*** 6th ACM Workshop on Artificial Intelligence and Security *** https://sites.google.com/site/ccsaisec2013/home Held in Conjunction with ACM CCS 2013 November 4, 2013 -- Berlin Congress Centre, Berlin, Germany *** Extended Deadline *** Paper submissions due: July 29, 2013 (23:59 PDT) Acceptance notification: August 21, 2013 Camera ready due: August 30, 2013 Workshop: November 4, 2013 *** Call for Papers *** The potential for applying artificial intelligence (AI), machine learning, and data mining to security and privacy problems is ever-more lucrative. The analytic tools and intelligent behavior provided by these techniques makes AI and learning increasingly important for autonoumous real-time analysis and decision-making in domains with a wealth of data or that require quick reactions to ever-changing situations. Particularly, these intelligent technologies offer new solutions to security problems involving Big Data analysis, which can be scaled through cloud-computing. Further, the use of learning methods in security-sensitive domains creates new frontiers for security research, in which adversaries may attempt to mislead or evade intelligent machines. The 2013 ACM Workshop on Artificial Intelligence and Security (AISec) provides a venue for presenting and discussing new developments in this fusion of security/privacy with AI and machine learning. We invite original research papers describing the use of AI or machine learning in security, privacy and related problems. We also invite position and open problem papers discussing the role of AI or machine learning in security and privacy. Submitted papers of these types may not substantially overlap papers that have been published previously or that are simultaneously submitted to a journal or conference/workshop proceedings. Finally we again welcome a 'systematization of knowledge' category of papers, which should distill the AI or machine learning contributions of a previously published series of security papers. Regular research, systematization of knowledge, and open/position paper submissions must be at most 10 pages in double-column ACM format (note: pages must be numbered) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read the appendices, so the paper should be intelligible without them. Submissions need not be anonymized. We recommend the use of the ACM SIG Proceedings templates for submissions. The ACM format is the required template for the camera-ready version. Accepted papers will be published by the ACM Digital Library and/or ACM Press. Submissions can be made through EasyChair at: https://www.easychair.org/conferences/?conf=aisec2013 Topics of interest include, but are not limited to: ** Theoretical topics related to security ** * Adversarial Learning * Robust Statistics * Online Learning * Learning in stochastic games ** Security applications ** * Computer Forensics * Spam detection * Phishing detection and prevention * Botnet detection * Intrusion detection and response * Malware identification * Authorship Identification * Big data analytics for security ** Security-related AI problems ** * Distributed inference and decision making for security * Secure multiparty computation and cryptographic approaches * Privacy-preserving data mining * Adaptive side-channel attacks * Design and analysis of CAPTCHAs * AI approaches to trust and reputation * Vulnerability testing through intelligent probing (e.g. fuzzing) * Content-driven security policy management & access control * Techniques and methods for generating training and test sets * Anomalous behavior detection (e.g. fraud prevention, authentication) *** Organization *** General Chair: Ahmad-Reza Sadeghi, TU Darmstadt; CASED; Fraunhofer SIT; Intel ICRI-SC Program Co-Chairs: Blaine Nelson, University of Potsdam Christos Dimitrakakis, EPFL Elaine Shi, University of Maryland, College Park Program Committee Battista Biggio, University of Cagliari Ulf Brefeld, Technische Universität Darmstadt Michael Brückner, SoundCloud Inc. Mike Burmester, Florida State University Alvaro A. Cárdenas, University of Texas at Dallas Mario Frank, University of California, Berkeley Rachel Greenstadt, Drexel University Guofei Gu, Texas A&M University Ling Huang, Intel Labs Anthony Joseph, University of California, Berkeley Ari Juels, RSA Labs Pavel Laskov, University of Tübingen Daniel Lowd, University of Oregon Pratyusa Manadhata, HP Labs Aikaterini Mitrokotsa, HESSO-GE Roberto Perdisci, University of Georgia Vasyl Pihur, Google Inc. Konrad Rieck, University of Göttingen Fabio Roli, University of Cagliari Benjamin I. P. Rubinstein, IBM Research Robin Sommer, ICSI and LBNL Nina Taft, Technicolor J. D. Tygar, University of California, Berkeley Shobha Venkataraman, AT&T Research Ting-Fang Yen, RSA Labs -- Prof. Dr. Konrad Rieck Computer Security Group, University of Göttingen http://www.sec.cs.uni-goettingen.de