CALL FOR PAPERS

2008 IEEE Symposium on
Security and Privacy
May 18-21, 2008
The Claremont Resort, Berkeley/Oakland, California, USA
http://www.ieee-security.org/TC/SP2008/oakland08-cfp.html

Sponsored by
IEEE Computer Society Technical Committee on Security and Privacy
In cooperation with
The International Association for Cryptologic Research (IACR)

Symposium Committee:
General Chair: Yong Guan (Iowa State University, USA), oakland08-generalchair @ ieee-security.org
Registration and Publicity Chair: David Du (University of Minnesota/National Science Foundation, USA)
Treasurer: David Shambroom (Intersystems, USA)
Program Co-Chairs: Patrick McDaniel (Pennsylvania State University, USA)
Avi Rubin (Johns Hopkins University, USA)

Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for the presentation of developments in computer
security and electronic privacy, and for bringing together researchers
and practitioners in the field.

Previously unpublished papers offering novel research contributions in
any aspect of computer security or electronic privacy are solicited
for submission to the 2008 symposium. Papers may represent advances in
the theory, design, implementation, analysis, or empirical evaluation
of secure systems, either for general use or for specific application
domains. The Symposium is also open to the submission of co-located
half-day or one-day workshops. See below for these and other program
elements.

Topics of interest include, but are not limited to, the following:
Access control and audit
Anonymity and pseudonymity
Application-level security
Biometrics
Cryptographic protocols
Database security
Denial of service
Distributed systems security
Formal methods for security
Information flow
Intrusion detection and prevention
Language-based security
Malicious code prevention
Network security
Operating system security
Peer-to-peer security
Privacy
Risk analysis
Secure hardware and smartcards
Security engineering
Security policy
User authentication

Note: S&P is a general security and privacy conference. Papers without
concrete and demonstrated relation to security and/or privacy will be
rejected without review. For example, papers on topics in cryptography
without clear, executed application to security or privacy will not be
reviewed.

Program Committee:
William Aiello, University of British Columbia, Canada
Elisa Bertino, CERIAS and CS Department, Purdue University, USA
Matt Blaze, University of Pennsylvania, USA
Christian Cachin, IBM Zurich Research Lab, Switzerland
Crispin Cowan, Novell, USA
Robert Cunningham, MIT Lincoln, USA
Dave Evans, University of Virginia, USA
Kevin Fu, UMass, USA
Michael Franz, UCI, USA
Carl Landwehr, DTO, USA
Yingjiu Li, Singapore Management University, Singapore
Jonathon Giffin, Georgia Institute of Technology, USA
Virgil Gligor, University of Maryland, USA
Steve Gribble, University of Washington, USA
Susan Hohenberger, Johns Hopkins University, USA
Trent Jaeger, Penn State University, USA
Somesh Jha, University of Wisconsin, USA
Ari Juels, RSA, USA
Angelos Keromytis, Columbia University, USA
Yongdae Kim, University of Minnesota Twin Cities, USA
Tadayoshi Kohno, University of Washington, USA
Christopher Kruegel, Technical University Vienna, Austria
Andrew Myers, Cornell University, USA
Wenke Lee, Georgia Institute of Technology, USA
Ninghui Li, Purdue University, USA
Gary McGraw, Cigital, USA
Fabian Monrose, Johns Hopkins University, USA
Hilarie Orman, Purple Streak, USA
Vern Paxson, ICSI/Berkeley
Atul Prakash, University of Michigan, USA
Niels Provos, Google, USA
Steve Zdancewic, University of Pennsylvania, USA
R. Sekar, State University of New York at Stony Brook, USA
Dawn Song, CMU, USA
Sean Smith, Dartmouth College, USA
Adam Stubblefield, Independent Security Evaluators, USA
Gene Tsudik, UCI, USA
Dan Wallach, Rice University, USA
David Wagner, UCB, USA


AWARDS

This year we are reintroducing awards for the "best paper" and "best
student paper" from the accepted program. Judged by the chairs and
several representatives from the program committee, this award will be
given to the paper deemed to have the highest overall quality, as
measured by scientific contribution, depth, and impact. A student must
be the first author to be eligible for the best student paper.

In conjunction with the IEEE Security and Privacy magazine, the conference
organizers wish to introduce an award for the "most practical" paper
appearing in the conference. This award will be judged on the paper
most likely to immediately improve the security of current
environments and systems. In additional to the award presented at the
conference, this paper will be invited to appear in the IEEE Security
and Privacy Magazine.

INSTRUCTIONS FOR PAPER SUBMISSIONS

All submissions MUST reflect original work and MUST adequately
document any overlap with previously published or simultaneously
submitted papers from any of the authors. Especially, simultaneous
submission of the same paper to another conference with proceedings or
a journal is not allowed. Failure to clearly document such overlaps
will lead to automatic rejection. If authors have any doubts regarding
such overlaps, they should contact the program chairs prior to
submission.

Papers should be submitted in Portable Document Format (.pdf) using an
11-point font, single column layout, standard interline spacing, and
reasonable margins. Papers must not exceed 15 pages, excluding the
bibliography and well-marked appendices. Committee members are not
required to read the appendices, so papers must be intelligible
without them. You can also consider using IEEE standard Latex template
(Note: please use onecolumn option), which can be found at
http://www.ieee.org/web/publications/authors/transjnl/index.html .

We request that submissions be in US letter paper size (not A4) if
possible. We urge authors to follow the NSF "Fastlane" guidelines for
document preparation (https://www.fastlane.nsf.gov/documents/pdf_create/pdfcreate_05.jsp),
and to pay special attention to unusual fonts.

Papers should be submitted in a form suitable for anonymous review:
remove author names and affiliations from the title page, and avoid
explicit self-referencing in the text. When referring to your previous
work, do so in the third person, as though it were written by someone
else. Only blind the reference itself if a third-person reference will
clearly not work.

Please submit your paper through the submissions website at
http://oakland08.cse.psu.edu in .pdf form only. If you have any
difficulty submitting a paper or have any questions about the
submission process, please contact the submission chair, Kevin Butler
(Pennsylvania State University) at butler@cse.psu.edu.

For any questions, contact the program chairs at oakchairs08@ieee-security.org
Paper submissions due: November 9, 2007, 23:59:00 EST (GMT-5).    (No extensions!)
Acceptance notification: January 25, 2008.
Final papers due: March 1, 2008.

Submissions received after the submission deadline or failing to
conform to the guidelines above risk rejection without consideration
of their merits. Authors are responsible for obtaining appropriate
clearances; authors of accepted papers will be asked to sign IEEE
copyright release forms. Where possible all further communications to
authors will be via email.

CO-LOCATED WORKSHOPS

We are also encouraging the submissions of workshops to be associated
with IEEE SP 2008. A workshop call will be made available on the
symposium website in the near future.  

5-MINUTE TALKS

A continuing feature of the symposium is a session of 5-minute talks
where attendees can present preliminary research results or summaries
of works published elsewhere. Abstracts for 5-minute talks must fit on
one US letter or A4 page, including the title and all author names and
affiliations. Submit abstracts prior to the conference by email to
Dr. Jonathon Giffin (giffin@cc.gatech.edu); or by Monday morning at
the conference by hardcopy given to the 5-minute talks chairs.

While the majority of these presentations will be accepted and
notified per the above dates, we will also review and accept a small
number of presentations prior to the meeting, with an early decision,
for those who require a decision in order to plan their travel. Due
dates for these presentation will be announced in the final symposium
call.