Papers for 2015 are now in the IEEE Digital Library.
The presentation from Greg Conti’s keynote is also on the web site.
For link to papers and keynote presentation, see http://vizsec.org/vizsec2015/
We have made the papers that will be presented at VizSec 2015 available on a password protected site for those who will be coming to the conference and want to read the papers ahead.
Please send an email to firstname.lastname@example.org and we will send you the URL and password.
The Program Schedule for VizSec has been announced!
- 8:30 – 9:30 Keynote: Greg Conti
- 9:30 – 9:45 Posters fast forward
- 9:45 – 10:10 Paper Session: Visualizing Users Activity 1
- Giuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli and Roberto Tamassia, BitConeView: Visualization of Flows in the Bitcoin Transaction Graph
- 10:10-10:30 Break
- 10:30-11:20 Paper Session: Visualizing Users Activity 2
- Kodzo Webga and Aidong Lu, Discovery of Rating Fraud with Real-Time Streaming Visual Analytics
- Philip A. Legg, Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity
- 11:20-12:10 Paper Session: Session Network Security 1
- Bram C.M. Cappers and Jarke van Wijk, SNAPS: Semantic Network traffic Analysis through Projection and Selection
- Joseph Yuen, Benjamin Turnbull and Justin Hernandez, Visual Analytics for Cyber Red Teaming
- 2:00-3:40 Paper Session: Network Security 2
- Marco Angelini, Nicolas Prigent and Giuseppe Santucci, PERCIVAL: Proactive and rEactive attack and Response assessment for Cyber Incidents using Visual AnaLytics
- Dustin L. Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko and Celeste Lyn Paul, Ocelot: User-Centered Design of a Decision Support Visualization for Network Quarantine
- Cameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts, Contextual Network Navigation to provide Situational Awareness for Network Administrators
- Lihua Hao, Christopher G. Healey and Steve E. Hutchinson, Ensemble Visualization For Cyber Situation Awareness of Network Security Data
- 3:40-4:15 Break
- 4:15-5:05 Paper Session: Models and Methods
- Simon Walton, Eamonn Maguire, Min Chen, A Visual Analytics Loop for Supporting Model Development
- Sean McKenna, Diane Staheli and Miriah Meyer, Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
- 5:05-5:55 Poster Session
- Ewart de Visser, Alix Dorfman, Marvin Cohen, Niraj Srivastava, Christopher Eck and Suzanne Hassell, CyberViz: A Tool for Trustworthiness Visualization of Projected Cyber Threats
- Bastian Hellmann, Marcel Reichenbach, Leonard Renners and Volker Ahlers, Visualization of Network Security Policy Evaluation
- Cody Fulcher and Diane Staheli, Hall Monitor: An interactive visualization to monitor “who goes where” on the network
- Robert Gove, Christopher Wacek, Matthew Oertle and Jeffrey Karrels, V3SPA: An IDE and Visualization Environment for SELinux Security Policy Abstractions
- Damien Cremilleux, Frédéric Majorczyk, and Nicolas Prigent, VEGAS: Visualizing, Exploring and Grouping AlertS
- Mehrdad Zaker Shahrak and Sheng Wei, Visible Hardware Security Techniques
Hoping to see you all in Chicago!
The 12th IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. VizSec will be held in Chicago, Illinois, USA in conjunction with IEEE VIS.
The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user assisted attacks prevention, compliance management, wireless security, secure coding, and penetration testing.
Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, practical experience, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that promise to improve cyber security practices, including, but not limited to:
- Situation awareness and/or understanding
- Incident handling including triage, exploration, correlation, and response
- Computer forensics
- Recording and reporting results of investigations
- Assisting proactive security configuration and deployment
- Reverse engineering and malware analysis
- Vulnerability management
- Multiple data source analysis
- Analyzing information requirements for computer network defense
- Evaluation and/or user testing of VizSec systems
- Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective)
- Modeling system and network behavior
- Modeling attacker and defender behavior
- Studying risk and impact of cyber attacks
- Predicting future attacks or targets
- Security metrics and education
- Software security
- Mobile application security
- Social networking privacy and security
When applicable, visualization and interaction techniques that effectively capture the insights of human analysts and/or allow analysts to collaborate efficiently are particularly desirable.
Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. The poster program will be a great opportunity for the authors to interact with the attendees and solicit feedback. Accepted poster abstracts will be made available on this website.
Tests and Evaluation
When applicable, submissions including tests and evaluations of the proposed tools and techniques are considered particularly desirable. If possible, making the data used for the tests available will also be considered positively. If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the VAST Challenge data sets.
The VizSec 2015 proceedings will be published by IEEE. Submissions must be formated using the IEEE VGTC template that can be found at http://junctionpublishing.org/vgtc/Tasks/camera.html.
Papers should be at most 8 pages including the bibliography and appendices. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merit. Reviews are single-blind, so authors may include names and affiliations in their submissions. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference.
Submit papers and poster abstracts using EasyChair: http://www.easychair.org/conferences/?conf=vizsec2015
All deadlines are 5:00 PM PST
- August 1, 2015:
- Submission for Papers
- September 5, 2015
- Author Notification for Papers
- September 19, 2015
- Camera Ready Submission and Copyright Forms for Papers
- September 19, 2015
- Abstract Submission for Posters
- September 26, 2015
- Author Notification for Poster