Call for Research Papers

event logo The thirteenth Symposium on Electronic Crime Research (eCrime 2018) will be held between May 15th - 17th 2018 in San Diego, CA.

eCrime 2018 consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.

This conference has two publication tracks to help attract research covering applied, industrial cybercrime research as well as applied and/or theoretical cybercrime academic research. To further strengthen the confidence in each track, there have been two managing chairs and committees appointed for reviewing and selecting papers for each track of the cybercrime conference.

The conference offers travel grants to students who are having issues finding the funding to attend the conference. Note that there is a set final date for requesting the stipend so please get your requests in as soon as possible after hearing back about your paper’s acceptance. eCrime 2018 also has a best paper and runner-up award that is accompanied by a cash reward for the top papers submitted to the academic track only.

Important Dates:     Full Papers registration and submission due: March 16 2018 12am EDT (Thursday 15 Mar 2018 8pm PST
    Paper Notifications due: March 30th, 2018
    Request for a stipend: April 1st, 2018
    Camera ready due: May 1st, 2018
    Conference: May 15th-17th, 2018

Academic Track Topics of interests include (but are not limited to):

  • Economics of online crime
    • Measurement studies of underground economies
    • Models of e-crime
    • Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
    • Uncovering and disrupting online criminal collaboration and gangs
  • Security-related risk assessments
    • The risks and yields of attacks
    • Effectiveness of countermeasures
    • Metrics standards
    • Conventions in the establishment of tests of efficacy
  • Attack delivery strategies and countermeasures
    • Spam
    • DNS
    • Mobile Apps
    • Social engineering
    • Instant messaging
    • Web browser search manipulation
  • Malware
    • Detection
    • Identification of malware families
    • Polymorphic malware detection
    • Mobile malware
    • Ransomeware
    • Techniques to circumvent detection and sandboxes
  • Public Policy and Law
    • Cross-border and public-private law enforcement collaboration
    • Tension between cybercrime investigation and data privacy regulations (e.g., impact of GDPR on anti-abuse)
    • Legal and policy issues involving anti-abuse and counter-cybercrime efforts
    • Economic and incentive issues involving cybercrime
  • Security assessments of the mobile devices
    • Mobile App stores and ecosystems
    • Mobile App privacy
    • Risk prevention issues
  • User psychology / cognition / awareness
    • UI / UX architectures and their contributions to cybercrime suppression and cybercrime success
    • ICT user resilience / susceptibility to cybercrime
    • Measurement of user experiences before and during cybercrime events
    • Psychological and cognitive aspects of deception techniques delivered via ICT
    • Socio-Technical analyses of security incidents
    • Cognitive psychology of security, risk and trust and their influence on human behavior before and during cybercrime events
    • Awareness messaging/training/testing and efficacy measured by all relevant dimensions (e.g. longevity, applicability across exposures, etc.)
  • Financial infrastructure of e-crime
    • Criminal payment processing options
    • Money laundering strategies
    • Use of crypto-currencies
    • Underground marketplaces
  • Crypto Currency and Cybercrime Tools and Responses
    • Hardware devices to protect encryption keys
    • Protections for multisig wallets, failures, new ideas
    • Management and protection of cold storage wallets
    • Anti-Phishing protections for crypto currencies
    • Browser plug-ins
    • Out of band authentication for transactions
    • Multi-party authentication concepts
  • Technical, legal, political, social and psychological aspects of fraud and fraud prevention

Industrial Track Topics of interests include (but are not limited to):

  • Case studies of current attack methods
    • System and network intrusions
    • Phishing
    • Malware (rogue antivirus, botnets, ransomware, etc…)
    • Spam
    • Pharming
    • Crimeware toolkits
    • Emerging threats to mobile devices
  • Open source intelligence
    • Data collection and correlation
    • Strategies and tools
  • Case studies of online advertising fraud
    • Click fraud
    • Malvertising
    • Cookie stuffing
    • Affiliate fraud
  • Case studies of large-scale take-downs
    • Coordinated botnet disruption
    • Phishing takedown
    • Bullet proof hosting services
  • Economics of online crime
    • Measurement studies of underground economies
    • Models of e-crime
    • Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
  • Uncovering and disrupting online criminal collaboration and gangs
  • Longitudinal study of eCrime related activities and their evolutions
  • Security assessments of the mobile devices
    • Mobile App stores and ecosystems
    • Mobile malware
    • Mobile App privacy
  • Risk prevention issues
    • Security-related risk assessments
    • The risks and yields of attacks
    • Effectiveness of countermeasures
    • Metrics standards
    • Conventions in the establishment of tests of efficacy

Papers accepted in the Research and Industry Tracks will be indexed by IEEE and included in IEEEXplore http://ieeexplore.ieee.org/. In addition, cash awards will be given for the best paper overall and the best student co-authored paper. A limited number of cash travel awards will also be made to student authors of papers and posters.

Instructions for Authors: Research and Industry Tracks

eCrime has adopted the IEEE publication format. Submissions should be in English, in PDF format with all fonts embedded, formatted using the the IEEE conference template, found here: http://www.ieee.org/conferences_events/conferences/publishing/templates.html. Submissions should include author names, affiliations and acknowledgments. They should not exceed 12 letter-sized pages, not counting the bibliography and appendices. Papers should begin with a title, abstract, and an introduction that clearly summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Papers should contain a scholarly exposition of ideas, techniques, and results, including motivation, relevance to practical applications, and a clear comparison with related work. Committee members are not required to read appendices, and papers should be intelligible without them. Submitted papers risk being rejected without consideration of their merits if they do not follow all the above guidelines. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings.

Authors will be asked to indicate whether their submissions should be considered for the best student paper award; any paper co-authored by a full-time student is eligible for this award.

Authors of accepted papers must guarantee that their paper will be presented at the conference. A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are given priority to receive such assistance. Requests for stipends should be addressed to the general chair after April 1st.

For paper submissions in 2018 please register an account then use the New Submission option at https://ecrime18.hotcrp.com/.


Organizing Committee

General Chair: Brad Wardman, PayPal

Academic Track PC Chairs:
Gianluca Stringhini, University College London
Nick Nikiforakis, Stony Brook University

Industry Track PC Chair:
Xuan Zhao, Cylance

Academic Track Program Committee:
Sadia Afroz, ICSI
Luca Allodi, TU Eindhoven
Manos Antonakakis, Georgia Tech
Marco Balduzzi, Trendmicro
Juan Caballero, IMDEA
Jeremy Clark, Concordia University
Adam Doupe, ASU
Shuang Hao, UT Dallas
Alice Hutchings, University of Cambridge
Chris Kanich, UIC
Alexandros Kapravelos, NCST
Engin Kirda, Northeastern
Nektarios Leontiadis, Facebook
Pierre Laperdrix, Stony Brook University
Kirill Levchenko, UCSD
Federico Maggi, Trendmicro
Damon McCoy, NYU
Tyler Moore, University of Tulsa
Jason Polakis, University of Illinois at Chicago
Peter Snyder, UIC
Guillermo Suarez-Tangil, UCL
Gang Wang, Virginia Tech
Ben Zhao, University of Chicago
Nataliia Bielova, Inria, France


Industry Track Program Committee:
Yu Cai, Michigan Technological University
Wei Ding, Amazon.com
Shibing Liu, Hyperloop One
Tongbo Luo, Palo Alto Networks
Mengfan Tang, Amazon.com
Brian Wallace, Cylance, Inc
Yunfeng Xi, DataVisor Inc
John Brock, Cylance, Inc
Holly Stewart, Microsoft, Inc
James Wan, Comcast
Shaohua Xiang, Shenzhen Technology University
Anirban Das, Samsung Research America

GOLD SPONSOR Verisign SILVER SPONSOR EasySolutions BRONZE SPONSOR Webroot Afilias BADGE SPONSOR BrandProtect PROGRAM PARTNERS IEEE Reboot Girls CUing Project STOP. THINK. CONNECT.