IEEE VizSec 2015 IEEE Symposium on Visualization for Cyber Security

IEEE Symposium on Visualization for Cyber Security

October 26, 2015
  /   Chicago, Illinois, USA

IEEE VizSec was held in Chicago, Illinois, USA on October 26, 2015. VizSec brings together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques.

VizSec was again be held in conjunction with IEEE VIS.

The proceedings are available in the IEEE Digital Library: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7310645.

Program Schedule

8:30 – 9:30
Keynote : Greg Conti - Security Visualization Past, Present, Future
9:30 – 9:45
Posters fast forward
9:45 – 10:10
Paper Session: Visualizing Users Activity 1
  • BitConeView: Visualization of Flows in the Bitcoin Transaction Graph
    Giuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli and Roberto Tamassia
10:10 – 10:30
Break
10:30 – 11:20
Paper Session: Visualizing Users Activity 2
  • Discovery of Rating Fraud with Real-Time Streaming Visual Analytics
    Kodzo Webga and Aidong Lu
  • Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity
    Philip A. Legg
11:20 – 12:10
Paper Session: Session Network Security 1
  • SNAPS: Semantic Network traffic Analysis through Projection and Selection
    Bram C.M. Cappers and Jarke van Wijk
  • Visual Analytics for Cyber Red Teaming
    Joseph Yuen, Benjamin Turnbull and Justin Hernandez
2:00 – 3:40
Paper Session: Network Security 2
  • PERCIVAL: Proactive and rEactive attack and Response assessment for Cyber Incidents using Visual AnaLytics
    Marco Angelini, Nicolas Prigent and Giuseppe Santucci
  • Ocelot: User-Centered Design of a Decision Support Visualization for Network Quarantine
    Dustin L. Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko and Celeste Lyn Paul
  • Contextual Network Navigation to provide Situational Awareness for Network Administrators
    Cameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts
  • Ensemble Visualization For Cyber Situation Awareness of Network Security Data
    Lihua Hao, Christopher G. Healey and Steve E. Hutchinson
3:40 – 4:15
Break
4:15 – 5:05
Paper Session: Models and Methods
  • A Visual Analytics Loop for Supporting Model Development
    Simon Walton, Eamonn Maguire, Min Chen
  • Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
    Sean McKenna, Diane Staheli and Miriah Meyer
5:05 – 5:55
Poster Session
  • CyberViz: A Tool for Trustworthiness Visualization of Projected Cyber Threats
    Ewart de Visser, Alix Dorfman, Marvin Cohen, Niraj Srivastava, Christopher Eck and Suzanne Hassell
  • Visualization of Network Security Policy Evaluation
    Bastian Hellmann, Marcel Reichenbach, Leonard Renners and Volker Ahlers
  • An interactive visualization to monitor “who goes where” on the network
    Cody Fulcher and Diane Staheli, Hall Monitor
  • V3SPA: An IDE and Visualization Environment for SELinux Security Policy Abstractions
    Robert Gove, Christopher Wacek, Matthew Oertle and Jeffrey Karrels
  • VEGAS: Visualizing, Exploring and Grouping AlertS
    Damien Cremilleux, Frédéric Majorczyk, and Nicolas Prigent
  • Visible Hardware Security Techniques
    Mehrdad Zaker Shahrak and Sheng Wei

Keynote

Greg Conti

Security Visualization Past, Present, Future

presentation

Greg Conti Greg Conti is Director of the Army Cyber Institute at West Point. He holds a BS from West Point, an MS from Johns Hopkins University, and a PhD from the Georgia Institute of Technology, all in computer science. He is the author of "Security Data Visualization" (No Starch Press) and "Googling Security" (Addison-Wesley) as well as over 75 articles and papers covering cyber conflict, online privacy, usable security, and security data visualization. He has spoken at numerous security conferences, including Black Hat, DEF CON, CyCon, HOPE, Interz0ne, ShmooCon, and RSA and has published his academic research in a variety of scholarly venues. He and his work can be found at @cyberbgone on Twitter and at www.gregconti.com.

Papers

Giuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli and Roberto Tamassia
"BitConeView: Visualization of Flows in the Bitcoin Transaction Graph"
Kodzo Webga and Aidong Lu
"Discovery of Rating Fraud with Real-Time Streaming Visual Analytics"
Philip A. Legg
"Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity"
Bram C.M. Cappers and Jarke van Wijk
"SNAPS: Semantic Network traffic Analysis through Projection and Selection"
Joseph Yuen, Benjamin Turnbull and Justin Hernandez
"Visual Analytics for Cyber Red Teaming"
Marco Angelini, Nicolas Prigent and Giuseppe Santucci
"PERCIVAL: Proactive and rEactive attack and Response assessment for Cyber Incidents using Visual AnaLytics"
Dustin L. Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko and Celeste Lyn Paul
"Ocelot: User-Centered Design of a Decision Support Visualization for Network Quarantine"
Cameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts
"Contextual Network Navigation to provide Situational Awareness for Network Administrators"
Lihua Hao, Christopher G. Healey and Steve E. Hutchinson
"Ensemble Visualization For Cyber Situation Awareness of Network Security Data"
Simon Walton, Eamonn Maguire, Min Chen
"A Visual Analytics Loop for Supporting Model Development"
Sean McKenna, Diane Staheli and Miriah Meyer
"Unlocking User-Centered Design Methods for Building Cyber Security Visualizations"

Posters

Ewart de Visser, Alix Dorfman, Marvin Cohen, Niraj Srivastava, Christopher Eck and Suzanne Hassell
"CyberViz: A Tool for Trustworthiness Visualization of Projected Cyber Threats" abstract
Bastian Hellmann, Marcel Reichenbach, Leonard Renners and Volker Ahlers
"Visualization of Network Security Policy Evaluation" abstract
Cody Fulcher and Diane Staheli, Hall Monitor
"An interactive visualization to monitor “who goes where” on the network" abstract
Robert Gove, Christopher Wacek, Matthew Oertle and Jeffrey Karrels
"V3SPA: An IDE and Visualization Environment for SELinux Security Policy Abstractions" abstract
Damien Cremilleux, Frédéric Majorczyk, and Nicolas Prigent
"VEGAS: Visualizing, Exploring and Grouping AlertS" abstract
Mehrdad Zaker Shahrak and Sheng Wei
"Visible Hardware Security Techniques" abstract

The 12th IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cybersecurity community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. VizSec was held in Chicago, Illinois, USA in conjunction with IEEE VIS.

The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user assisted attacks prevention, compliance management, wireless security, secure coding, and penetration testing.

Technical Papers

Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:

When applicable, visualization and interaction techniques that effectively capture the insights of human analysts and/or allow analysts to collaborate efficiently are particularly desirable.

Posters

Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. The poster program will be a great opportunity for the authors to interact with the attendees and solicit feedback. Accepted poster abstracts will be made available on this website.

Tests and Evaluation

When applicable, submissions including tests and evaluations of the proposed tools and techniques are considered particularly desirable. If possible, making the data used for the tests available will also be considered positively. If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the VAST Challenge data sets.

Papers

The VizSec 2015 proceedings will be published by IEEE. Submissions must be formated using the IEEE VGTC template that can be found at http://junctionpublishing.org/vgtc/Tasks/camera.html.

Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merit. Reviews are single-blind, so authors may include names and affiliations in their submissions. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Submission

Submit papers and poster abstracts using EasyChair: http://www.easychair.org/conferences/?conf=vizsec2015

All deadlines are 5:00 PM PST

Papers

August 1, 2015
Submission for Papers
September 5, 2015
Author Notification for Papers
October 3, 2015
Camera Ready Submission and Copyright Forms for Papers

Posters

September 19, 2015
Abstract Submission for Posters
September 30, 2015
Author Notification for Posters

VizSec is held with IEEE VIS.

To register, continue to the IEEE VIS Conference Registration page.

For more information on the venue and hotel, please see the IEEE VIS Conference Venue page.

Organizing Committee

General Chair
Lane Harrison, Worcester Polytechnic Institute
Program Chair
Nicolas Prigent, CentraleSupélec
Publicatations Chair
Sophie Engle, University of San Francisco
Poster Chair
Dan Best, Pacific Northwest National Laboratory
Web Design
John Goodall, Oak Ridge National Laboratory

Program Committee

VizSec Steering Committee

Email questions to vizsec2015@easychair.org or post to the Google Group. Also, keep updated on Twitter: @vizsec.