The second workshop on Cyber Range Technologies and Applications (CACOE) will be organized in conjunction with IEEE EuroS&P 2021. The workshop will be held on September 7, 2021 in Vienna, Austria.
Call For Papers
The Cyber Range Technologies and Applications (CACOE) workshop aims to bring together researchers advancing, developing and maintaining cyber ranges (e.g., cyber-physical labs, clouds and other virtual platforms) supporting cyber security training, tests and exercises. Cyber ranges have emerged as a response to the need of high-fidelity environments for testing, training, exercising capabilities related to cyber security. They are typically based on virtualization technology and are used to set up complex computer networks, simulate events, and observe phenomena in a controlled environment. However, to set up realistic tests, training or exercises in a cyber range is often difficult, expensive and error prone. It can be seen as system administration on steroids, where a few range engineers are to rapidly build and manage networks of the size that it typically takes a whole IT department to manage. There are many issues related to technical support tools (e.g. deployment of virtual machines) that are yet to be solved and many management issues (e.g. of event data management) that are to be solved. Furthermore, the application of cyber ranges to tests, training, and exercises is relatively new. Methodologies for constructing large events, standards for experiments, and the utility of cyber ranges to different applications is largely unknown.
Aim & Scope
The aim of the workshop is to exchange and discuss technologies and infrastructures required to simulate real systems with cyber incidents (e.g., simulation of benign or malicious users, evaluation frameworks, capability measurement). This includes experiences from using such technologies, e.g. for exercises and tests. The workshop will not focus on product presentations, feature presentations nor marketing of various technical infrastructures for cyber security training and exercises.
We invite papers from researchers and practitioners working in security, systems engineering, situational awareness and related areas to submit their original papers to this workshop. Case studies (successful or not) related to cyber ranges are also encouraged.
Topics of interest include, but are not limited to:
- Design of large-scale exercises
- Design of experiments
- Analysis/reviews/tests of tools and components for building large technical infrastructures
- Automated machine configuration and deployment
- Event and scenario management
- Simulation of benign or malicious users
- Event monitoring and evaluation
- Data management
- Event operating environments and scenarios modelling
- Metrics and maturity levels
- Measurements of training effects and capabilities
- Applications to test cyber security properties
- Human factors in training and exercises
- Software as a Service (SaaS) solutions
- Security and privacy challenges
- Simulation of tools and components from various systems (e.g., industrial control systems, cyber-physical systems, legacy systems, etc.)
Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.
Page Limit and Formatting
Papers must not exceed 10 pages total (including the references and appendices). Papers must be typeset in LaTeX in A4 format (not “US Letter”) using the IEEE conference proceeding template. We suggest you first compile the supplied LaTeX source as is, checking that you obtain the same PDF as the one supplied, and then write your paper into the LaTeX template, replacing the boilerplate text. Please do not use other IEEE templates. Failure to adhere to the page limit and formatting requirements can be grounds for rejection.
All submissions must be original work. Plagiarism (whether of others
or self) will be grounds for rejection. The submitter must clearly
document any overlap with previously published or simultaneously
submitted papers from any of the authors. Failure to point out and
explain overlap will be grounds for rejection. Simultaneous submission
of the same paper to another venue with proceedings or a journal is not
allowed and will be grounds for automatic rejection. Submitting multiple
distinct papers is of course allowed.
Papers must be submitted at EasyChair and may be updated at any time until the submission deadline expires.
Please upload your submissions to EasyChair (To be determined).
Publication and Presentation
Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference. Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without review.