International Workshop on Incident Management, Trusted Computing, and Advanced Security Attacks to be held in conjunction with the 19th International Conference on Availability, Reliability and Security
Security incidents and attacks are becoming increasingly complex nowadays, requiring deep technical knowledge in several areas (including cybersecurity attacks, machine learning algorithms, and risk management) for their detection, handling, and analysis, and efficient tools for fast reaction. While traditional approaches are currently in use to detect and counter the security attacks (including firewalls, intrusion detection systems), with the advent of Artificial Intelligence (AI) models and trusted computing standards, other innovative solutions can be further designed and deployed to detect, investigate, and respond to cybersecurity incidents in as little time as possible.
Another controversial issue is how openness can be consistent with, and respectful of, the protection of industrial secrets and intellectual property rights. While IT manufacturing should endorse transparency and trust verification, it is also necessary to guarantee that innovators exploit the result of their creations. In the current technological scenario it is also necessary to take into account the risks associated to software and hardware supply chains, and the benefits of promoting openness in software and hardware manufacturing to better contained those risks.
The aim of the workshop is to gather contributions of leading-edge researchers from network and information security, as well as artificial intelligence, both academia and industry, working on the detection and countermeasures of cyberattacks. The workshop will also tackle the latest developments in open hardware applications for cybersecurity and privacy protection. The aim is to see to what extent openness as a principle can contribute to improve standards and the security evaluation and certification of IT products, evaluating also the compliance with the EU Cyber Resilience Act and the EU cybersecurity certification framework.
The workshop aims to provide a forum of discussion about: a) discovery of (advanced) cybersecurity attacks exploiting both technical and non-technical means; b) exploitation of trusted computing techniques and standards to counter attacks, e.g., by using the Trusted Platform Module (TPM) 2.0, or alternative standards like DICE (Device Identifier Composition Engine) or MARS (Measurement and Attestation RootS) that are more flexible and suitable for different platforms; c) design and development of innovative solutions for incident management, required by incident response teams and security operation centers; d) machine learning algorithms for security attacks detection; e) cyber-risks associated to hardware supply chains and the relevance of open hardware as a means to reduce those risks; e) guidelines, recommendations, procedures for security risk management.