ProgramRegistrationCFPTravelWorkshops
IEEE Symposium on Security and Privacy

Call For Short Talks

Call For Posters

Call For Papers

[PDF version for printing]

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of computer security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.

Topics of interest include:

Access controlAccountability
AnonymityApplication security
Attacks and defensesAuthentication
Censorship and censorship-resistanceDistributed systems security
Embedded systems securityForensics
Hardware securityIntrusion detection
Language-based securityMalware
MetricsNetwork security
Privacy-preserving systemsProtocol security
Secure information flowSecurity and privacy policies
Security architecturesSystem security
Usability and securityWeb security

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review. See below for detailed submission instructions.

Systematization of Knowledge Papers

Following the success of the previous year's conference, we are also soliciting papers focused on systematization of knowledge (SoK). The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will provide a high value to our community but would otherwise not be accepted because they lack novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Submissions will be distinguished by a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

[Answers to Frequently Asked Questions]

Workshops

The Symposium is also soliciting submissions for co-located workshops. Workshop proposals should be sent by Friday, 27 August 2010 by email to oakland-workshops@cs.ucsb.edu. Workshops may be half-day or full-day in length. Submissions should include the workshop title, a short description of the topic of the workshop, and biographies of the organizers.

Important Dates

All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!

Workshop proposals due: PASSED Friday, 27 August 2010
Research papers and SoK papers due: PASSED Friday, 19 November 2010
Acceptance notification: PASSED Monday, 31 January 2011
Final papers due: PASSED Friday, 4 March 2011

Instructions for Paper Submission

These instructions apply to both the research papers and systematization of knowledge papers.

All submissions must be original work and must precisely document any overlap with previously published or simultaneously submitted papers from any of the authors. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed. Failure to clearly document such overlaps will lead to automatic rejection.

Submission Server. Papers should be submitted using the conference submission server:

http://oakland32-submit.cs.ucsb.edu/

Submissions may be started now, and updated at any time until the submission deadline expires.

Anonymous Submission. Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though someone else wrote it. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Page Limit and Formatting. Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found at: http://www.computer.org/portal/web/cscps/formatting.

Submission Format. Papers should be submitted in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Publication and Presentation. Authors are responsible for obtaining appropriate publication clearances; authors of accepted papers are expected to sign IEEE copyright release forms. One of the authors of the accepted paper is expected to present the paper at the conference.

Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without review.

For more information, contact the Program Co-Chairs at:
   oakland11-pcchairs@ieee-security.org.

Call For Posters Work-In-Progress Talks

A continuing feature of the symposium is a session of 5-minute talks where attendees can present preliminary research results and new ideas. More information on work-in-progress talk submissions will be available on the conference website soon.

Program Committee

Program Committee Co-Chairs:
Giovanni Vigna, UC Santa Barbara
Somesh Jha, University of Wisconsin, Madison

Program Committee Members:
Giuseppe Ateniese, Johns Hopkins University
Michael Backes, Saarland University and Max Planck Institute for Software Systems
Michael Bailey, University of Michigan
Lujo Bauer, Carnegie Mellon University
David Brumley, Carnegie Mellon University
Cristian Cadar, Imperial College London
Shuo Chen, Microsoft Research
Weidong Cui, Microsoft Research
Robert Cunningham, MIT Lincoln Laboratory
Anupam Datta, Carnegie Mellon University
Roger Dingledine, The Tor Project
David Evans, University of Virginia
Nick Feamster, GeorgiaTech
Kevin Fu, UMass Amherst
Debin Gao, Singapore Management University
Jon Giffin, GeorgiaTech
Steven Gribble, University of Washington
Virgil Gligor, Carnegie Mellon University
Guofei Gu, Texas A&M University
Thorsten Holz, Bochum University, Germany
Trent Jaeger, Penn State University
Farnam Jahanian, University of Michigan
Yoshi Kohno, University of Washington
Engin Kirda, Eurecom, France
Shriram Krishnamurthi, Brown University
Christopher Kruegel, UC Santa Barbara
Wenke Lee, Georgia Tech
Ben Livshits, Microsoft Research
Michael Locasto, University of Calgary
Sergio Maffeis, Imperial College London
Z. Morley Mao, University of Michigan
Jon McCune, Carnegie Mellon University
Patrick McDaniel, Penn State University
John Mitchell, Stanford University
David Molnar, Microsoft Research
Andrew Myers, Cornell University
Cristina Nita-Rotaru, Purdue University
Adrian Perrig, Carnegie Mellon University
Mike Reiter, University of North Carolina
William Robertson, UC Berkeley
Hovav Shacham, UC San Diego
Stuart Schechter, Microsoft Research
R. Sekar, Stony Brook University
Radu Sion, Stony Brook University
Sean Smith, Dartmouth College
Angelos Stavrou, George Mason University
Ed Suh, Cornell University
Patrick Traynor, Georgia Tech
Venkat Venkatakrishnan, University of Illinois, Chicago
David Wagner, UC Berkeley
Dan Wallach, Rice University
XiaoFeng Wang, Indiana University
Brent Waters, UT Austin

Conference News
Conference Proceedings Available Online
11/01/2011
All the papers for the 2011 symposium have been made available free of charge on the ieee-security.org website.
Conference Photo Album
6/7/2011
Photo set from IEEE Security and Privacy 2011 now on flickr!
Paper awards
5/25/2011
Congratulations to the paper award winners!
Best Paper: Hookt on fon-iks
Best Student Paper: OpenConflict
Best Practical Paper: How to Shop for Free Online
Poster abstracts posted
5/18/2011
Posted here.
Ethics Workshop Cancelled
5/13/2011
The "Community Workshop on Ethical Guidelines for Security Research" has been cancelled. Those who registered will receive a full refund. The other workshops remain open and available.
Call for short talks
5/9/2011
We are soliciting short talks (5 minutes) that present preliminary research results or summaries of emerging topics to the Oakland community.
Registration complete
5/8/2011
Registration for the 2011 conference is complete, with the exception of offering replacements for last minute cancellations. We ask that those who would have come to the conference provide their contact info via the registration page, so we can size venues for future years.
Registration is nearly full
4/19/2011
Registration for the 2011 conference is nearly full, and we are accepting applications to the wait list. Please let the registration chair know if you will not be able to attend the conference so we can let others in. Workshop registrations remain open and slots are available.