The Tower of Babel
STAST2014
4th Workshop on Socio-Technical Aspects in Security and Trust
Vienna Technical University, Vienna, Austria

Co-located with
27th IEEE Computer Security Foundations Symposium (CSF)
in the Vienna Summer of Logic 2014
Vienna Summer of Logic 2014

Important Dates

    Papers due:
    20 April 2014
    30 April 2014 (extended)
  • Notification:
    31 May 2014
  • Pre-proceeding version due:
    6 July 2014
  • Final version due:
    27 July 2014
    (after the workshop)
  • Workshop:
    18 July 2014

Previous Editions

STAST 2011:
stast2011.uni.lu

STAST 2012:
stast2012.uni.lu

STAST 2013:
stast2013.uni.lu

STAST 2015:
stast2015.uni.lu

Supported by

SnT

SnT

UNICT

DTU

DMU

Proceedings

Proc. of 4th Int. Worshop on Socio-Technical Aspects in Security and Trust (STAST)

G. Bella and G. Lenzini (eds.), IEEE, 2014
are now available at IEEEXplore digital library
IEEE Catalogue Number CFP1470P-ART (ISBN-13: 978-1-4799-7901-1)

Motivation

Today, security threats are hardly sheer technical. They are rather socio-technical threats and come from adversaries who combine social engineering practices with technical skills to circumvent the defenses of information systems. Socio-technical attacks often succeed by exploiting the users' ill-understanding of security mechanisms or loopholes in poorly designed user interfaces and unclear security policies. In securing systems against these threats, humans obviously cannot be treated as machines. Humans have peculiar decision making. But their actions and behavioural patterns, despite apparently irrational, are perfectly justifiable from a cognitive and a social perspective. Computer security hence appears to acquire more and more the facets of an interdisciplinary science with roots in both interpretive and positivist research traditions.

Goals

The workshop intends to foster an interdisciplinary discussion on how to model and analyse the socio-technical aspects of modern security systems and on how to protect such systems from socio-technical threats and attacks. It aims to stimulate an active exchange of ideas and experiences from different communities of researchers in order to identify weaknesses potentially emerging from poor usability designs and policies, from social engineering, and from deficiencies hidden in flawed interfaces and implementations. It will bring together experts in computer security and in cognitive, social, and behavioral sciences; it will collect the state of the art, identify open and emerging problems, and propose future research directions.

Duration

STAST2014 is a one day workshop.

Acknowledgement

Supported by the National Research Fund Luxembourg C11/IS1183245/STAST.