MAY 18-21, 2014 AT THE FAIRMONT, SAN JOSE, CA

35th IEEE Symposium on Security and Privacy

   Register

The early-bird registration deadline is Saturday, April 19!

Call For Papers


Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.

Topics of interest include:

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Given the rapidly expanding and maturing security and privacy community, we hope to increase the acceptance rate of papers that are more "far-reaching" and "risky," as long as those papers also show sufficient promise for creating interesting discussions and questioning widely-held beliefs.

Systematization of Knowledge Papers

Following the success of the previous year’s conferences, we are also soliciting papers focused on systematization of knowledge (SoK). The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers can provide a high value to our community but may not be accepted because of a lack of novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Submissions are encouraged to analyze the current research landscape: identify areas that have enjoyed much research attention, point out open areas with unsolved challenges, and present a prioritization that can guide researchers to make progress on solving important challenges. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

Workshops

The Symposium is also soliciting submissions for co-located workshops. Workshop proposals should be sent by September 13, 2013. Details on submissions can be found at http://ieee-security.org/TC/SPW2014/

Important Dates

All deadlines are 23:59:59 CET (UTC+01).

Paper submission deadline November 15, 2013 (Extended)
Rebuttal January 11-14, 2014
Acceptance notification February 3, 2014
Shepherded papers due to shepherd March 7, 2014
Final papers due March 14, 2014

Instructions for Paper Submission


These instructions apply to both the research papers and systematization of knowledge papers.

All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy.

Anonymous Submission

Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Page Limit and Formatting

Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8, dated 2012/12/27. Failure to adhere to the page limit and formatting requirements can be grounds for rejection.

Submission

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Conference Submission Server

Papers must be submitted at https://www.infsec.cs.uni-saarland.de/oakland2014/ and may be updated at any time until the submission deadline expires. The submission site will open October 14, 2013.

Publication and Presentation

Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference. Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without review.

For more information, contact the program co-chairs at: oakland14-pcchairs@ieee-security.org.

Program Committee


Chairs

Michael Backes Saarland University and MPI-SWS
Adrian Perrig ETH Zürich
Helen Wang Microsoft Research

Members

Mikhail Atallah Purdue University
David Basin ETH Zürich
Lujo Bauer Carnegie Mellon University
Konstantin Beznosov University of British Columbia
Juan Caballero IMDEA Software Institute
Christian Cachin IBM Research - Zürich
Srdjan Capkun ETH Zürich
Nicolas Christin Carnegie Mellon University
Weidong Cui Microsoft Research
Marc Dacier Symantec Research Labs
George Danezis University College London
Anupam Datta Carnegie Mellon University
Roberto DiPietro University of Rome III
William Enck North Carolina State University
Marc Fischlin Technical University of Darmstadt
Deepak Garg MPI-SWS
Virgil Gligor Carnegie Mellon University
Krishna P. Gummadi MPI-SWS
Christian Hammer Saarland University
Cormac Herley Microsoft Research
Thorsten Holz Ruhr-University Bochum
Nicholas Hopper University of Minnesota
Yih-Chun Hu UIUC
Markus Jakobsson Qualcomm
Xuxian Jiang North Carolina State University
Aaron Johnson Naval Research Laboratory
Ari Juels RSA Labs
Apu Kapadia Indiana University
Yongdae Kim Korea Advanced Institute of Science and Technology
Yoshi Kohno University of Washington
Farinaz Koushanfar Rice University
Christian Kreibich ICSI
Heejo Lee Korea University
Ninghui Li Purdue University
Yingjiu Li Singapore Management University
David Lie University of Toronto
Jonathan McCune Google
Greg Morrisett U Harvard
Alina Oprea RSA Labs
Bryan Parno Microsoft Research
Vern Paxson UC Berkeley / ICSI
Benny Pinkas University of Haifa
Phil Porras SRI International
Niels Provos Google
Volker Roth Freie Universität Berlin
Andrei Sabelfeld Chalmers University of Technology
Prateek Saxena U Singapore
Radu Sion Stony Brook University
Matthew Smith University of Hannover
Frank Stajano Cambridge University
Patrick Traynor Georgia Institute of Technology
Venkat Venkatakrishnan University of Illinois, Chicago
Xiaofeng Wang Indiana University