IWSMR 2019

1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019)

to be held in conjunction with the 14 th International Conference on Availability, Reliability and Security
(ARES 2019 – http://www.ares-conference.eu)

August 26 – August 29, 2019, University of Kent, Canterbury, United Kingdom

In recent years, research started to focus on the scientific fundamentals of information security. These fundamentals include several important aspects such as the unified description of attacks and countermeasures, the reproducibility of experiments and means to achieve reproducibility, the sharing of research data and code, the discussion of quality criteria for experiments and the design and implementation of testbeds.

The related academic publications contributed to the advancement of information security research, e.g. by making research contributions easier to compare. Moreover, work on terminology and taxonomy addressed redundancies and unified the understanding between different sub-domains of information security.

This workshop desires to foster the progress in research on the scientific methodology of information security, to improve the links between sub-domains of information security research and to advance the discussion on the scientific methodology in information security. Moreover does this workshop welcome submissions that evaluate existing research results by reproducing experiments.

Topics of interest include, but are not limited to
  • Surveys of scientific methodology in information security.
  • Fundamentals for a `science of security’.
  • Discussion of links/similarities between scientific fundamentals of information security and other research domains, such as Economics, Psychology, Biology, Physics or Chemistry (but no papers specific to non-security domains).
  • Evaluation and extension of existing taxonomies and proposals for new taxonomies in cyber security.
  • Data collection and measurement.
  • Work that unifies terminological inconsistencies in cyber security.
  • Work that reproduces existing experiments, i.e. that confirms/disproves experimental results or that shows how replication platforms can be realized in information security.
  • Work that discusses the underlying criteria for the design and evaluation for cyber security research testbeds.
  • Evaluation of the novelty of research contributions and handling of scientific re-inventions.
  • Methodology in network security, cryptography, information hiding, IoT security, system security, digital forensics, and other sub-disciplines of information security.
  • Methodology for privacy, information sharing and collaborative work in the context of information security.
  • “Open science” for cyber security.
  • History of information security.
  • Scientometric analyses, e.g. citation behavior, in information security.
  • Policy issues that influence cyber security research.
Important Dates
Submission Deadline May 27, 2019
Author Notification June 15, 2019
Proceedings Version June 23, 2019
ARES EU Symposium August 26, 2019
Conference August 26 – August 29, 2019

The need of standardisation and reference collections in digital forensics
Christian Hummert, director of digital forensics at the Central Office for Information Technology in the Security Sector (ZITiS), Germany

Workshop IWSMR

Abstract : In digital forensics the experts usually have only on try, especially in smartphone, IoT or embedded systems forensics. If a trace in criminal proceedings is destroyed or analyzed incorrectly there are only limited possibilities for repetition of the procedure. In contrast, in good scientific research requires all methods must be reproducible and transparent. In this field of unresolved tension the use of standardization and reference collections can help. There are some endeavours within the European Union to overcome these issues.

Christian Hummert obtained his PhD in computer science from the Friedrich-Schiller University in Jena, Germany. He worked six years as a forensic expert for the Federal Police of Thuringia. In 2015 he was appointed as a Full Professor for IT-Security / Digital Forensics at the Mittweida University of Applied Science. In October 2018 he left university and became the director of digital forensics at the Central Office for Information Technology in the Security Sector (ZITiS) in Germany. His research interests include digital forensics especially forensics of embedded systems and automotive forensics.

Workshop Chairs

Steffen Wendzel, Worms University of Applied Sciences, Germany
Luca Caviglione, Inst. Appl. Math. & Inf. Techn. (IMATI), National Research Council (CNR), Italy
Alessandro Checco, University of Sheffield, United Kingdom
Aleksandra Mileva, University Goce Delcev, Macedonia
Jean-Francois Lalande, CentraleSupélec, France
Wojciech Mazurczyk, Warsaw University of Technology, Poland

TPC Members

Krzysztof Cabaj, Warsaw University of Technology, Poland
Bela Genge, Petru Maior University of Tg Mures, Romania
Nils Gruschka, University of Oslo, Norway
Karl Jonas, Bonn Rhine-Sieg University, Germany
Jörg Keller, University of Hagen, Germany
Thomas Kemmerich, University of Bremen, Germany / NTNU, Norway
Hanno Langweg, HTWG Konstanz, Germany
Michael Meier, University of Bonn, Germany
Frederic Petit, Argonne National Laboratory, USA
Slobodan Petrovic, Gjøvik University College, Gjøvik, Norway
Michael Rademacher, Bonn Rhine-Sieg University, Germany
Ruben Rios, University of Malaga, Spain
Peter Schartner, Klagenfurt University, Austria
Roland Varriale, Argonne National Laboratory, USA
Simon Vrhovec, University of Maribor, Slovenia
Christian Hummert, ZITiS, Germany
Olaf Maennel, Tallinn University of Technology, Estonia

Submission Guidelines

The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at https://www.ares-conference.eu/conference/submission/ .

Accepted submissions will receive an invitation to submit their extended versions to the Journal of Universal Computer Science (J.UCS) special issue “Information Security Methodology, Replication Studies and Information Security Education