USENIX Security '12: 21st USENIX Security Symposium Hyatt Regency Bellevue in Bellevue, WA, August 8-10, 2012 Event Website: http://www.usenix.org/events/sec12/ http://www.usenix.org/events/sec12/cfp/sec12cfp.pdf Description: Join us in Bellevue, WA, August 8-10, 2012, for the 21st USENIX Security Symposium. The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The Symposium will span three days, with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Workshops will precede the symposium on August 6 and 7. Co-located workshops include: 5th Workshop on Cyber Security Experimentation and Test (CSET '12) 3rd USENIX Workshop on Health Security and Privacy (HealthSec '12) Overview The USENIX Security Symposium brings together researchers, practitio- ners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The 21st USENIX Security Symposium will be held August 8–10, 2012, in Bellevue, WA. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. Submissions are due on Thursday, February 16, 2012, 11:59 p.m. PST. The Symposium will span three days, with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Workshops will precede the symposium on August 6 and 7. Symposium Topics Refereed paper submissions are solicited in all areas relating to systems and network security, including: o Analysis of network and security protocols o Applications of cryptographic techniques o Attacks with novel insights, techniques, or results o Authentication and authorization of users, systems, and applications o Automated tools for source code analysis o Botnets o Cryptographic implementation analysis and construction o Denial-of-service attacks and countermeasures o Embedded systems security o File and filesystem security o Forensics and diagnostics for security o Hardware security o Human-computer interaction, security, and privacy o Intrusion and anomaly detection and prevention o Malicious code analysis, anti-virus, anti-spyware o Mobile system security o Network infrastructure security o Operating system security o Privacy-enhancing technologies o Security architectures o Security education and training o Security for critical infrastructures o Security in heterogeneous and large-scale environments o Security in ubiquitous computing environments o Security policy o Self-protecting and self-healing systems o Techniques for developing secure systems o Technologies for trustworthy computing o Wireless security o Web security, including client-side and server-side security The USENIX Security Symposium is primarily a systems security conference. Papers whose contributions are primarily new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc., may not be appropriate for this conference. Program committee members are limited to being authors or co- authors of at most two paper submissions. The program chair is not permitted to be author or co-author of any paper submissions. Refereed Papers Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. It is expected that one of the paper authors will attend the conference and present the work. It is the responsibility of the authors to find a suitable replacement presenter for their work, if the need arises. A registration discount will be available for one author per paper. If the registration fee poses a hardship to the presenter, USENIX will offer complimentary registration. The Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. Attendees may choose also to receive a USB drive pre-loaded with the Proceedings. Invited Talks, Panels, Poster Session, Rump Session, and BoFs In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a Poster Session, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program chair at sec12chair@usenix.org. Invited Talks Invited talks will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk proposals via email to sec12it@ usenix.org by Thursday, February 16, 2012, 11:59 p.m. PST. Panel Discussions The technical sessions may include topical panel discussions. Please send topic suggestions and proposals to sec12chair@usenix.org. The deadline for panel proposals is Friday, April 6, 2012, 11:59 p.m. PDT. Poster Session Would you like to share a provocative opinion, interesting preliminary work, or a cool idea that will spark discussion at this year's USENIX Se- curity Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees. To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster ses- sion submission form, which will be available here soon, by July 2, 2012, 11:59 p.m. PDT. Decisions will be made by July 12, 2012. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors' names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster. Rump Session We will host a rump session on the evening of Wednesday, August 8, 2012. This is intended as an informal session for short and engaging presentations on recent unpublished results, work in progress, or other topics of interest to the USENIX Security attendees. As in the past, talks do not always need to be serious. To submit a rump session talk, email sec12rump@usenix.org by Wednesday, August 8, 2012, at 11:59 a.m. PDT. Birds-of-a-Feather Sessions (BoFs) Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on-site or in advance. To preschedule a BoF, please send email to the USENIX Conference Depart- ment at bofs@usenix.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time. How and Where to Submit Refereed Papers Important: Note that some past USENIX Security Symposiums have had different anonymity policies and page limits. Papers are due by Thursday, February 16, 2012, at 11:59 p.m. PST (firm deadline). All submissions will be made online via a Web form on the Call for Papers Web site, http://www.usenix.org/sec12/cfp. Submissions should be finished, complete papers. Paper submissions should at most 13 typeset pages, excluding bibli- ography and well-marked appendices. There is no limit on the length of the bibliography and appendices, but reviewers are not required to read them. Once accepted, papers must be reformatted to fit in 16 pages, including bibliography and any appendices. The submission must be for- matted in 2 columns, using 10 point Times Roman type on 12 point lead- ing, in a text block of 6.5" by 9", on 8.5"x11" (letter-sized) paper. If you wish, please make use of the LaTex file and style file available at http://www.usenix.org/about/mailing.html. www.usenix.org/sec12/cfp when preparing your paper for submission. Paper submissions must be submitted in a form suitable for anony- mous review: no author names or affiliations may appear on the title page, and authors should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chair at sec12chair@usenix.org if you have any questions. Papers that do not comply with the submission requirements, includ- ing length and anonymity, may be rejected without review. Submissions must be in PDF format. LaTeX users can use the "pdflatex" command to convert a LaTeX document into PDF format. Please make sure your submission can be opened using Adobe Reader. Please also make sure your submission, and all embedded figures, are intelligible when printed in grayscale. All submissions will be judged on originality, relevance, correctness, and clarity. In addition to citing relevant published work, authors should relate their submission to any other relevant submissions of theirs in other venues that are under review at the same time as their submission to the Symposium. These citations to simultaneously submitted papers should be anonymized; non-anonymous versions of these citations must, however, be emailed to the program chair at sec12chair@usenix.org. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy at http://www.usenix.org/submissionspolicy. Questions? Contact your program chair, sec12chair@usenix.org, or the USENIX office, submissionspolicy@usenix.org. Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX Security '12 Web site; rejected submissions will be permanently treated as confidential. Authors will be notified of acceptance by Tuesday, April 24, 2012. The final paper due date is Tuesday, June 19, 2012 (firm deadline). Each accepted submission may be assigned a member of the program com- mittee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the com- mittee to the authors. All papers will by default be available online to registered attendees before the symposium. If your accepted paper should not be published prior to the event, please notify production@usenix.org. The papers will be available online to everyone beginning on the first day of the symposium, August 8, 2012. Specific questions about submissions may be sent to the program chair at sec12chair@usenix.org. Sponsorship Opportunities Interested in sponsoring USENIX Security '12? Contact sponsorship@usenix.org. Program and Registration Information Complete program and registration information will be available in May 2012 on the conference Web site. If you would like to receive the latest USENIX conference information, please join our mailing list at http://www.usenix.org/about/mailing.html. Important Dates Paper submissions due: Thursday, February 16, 2012, 11:59 p.m. PST (firm deadline) Invited talk proposals due: Thursday, February 16, 2012, 11:59 p.m. PST Panel proposals due: Friday, April 6, 2012, 11:59 p.m. PDT Notification to authors: Tuesday, April 24, 2012 Final papers due: Tuesday, June 19, 2012, 11:59 p.m. PDT (firm deadline) Poster proposals due: Monday, July 2, 2012, 11:59 p.m. PDT Notification to poster presenters: Thursday, July 12, 2012 Rump session submissions due: Wednesday, August 8, 2012, 11:59 a.m. PDT Symposium Organizers Program Chair Tadayoshi Kohno, University of Washington Program Committee Ben Adida, Mozilla Nikita Borisov, University of Illinois at Urbana-Champaign David Brumley, Carnegie Mellon University Kelly Caine, Indiana University Srdjan Capkun, ETH Sonia Chiasson, Carleton University Mihai Christodorescu, IBM T.J. Watson Research Center Anupam Datta, Carnegie Mellon University David Evans, University of Virginia Kevin Fu, University of Massachusetts Amherst Carrie Gates, CA Technologies Roxana Geambasu, Columbia University Ian Goldberg, University of Waterloo Matthew Green, Johns Hopkins University Urs Hengartner, University of Waterloo Jaeyeon Jung, Microsoft Research Sam King, University of Illinois at Urbana-Champaign Engin Kirda, Northeastern University Christian Kreibich, International Computer Science Institute Kirill Levchenko, University of California, San Diego David Lie, University of Toronto Jonathan McCune, Carnegie Mellon University David Molnar, Microsoft Research Alex Moshchuk, Microsoft Research Steven Murdoch, University of Cambridge Cristina Nita-Rotaru, Purdue University Niels Provos, Google Vitaly Shmatikov, University of Texas, Austin Diana Smetters, Google Patrick Traynor, Georgia Institute of Technology Giovanni Vigna, University of California, Santa Barbara Dan Wallach, Rice University Invited Talks Committee David Evans, University of Virginia David Molnar, Microsoft Research Bruce Potter, Ponte Technologies Margo Seltzer, Harvard School of Engineering and Applied Sciences and Oracle Poster Session Chair Matt Bishop, University of California, Davis Rump Session Chair Matt Blaze, University of Pennsylvania