The Workshop on Research for Insider Threat (WRIT) will highlight the challenges and trends specific to the insider threat problem from multiple viewpoints, such as information technology, behavioral sciences, and criminology. Furthermore, the workshop will review existing promising approaches and explore experimental possibilities for evaluation of technical, non-technical, and combined solution approaches. The workshop will be accessible to both non-experts interested in learning about the insider threat problem as well as experts interested in learning about new research and approaches.
WRIT 2013 is part of the IEEE CS Security and Privacy Workshops (SPW) and is co-located with SP 2013, the IEEE Symposium on Security and Privacy.
The threat of malicious insider attacks to organizational security has historically been one of the most difficult challenges to address. Insiders often attack using authorized access and with behavior very difficult to distinguish from normal activities. Modern insiders are further enabled by immense data storage capabilities, advanced searching algorithms, and the difficulty of comprehensive monitoring of networked systems. Furthermore, several recent high-profile attacks have been enabled by non-malicious, or unintentional, insiders fooled by exploits from external attackers.
The threat of attack from insiders is real and substantial. An insider can be defined as a current or former employee, contractor, or other business partner who has authorized access to an organization's network, system, or data. Malicious insiders are those who intentionally exceed or misuse that access in a manner that negatively affects the confidentiality, integrity, or availability of the organization's information or information systems. The problem of insider threats has recently received increased attention in academic, commercial, and government research communities. While many cases of insider threat are high-profile and receive considerable attention, untold scores of low-level insider attacks occur across organizations on a daily basis. Malicious insiders are dangerous and difficult to identify because they typically use authorized access and regular business processes to commit crimes such as fraud, theft, sabotage, or espionage.
Therefore, it is imperative that academia and industry work together to find solutions and measures to protect organizations from their own current and/or former employees. Technical solutions to this problem are emerging, but studies show little significant progress has been made in reducing the numbers or impacts of insider attacks. There are two main reasons for the relative lack of success in identifying insider threats:
Topics of interest include but are not limited to:
View the preliminary program, and contact us if you have questions or comments.
Submit Papers: Authors are invited to submit Regular Papers (maximum 8 pages) or Short Papers (maximum 4 pages). Papers accepted by the workshop will be published in the Conference Proceedings published by IEEE Computer Society Press. The Workshop uses EasyChair for all submissions.
Register: Register for WRIT2013 at http://www.regonline.com/Register/Checkin.aspx?EventID=1181099.
February 4, 2013
February 11, 2013
Extended Deadline for Paper Submission
March 12, 2013
April 1, 2013
Camera-Ready Version Due
May 24, 2012
Dr. William (Bill) Claycomb, Carnegie Mellon University
Frank Stajano, University of Cambridge
Matt Bishop, University of California at Davis
Deanna C. Caputo, The MITRE Corporation
Anni Coden, IBM
George Cybenko, Dartmouth College
Zheng Dong, Indiana University
Bill Fitzgerald, University of Cambridge
Dieter Gollman, Hamburg University of Technology
Frank Greitzer, PsyberAnalytix
Sam Liles, Purdue University
Debin Liu, PayPal
Roy Maxion, Carnegie Mellon University
Joshua Neil, Los Alamos National Laboratory
Shari Pfleeger, I3P Dartmouth College
Daniel Quist, MIT Lincoln Laboratories
Angela Sasse, University College London
Ted Senator, SAIC
Dongwan Shin, New Mexico Tech
Craig Shue, Worcester Polytechnic Institute
Sean Smith, Dartmouth College
David Stein, Raytheon
Sal Stolfo, Columbia University
Rhys Williams, Ministry of Defence
Jeong Hyun Yi, Soongsil University
Ilsun You, Korean Bible University