On behalf of the program committee, we invite you to submit position
papers on new directions of research, non-traditional approaches,
noteworthy experience in an emerging area, or an important topic
that will generate lively discussion. 

Wietse Venema, IBM Research
HotSec '10 Program Chair


HotSec '10 Call for Papers

5th USENIX Workshop on Hot Topics in Security (HotSec '10)
August 10, 2010
Washington, DC

Sponsored by USENIX, the Advanced Computing Systems Association

HotSec '10 will be co-located with the 19th USENIX Security Symposium
(USENIX Security '10), which will take place August 11–13, 2010.

Important Dates

    * Submissions due: May 3, 2010, 11:59 p.m. PDT
    * Notification of acceptance: June 28, 2010
    * Final files due: July 12, 2010

Workshop Organizers

Program Chair
Wietse Venema, IBM Research

Program Committee
Lucas Ballard, Google Inc.
Dan Boneh, Stanford University
Herbert Bos, Vrije Universiteit Amsterdam
Manuel Costa, Microsoft Research
Trent Jaeger, Pennsylvania State University
Angelos D. Keromytis, Columbia University
Engin Kirda, Institute Eurecom
Christopher Kruegel, University of California, Santa Barbara
Wenke Lee, Georgia Institute of Technology
Patrick McDaniel, Pennsylvania State University
Vern Paxson, University of California, Berkeley, and International Computer Science Institute
Niels Provos, Google Inc.
Leendert van Doorn, AMD
Paul van Oorschot, Carleton University
Helen Wang, Microsoft Research


Position papers are solicited for the 5th USENIX Workshop on Hot
Topics in Security (HotSec '10). We favor papers that propose new
directions of research, advocate non-traditional approaches, report on
noteworthy experience in an emerging area, or generate lively
discussion around an important topic. Papers in well-explored research
areas are discouraged.

While pragmatic and systems-oriented, HotSec takes a broad view of
security and privacy and encompasses research on topics including, but
not limited to, large-scale threats, network security, hardware
security, software security, programming languages, applied
cryptography, anonymity, human-computer interaction, sociology, and

We expect that most accepted papers will fall into one or more of the following categories:

    * Fundamentally new techniques, approaches, or perspectives for
      dealing with current security problems
    * New, major problems arising from new technologies that are now
      being developed or deployed
    * Truly surprising results that cause rethinking of previous approaches

Further, while our goal is to solicit innovative ideas in their
formative stages, we expect submissions to be supported by some
evidence of feasibility or preliminary quantitative results. We also
expect that many accepted position papers will eventually evolve into
finished, full papers presented at future conferences.

Workshop Format

Attendance will be limited to 35–50 participants, with preference
given to the authors of accepted position papers/presentations.

Each author will have 10–15 minutes to present his or her idea,
followed by 15–20 minutes of discussion with the workshop


Submissions must be no longer than 6 pages including figures, tables,
and references. Text should be formatted in two columns on 8.5" x 11"
paper using 10 point type on 12 point leading ("single-spaced"), with
the text block being no more than 6.5" wide by 9" deep. Author names
and affiliations should appear on the title page (reviewing is not
blind). Pages should be numbered, and figures and tables should be
legible in black and white without requiring magnification. Papers not
meeting these criteria will be rejected without review, and no
deadline extensions will be granted for reformatting.

Submissions must be in PDF and must be submitted via the Web
submission form, which will be available here soon.

Authors will be notified of acceptance by June 28, 2010. Authors of
accepted papers will produce a final PDF by July 12, 2010. All papers
will be available online to registered attendees before the
workshop. If your accepted paper should not be published prior to the
event, please notify production@usenix.org. The papers will be
available online to everyone beginning on the day of the workshop,
August 10, 2010.

Simultaneous submission of the same work to multiple venues,
submission of previously published work, or plagiarism constitutes
dishonesty or fraud. USENIX, like other scientific and technical
conferences and journals, prohibits these practices and may take
action against authors who have committed them. See the USENIX
Conference Submissions Policy for details. Questions? Contact your
program chair, hotsec10chair@usenix.org, or the USENIX office,

Papers accompanied by nondisclosure agreement forms will not be
considered. Accepted submissions will be treated as confidential prior
to publication on the USENIX HotSec '10 Web site; rejected submissions
will be permanently treated as confidential.