Call For Papers
[PDF version for printing]
Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest
developments and bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research
contributions in any aspect of computer security or privacy. Papers may
present advances in the theory, design, implementation, analysis,
verification, or empirical evaluation of secure systems.
Topics of interest include:
Attacks and defenses|
Censorship and censorship-resistance|
Distributed systems security||
Embedded systems security|
Secure information flow||
Security and privacy policies|
Usability and security||
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear
application to security or privacy, however, will be considered out of
scope and may be rejected without full review. See below
Systematization of Knowledge Papers. In addition to the standard
research papers, we are also soliciting papers this year focused on
systematization of knowledge. The goal of this call is to encourage work
that evaluates, systematizes, and contextualizes existing knowledge.
These papers will provide a high value to our community but would
otherwise not be accepted because they lack novel research
contributions. Suitable papers include survey papers that provide useful
perspectives on major research areas, papers that support or challenge
long-held beliefs with compelling evidence, or papers that provide an
extensive and realistic evaluation of competing approaches to solving
specific problems. Submissions will be distinguished by a checkbox on
the submission form. They will be reviewed by the full PC and held to
the same standards as traditional research papers, except instead of
emphasizing novel research contributions the emphasis will be on value
to the community. Accepted papers will be presented at the symposium and
included in the proceedings. [Answers to
Frequently Asked Questions]
The Symposium is also soliciting submissions for
colocated workshops. Workshop proposals should be sent by Friday, 21
August 2009 by email to Carrie Gates (firstname.lastname@example.org). Workshops
may be half-day or full-day in length. Submissions should include the
workshop title, a short description of the topic of the workshop, and
biographies of the organizers.
Workshop proposals due: Friday, 21 August 2009
All deadlines are 23:59 PST (UTC-8). Absolutely no
Research papers due: Wednesday, 18 November 2009
Systematization of Knowledge papers due: Tuesday, 24 November
Acceptance notification: 1 February 2010
Final papers due: 5 March 2010
Instructions for Paper Submission
These instructions apply to both the research papers and systematization
of knowledge papers.
All submissions must be original work and must precisely document any
overlap with previously published or simultaneously submitted papers
from any of the authors. Simultaneous submission of the same paper to
another venue with proceedings or a journal is not allowed. Failure to
clearly document such overlaps will lead to automatic rejection.
Papers should be submitted using the
conference submission server:
Research papers: http://oakland10-submit.cs.ucsb.edu/
SoK papers: http://oakland10-sok.cs.ucsb.edu/
Submissions may be started now, and updated at any time until the
submission deadline expires.
Papers must be submitted in a form suitable
for anonymous review: no author names or affiliations may appear on the
title page, and papers should avoid revealing their identity in the
text. When referring to your previous work, do so in the third person,
as though it were written by someone else. Only blind the reference
itself in the (unusual) case that a third-person reference is
infeasible. Contact the program chairs if you have any questions. Papers
that are not properly anonymized may be rejected without review.
Page Limit and Formatting.
Papers must not exceed 15 pages total
(including the references and appendices). Papers must be formatted for
US letter (not A4) size paper with margins of at least 3/4 inch on all
sides. The text must be formatted in a two-column layout, with columns
no more than 9 in. high and 3 1/4 in. wide [revised: 3.375in is okay, see Note
]. The text must be in Times
font, 10-point or larger, with 12-point or larger line spacing. Authors
are encouraged to use the IEEE conference proceedings templates found
Papers should be submitted in Portable
Document Format (.pdf). Authors should pay special attention to unusual
fonts, images, and figures that might create problems for
reviewers. Your document should render correctly in Adobe Reader 9 and
when printed in black and white.
Publication and Presentation.
Authors are responsible for
obtaining appropriate publication clearances; authors of accepted papers
are expected to sign IEEE copyright release forms. One of the authors of
the accepted paper is expected to present the paper at the conference.
Submissions received after the submission deadline or failing to conform
to the submission guidelines risk rejection without review.
For more information, contact the Program Co-Chairs at:
There will be a poster session at an evening reception during the
conference. Posters are solicited that present recent and ongoing
research on topics related to security and privacy. The poster session
is an excellent opportunity to obtain feedback on ongoing work. More
information on poster submissions will be available on the conference
is chair of
the poster session.
A continuing feature of the symposium is a session of 5-minute talks
where attendees can present preliminary research results and new
ideas. More information on work-in-progress talk submissions will be
available on the conference website soon.