The 32nd IEEE Symposium on Security & Privacy
May 22-25, 2011
The Claremont Resort, Oakland, California, USA

Sponsored by the IEEE Computer Society 
Technical Committee of Security and Privacy


Since 1980, the IEEE Symposium on Security and Privacy (S&P) has been
the premier forum for computer security research, presenting the
latest developments and bringing together researchers and

We solicit previously unpublished papers offering novel research
contributions in any aspect of computer security or privacy. Papers
may present advances in the theory, design, implementation, analysis,
verification, or empirical evaluation of secure systems.

Topics of interest include:
Access control	 
Application security	 
Attacks and defenses
Censorship and censorship-resistance
Distributed systems security	 
Embedded systems security
Hardware security
Intrusion detection	 
Language-based security
Network security	 
Privacy-preserving systems
Protocol security	 
Secure information flow	 
Security and privacy policies
Security architectures	 
System security
Usability and security	 
Web security

This topic list is not meant to be exhaustive; S&P is interested in
all aspects of computer security and privacy. Papers without a clear
application to security or privacy, however, will be considered out of
scope and may be rejected without full review. See below for detailed
submission instructions.


Following the success of the previous year's conference, we are also
soliciting papers focused on systematization of knowledge (SoK). The
goal of this call is to encourage work that evaluates, systematizes,
and contextualizes existing knowledge. These papers will provide a
high value to our community but would otherwise not be accepted
because they lack novel research contributions. Suitable papers
include survey papers that provide useful perspectives on major
research areas, papers that support or challenge long-held beliefs
with compelling evidence, or papers that provide an extensive and
realistic evaluation of competing approaches to solving specific
problems. Submissions will be distinguished by a checkbox on the
submission form. They will be reviewed by the full PC and held to the
same standards as traditional research papers, except instead of
emphasizing novel research contributions the emphasis will be on value
to the community. Accepted papers will be presented at the symposium
and included in the proceedings.


The Symposium is also soliciting submissions for co-located
workshops. Workshop proposals should be sent by Friday, 27 August 2010
by email to oakland-workshops@cs.ucsb.edu. Workshops may be half-day
or full-day in length. Submissions should include the workshop title,
a short description of the topic of the workshop, and biographies of
the organizers.


All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!

Workshop proposals due: Friday, 27 August 2010
Workshop notification: Friday, 17 September 2010
Research papers and SoK papers due: Friday, 19 November 2010
Acceptance notification: Monday, 31 January 2011
Final papers due: Friday, 4 March 2011


These instructions apply to both the research papers and
systematization of knowledge papers.

All submissions must be original work and must precisely document any
overlap with previously published or simultaneously submitted papers
from any of the authors. Simultaneous submission of the same paper to
another venue with proceedings or a journal is not allowed. Failure to
clearly document such overlaps will lead to automatic rejection.

Papers must submitted using the conference submission server:

Submissions may be started now, and updated at any time until the
submission deadline expires.


Papers must be submitted in a form suitable for anonymous review: no
author names or affiliations may appear on the title page, and papers
should avoid revealing their identity in the text. When referring to
your previous work, do so in the third person, as though someone else
wrote it. Only blind the reference itself in the (unusual) case that a
third-person reference is infeasible. Contact the program chairs if
you have any questions. Papers that are not properly anonymized may be
rejected without review.


Papers must not exceed 15 pages total (including the references and
appendices). Papers must be formatted for US letter (not A4) size
paper with margins of at least 3/4 inch on all sides. The text must be
formatted in a two-column layout, with columns no more than 9 in. high
and 3.375 in. wide. The text must be in Times font, 10-point or
larger, with 12-point or larger line spacing. Authors are encouraged
to use the IEEE conference proceedings templates found at:


Papers should be submitted in Portable Document Format (.pdf). Authors
should pay special attention to unusual fonts, images, and figures
that might create problems for reviewers. Your document should render
correctly in Adobe Reader 9 and when printed in black and white.


Authors are responsible for obtaining appropriate publication
clearances; authors of accepted papers are expected to sign IEEE
copyright release forms. One of the authors of the accepted paper is
expected to present the paper at the conference.  Submissions received
after the submission deadline or failing to conform to the submission
guidelines risk rejection without review.

For more information, contact the Program Co-Chairs at:


There will be a poster session at an evening reception during the
conference. Posters are solicited that present recent and ongoing
research on topics related to security and privacy. The poster session
is an excellent opportunity to obtain feedback on ongoing work. More
information on poster submissions will be available on the conference
website soon.


A continuing feature of the symposium is a session of 5-minute talks
where attendees can present preliminary research results and new
ideas. More information on work-in-progress talk submissions will be
available on the conference website soon.


Program Committee Co-Chairs: 
	Giovanni Vigna, UC Santa Barbara
	Somesh Jha, University of Wisconsin, Madison

Giuseppe Ateniese, Johns Hopkins University
Michael Backes, Saarland University and 
   Max Planck Institute for Software Systems
Michael Bailey, University of Michigan
Lujo Bauer, Carnegie Mellon University
David Brumley, Carnegie Mellon University
Cristian Cadar, Imperial College London
Shuo Chen, Microsoft Research
Weidong Cui, Microsoft Research
Anupam Datta, Carnegie Mellon University
David Evans, University of Virginia
Nick Feamster, GeorgiaTech
Kevin Fu, UMass Amherst
Debin Gao, Singapore Management University
Jon Giffin, GeorgiaTech
Steven Gribble, University of Washington
Virgil Gligor, Carnegie Mellon University
Guofei Gu, Texas A&M University
Thorsten Holz, Bochum University, Germany
Trent Jaeger, Penn State University
Farnam Jahanian, University of Michigan
Yoshi Kohno, University of Washington
Engin Kirda, Eurecom, France
Shriram Krishnamurthi, Brown University
Christopher Kruegel, UC Santa Barbara
Wenke Lee, Georgia Tech
Ben Livshits, Microsoft Research
Michael Locasto, University of Calgary
Sergio Maffeis, Imperial College London
Z. Morley Mao, University of Michigan
Jon McCune, Carnegie Mellon University
Patrick McDaniel, Penn State University
John Mitchell, Stanford University
David Molnar, Microsoft Research
Andrew Myers, Cornell University
Cristina Nita-Rotaru, Purdue University
Adrian Perrig, Carnegie Mellon University
Mike Reiter, University of North Carolina
William Robertson, UC Berkeley
Hovav Shacham, UC San Diego
Stuart Schechter, Microsoft Research
R. Sekar, Stony Brook University
Radu Sion, Stony Brook University
Sean Smith, Dartmouth College
Angelos Stavrou, George Mason University
Ed Suh, Cornell University
Patrick Traynor, Georgia Tech
Venkat Venkatakrishnan, University of Illinois, Chicago
David Wagner, UC Berkeley
Dan Wallach, Rice University
XiaoFeng Wang, Indiana University