detect and predict insider threats
- Cryptographic protocols against insider threats
- Validating the trustworthiness of staff
- Post-insider threat incident analysis
- Data breach modeling and mitigation techniques
- Registration, authentication and identification
- Certification and authorization
- Database security
- Device control system
- Digital forensic system
- Fraud detection
- Network access control system
- Intrusion detection
- Keyboard information security
- Information security governance
- Information security management systems
- Risk assessment and management
- Log collection and analysis
- Trust management
- IT compliance (audit)
- Continuous auditing
- Corporate ethics, accountability and integrity



## Workshop Organization

General Co-Chairs

- Elisa Bertino (Purdue University, USA)
- Ilsun You (Korean Bible University, South Korea)

Program Committee

- Benjamin Aziz (University of Portsmouth, UK)
- Joonsang Baek (Khalifa University of Science, Technology & Research (KUSTAR), UAE)
- Rana Barua (Indian Statistical Institute, India)
- Matt Bishop (UC Davis, USA)
- Aniello Castiglione (Università degli Studi di Salerno, Italy)
- William R. Claycomb (Carnegie Mellon University, USA)
- Pandu Rangan Chandrasekaran (IIT Madras, India)
- Steven Furnell (Plymouth University, UK)
- Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)
- Igor Kotenko (SPIRAS, Russia)
- Fang-Yie Leu (Tunghai University, Taiwan)
- Jason Nurse (Oxford University, UK)
- Marek R. Ogiela (AGH University, Poland)
- Francesco Palmieri (Università degli Studi di Salerno, Italy)
- Günther Pernul (University of Regensburg, Germany)
- Christian W. Probst (Technical University of Denmark, Denmark)
- Malek Ben Salem (Accenture Technology Labs, USA)
- Dongwan Shin (New Mexico Tech., USA)
- Willy Susilo (University of Wollongong, Australia)
- Hassan Takabi (University of North Texas, USA)
- Shambhu Upadhyaya (SUNY Buffalo, USA)
- S. Felix Wu (UC Davis, USA)
- Danfeng (Daphne) Yao (Virginia Tech, USA)

[Additional members still being invited]



## Important Dates

- Paper submission deadline: June 22, 2015, 23:59 (UTC–11)
- Review deadline: July 18, 2015
- Acceptance notification: July 22, 2015
- Camera-ready due: July 29, 2015 (hard deadline)



## Author Instruction

Authors are invited to submit original papers:
they must not substantially duplicate work that any of the authors have published elsewhere
or have submitted in parallel to any other conferences that have proceedings.

The submission of contributions to MIST 2015 must occur through
the workshop submission system: https://easychair.org/conferences/?conf=mist2015

Submissions must be at most 12 pages in double-column ACM format
(https://www.acm.org/sigs/publications/proceedings-templates) including the bibliography and well-marked appendices. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Each accepted paper must be presented by an author, who will have to be registered
by the early-bird registration deadline.



## Registration

The workshop is being held in conjunction with the 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015).

Please visit the ACM CCS 2015 Registration website for more information.



## Proceedings

Proceedings of MIST 2015 will be available (on a USB jump drive) to the workshop attendees.
MIST 2015 will also have on-line proceedings through ACM Digital Library, with a separate ISBN.



## Previous MISTs

- MIST 2014 - November 21-22, 2014, Konkuk University, Seoul, Rep. of Korea
- MIST 2013 - October 24-25, 2013, Pukyong National University, Busan, Rep. of Korea
- MIST 2012 - November 8-9, 2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan
- MIST 2011 - December 1-2, 2011, Fukuoka Institute of Technology, Fukuoka, Japan (with InCos 2011)
- MIST 2010 - June 15, 2010, Morioka, Iwate, Japan (with IFIPTM 2010)
- MIST 2009 - June 16, 2009, Purdue University, West Lafayette, USA (with IFIPTM 2009)



## Invited Talk

Title: Detecting Insider Threats: Who Is Winning the Game?

"Preventing, detecting, and responding to malicious insider activity poses a significant challenge to enterprise and organizational security.  Studies continue to show the insider threat problem has not abated, and may be increasing.  We could speculate on cause, perhaps looking at workforce demographics, new information sharing technologies, or evolving policies regarding personal devices in the workplace.  But regardless of the factors driving this trend, the problem of trusted individuals causing harm to the organization by exploiting authorized access is ancient, and will remain a serious problem ad infinitum.  The cycle is familiar to security professionals: attackers determine methods of attack, defenders develop countermeasures, attackers determine new methods of attack, and so on.  So where do we stand today?  What new capabilities are malicious insiders exploiting, and how are cybersecurity professionals countering those attacks?  Is one side significantly “ahead” of the other?

In this talk, we’ll address those questions, looking at trends in insider attacks and emerging workplace issues that may influence an employee’s decision to act maliciously.  We’ll look at new techniques being published for detecting suspicious activity, including solutions that look for anomalous cyber indicators as well as those that try to identify behavioral concerns among the workforce.  We’ll highlight barriers to effective insider threat research, such as limited access to real data sets that include ground-truth on insider activity, and share methods for overcoming those challenges.  The talk will conclude with a discussion of key areas for future work.”

Invited Speaker: Dr. William (Bill) Claycomb (Software Engineering Institute, Carnegie Mellon University)

Dr. William (Bill) Claycomb is a Senior Member of Technical Staff at Carnegie Mellon University’s (CMU) Software Engineering Institute (SEI), where he leads multidisciplinary research projects related to cyber security and human behavior.  His portfolio of previous work represents a broad range of topics such as malware detection, cloud security, wireless and mobile security, enterprise architecture, and identity management.



## Contact

For further information regarding the workshop and paper submission, please contact MIST 2015 organizer at ilsunu@gmail.com


 Jay Heiser. "Understanding Data Leakage", Gartner Research Report, August 2007
2) George Fyffe. "Addressing the insider Threat", Network Security, March 2008