Call For Short Talks
Call For Posters
Call For Papers
[PDF version for printing]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier
forum for computer security research, presenting the latest developments and
bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research
contributions in any aspect of computer security or privacy. Papers may
present advances in the theory, design, implementation, analysis,
verification, or empirical evaluation of secure systems.
Topics of interest include:
Access control | Accountability |
Anonymity | Application security |
Attacks and defenses | Authentication |
Censorship and censorship-resistance | Distributed systems security |
Embedded systems security | Forensics |
Hardware security | Intrusion detection |
Language-based security | Malware |
Metrics | Network security |
Privacy-preserving systems | Protocol security |
Secure information flow | Security and privacy policies |
Security architectures | System security |
Usability and security | Web security |
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review. See below for detailed submission
instructions.
Systematization of Knowledge Papers
Following the success of the previous year's conference, we are also
soliciting papers focused on systematization of knowledge (SoK). The goal of
this call is to encourage work that evaluates, systematizes, and contextualizes
existing knowledge. These papers will provide a high value to our community but
would otherwise not be accepted because they lack novel research
contributions. Suitable papers include survey papers that provide useful
perspectives on major research areas, papers that support or challenge long-held
beliefs with compelling evidence, or papers that provide an extensive and
realistic evaluation of competing approaches to solving specific
problems. Submissions will be distinguished by a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, except instead of emphasizing novel research
contributions the emphasis will be on value to the community. Accepted papers
will be presented at the symposium and included in the proceedings.
[Answers to Frequently Asked Questions]
Workshops
The Symposium is also soliciting submissions for co-located workshops.
Workshop proposals should be sent by Friday, 27 August 2010 by email to
oakland-workshops@cs.ucsb.edu.
Workshops may be half-day or full-day in length. Submissions should include the
workshop title, a short description of the topic of the workshop, and
biographies of the organizers.
Important Dates
All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!
Workshop proposals due: PASSED Friday, 27 August 2010
Research papers and SoK papers due: PASSED Friday, 19 November 2010
Acceptance notification: PASSED Monday, 31 January 2011
Final papers due: PASSED Friday, 4 March 2011
Instructions for Paper Submission
These instructions apply to both the research papers and systematization
of knowledge papers.
All submissions must be original work and must precisely document any
overlap with previously published or simultaneously submitted papers
from any of the authors. Simultaneous submission of the same paper to
another venue with proceedings or a journal is not allowed. Failure to
clearly document such overlaps will lead to automatic rejection.
Submission Server. Papers should be submitted using the
conference submission server:
http://oakland32-submit.cs.ucsb.edu/
Submissions may be started now, and updated at any time until the
submission deadline expires.
Anonymous Submission. Papers must be submitted in a form suitable for
anonymous review: no author names or affiliations may appear on the title
page, and papers should avoid revealing their identity in the text. When
referring to your previous work, do so in the third person, as though someone
else wrote it. Only blind the reference itself in the (unusual) case that a
third-person reference is infeasible. Contact the program chairs if you have
any questions. Papers that are not properly anonymized may be rejected without
review.
Page Limit and Formatting.
Papers must not exceed 15 pages total (including the references and
appendices). Papers must be formatted for US letter (not A4) size paper with
margins of at least 3/4 inch on all sides. The text must be formatted in a
two-column layout, with columns no more than 9 in. high and 3.375 in. wide.
The text must be in Times font, 10-point or larger, with 12-point or larger
line spacing. Authors are encouraged to use the IEEE conference proceedings
templates found at: http://www.computer.org/portal/web/cscps/formatting.
Submission Format. Papers should be submitted in Portable
Document Format (.pdf). Authors should pay special attention to unusual
fonts, images, and figures that might create problems for
reviewers. Your document should render correctly in Adobe Reader 9 and
when printed in black and white.
Publication and Presentation. Authors are responsible for
obtaining appropriate publication clearances; authors of accepted papers
are expected to sign IEEE copyright release forms. One of the authors of
the accepted paper is expected to present the paper at the conference.
Submissions received after the submission deadline or failing to conform
to the submission guidelines risk rejection without review.
For more information, contact the Program Co-Chairs at:
oakland11-pcchairs@ieee-security.org.
Call For Posters
Work-In-Progress Talks
A continuing feature of the symposium is a session of 5-minute talks
where attendees can present preliminary research results and new
ideas. More information on work-in-progress talk submissions will be
available on the conference website soon.
Program Committee
Program Committee Co-Chairs:
Giovanni Vigna, UC Santa Barbara
Somesh Jha, University of Wisconsin, Madison
Program Committee Members:
Giuseppe Ateniese, Johns Hopkins University
Michael Backes, Saarland University and Max Planck Institute for Software Systems
Michael Bailey, University of Michigan
Lujo Bauer, Carnegie Mellon University
David Brumley, Carnegie Mellon University
Cristian Cadar, Imperial College London
Shuo Chen, Microsoft Research
Weidong Cui, Microsoft Research
Robert Cunningham, MIT Lincoln Laboratory
Anupam Datta, Carnegie Mellon University
Roger Dingledine, The Tor Project
David Evans, University of Virginia
Nick Feamster, GeorgiaTech
Kevin Fu, UMass Amherst
Debin Gao, Singapore Management University
Jon Giffin, GeorgiaTech
Steven Gribble, University of Washington
Virgil Gligor, Carnegie Mellon University
Guofei Gu, Texas A&M University
Thorsten Holz, Bochum University, Germany
Trent Jaeger, Penn State University
Farnam Jahanian, University of Michigan
Yoshi Kohno, University of Washington
Engin Kirda, Eurecom, France
Shriram Krishnamurthi, Brown University
Christopher Kruegel, UC Santa Barbara
Wenke Lee, Georgia Tech
Ben Livshits, Microsoft Research
Michael Locasto, University of Calgary
Sergio Maffeis, Imperial College London
Z. Morley Mao, University of Michigan
Jon McCune, Carnegie Mellon University
Patrick McDaniel, Penn State University
John Mitchell, Stanford University
David Molnar, Microsoft Research
Andrew Myers, Cornell University
Cristina Nita-Rotaru, Purdue University
Adrian Perrig, Carnegie Mellon University
Mike Reiter, University of North Carolina
William Robertson, UC Berkeley
Hovav Shacham, UC San Diego
Stuart Schechter, Microsoft Research
R. Sekar, Stony Brook University
Radu Sion, Stony Brook University
Sean Smith, Dartmouth College
Angelos Stavrou, George Mason University
Ed Suh, Cornell University
Patrick Traynor, Georgia Tech
Venkat Venkatakrishnan, University of Illinois, Chicago
David Wagner, UC Berkeley
Dan Wallach, Rice University
XiaoFeng Wang, Indiana University
Brent Waters, UT Austin