On behalf of the program committee, we invite you to submit position papers on new directions of research, non-traditional approaches, noteworthy experience in an emerging area, or an important topic that will generate lively discussion. Wietse Venema, IBM Research HotSec '10 Program Chair firstname.lastname@example.org ----------------------------------------------------------------------------------- HotSec '10 Call for Papers 5th USENIX Workshop on Hot Topics in Security (HotSec '10) http://www.usenix.org/hotsec10/cfpa/ August 10, 2010 Washington, DC Sponsored by USENIX, the Advanced Computing Systems Association HotSec '10 will be co-located with the 19th USENIX Security Symposium (USENIX Security '10), which will take place August 11–13, 2010. Important Dates * Submissions due: May 3, 2010, 11:59 p.m. PDT * Notification of acceptance: June 28, 2010 * Final files due: July 12, 2010 Workshop Organizers Program Chair Wietse Venema, IBM Research Program Committee Lucas Ballard, Google Inc. Dan Boneh, Stanford University Herbert Bos, Vrije Universiteit Amsterdam Manuel Costa, Microsoft Research Trent Jaeger, Pennsylvania State University Angelos D. Keromytis, Columbia University Engin Kirda, Institute Eurecom Christopher Kruegel, University of California, Santa Barbara Wenke Lee, Georgia Institute of Technology Patrick McDaniel, Pennsylvania State University Vern Paxson, University of California, Berkeley, and International Computer Science Institute Niels Provos, Google Inc. Leendert van Doorn, AMD Paul van Oorschot, Carleton University Helen Wang, Microsoft Research Overview Position papers are solicited for the 5th USENIX Workshop on Hot Topics in Security (HotSec '10). We favor papers that propose new directions of research, advocate non-traditional approaches, report on noteworthy experience in an emerging area, or generate lively discussion around an important topic. Papers in well-explored research areas are discouraged. While pragmatic and systems-oriented, HotSec takes a broad view of security and privacy and encompasses research on topics including, but not limited to, large-scale threats, network security, hardware security, software security, programming languages, applied cryptography, anonymity, human-computer interaction, sociology, and economics. We expect that most accepted papers will fall into one or more of the following categories: * Fundamentally new techniques, approaches, or perspectives for dealing with current security problems * New, major problems arising from new technologies that are now being developed or deployed * Truly surprising results that cause rethinking of previous approaches Further, while our goal is to solicit innovative ideas in their formative stages, we expect submissions to be supported by some evidence of feasibility or preliminary quantitative results. We also expect that many accepted position papers will eventually evolve into finished, full papers presented at future conferences. Workshop Format Attendance will be limited to 35–50 participants, with preference given to the authors of accepted position papers/presentations. Each author will have 10–15 minutes to present his or her idea, followed by 15–20 minutes of discussion with the workshop participants. Submissions Submissions must be no longer than 6 pages including figures, tables, and references. Text should be formatted in two columns on 8.5" x 11" paper using 10 point type on 12 point leading ("single-spaced"), with the text block being no more than 6.5" wide by 9" deep. Author names and affiliations should appear on the title page (reviewing is not blind). Pages should be numbered, and figures and tables should be legible in black and white without requiring magnification. Papers not meeting these criteria will be rejected without review, and no deadline extensions will be granted for reformatting. Submissions must be in PDF and must be submitted via the Web submission form, which will be available here soon. Authors will be notified of acceptance by June 28, 2010. Authors of accepted papers will produce a final PDF by July 12, 2010. All papers will be available online to registered attendees before the workshop. If your accepted paper should not be published prior to the event, please notify email@example.com. The papers will be available online to everyone beginning on the day of the workshop, August 10, 2010. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program chair, firstname.lastname@example.org, or the USENIX office, email@example.com. Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX HotSec '10 Web site; rejected submissions will be permanently treated as confidential.