Call for Short Talks
A continuing feature of the symposium is a session of 5-minute talks
where attendees can present work-in-progress and preliminary research
results or summaries of emerging topics to the Oakland community.
Abstracts for 5-minute talks must fit on one US letter page, including
the title and all author names and affiliations. Submit abstracts
prior to the conference by emailing the chair:
Guofei Gu.
Short talk abstracts are due on Saturday, May 11, 2013 (11:59pm EST) Extended: We still have a few slots.
In case there is room after this initial selection, we may also
consider short talk abstracts submitted after this deadline, up until
the end of the first day of the conference (Monday, May 20, 2013). The
short talks session will be held Tuesday (May 21, 2013) 4:30-5:45pm,
and time limits will be strictly enforced.
Important Dates
Submission Deadline: May 11, 2013 (11:59pm EST)
Notification: May 17, 2013
Submission Address: oakland13-short-talks@ieee-security.org
Submission Subject Line: Oakland Short Talk
Birds of a Feathers
This year we'll have space for a small number of Birds-of-a-Feather
gatherings (BoFs) during the S&P/SPW bridging reception on Wednesday
night, and we are looking for topic proposals. BoFs are informal
discussion groups that focus on a particular interest shared by a
number of attendees. They don't follow any particular format but
usually have a lead organizer who moderates the discussion. If you're
interested in leading a BoF, please email an informal proposal to
oakland13-bofs@ieee-security.org by May 3, 2013. (Please note that we
don't plan on providing any A/V support for BoFs, such as microphones
or projectors.)
Call For Posters
The 2013 Symposium marks the 34th annual meeting of this flagship
conference. Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for presenting developments in computer security and electronic
privacy, and for bringing together researchers and practitioners in the field.
Posters are solicited that present recent and late-breaking research
on security and privacy related topics. Presenting a poster at the IEEE
Symposium on Security and Privacy is a great chance for researchers to obtain
valuable feedback on their ongoing work from knowledgeable participants at the
conference. Posters from students on new and exciting problems are especially
encouraged.
At least one author of each accepted poster will be
required to register for the conference to present the poster. This should be
the most valuable part of participation, as authors will be able to engage
conference attendees in extended conversations about their ongoing work!
Important Dates
Submission deadline: Monday, April 8, 2013
Acceptance notification: Monday, April 15, 2013
Early registration: Saturday, April 20, 2013
Final abstracts: Monday, May 13, 2013
Poster session: Monday, May 20, 2013
All deadlines are 23:59 PST (UTC-8).
Submission Details
Submit an abstract no longer than two pages describing the work. The
abstract title should begin with the keyword "Poster:". The abstract should
identify the key contribution of the work being presented in the poster. In
addition, it should describe the particular problem being addressed, what makes
this problem interesting or important, and what your approach is to the
problem. Include a list of authors with institutional affiliation and status
(student, faculty, and so on).
Please use the IEEE conference proceedings style (2 column) for preparing your
abstract. Your abstract should not exceed the two page limit; non-conforming
submissions will not be considered for review.
Email poster abstracts as a PDF attachment to ieeesp-posters@cs.usfca.edu with
the subject "Poster: [TITLE]" by Monday, April 8, 2013.
If accepted, a final version of your abstract is due on Monday, May 13, 2013.
Your abstract will be placed on the IEEE S&P website prior to the conference
start date, but will not be included in the conference proceedings.
For more information about the IEEE Symposium on Security and Privacy 2013
poster session, please contact the poster session chair (Sophie Engle,
sjengle@cs.usfca.edu).
Call For Papers
[PDF version for printing]
Since 1980, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest
developments and bringing together
researchers and practitioners.
The 34th
IEEE Symposium on Security and Privacy will take place on May 19-22, 2013 at
the Westin St. Francis Hotel, in San Francisco, CA, USA. We solicit previously
unpublished papers offering novel research contributions in any aspect of
computer security or privacy. Papers may present advances in the theory,
design, implementation, analysis, verification, or empirical evaluation of
secure systems.
Topics of interest include:
Access control | Malware |
Accountability | Metrics |
Anonymity | Language-based security |
Application security | Network security |
Attacks and defenses | Privacy-preserving systems |
Authentication | Protocol security |
Censorship and censorship-resistance | Secure information flow |
Distributed systems security | Security and privacy policies |
Embedded systems security | Security architectures |
Forensics | Systems security |
Hardware security | Usability and security |
Intrusion detection | Web security |
Mobile Security |
This topic list
is not meant to be exhaustive; S&P is interested in all aspects of
computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may
be rejected without
full review.
Systematization of Knowledge Papers
Following the success of the previous years' conferences, we are also
soliciting papers focused on systematization of knowledge (SoK). The
goal of this call is to encourage work that evaluates, systematizes,
and contextualizes existing knowledge. These papers can provide a high
value to our community but may not be accepted because of a lack of
novel research contributions. Suitable papers include survey papers
that provide useful perspectives on major research areas, papers that
support or challenge long-held beliefs with compelling evidence, or
papers that provide an extensive and realistic evaluation of competing
approaches to solving specific problems. Submissions are encouraged to
analyze the current research landscape: identify areas that have
enjoyed much research attention, point out open areas with unsolved
challenges, and present a prioritization that can guide researchers to
make progress on solving important challenges. Submissions must be
distinguished by a checkbox on the
submission form. In addition, the paper title must have the prefix
"SoK:". They
will be reviewed by the full PC and held to the same standards as
traditional research papers, except instead of emphasizing novel
research contributions the emphasis will be on value to the community.
Accepted papers will be presented
at the symposium and included in the proceedings.
Important Dates
Research papers and SoK papers due: | Friday, November 16, 2012 (November 14, 2012) |
Acceptance notification: | Monday, January 28, 2013 |
Final papers due: | Monday, March 4, 2013 |
|
All deadlines are 23:59 EST (UTC-5). |
Instructions for Paper Submission
These
instructions apply to both the research papers and systematization of knowledge
papers.
All submissions must be original work; the submitter must clearly
document any overlap with previously published or simultaneously
submitted papers from any of the authors. Failure to point out and
explain overlap will be grounds for rejection. Simultaneous submission
of the same paper to another venue with proceedings or a journal is
not allowed and will be grounds for automatic rejection. Contact the
program committee chairs if there are questions about this policy.
Anonymous Submission.
Papers must be submitted in a form suitable for anonymous review: no
author names or affiliations may appear on the title page, and papers
should avoid revealing their identity in the text. When referring to
your previous work, do so in the third person, as though it were
written by someone else. Only blind the reference itself in the
(unusual) case that a third-person reference is infeasible. Contact
the program chairs if you have any questions. Papers that
are not properly anonymized may be rejected without review.
Page Limit and Formatting.
Papers must not exceed 15 pages total (including the references and
appendices). Papers must be formatted for US letter (not A4) size
paper with margins of at least 3/4 inch on all sides. The text must be
formatted in a two-column layout, with columns no more than 9 in. high
and 3.375 in. wide. The text must be in Times font, 10-point or
larger, with 12-point or larger line spacing. Authors are encouraged
to use the IEEE
conference proceedings templates found at:
http://www.computer.org/portal/web/cscps/formatting
Failure to adhere to the page
limit and formatting requirements will be grounds for rejection.
Submission.
Submissions must be in Portable Document Format (.pdf). Authors should
pay special attention to unusual fonts, images, and figures that might
create problems for reviewers. Your document should render correctly
in Adobe Reader 9 and when printed in
black and white.
Conference Submission Server.
Papers must be submitted using the submission site:
https://oakland.gtisc.gatech.edu.
Submissions may be started now, and updated at any time until the submission deadline expires.
Publication and Presentation.
Authors are responsible for obtaining appropriate publication
clearances. One of the authors of the accepted paper is expected to
present the paper at the conference. Submissions received after the
submission deadline or failing to conform to the submission guidelines
risk rejection
without review.
For more information, contact the Program Co-Chairs at:
oakland13-pcchairs@ieee-security.org.
Work-In-Progress Talks
A continuing feature of the symposium is a session of 5-minute talks
where attendees can present preliminary research results and new
ideas. More information on work-in-progress talk submissions will be
available on the conference
website.
Program Committee
Program Committee Chairs:
Wenke Lee, Georgia Institute of Technology
Adrian Perrig, Carnegie Mellon University and ETH Zurich
Michael Backes, Saarland University and MPI-SWS
Program Committee Members:
Martin Abadi, UC Santa Cruz and Microsoft Research | Matteo Maffei, Saarland University |
Michael Bailey, University of Michigan | Z. Morley Mao, University of Michigan |
Herbert Bos, Vrije Universiteit Amsterdam | Jonathan McCune, Google |
Lujo Bauer, Carnegie Mellon University | Patrick McDaniel, Pennsylvania State University |
David Brumley, Carnegie Mellon University | John Mitchell, Stanford University |
Juan Caballero, IMDEA Software Institute | Arvind Narayanan, Princeton University |
Srdjan Capkun, ETH Zurich | Peng Ning, North Carolina State University |
Shuo Chen, Microsoft Research | Cristina Nita-Rotaru, Purdue University |
Yan Chen, Northwestern University | Bryan Parno, Microsoft Research |
Weidong Cui, Microsoft Research | Roberto Perdisci, University of Georgia |
Robert Cunningham, MIT Lincoln Laboratory | Niels Provos, Google |
George Danezis, Microsoft Research | Thomas Ristenpart, University of Wisconsin |
Anupam Datta, Carnegie Mellon University | William Robertson, Northeastern University |
William Enck, North Carolina State University | Ahmad-Reza Sadeghi, Technical University of Darmstadt |
David Evans, University of Virginia | David Sands, Chalmers University of Technology |
Nick Feamster, Georgia Institute of Technology | R. Sekar, Stony Brook University |
Debin Gao, Singapore Management University | Simha Sethumadhavan, Columbia University |
Deepak Garg, MPI-SWS | Kapil Singh, IBM Research |
Virgil Gligor, Carnegie Mellon University | Radu Sion, Stony Brook University |
Guofei Gu, Texas A&M University | Robin Sommer, ICSI/LBNL |
Thorsten Holz, Ruhr-University Bochum | Paul Syverson, Naval Research Labs |
Seny Kamara, Microsoft Research | Patrick Traynor, Georgia Institute of Technology |
Yongdae Kim, KAIST | Venkat Venkatakrishnan, University of Illinois, Chicago |
Engin Kirda, Northeastern University | Giovanni Vigna, UC Santa Barbara |
Christopher Kruegel, UC Santa Barbara | Helen Wang, Microsoft Research |
Ruby Lee, Princeton University | Xiaofeng Wang, Indiana University |
Ninghui Li, Purdue University | Yinglian Xie, Microsoft Research |
Ben Livshits, Microsoft Research | Wei Zou, Peking University |
John Lui, Chinese University of Hong Kong | |