Call for Research Papers

** View This Year's Accepted Papers Here **

The tenth Symposium on Electronic Crime Research (eCrime) 2015 once again will be held in conjunction with the 2015 APWG General Meeting and the fifth eCrime Sync-up between May 26-29, 2015 in Caixa Forum, in Barcelona, Spain.

eCrime 2015 consists of 4 days of keynote presentations, technical and practical sessions and interactive panels, which will allow academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.

This time the main topic of the conference will be “Mobile Devices Security”, since Barcelona is the Mobile World Capital. Topics of interests include (but are not limited to):

  • Case studies of current attack methods, including intrusion, phishing, smishing, malware, rogue antivirus, pharming, crimeware, botnets, and emerging threats to mobile devices.
  • Case studies of online advertising fraud, including click fraud, malvertising, cookie stuffing, and affiliate fraud, as well as mobile App privacy risks prevention.
  • Case studies of large-scale take-downs, such as coordinated botnet disruption
  • Technical, legal, political, social and psychological aspects of fraud and fraud prevention
  • Economics of online crime, including measurement studies of underground economies and models of e-crime, social engineering linked to use of mobile devices as first or second authentication factor.
  • Applied Innovations in the use of authentication systems in eBanking and other sectors: biometry, soft and hard-token devices as mobile phones, tablets and others. Privacy aware mobile authentication and mobile identity management, BYOD security, mobile device management, encryption, etc.
  • Uncovering and disrupting online criminal collaboration and gangs
  • Financial infrastructure of e-crime, including payment processing and money laundering, and the impact of increasing success of mobile payment methods.
  • Techniques to assess the risks and yields of attacks and the effectiveness of countermeasures. Metrics standards and conventions in the establishment of tests of efficacy.
  • Delivery techniques, including DNS manipulation, mobile App, spam, voice mail, social network and web browser search manipulation, specific mobile devices security hardening; and countermeasures
  • Techniques to avoid detection, tracking and take-down; and ways to block such techniques
  • Mobile malware and mobile infrastructure security configuration and best practices to improve security and prevent infection.
  • Mobile devices forensic analysis tools.
  • Best practices for detecting and avoiding damages to critical internet infrastructure, such as DNS and SCADA, from electronic crime activities, including mobile phone infrastructure.

Accepted papers will be published in proceedings with IEEE. In addition, cash awards will be given for the best paper overall and the best student co-authored paper. A limited number of cash travel awards will also be made to student authors of papers and posters.

Instructions for Authors
eCrime has adopted the IEEE publication format. Submissions should be in English, in PDF format with all fonts embedded, formatted using the the IEEE conference template, found here: Submissions should include author names, affiliations and acknowledgments. They should not exceed 12 letter-sized pages, not counting the bibliography and appendices. Papers should begin with a title, abstract, and an introduction that clearly summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Papers should contain a scholarly exposition of ideas, techniques, and results, including motivation, relevance to practical applications, and a clear comparison with related work. Committee members are not required to read appendices, and papers should be intelligible without them. Submitted papers risk being rejected without consideration of their merits if they do not follow all the above guidelines. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings.

Authors will be asked to indicate whether their submissions should be considered for the best student paper award; any paper co-authored by a full-time student is eligible for this award.

Authors of accepted papers must guarantee that their paper will be presented at the conference. A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are given priority to receive such assistance. Requests for stipends should be addressed to the general chair after March 13.

Full papers have to be submitted via easychair: First, papers have to be registered, then authors can upload their papers. A successful submission can be viewed in EasyChair, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.

Case Studies
A special category is available in the paper submission system for Case Studies. This category allows for industrial research and case studies that do not qualify as full academic papers. Note though that papers submitted to this category are highly technical. For consideration in this category please submit your case study via easychair: First, Case Studies have to be registered, then authors can upload their papers. A successful submission can be viewed in EasyChair, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.

Important Dates: (11:59pm US EDT)
    Full Papers and Case Studies registration and submission due: January 30, 2015
    Paper Notifications due: February 13, 2015
    Camera ready due: March 13, 2015
    Conference: May 26-29, 2015

Organizing Committee General Chair: Manel Medina, esCERT-inLab-UPC, APWG.EU

Program Co-Chairs Paul Watters, Massey University, New Zealand
Jordi Aguilà Vila, CaixaBank, APWG.EU

Technical Program Committee Wes Young, REN-ISAC
Jeff Murphy, REN-ISAC
Brad Wardman, PayPal
Debin Liu, PayPal
Ani Das, FireEye
Richard Clayton, Cambridge
Jetzabel Serna, Goethe University
Robert Layton, Federation University
Stephen McCombie, RSA
Simon Brown, Westpac
Peter Pilley, Department of Internal Affairs, New Zealand
Alex Tilley, Australian Federal Police
Paul Black, Phishlabs
Jart Armin, CyberDefcon
Alice Hutchings, Univ. of Cambridge
David Watson, The Shadowserver Foundation
Raul Chiesa, Security Brokers
Erno Jeges, SEARCH-LAB / Secure Coding Academy
Giovane Moura, Delft University of Technology
Przemek Jaroszewski, CERT Polska (
Rainer Link, Trend Micro
Giorgio Giacinto, University of Cagliari
Peter Kieseberg, SBA Research
Christine Bejerasco, F-Secure Corporation
Edgardo Montes De Oca, Montimage
Madhusudhanan Chandrasekaran, Amazon
Eric Davis, Google
Saeed Abu-Mimeh, Seclytics
Michael Hausding, SWITCH

Publications Chair

Ani Das, FireEye

Orgnization Arrangements Chairs

Jart Armin, Cyberdefcon
Alejandro Fernández-Cernuda, CaixaBank



Verisign Inc




Advanced Center for Cyber Defence