The 2024 Symposium on Electronic Crime Research (eCrime 2024) examines the economic foundations, behavioral elements, technological exposures, policy aspects and other dimensions that fuel the burgeoning global, multi-billion-dollar cybercrime plexus, at its 19th annual eCrime symposium on September 24 – 26, 2024 in Boston, Massachusetts, USA.
APWG sponsoring members can register for NO CHARGE using a members code (i.e. Premium: 3 per; Sponsor: 2 per; Corporate & Corporate Individual levels: 1 per). Member codes will be distributed to APWG members via the members discussion list. Discount ticket codes are also available for unsubsidized university researchers, government personnel and law enforcement personnel. Delegates from those organizations can contact the event organizers at apwg_events@apwg.org.
eCrime Venue: Bunker Hill Holiday Inn
Students requiring discounts should contact symposium managers at apwg_events@apwg.org
The symposium’s proceedings are in English.
Please contact the APWG eCrime organizers for details via email at apwg_events@apwg.org.
Discount codes are also available for university researchers, government personnel and law enforcement professionals from pubic-sector agencies.
Plenary Keynote
![](https://s29837.pcdn.co/wp-content/uploads/2024/02/bruce_scheier.png)
Keynote address: Bruce Schneier, Berkman-Klein Center for Internet and Society at Harvard University — AI: How It Will Affect Crime, Law Enforcement, and the Judiciary
SESSION: AICrime Machine Combat at the Cybercrime Frontier
Research Talk: Aditya K Sood, VP of Security Engineering and AI Strategy, Aryaka — Anatomizing the Growing Threat Attacks on the AI Ecosystem
Operations Talk: April Lorenzen, Dissect Cyber — Squeezing Quality Phish Classification from a Truculent LLM
Accepted research papers: TBA
SESSION: Human Factors in Evolution of Electronic Crime & AICrime
PANEL DISCUSSION: Artificial Intelligence and the Human Element of Cybercrime
Benoit Dupont, Université de Montréal
Michael Joyce, Executive Director at the Human-Centric Cybersecurity Partnership
TBA
Operations Talk: Righard Zwienenberg, ESET — Telekopye: Professional Scamming by Putting a Mammoth in a Chamber Full of Neanderthals’ Secrets
Accepted research papers: TBA
SESSION: Hygienic Practices for Maintaining Internet and Enterprise Infrastructure
Operations Talk: Vinzens Vogel, Robin Grunewald, SWITCH.ch — Minority Report and Robocop: Fighting Abuse at Infrastructure Edges and Policy Frontiers in the Lifecycle of .ch Domains
Industry Talk: Aditi Gupta & Yue Want, Netflix — Decoding Fraud: The Evolution and Impact of Netflix’s Fraud Metrics
Accepted research papers: TBA
SESSION: Cybercrime Attack and Defence Architectural Shifts Attendant Telephone-Based Phishing
PANEL I: THE SHIFT IN PHISHING ATTACK ARCHITECTURES
Covers lure and hook architectures – as well as novel, hardware-specific attack schemes that are exposures native to wireless devices.
John Wilson, FORTRA
Matt Harris, OpSec
Cici Ling, Indiana University
Erich Kron, KnowBe4
TBA
PANEL II: DATA EXCHANGE STORY BEHIND ARCHIVING SMS/TEXT ATTACK DATA
Uniquely informed panel examines the challenges and field decisions of operations personnel charged with archiving machine event data and data exhaust related to telephone based phishign attacks.
Muhammad Lutfor Rahman, CSU San Marcos . Smishtank
Daniel Timko, CSU San Marcos . Smishtank
Carlos Ramirez, APWG Engineering
TBA
Accepted research papers: TBA
Friday, September 27 – eCrime Measurement, Risk and Policy Roundtables @ Tufts University
![](https://s29837.pcdn.co/wp-content/uploads/2024/07/round_tables_eCriime_2024-1024x419.png)
Following the APWG eCrime 2024 conference, APWG and Tufts University will be convening the inaugural eCrime Measurement, Risk and Policy Roundtables on Securing Digital Society at Tufts University’s Joyce Cummings Center (JCC) on Friday, September 27, 2024.
Policy and Research Roundtables: How Can Polities Tackle Cybercrime, Through Rigorous Research and Evidence-Based Policy?
Information and cybersecurity has been the topic in the boardroom and policy circles for multiple years now. Outages regularly make the news, as failures of popular services can impact on hundreds of organizations and millions of people.
Yet, while some discussions are happening around the issues of cybercrime and abuse, little is improving at any scale. Cryptoscams are legion on YouTube, TikTok, and Twitter, attempts to compromise Business Email are regularly successful, phishing sites are everywhere, and fraudulent spam clogs mailboxes — even if technical measures are deployed.
The eCrime Measurement, Risk and Policy Roundtables on Securing Digital Society shall engage the public policy gaps that must be addressed to make those common abuses that plague Internet infrastructure manageable at scale. These are policy deficits that the private sector has, to date, indicated it lacks the power, imagination or motivation to grasp constructively, to our common peril.
Some key issues demand technical expertise and operations-level mitigations, and these aspects of criminal schemes are thus relegated to disciplines of computer science, engineering, economics, and criminology. Yet, many if not most other key issues pertain directly or partially to governance and the international system: for example, it is an open secret that many profit-oriented cybercrime groups are shielded if not supported by governments who benefit from extracting value from “Western” consumers, transferring funds and weakening their economic and political systems.
It has become, therefore, increasingly clear to both sides of the operations and policy divide that the strongest solutions to common infrastructure abuses are operational best practices steeled by directly relevant policy. eCrime Measurement, Risk and Policy Roundtables on Securing Digital Society will work to identify those opportunities in securing shared Internet infrastructure from common abuses that can be most enduringly animated by the contemporaneous application of policy and operational conventions.
This first installment of the policy roundtables shall lay the groundwork for future discussions and work products that may have an impact on governments, companies, and — most importantly — people. What questions need to be resolved to make progress, what issues need to be clarified and discussed, what “work products” would lead to interest and change in corporate and policy circles? In short, what are the levers to pull to stop criminal exploitation of the shared Internet infrastructure, and who and where need they to be pulled?
These policy roundtables shall bring together business and policy leaders, non-governmental and civil society organizations, law enforcement, empirical researchers, security specialists, and engineers in order for all these groups to consider what different stakeholders can do and provide to address the challenges of cybercrime and online abuse.
DRAFT AGENDA: Policy and Research Roundtables: How Can Polities Tackle Cybercrime, Through Rigorous Research and Evidence-Based Policy?
8:15-8:45 Registration / Coffees and Crusts
8:45-8:55 Prompt: What are the key gaps and issues we encountered and addressed this week in eCrime 2024’s discussions?
8:55-9:35 Discussion: What are the key gaps and issues we addressed this week?
9:35-9:40 Opener: How can these gaps be researched and measured with appropriate. domain-relevant rigor?
9:40-10:15 Discussion: How can these gaps be researched and measured with appropriate. domain-relevant rigor?
Break — 25 min
10:40-10:45 Opener: How can policy makers and industry address these issues and avoid/adroitly negotiate collisions?
11:45-11:20 Discussion: How can policy makers and companies address these issues?
11:20-12:00 What operational at risk management practices will devolve to sovereign law to organise and enforce as keystones to stable infrastructure maintenance upon which society depends?
12:00-13:30 Room stays open for discussions, coffees and crusts.
APWG eCrime 2024: the 19th Edition
APWG eCrime 2024 combines a peer-reviewed conference with general sessions open to industry, government, law enforcement and multilateral organizations, featuring keynote presentations from global thought-leaders, as well as technical and practical operationally focused sessions, and interactive panels. The objective of eCrime is to foster practical collaboration and the exchange of catalytic ideas by academic researchers, industry security practitioners, and law enforcement professionals in the global struggle against cybercrime.
IMPORTANT DATES:
Full Paper registration / submission due: July 7
Notification of acceptance: July 21
Conference: Sept 24-26
Camera-ready paper due: October 25
PAPERS´ TOPICS MAY INCLUDE BUT ARE NOT LIMITED TO:
Artificial Intelligence as criminal co-conspirator – and as defensive collaborator
Addressing challenges of cybercrime’s increasing complexity (e.g. digital infrastructures, crime-fighting/forensic techniques, and the structure of the crimes themselves)
Detecting and/or mitigating eCrime (e.g. online fraud, malware, phishing, ransomware, etc.)
Behavioral and psychosocial aspects of cybercrime victimization – and prevention
Measuring and modeling of cybercrime
Economics of cybercrime
Cybercrime payload delivery strategies and countermeasures (e.g. spam, mobile apps, social engineering, etc.)
Public Policy and Law for cybercrime
Cryptocurrency and related cybercrimes – and forensic tools and techniques for cryptocurrency related cybercrimes
Case studies of current cybercrime attack methods, (e.g. phishing, malware, rogue antivirus programs, pharming, crimeware, botnets, and emerging techniques)
Detecting/preventing abuse of internet infrastructure to neutralize cybercrimes
Detecting/isolating cybercrime gangs’ and attendant money laundering enterprises
Cybercrime’s evolution in specific verticals: (e.g. financial services, e-commerce, health, energy & supplies)
Cybercriminal cloaking techniques – and counter-cloaking tools and approaches
Design and evaluation of UI/UXs to neutralize fraud and enhance user security
AUTHORS’ GUIDANCE
eCrime has adopted the IEEE publication format. Submissions should be in English, in PDF format with all fonts embedded, and formatted using the IEEE conference template, which can be found at:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html.
Submissions should be anonymised, excluding author names, affiliations and acknowledgments. Authors’ own work should be referred to in the third person.
Paper should not exceed 12 letter-sized pages, excluding the bibliography and appendices.
Committee members are not required to read appendices, so ensure that the main paper is intelligible without them.
Submitted papers that do not adhere to all the above guidelines may be rejected without consideration of their merits.
Authors of accepted papers must present them and register at the event.
For paper submissions use the New Submission option at:
Authors will be asked to indicate whether they would like their submissions to be considered for the Best Student Paper Award. Any paper co-authored by a full-time student is eligible for this award.
Authors of accepted papers must guarantee that their paper will be presented at the conference. We understand that some authors may face difficulties in obtaining funding to attend the conference. Therefore, a limited number of stipends are available for those who are unable to secure funding. Students who will present their accepted papers themselves will be given priority in receiving such assistance.
ORGANIZING COMMITTEE
Program Chair
Ebrima Ceesay
Mastercard
General Chair
Laurin Weissinger
(Tufts University / Yale University)
Publications Chair
Miranda Bruce (University of Oxford)
PROGRAM COMMITTEE
Committee Member | Affiliation |
---|---|
Adam Oest | PayPal |
Suryadipta Majumdar | Concordia University |
Guy-Vincent Jordan | University of Ottawa |
Zhibo (Eric) Sun | Drexel University |
Paria Shirani | University of Ottawa |
Eireann Leverett | Concinnity Risks |
Jan-Willem Bullee | University of Twente |
Samaneh Tajali | ICANN |
Laurin Weissinger | Tufts University |
Jan-Willem Bullee | University of Twente |
Yi Ting Chua | University of Tulsa |
Sergio Pastrana | University Carlos III of Madrid |
Brad Wardman | Booz Allen Hamilton |
Alice Hutchings | University of Cambridge |
Daniel Thomas | University of Strathclyde |
Max Aliapoulios | Meta |
Miranda Bruce | University of Oxford |
Ebrima Ceesay | Mastercard |
Benoit Dupont | Universite de Montreal |
Andrew Morin | University of Tulsa |
Luca Allodi | Eindhoven University of Technology |
Marc Rivero | Universitat Ramon LLull |
Peter Cassidy | APWG |