[HTML version: http://www.ieee-security.org/TC/SP2013/cfp.html]
[PDF  version: http://www.ieee-security.org/TC/SP2013/oakland2013-cfp.pdf]

=========================================================================

                             CALL FOR PAPERS

               34th IEEE Symposium on Security and Privacy

                             May 19-22, 2013

                         San Francisco, CA, USA

                  http://www.ieee-security.org/TC/SP2013

=========================================================================


Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest
developments and bringing together researchers and practitioners.

The 34th IEEE Symposium on Security and Privacy will take place on May
19-22, 2013 at the Westin St. Francis Hotel, in San Francisco, CA,
USA. We solicit previously unpublished papers offering novel research
contributions in any aspect of computer security or privacy. Papers
may present advances in the theory, design, implementation, analysis,
verification, or empirical evaluation of secure systems.

Topics of interest include:

    Access control                        Malware
    Accountability                        Metrics
    Anonymity                             Language-based security
    Application security                  Network security
    Attacks and defenses                  Privacy-preserving systems
    Authentication                        Protocol security
    Censorship and censorship-resistance  Secure information flow
    Distributed systems security          Security and privacy policies
    Embedded systems security             Security architectures
    Forensics                             System security
    Hardware security                     Usability andsecurity
    Intrusion detection                   Web security

This topic list is not meant to be exhaustive; S&P is interested in
all aspects of computer security and privacy. Papers without a clear
application to security or privacy, however, will be considered out of
scope and may be rejected without full review.


Systematization of Knowledge Papers
-----------------------------------

Following the success of the previous years' conferences, we are also
soliciting papers focused on systematization of knowledge (SoK). The
goal of this call is to encourage work that evaluates, systematizes,
and contextualizes existing knowledge. These papers can provide a high
value to our community but may not be accepted because of a lack of
novel research contributions. Suitable papers include survey papers
that provide useful perspectives on major research areas, papers that
support or challenge long-held beliefs with compelling evidence, or
papers that provide an extensive and realistic evaluation of competing
approaches to solving specific problems. Submissions are encouraged to
analyze the current research landscape: identify areas that have
enjoyed much research attention, point out open areas with unsolved
challenges, and present a prioritization that can guide researchers to
make progress on solving important challenges. Submissions must be
distinguished by a checkbox on the submission form. In addition, the
paper title must have the prefix "SoK:". They will be reviewed by the
full PC and held to the same standards as traditional research papers,
except instead of emphasizing novel research contributions the
emphasis will be on value to the community. Accepted papers will be
presented at the symposium and included in the proceedings.


Important Dates
---------------

Research papers and SoK papers due:   Wednesday, November 14 2012
Acceptance notification:              Monday, January 28, 2013
Final papers due:                     Monday, March 4 2013

All deadlines are 23:59 EST (UTC-5).


Instructions for Paper Submission
---------------------------------

These instructions apply to both the research papers and
systematization of knowledge papers.

All submissions must be original work; the submitter must clearly
document any overlap with previously published or simultaneously
submitted papers from any of the authors. Failure to point out and
explain overlap will be grounds for rejection. Simultaneous submission
of the same paper to another venue with proceedings or a journal is
not allowed and will be grounds for automatic rejection. Contact the
program committee chairs if there are questions about this policy.

Anonymous Submission: Papers must be submitted in a form suitable for
anonymous review: no author names or affiliations may appear on the
title page, and papers should avoid revealing their identity in the
text. When referring to your previous work, do so in the third person,
as though it were written by someone else. Only blind the reference
itself in the (unusual) case that a third-person reference is
infeasible. Contact the program chairs if you have any questions.
Papers that are not properly anonymized may be rejected without
review.

Page Limit and Formatting: Papers must not exceed 15 pages total
(including the references and appendices). Papers must be formatted
for US letter (not A4) size paper with margins of at least 3/4 inch on
all sides. The text must be formatted in a two-column layout, with
columns no more than 9 in. high and 3.375 in. wide. The text must be
in Times font, 10-point or larger, with 12-point or larger line
spacing. Authors are encouraged to use the IEEE conference proceedings
templates found at: http://www.computer.org/portal/web/cscps/formatting

Failure to adhere to the page limit and formatting requirements will
be grounds for rejection.

Submission: Submissions must be in Portable Document Format (.pdf).
Authors should pay special attention to unusual fonts, images, and
figures that might create problems for reviewers. Your document should
render correctly in Adobe Reader 9 and when printed in black and
white.

Conference Submission Server: Papers must be submitted using the
submission site: https://oakland.gtisc.gatech.edu. Submissions may be
started now, and updated at any time until the submission deadline
expires.

Publication and Presentation: Authors are responsible for obtaining
appropriate publication clearances. One of the authors of the accepted
paper is expected to present the paper at the conference. Submissions
received after the submission deadline or failing to conform to the
submission guidelines risk rejection without review.

For more information, contact the Program Co-Chairs at:

    oakland13-pcchairs@ieee-security.org


Work-In-Progress Talks
----------------------

A continuing feature of the symposium is a session of 5-minute talks
where attendees can present preliminary research results and new
ideas. More information on work-in-progress talk submissions will be
available on the conference website.


Program Committee
-----------------

Program Committee Chairs

    Wenke Lee, Georgia Institute of Technology
    Adrian Perrig, Carnegie Mellon University and ETH Zurich
    Michael Backes, Saarland University and MPI-SWS

Program Committee Members

    Martin Abadi, UC Santa Cruz and Microsoft Research
    Michael Bailey, University of Michigan
    Hebert Bos, Vrije Universiteit Amsterdam
    Lujo Bauer, Carnegie Mellon University
    David Brumley, Carnegie Mellon University
    Juan Caballero, IMDEA Software Institute
    Srdjan Capkun, ETH Zurich
    Shuo Chen, Microsoft Research
    Yan Chen, Northwestern University
    Weidong Cui, Microsoft Research
    Robert Cunningham, MIT Lincoln Laboratory
    George Danezis, Microsoft Research
    Anupam Datta, Carnegie Mellon University
    William Enck, North Carolina State University
    David Evans, University of Virginia
    Nick Feamster, University of Maryland
    Debin Gao, Singapore Management University
    Deepak Garg, MPI-SWS
    Virgil Gligor, Carnegie Mellon University
    Guofei Gu, Texas A&M University
    Thorsten Holz, Ruhr-University Bochum
    Seny Kamara, Microsoft Research
    Yongdae Kim, KAIST
    Engin Kirda, Northeastern University
    Christopher Kruegel, UC Santa Barbara
    Ruby Lee, Princeton University
    Ninghui Li, Purdue University
    Ben Livshits, Microsoft Research
    John Lui, Chinese University of Hong Kong
    Matteo Maffei, Saarland University
    Z. Morley Mao, University of Michigan
    Jonathan McCune, Carnegie Mellon University
    Patrick McDaniel, Pennsylvania State University
    John Mitchell, Stanford University
    Arvind Narayanan, Princeton University
    Peng Ning, North Carolina State University
    Cristina Nita-Rotaru, Purdue University
    Bryan Parno, Microsoft Research
    Roberto Perdisci, University of Georgia
    Niels Provos, Google
    Thomas Ristenpart, University of Wisconsin
    William Robertson, Northeastern University
    Ahmad-Reza Sadeghi, Technical University of Darmstadt
    David Sands, Chalmers University of Technology
    R. Sekar, Stony Brook University
    Simha Sethumadhavan, Columbia University
    Kapil Singh, IBM Research
    Radu Sion, Stony Brook University
    Robin Sommer, ICSI/LBNL
    Paul Syverson, Naval Research Labs
    Patrick Traynor, Georgia Institute of Technology
    Venkat Venkatakrishnan, University of Illinois, Chicago
    Giovanni Vigna, UC Santa Barbara
    Helen Wang, Microsoft Research
    Xiaofeng Wang, Indiana University
    Yinglian Xie, Microsoft Research
    Wei Zou, Peking University