Call For Papers
Security and Privacy Symposium and Workshops
(May 18-20, 2015),   San Jose, CA, USA
http://www.ieee-security.org 

Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest
developments and bringing together researchers and practitioners. We
solicit previously unpublished papers offering novel research
contributions in any aspect of security or privacy. Papers may present
advances in the theory, design, implementation, analysis,
verification, or empirical evaluation and measurement of secure
systems.

Topics of interest include:

    Access control
    Accountability
    Anonymity
    Application security
    Attacks and defenses
    Authentication
    Censorship and censorship-resistance
    Cloud security
    Distributed systems security
    Embedded systems security
    Forensics
    Hardware security
    Intrusion detection
    Malware
    Metrics
    Mobile security and privacy
    Language-based security
    Network security
    Privacy-preserving systems
    Protocol security
    Secure information flow
    Security and privacy policies
    Security architectures
    System security
    Usable security and privacy
    Web security and privacy

This topic list is not meant to be exhaustive; S&P is interested in
all aspects of computer security and privacy. Papers without a clear
application to security or privacy, however, will be considered out of
scope and may be rejected without full review.

Given the rapidly expanding and maturing security and privacy
community, we hope to increase the acceptance rate of papers that are
more far-reaching and risky, as long as those papers also show
sufficient promise for creating interesting discussions and
questioning widely-held beliefs.  Systematization of Knowledge Papers

Following the success of recent years' conferences, we are also
soliciting papers focused on systematization of knowledge (SoK). The
goal of this call is to encourage work that evaluates, systematizes,
and contextualizes existing knowledge. Such work can provide a high
value to our community but may not be accepted because of a lack of
novel research contributions. Suitable papers are those that provide
important new insights on established, major research areas or support
or challenge long-held beliefs with compelling evidence. Papers that
survey research areas without providing such insights are not
appropriate. Submissions will be distinguished by the prefix “SoK:” in
the title and a checkbox on the submission form. They will be reviewed
by the full PC and held to the same standards as traditional research
papers, except instead of emphasizing novel research contributions the
emphasis will be on value to the community. Accepted papers will be
presented at the symposium and included in the proceedings.  Workshops

The Symposium is also soliciting submissions for co-located
workshops. Further details on submissions can be found at
http://www.ieee-security.org/TC/SP2015/workshops.html

Important Dates

All deadlines are 23:59:59 EST (UTC-5).
Paper submission deadline 	November 14, 2014  No Extensions
Author response period 	January 14-16, 2015
Acceptance notification 	February 8, 2015
Shepherded papers approval deadline 	February 27, 2015
Final papers due 	March 5, 2015
Instructions for Paper Submission

These instructions apply to both the research papers and
systematization of knowledge papers.

All submissions must be original work; the submitter must clearly
document any overlap with previously published or simultaneously
submitted papers from any of the authors. Failure to point out and
explain overlap will be grounds for rejection. Simultaneous submission
of the same paper to another venue with proceedings or a journal is
not allowed and will be grounds for automatic rejection. Papers may
not be withdrawn between the start of the author response period and
acceptance notification. Contact the program committee chairs if there
are questions about this policy.  Anonymous Submission

Papers must be submitted in a form suitable for anonymous review: no
author names or affiliations may appear on the title page, and papers
should avoid revealing their identity in the text. When referring to
your previous work, do so in the third person, as though it were
written by someone else. Only blind the reference itself in the
(unusual) case that a third-person reference is infeasible. Contact
the program chairs if you have any questions. Papers that are not
properly anonymized may be rejected without review.  Page Limit and
Formatting

Papers must not exceed 15 pages total (including the references and
appendices). Papers must be formatted for US letter (not A4) size
paper. The text must be formatted according to the IEEE conference
proceedings templates. Details and a link to a LaTeX template will be
provided soon. Failure to adhere to the page limit and formatting
requirements can be grounds for rejection.  Submission

Submissions must be in Portable Document Format (.pdf). Authors should
pay special attention to unusual fonts, images, and figures that might
create problems for reviewers. Your document should render correctly
in Adobe Reader 9 and when printed in black and white.  Conference
Submission Server

Papers must be submitted at https://oakland2015.ece.cmu.edu and may be
updated at any time until the submission deadline. The submission site
will open October 14, 2015.  Publication and Presentation

Authors are responsible for obtaining appropriate publication
clearances. One of the authors of the accepted paper is expected to
present the paper at the conference. Submissions received after the
submission deadline or failing to conform to the submission guidelines
risk rejection without review.

For more information, contact the program co-chairs at:
oakland15-pcchairs@ieee-security.org.

Program Committee

Chairs
Lujo Bauer 	Carnegie Mellon University
Vitaly Shmatikov 	The University of Texas at Austin

Members
Michael Bailey 	University of Illinois at Urbana Champaign
David Basin 	ETH Zurich
Lujo Bauer 	Carnegie Mellon University
Konstantin Beznosov 	University of British Columbia
Joseph Bonneau 	Princeton University
Herbert Bos 	Vrije Universiteit / VU University Amsterdam
Srdjan Capkun 	ETH Zurich
Hao Chen 	UC Davis
Shuo Chen 	Microsoft Research
Nicolas Christin 	Carnegie Mellon University
Emiliano De Cristofaro 	UCL
David Evans 	University of Virginia
Bryan Ford 	Yale University
Cedric Fournet 	Microsoft Research
Deepak Garg 	MPI-SWS
Matt Green 	Johns Hopkins University
Carl Gunter 	University of Illinois
Nadia Heninger 	University of Pennsylvania
Cormac Herley 	Microsoft Research
Michael Hicks 	University of Maryland, College Park
Sotiris Ioannidis 	Foundation for Research and Technology - Hellas
Trent Jager 	Pennsylvania State University
Limin Jia 	Carnegie Mellon University
Ari Juels 	Cornell Tech
Chris Kanich 	University of Illinois at Chicago
Jonathan Katz 	University of Maryland, College Park
Yongdae Kim 	KAIST
Farinaz Koushanfar 	Rice University
Ralf Kuesters 	University of Trier
David Lie 	University of Toronto
Michelle Mazurek 	University of Maryland, College Park
Greg Morrisett 	Harvard University
Andrew Myers 	Cornell University
Arvind Narayanan 	Princeton University
Alina Oprea 	RSA Labs
Bryan Parno 	Microsoft Research
Frank Piessens 	KU Leuven
Raluca Ada Popa 	MIT
Niels Provos 	Google
Michael K. Reiter 	UNC Chapel Hill
Thomas Ristenpart 	University of Wisconsin
William Robertson 	Northeastern University
Franziska Roesner 	University of Washington
Andrei Sabelfeld 	Chalmers University
Prateek Saxena 	National University of Singapore
Vyas Sekar 	Carnegie Mellon University
Vitaly Shmatikov 	University of Texas at Austin
Matthew Smith 	University of Bonn
Robin Sommer 	ICSI/LBNL
Edward Suh 	Cornell University
Mohit Tiwari 	University of Texas at Austin
Haining Wang 	University of Delaware
Robert Watson 	University of Cambridge
Matthew Wright 	University of Texas at Arlington
Dongyan Xu 	Purdue University
Xiaowei Yang 	Duke University
Vinod Yegneswaran 	SRI International
Ben Zhao 	UC Santa Barbara