OVERVIEW

As computing and communication systems continue to expand and offer new services, these advancements require more dynamic, diverse, and interconnected computing infrastructures. Unfortunately, defending and maintaining resilient and trustworthy operation of these complex systems are increasingly difficult challenges. Conventional approaches to Security, Trust, Assurance and Resilience (STAR for short) are often too narrowly focused and cannot easily scale to manage large, coordinated and persistent attacks in these environments.

Designs found in nature are increasingly used as a source of inspiration for STAR and related networking and intelligence solutions for complex computing and communication environments. Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms, immune systems just to name a few. For example several networking management and security technologies have successfully adopted some of nature’s approaches, such as swarm intelligence, artificial immune systems, sensor networks, moving target defense, diversity-based software design, etc. Nature has also developed an outstanding ability to recognize individuals or foreign objects and adapt/evolve to protect a group or a single organism. Solutions that incorporate these nature-inspired characteristics often have improved performance and/or provided new capabilities beyond more traditional methods.

The aim of this BioSTAR workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of nature-inspired STAR aspects in computing and communications.

Topics of interests include, but are not limited to:
  • Nature-inspired anomaly and intrusion detection
  • Adaptation algorithms
  • Biometrics
  • Nature-inspired algorithms and technologies for STAR
  • Biomimetics
  • Artificial Immune Systems
  • Adaptive and Evolvable Systems
  • Machine Learning, neural networks, genetic algorithms for STAR
  • Nature-inspired analytics and prediction
  • Cognitive systems
  • Sensor and actuator networks and systems
  • Information hiding solutions (steganography, watermarking) for network traffic
  • Cooperative defense systems
  • Cloud-supported nature-inspired STAR
  • Theoretical development in heuristics
  • Management of decentralized networks
  • Nature-inspired algorithms for dependable networks
  • Platforms for STAR services
  • Diversity in computing and communications
  • Survivable and sustainable systems
  • STAR management systems
  • Autonomic cyber defenses


SUBMISSIONS

Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English.

Authors are invited to submit Regular Papers (maximum 8 pages) via EasyChair. Papers accepted by the workshop will be published in the Conference Proceedings published by IEEE Computer Society Press.

Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found here. Failure to adhere to the page limit and formatting requirements will be grounds for rejection.

The extended versions of accepted papers will be considered for publication in a special issue of the EURASIP Journal on Information Security. The decision which of the accepted paper will be invited depends on the quality of the paper and quality of the presentation at BioSTAR. The final decision will be made by chairs after the workshop.


IMPORTANT DATES

  • January 24, 2016 (EXTENDED): Regular Paper Submission [submission closed!]
  • February 24, 2016 (EXTENDED): Notification Date
  • March 25, 2016: Camera-Ready Paper Deadline


KEYNOTE:

Sean Moore, Chief Technology Officer and Vice President of Research for Centripetal Networks
"Bio-Inspired Security: Into The Wild - Transitioning your basic research technologies from the lab to the Internet"


ACCEPTED PAPERS:

Faisal Alshanketi, Issa Traore and Ahmed Awad Ahmed, Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication
James Brown, Mohd Anwar and Gerry Dozier, Detection of Mobile Malware: An Artificial Immunity Approach
Jake Drew, Michael Hahsler and Tyler Moore, Polymorphic Malware Detection Using Sequence Classification Methods
Christopher Oehmen, Paul Bruillard, Brett Matzke, Aaron Phillips, Keith Star, Jeffrey Jensen, Doug Nordwall, Seth Thompson and Elena Peterson, LINEBACKER: LINE-speed Bio-inspired Analysis and Characterization for Event Recognition
Mohamed Azab and Mohamed Eltoweissy, MIGRATE: Towards a Lightweight Moving-target Defense against Cloud Side Channels
Shin-Ming Cheng and Pin-Yu Chen, Ecology-Based DoS Attack in Cognitive Radio Networks
Konstantin Boettinger, Hunting Bugs with Levy Flight Foraging
Christopher Oehmen, Elena Peterson, Aaron Phillips and Darren Curtis, A Biosequence-based Approach to Software Characterization


PROGRAM:

08:45AM - 09:00AM - BioSTAR Opening Remarks
09:00AM - 10:00AM - Keynote: Bio-Inspired Security: Into The Wild - Transitioning your basic research technologies from the lab to the Internet, Sean Moore

10:15AM - 10:45AM - Workshops Break

10:45AM - 12:30PM - BioSTAR Session #1
James Brown, Mohd Anwar and Gerry Dozier, Detection of Mobile Malware: An Artificial Immunity Approach
Jake Drew, Michael Hahsler and Tyler Moore, Polymorphic Malware Detection Using Sequence Classification Methods
Christopher Oehmen, Elena Peterson, Aaron Phillips and Darren Curtis, A Biosequence-based Approach to Software Characterization

12:30PM - 01:30PM - Workshops Lunch

01:30PM - 03:15PM - BioSTAR Session #2 Christopher Oehmen, Paul Bruillard, Brett Matzke, Aaron Phillips, Keith Star, Jeffrey Jensen, Doug Nordwall, Seth Thompson and Elena Peterson, LINEBACKER: LINE-speed Bio-inspired Analysis and Characterization for Event Recognition
Mohamed Azab and Mohamed Eltoweissy, MIGRATE: Towards a Lightweight Moving-target Defense against Cloud Side Channels
Shin-Ming Cheng and Pin-Yu Chen, Ecology-Based DoS Attack in Cognitive Radio Networks

03:15PM - 03:45PM - Workshops Break

03:45PM - 05:30PM - BioSTAR Session #3
Konstantin Bottinger, Hunting Bugs with Levy Flight Foraging
Faisal Alshanketi, Issa Traore and Ahmed Awad Ahmed, Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication

05:30PM - 05:45PM - Closing Remarks


COMMITTEES


ORGANIZING COMMITTEE
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, NC, USA
Mohamed Eltoweissy, Virginia Military Institute, USA
Hiroshi Wada, Unitrends, Australia

PROGRAM COMMITTEE
Eitan Altman, INRIA Sophia-Antipolis, France
Elias Bou-Harb, National Cyber Forensics and Training Alliance (NCFTA) & Concordia University, Canada
Luca Caviglione, ISSIA, CNR, Italy
Eric Chan-Tin, Oklahoma State University, USA
Michal Choras, University of Technology and Life Sciences, Poland
Ruairi De Frein, Royal Institute of Technology, Sweden
Eduardo Feo, Dalle Molle Institute for Artificial Intelligence, Switzerland
Julie Greensmith, University of Nottingham, UK
Kay Hamacher, Technische Universitat Darmstadt, Germany
Artur Janicki, Warsaw University of Technology, Poland
Maciej Korczynski, Delft University of Technology, The Netherlands
Igor Kotenko, SPIIRAS, Russia
Jean-Francois Lalande, Inria, Univ. Rennes 1, INSA Centre Val de Loire, Univ. Orleans, France
Kenji Leibnitz, National Institute of Information and Communications Technology, Japan
Sean Moore, Centripetal Networks, USA
Tadashi Nakano, Osaka University, Japan
Michele Nogueira, Federal University of Parana, Brazil
Christopher S. Oehmen, Pacific Northwest National Laboratory, USA
Marinella Petrocchi, IIT, CNR, Italy
Mayank Raj, Missouri University of Science and Technology, USA
Siva Rajagopalan, Honeywell, USA
Hui Tian, National Huaqiao University, China
Steffen Wendzel, Fraunhofer FKIE, Germany
Chenyu Zheng, University of Colorado, USA


CONTACT

For any enquiries please contact us at: contact@cybersecurity.bio.