Page tree
Viewable by the world
Skip to end of metadata
Go to start of metadata

Submission Link:

Questions?  For any questions or problems feel free to contact:

    Scott Campbell

    Aashish Sharma



Program Committee

Mine Altunay, Fermi National Accelerator Laboratory

Galen Wesley Arnold, National Center for Supercomputing Applications

David Bailey, Lawrence Berkeley National Lab

RuthAnne Bevier, Caltech

Scott Campbell, National Energy Research Scientific Computing Center

Carrie Gates, CA Technologies

Bill Kramer, National Center for Supercomputing Applications

Alex Malin, Los Alamos National Lab

Jim Marsteller, Pittsburgh Supercomputing Center

Jim Mellander, National Energy Research Scientific Computing Center

Sean Peisert, University of California Davis

Gene Rackow, Argonne National Lab

Aashish Sharma, Lawrence Berkeley National Lab

Robin Sommer, International Computer Science Institute

Von Welch, Indiana University

Changing Landscapes in HPC Security 2013 Call For Papers

Co-located with ACM HPDC 2013
New York City, NY, USA -- June 17-21th, 2013

Important Dates

  Paper submission: February 25th, 2013

Workshop: June 18, 2013

Providing effective and non-intrusive security within a HPC environment provides a number of challenges for both researchers and operational personnel.  What constitutes HPC has expanded to include cloud computing, 100G networking, cross-site integration, and web 2.0 based interfaces for job submission and reporting, increasing the complexity of the aggregate system dramatically.  This growing complexity and it's new issues is set against a backdrop of routine user and application attacks, which remain surprisingly effective over time.

The CLHS workshop will focus on the problems inherent in securing contemporary large-scale compute and storage systems.  To provide some clarification we have broken this out into four general areas or questions.  First is Attribution: who is doing what in terms of process activity and/or network traffic?  Second is looking beyond the interactive nodes: what is going on in the computing pool?  Third involves job scheduler activity and usage: what is being run, how has it is been submitted and is this activity abnormal?  Finally a more philosophical topic of why securing complex systems is so difficult and what can be done about it.  While these specific areas are interesting starting points for papers and presentations, any original and interesting topic will be considered.  For a complete list of information relating to paper submission details, please see the Paper Submission Details section.

Submission Tracks: This year there will be two separate tracks for paper submission. Authors of submitted papers will specify which track they wish to submit their paper to.

Research Papers Track

Besides the general class of problems described in the overview, the following should be considered a set of example topics that we are looking for in the research section track.

    • Accounting and Audit
    • Authentication
    • Cloud Security
    • Data and Application Security
    • Data/System Integrity
    • Database Security
    • Identity Management
    • Intrusion and Attack Detection
    • Intrusion and Attack Response
    • Secure Networking
    • Secure System Design
    • Security Monitoring & Management
    • Security in Untrusted & Adversarial Environments and Systems
    • Security of Grid and Cluster Architectures
    • Security Visualization

Please note that these example topics are in the context of the unique set of problems and difficulties within the HPC space.  We will ask participants in the research paper track to add a section describing in some detail their ongoing and future data needs.  This is principally to help researchers articulate the details of their data oriented needs as well as improving communications between data generators and consumers.

State of the Practice

For the State of of the Practice papers, the focus will be on the resolution of specific issues - ideally those identified in the Overview section, but really any significant problem which is endemic to the HPC domain.  Within the paper an explanation and exploration of the issue, resolution description and a numerical analysis showing that the proposed issue resolution was successful.  Like in the Research Papers track, it would be desirable to add a section on data resources that might be available to researchers - either individually or in larger sets.

Lightning Round!

The final section track will be a combined lightning round and data exchange where workshop participants can share short presentations on interesting but incomplete works as well as describe what data they have to share or need.  For this there will be no need to sign up ahead of time.  As time allows, additional discussions can be arranged.


  • No labels