Organised by:


The Second International Workshop on 

 

Cyberpatterns

 

Unifying Design Patterns with Security, Attack and Forensic Patterns

8-9 July 2013,  Abingdon, Oxfordshire , UK

In association with:

Welcome


Home
Topics
Program
Local Info
PC Members
CFP
Registration
Submission

                

Cyberpatterns proceedings

                            (Click on the above image to download the proceedings)

The workshop is inspired by existing work on the study of software design patterns and a vision of applying them to cybersecurity. There is widespread research in design patterns as representations of solutions to recurring design problems, including a growing body of knowledge of security patterns in designing and implementing robust defensive controls. Patterns also help us analyse security incidents, with possible adversarial behaviour modelled by attack patterns. There is significant interest on classifying incidents with attack patterns, as with the substantial catalogue in the CAPEC taxonomy. The emergence of patterns in modelling organisations and digital forensics could also be significant. Patterns are also important in pattern-matching algorithms widely used for detecting and responding to malicious activities.

The aim of the workshop is to explore commonalities and differences between the notions and uses of patterns in these various fields and to conceptualise them in a unified framework, in order to help put cybersecurity on a firmer theoretical foundation and provide aid in engineering secure systems. It will bring together interested parties from academia, industry and government to discuss issues of common interest to help bridge the gap between theory and practice.

The details and proceedings for the 1st Cyberpatterns workshop can be found at http://tech.brookes.ac.uk/CyberPatterns2012.

News: 
  • 3 April 2013: Submission website is now open. 
  • 16 May, 2013Amnon Eden (Essex) has agreed to give a keynote talk called 'Security Pattern Assurance through Round-trip Engineering'. He is an inventor of Codecharts that are used to create visual representations of software systems that can be formally verified. He also co-wrote the Stanford Encyclopaedia of Philosophy entry on ‘The philosophy of computer science’.
  • 16 May, 2013Adam Beautement (UCL) has agreed to give an invited talk on ‘Utilising Human Factors in the Science of Security'. UCL lead and coordinate the Science of Cyber Security Research Institute that has acquired £3.8 million of government funding.
  • 16 May, 2013: The proceedings from the first workshop are planned to be published by Springer in their SpringerBriefs in Computer Science series.
  • 23 May, 2013: We have announced a two page Call for Abstracts with deadline 16 June, 2013. We anticipate that the abstracts can be extended into full papers after the workshop for inclusion in the proceedings by a respected publisher 
  • 24 June 2013: We have selected papers for presentation at the workshop and notified the authors of our decision
  • 25 June 2013: We have published the provisional timetable
  • 6 July 2013: We have published the draft proceedings
  • 20 July 2013: We have published the keynote slides on the program page
  • 20 July 2013: We have published the final proceedings
  • 1 November 2013:The 3rd Cyberpatterns Workshop site is now open
  • 14 November 2013:The proceedings of the 1st Cyberpatterns workshop are due for publication by Springer in early 2014

 


Last updated: May 17, 2013.