Questions? For any questions or problems feel free to contact:
Scott Campbell [email protected]
Aashish Sharma [email protected]
Mine Altunay, Fermi National Accelerator Laboratory
Galen Wesley Arnold, National Center for Supercomputing Applications
David Bailey, Lawrence Berkeley National Lab
RuthAnne Bevier, Caltech
Scott Campbell, National Energy Research Scientific Computing Center
Carrie Gates, CA Technologies
Bill Kramer, National Center for Supercomputing Applications
Alex Malin, Los Alamos National Lab
Jim Marsteller, Pittsburgh Supercomputing Center
Jim Mellander, National Energy Research Scientific Computing Center
Sean Peisert, University of California Davis
Gene Rackow, Argonne National Lab
Aashish Sharma, Lawrence Berkeley National Lab
Robin Sommer, International Computer Science Institute
Von Welch, Indiana University
Changing Landscapes in HPC Security 2013 Call For Papers
Co-located with ACM HPDC 2013
New York City, NY, USA -- June 17-21th, 2013
Paper submission: February 25th, 2013
Workshop: June 18, 2013
Providing effective and non-intrusive security within a HPC environment provides a number of challenges for both researchers and operational personnel. What constitutes HPC has expanded to include cloud computing, 100G networking, cross-site integration, and web 2.0 based interfaces for job submission and reporting, increasing the complexity of the aggregate system dramatically. This growing complexity and it's new issues is set against a backdrop of routine user and application attacks, which remain surprisingly effective over time.
The CLHS workshop will focus on the problems inherent in securing contemporary large-scale compute and storage systems. To provide some clarification we have broken this out into four general areas or questions. First is Attribution: who is doing what in terms of process activity and/or network traffic? Second is looking beyond the interactive nodes: what is going on in the computing pool? Third involves job scheduler activity and usage: what is being run, how has it is been submitted and is this activity abnormal? Finally a more philosophical topic of why securing complex systems is so difficult and what can be done about it. While these specific areas are interesting starting points for papers and presentations, any original and interesting topic will be considered. For a complete list of information relating to paper submission details, please see the Paper Submission Details section.Submission Tracks: This year there will be two separate tracks for paper submission. Authors of submitted papers will specify which track they wish to submit their paper to.
Research Papers Track
Besides the general class of problems described in the overview, the following should be considered a set of example topics that we are looking for in the research section track.
- Accounting and Audit
- Cloud Security
- Data and Application Security
- Data/System Integrity
- Database Security
- Identity Management
- Intrusion and Attack Detection
- Intrusion and Attack Response
- Secure Networking
- Secure System Design
- Security Monitoring & Management
- Security in Untrusted & Adversarial Environments and Systems
- Security of Grid and Cluster Architectures
- Security Visualization
Please note that these example topics are in the context of the unique set of problems and difficulties within the HPC space. We will ask participants in the research paper track to add a section describing in some detail their ongoing and future data needs. This is principally to help researchers articulate the details of their data oriented needs as well as improving communications between data generators and consumers.
State of the Practice
For the State of of the Practice papers, the focus will be on the resolution of specific issues - ideally those identified in the Overview section, but really any significant problem which is endemic to the HPC domain. Within the paper an explanation and exploration of the issue, resolution description and a numerical analysis showing that the proposed issue resolution was successful. Like in the Research Papers track, it would be desirable to add a section on data resources that might be available to researchers - either individually or in larger sets.
The final section track will be a combined lightning round and data exchange where workshop participants can share short presentations on interesting but incomplete works as well as describe what data they have to share or need. For this there will be no need to sign up ahead of time. As time allows, additional discussions can be arranged.