Call For Papers
Security and Privacy Symposium
May 18-21, 2014 
The Fairmont Hotel, San Jose, CA 
http://www.ieee-security.org/TC/SP2014

Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest
developments and bringing together researchers and practitioners. We
solicit previously unpublished papers offering novel research
contributions in any aspect of security or privacy. Papers may present
advances in the theory, design, implementation, analysis,
verification, or empirical evaluation and measurement of secure
systems.

Topics of interest include:

    Access control
    Accountability
    Anonymity
    Application security
    Attacks and defenses
    Authentication
    Censorship and censorship-resistance
    Distributed systems security
    Embedded systems security
    Forensics
    Hardware security
    Intrusion detection
    Malware
    Metrics
    Mobile security and privacy
    Language-based security
    Network security
    Privacy-preserving systems
    Protocol security
    Secure information flow
    Security and privacy policies
    Security architectures
    System security
    Usable security and privacy
    Web security and privacy

This topic list is not meant to be exhaustive; S&P is interested in
all aspects of computer security and privacy. Papers without a clear
application to security or privacy, however, will be considered out of
scope and may be rejected without full review.

Given the rapidly expanding and maturing security and privacy
community, we hope to increase the acceptance rate of papers that are
more "far-reaching" and "risky," as long as those papers also show
sufficient promise for creating interesting discussions and
questioning widely-held beliefs.  Systematization of Knowledge Papers

Following the success of the previous year’s conferences, we are also
soliciting papers focused on systematization of knowledge (SoK). The
goal of this call is to encourage work that evaluates, systematizes,
and contextualizes existing knowledge. These papers can provide a high
value to our community but may not be accepted because of a lack of
novel research contributions. Suitable papers include survey papers
that provide useful perspectives on major research areas, papers that
support or challenge long-held beliefs with compelling evidence, or
papers that provide an extensive and realistic evaluation of competing
approaches to solving specific problems. Submissions are encouraged to
analyze the current research landscape: identify areas that have
enjoyed much research attention, point out open areas with unsolved
challenges, and present a prioritization that can guide researchers to
make progress on solving important challenges. Submissions will be
distinguished by the prefix “SoK:” in the title and a checkbox on the
submission form. They will be reviewed by the full PC and held to the
same standards as traditional research papers, except instead of
emphasizing novel research contributions the emphasis will be on value
to the community. Accepted papers will be presented at the symposium
and included in the proceedings.

Workshops

The Symposium is also soliciting submissions for co-located
workshops. Workshop proposals should be sent by TBD. Details on
submissions can be found at the website:
http://ieee-security.org/TC/SPW2014/.

Important Dates

Paper submission deadline is 23:59:59 CET (UTC+01), November 13, 2013.

Instructions for Paper Submission

These instructions apply to both the research papers and
systematization of knowledge papers.

All submissions must be original work; the submitter must clearly
document any overlap with previously published or simultaneously
submitted papers from any of the authors. Failure to point out and
explain overlap will be grounds for rejection. Simultaneous submission
of the same paper to another venue with proceedings or a journal is
not allowed and will be grounds for automatic rejection. Contact the
program committee chairs if there are questions about this policy.

Anonymous Submission

Papers must be submitted in a form suitable for anonymous review: no
author names or affiliations may appear on the title page, and papers
should avoid revealing their identity in the text. When referring to
your previous work, do so in the third person, as though it were
written by someone else. Only blind the reference itself in the
(unusual) case that a third-person reference is infeasible. Contact
the program chairs if you have any questions. Papers that are not
properly anonymized may be rejected without review.

Page Limit and Formatting

Papers must not exceed 15 pages total (including the references and
appendices). Papers must be formatted for US letter (not A4) size
paper with margins of at least 3/4 inch on all sides. The text must be
formatted in a two-column layout, with columns no more than 9 in. high
and 3.375 in. wide. The text must be in Times font, 10-point or
larger, with 12-point or larger line spacing. Authors are encouraged
to use the IEEE conference proceedings templates. Failure to adhere to
the page limit and formatting requirements will be grounds for
rejection.  

Submission

Submissions must be in Portable Document Format (.pdf). Authors should
pay special attention to unusual fonts, images, and figures that might
create problems for reviewers. Your document should render correctly
in Adobe Reader 9 and when printed in black and white.

Conference Submission Server

Papers must be submitted using the submission site.

Submissions may be started now, and updated at any time until the
submission deadline expires.

Publication and Presentation

Authors are responsible for obtaining appropriate publication
clearances. One of the authors of the accepted paper is expected to
present the paper at the conference. Submissions received after the
submission deadline or failing to conform to the submission guidelines
risk rejection without review.

For more information, contact the Program Co-Chairs at:
oakland14-pcchairs@ieee-security.org.

Program Committee
Program Committee Chairs

Michael Backes, Saarland University
Adrian Perrig, Carnegie Mellon University
Helen Wang, Microsoft Research


Program Committee Members

TBD