Call For Short Talks
A continuing feature of the symposium is a session of 5-minute talks where attendees can present preliminary research results or summaries of emerging topics to the Oakland community. Abstracts for 5-minute talks must fit on one US letter page, including the title and all author names and affiliations. Submit abstracts prior to the conference by emailing the chair: Anupam Datta.
Short talk abstracts are due on Saturday, May 11, 2012 (11:59pm PT). In case there is room after this initial selection, we may also consider short talk abstracts submitted after this deadline, up until the end of the first day of the conference (Monday, May 21, 2012). The short talks session will be held Tuesday (May 22, 2012) 4:30-5:30pm, and time limits will be strictly enforced.
Submission Deadline: May 11, 2012 (11:59pm PDT)
Notification: May 17, 2012
Submission Address: firstname.lastname@example.org
Submission Subject Line: Oakland Short Talk
Call For Posters
The 2012 Symposium marks the 33rd annual meeting of this flagship conference. Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
Posters are solicited that present recent and late-breaking research on security and privacy related topics. Presenting a poster at the IEEE Symposium on Security and Privacy is a great chance for researchers to obtain valuable feedback on their on-going work from knowledgeable participants at the conference. Posters from students are especially encouraged.
Poster Submission Details
Submit either (a) an abstract no longer than two pages describing the work or (b) an electronic copy of the poster graphic itself.
For those who choose to submit abstracts: An abstract title should begin with the keyword "Poster:". The abstract should identify the key contribution of the work being presented in the poster. In addition, it should describe the particular problem being addressed, what makes this problem interesting or important, and what your approach is to the problem. Please use the IEEE conference proceedings style (2-column) for preparing your abstract. Your abstract should not exceed the two-page limit; non-conforming submissions will not be considered for review.
For those who choose to submit poster graphics: The intent is that this graphic is substantially similar to what you will present at the conference. Include enough information that a security-savvy conference attendee can walk up, read the poster, and, within a reasonable amount of time, go from no knowledge of your work to an understanding sufficient to have a worthwhile conversation with you about your work and where it is headed.
Some considerations for either submission type: Preference will be given to new and exciting problems as opposed to thorough but incremental pieces of work. Either variety of submission should include a list of authors, with an institutional affiliation and status (student, faculty, and so on) for each.
At least one author of each accepted poster will be required to register for the conference and attend the poster session, to present the poster. This should be the most valuable part of participation, as authors will be able to engage conference attendees in extended conversations about their ongoing work!
All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!
Poster abstracts due: April 6, 2012 (E-mail as an attachment to email@example.com.)
Poster acceptance notifications: April 12, 2012
Poster abstracts final (for conference web site): May 13, 2012
For more information about the IEEE Symposium on Security and Privacy 2012 poster session, please contact the poster session chair (Adam Chlipala, firstname.lastname@example.org).
Call For Papers
[PDF version for printing]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier
forum for computer security research, presenting the latest developments and
bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research
contributions in any aspect of computer security or privacy. Papers may
present advances in the theory, design, implementation, analysis,
verification, or empirical evaluation of secure systems.
Topics of interest include:
|Attacks and defenses||Authentication|
|Censorship and censorship-resistance||Distributed systems security|
|Embedded systems security||Forensics|
|Hardware security||Intrusion detection|
|Privacy-preserving systems||Protocol security|
|Secure information flow||Security and privacy policies|
|Security architectures||System security|
|Usability and security||Web security|
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application
to security or privacy, however, will be considered out of scope and may be
rejected without full review. See back for detailed submission instructions.
Systematization of Knowledge Papers
Following the success of the previous year's conferences, we are also
soliciting papers focused on systematization of knowledge (SoK). The goal of
this call is to encourage work that evaluates, systematizes, and
contextualizes existing knowledge. These papers will provide a high value to
our community but would otherwise not be accepted because they lack novel
research contributions. Suitable papers include survey papers that provide
useful perspectives on major research areas, papers that support or challenge
long-held beliefs with compelling evidence, or papers that provide an
extensive and realistic evaluation of competing approaches to solving specific
problems. Submissions will be distinguished by a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, except instead of emphasizing novel research
contributions the emphasis will be on value to the community. Accepted papers
will be presented at the symposium and included in the proceedings.
The Symposium is also soliciting submissions for co-located workshops.
Workshop proposals should be sent by Friday, 15 August 2011. Details on
submissions can be found at this website:
All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!
Workshop proposals due: Monday, 15 August 2011
Instructions for Paper Submission
Research papers and SoK papers due: Wednesday, 16 November 2011
Acceptance notification: Wednesday, 1 February 2012
Final papers due: Monday, 5 March 2012
These instructions apply to both the research papers and systematization
of knowledge papers.
All submissions must be original work; the submitter must clearly
document any overlap with previously published or simultaneously submitted
papers from any of the authors. Simultaneous submission of the same paper to
another venue with proceedings or a journal is not allowed and will be
grounds for automatic rejection. Contact the program committee chairs if
there are questions about this policy. Papers must submitted using the
conference submission server: https://oakland12-submit.cs.wisc.edu/.
Submissions may be started now, and updated at any time until the submission
Submission Server. Papers should be submitted using the
conference submission server. https://oakland12-submit.cs.wisc.edu/.
Submissions may be started now, and updated at any time until the
submission deadline expires.
Anonymous Submission. Papers must be submitted in a form suitable for
anonymous review: no author names or affiliations may appear on the title
page, and papers should avoid revealing their identity in the text. When
referring to your previous work, do so in the third person, as though it
were written by someone else. Only blind the reference itself in the
(unusual) case that a third-person reference is infeasible. Contact the
program chairs if you have any questions. Papers that are not properly
anonymized may be rejected without review.
Page Limit and Formatting.
Papers must not exceed 15 pages total (including the references and
appendices). Papers must be formatted for US letter (not A4) size paper with
margins of at least 3/4 inch on all sides. The text must be formatted in a
two-column layout, with columns no more than 9 in. high and 3.375 in. wide.
The text must be in Times font, 10-point or larger, with 12-point or larger
line spacing. Authors are encouraged to use the IEEE conference proceedings
templates found at: http://www.computer.org/portal/web/cscps/formatting.
Submission. Submissions must be in Portable Document Format (.pdf).
Authors should pay special attention to unusual fonts, images, and figures
that might create problems for reviewers. Your document should render
correctly in Adobe Reader 9 and when printed in black and white.
Publication and Presentation. Authors are responsible for obtaining
appropriate publication clearances. One of the authors of the accepted
paper is expected to present the paper at the conference. Submissions
received after the submission deadline or failing to conform to the
submission guidelines risk rejection without review.
For more information, contact the Program Co-Chairs at:
A continuing feature of the symposium is a session of 5- minute talks where
attendees can present preliminary research results and new ideas. More
information on work- in-progress talk submissions will be available on the
Program Committee Chairs:
Somesh Jha, University of Wisconsin, Madison
Wenke Lee, Georgia Institute of Technology
Program Committee Members:
|Guiseppe Ateniese, Johns Hopkins
||Michael Backes, Max Planck Institute
|Michael Bailey, University of Michigan
||Kevin Borders, NSA
|Hebert Bos, Vrije Universiteit Amsterdam
||David Brumley, Carnegie Mellon University
|Kevin Butler, University of Oregon
||Juan Caballero, IMDEA Software Institute, Spain
|Cristian Cadar, Imperial College
||Shuo Chen, Microsoft Research
|Weidong Cui, Microsoft Research
||Robert Cunningham, MIT Lincoln Laboratory
|Anupam Datta, Carnegie Mellon University
||William Enck, North Carolina State
|David Evans, University of Virginia
||Nick Feamster, Georgia Tech
|Debin Gao, Singapore Management Univ.
||Jon Giffin, Georgia Tech
|Virgil Gligor, Carnegie Mellon University
||Steve Gribble, University of Washington
|Guofei Gu, Texas A&M
||Engin Kirda, Northeastern
|Shriram Krishnamurthi, Brown University
||Christopher Kruegel, UCSB
|David Molnar, Microsoft Research
||Cristina Nita-Rotaru, Purdue
|Brian Payne, Sandia National Labs
||Adrian Perrig, Carnegie Mellon University
| J. Alex Halderman, University of Michigan
||Thorsten Holz, ISEC Lab
|Ninghui Li, Purdue
||Ben Livshits, Microsoft Research
|Z. Morley Mao, University of Michigan
||Jonathan McCune, Carnegie Mellon University
|Patrick McDaniel, Penn State
||Andrew Myers, Cornell
|Arvind Narayanan, Stanford
||Roberto Perdisci, University of Georgia
|Zachary N. J. Peterson, Naval Postgrad. School
||Thomas Ristenpart, University of Wisconsin
|William Robertson, Berkeley
||R. Sekar, Stony Brook
|Greg Shannon, Carnegie Mellon Univ./CERT
||Kapil Singh, IBM Research
|Radu Sion, Stony Brook
||Angelos Stavrou, Goerge Mason University
|Patrick Traynor, Georgia Tech
||Dan Wallach, Rice University
|Xiaofeng Wang, Indiana University
||Simha Sethumadhavan, Columbia
|Venkat Venkatakrishnan, U. of Illinois, Chicago
||Tadayoshi Kohno, University of Washington