CSF 2014 Call for Papers and Panels
27th IEEE Computer Security Foundations Symposium

July 19 - 22, 2014
Vienna University of Technology (TU Wien)
part of FLoC 2014 - Federated Logic Conference
part of VSL 2014 - Vienna Summer of Logic - http://vsl2014.at/


The Computer Security Foundations Symposium is an annual conference
for researchers in computer security. CSF seeks papers on foundational
aspects of computer security, e.g., formal security models,
relationships between security properties and defenses, principled
techniques and tools for design and analysis of security mechanisms, as
well as their application to practice. While CSF welcomes submissions
beyond the topics listed below, the main focus of CSF is foundational
security: submissions that lack foundational aspects risk rejection.

New results in computer security are welcome. Possible topics include,
but are not limited to: access control, accountability, anonymity,
authentication, critical infrastructure security, cryptography, data
and system integrity, database security, decidability and complexity,
distributed systems, electronic voting, executable content, formal
methods and verification, game theory and decision theory, hardware-
based security, humans and computer security, information flow,
intrusion detection, language-based security, network security, novel
insights on attacks, privacy, provenance, resource usage control,
security for mobile computing, security models, security protocols,
software security, socio-technical security, trust management, usable
security, web security.

Special Sessions (NEW)
We strongly encourage papers in three foundational areas of research
not traditionally represented at CSF:

  AI & SECURITY. (Chairs: Ariel Procaccia & Benjamin Rubinstein.)
  In recent years, a number of communities overlapping with AI---
  notably algorithmic economics and machine learning---have made
  significant forays into security & privacy. This session aims to
  collect theoretical viewpoints on security & privacy, particularly
  from researchers across diverse communities such as those
  identifying with AAAI/IJCAI, AAMAS, EC, WEIS, ICML, NIPS, COLT,
  STOC/FOCS, S&P, and CCS (including the AISEC workshop). Papers in
  the following areas intersecting with information security are
  highly encouraged to submit to this special session: Economics: Game
  theory, mechanism design, market design, social choice; Learning:
  Online learning, robust statistics, adversarial machine learning,
  privacy-preserving technologies such as differential privacy.

  PRIVACY. (Chair: Vitaly Shmatikov.) CSF 2014 will include a special
  session on privacy foundations and invites submissions on
  definitions, models, and frameworks for communication and data
  privacy, principled analysis of deployed or proposed privacy
  protection mechanisms, and foundational aspects of practical privacy
  technologies. Submissions investigating connections between privacy
  law and policy and computer science are especially encouraged.

  USABLE SECURITY. (Chair: Lujo Bauer.) It has become accepted that
  any user-facing security technology or mechanism is unlikely to be
  secure if it is not usable.  Hence, understanding, measuring, and
  designing for usability are foundational aspects of building secure
  systems.  CSF 2014 encourages submission of papers that describe new
  results, quantitative or qualitative, in usability as it pertains to
  security and privacy.  Particularly encouraged are papers that focus
  on foundational aspects of usability, as well as those whose results
  generalize beyond a specific environment or system.

These papers will be reviewed under the supervision of expert invited
session chairs. They will be presented at the conference, and will
appear in the CSF proceedings without any distinction from the other

Challenges and Vision Papers
We particularly encourage challenge/vision papers, which may describe
open questions and raise fundamental concerns about practical
security. Challenges and/or vision papers should typically identify a
real world security problem, argue why it raises foundational issues,
explain why the currently available and relevant techniques are
inadequate for addressing it, and identify foundational challenges
that have to be addressed to solve the problem.  These papers will be
presented at the conference, and will appear in the CSF proceedings
without any distinction from the other papers.

Proceedings, published by the IEEE Computer Society Press, will be
available at the symposium, and selected papers will be invited for
submission to the Journal of Computer Security.


  Alessandro Acquisti, Carnegie Mellon University
  Gilles Barthe, IMDEA Software Institute
  Frank Piessens, K.U. Leuven


  Abstract due: February 3, 2014, 11:59pm Eastern Standard Time
  Papers due: February 10, 2014, 11:59pm Eastern Standard Time
  Author response period: March 20-21, 2014, ending at 11:59pm Eastern 
Standard Time
  Panel proposals due: March 15, 2014
  Notification: April 11, 2014
  Camera ready: May 9, 2014
  Symposium: July 19 - 22, 2014


    Martín Abadi, Microsoft Research
    Michael Backes, Saarland University and Max Planck Institute for 
Software Systems
    Lujo Bauer, Carnegie Mellon University
    Bruno Blanchet, INRIA Paris-Rocquencourt
    Stephen Chong, Harvard University
    Anupam Datta, Carnegie Mellon University (Co-Chair)
    Riccardo Focardi, Università Ca' Foscari, Venezia
    Cédric Fournet, Microsoft Research (Co-Chair) 
    Deepak Garg, Max Planck Institute for Software Systems
    Joshua Guttman, Worcester Polytechnic Institute and The MITRE 
    Michael Hicks, University of Maryland, College Park
    Somesh Jha, University of Wisconsin
    Boris Köpf, IMDEA Software Institute
    Sergio Maffeis, Imperial College London
    John Mitchell, Stanford University
    Benjamin Pierce, University of Pennsylvania
    Ariel Procaccia, Carnegie Mellon University
    Tamara Rezk, INRIA Sophia Antipolis-Méditerranée
    Benjamin Rubinstein, University of Melbourne
    Mark Ryan, University of Birmingham
    Andrei Sabelfeld, Chalmers University of Technology
    Vitaly Shmatikov, University of Texas, Austin
    Michael Carl Tschantz, UC Berkeley
    Bogdan Warinschi, University of Bristol


Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with published proceedings. Failure to clearly identify any
duplication or overlap with other published or submitted papers is
ground for rejection without full review.

Papers should be submitted in Portable Document Format (PDF). Papers
submitted in a proprietary format such as Microsoft Word cannot be
considered. At least one coauthor of each accepted paper is required
to attend CSF to present the paper.

Papers must be submitted using the two-column IEEE Proceedings style
available for various document preparation systems at the IEEE
Conference Publishing Services page. Papers must not be anonymized.
Authors should use appropriate keywords from "AI & Security", "Usable
Security", "Privacy" and "Challenge/Vision" to indicate that the paper
is meant for a special session. All papers should be at most 12 pages
long, not counting bibliography and well-marked appendices.

Committee members are not required to read appendices, and so the
paper must be intelligible without them. Papers not adhering to the
page limits will be rejected without consideration of their merits.

Papers should be submitted using the CSF 2014 submission site.


Proposals for panels are welcome. They should be no more than three
pages in length, and should include the names of possible panelists
and an indication of which of those panelists have confirmed a desire
to participate. They should be submitted by email to the program

PC Chairs
Anupam Datta, Carnegie Mellon University, USA
Cédric Fournet, Microsoft Research

General Chair
Luca Vigano, King's College, London

Publications Chair
Deepak Garg, Max Planck Institute for Software Systems, Germany