ProgramRegistrationCFPHotelsTravelWorkshopsDonors
IEEE Symposium on Security and Privacy Workshops ieee-security

Call For Short Talks

A continuing feature of the symposium is a session of 5-minute talks where attendees can present preliminary research results or summaries of emerging topics to the Oakland community. Abstracts for 5-minute talks must fit on one US letter page, including the title and all author names and affiliations. Submit abstracts prior to the conference by emailing the chair: Anupam Datta.

Short talk abstracts are due on Saturday, May 11, 2012 (11:59pm PT). In case there is room after this initial selection, we may also consider short talk abstracts submitted after this deadline, up until the end of the first day of the conference (Monday, May 21, 2012). The short talks session will be held Tuesday (May 22, 2012) 4:30-5:30pm, and time limits will be strictly enforced.

Submission Deadline: May 11, 2012 (11:59pm PDT)
Notification: May 17, 2012
Submission Address: danupam@cmu.edu
Submission Subject Line: Oakland Short Talk

Call For Posters

The 2012 Symposium marks the 33rd annual meeting of this flagship conference. Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

Posters are solicited that present recent and late-breaking research on security and privacy related topics. Presenting a poster at the IEEE Symposium on Security and Privacy is a great chance for researchers to obtain valuable feedback on their on-going work from knowledgeable participants at the conference. Posters from students are especially encouraged.

Poster Submission Details

Submit either (a) an abstract no longer than two pages describing the work or (b) an electronic copy of the poster graphic itself.

For those who choose to submit abstracts: An abstract title should begin with the keyword "Poster:". The abstract should identify the key contribution of the work being presented in the poster. In addition, it should describe the particular problem being addressed, what makes this problem interesting or important, and what your approach is to the problem. Please use the IEEE conference proceedings style (2-column) for preparing your abstract. Your abstract should not exceed the two-page limit; non-conforming submissions will not be considered for review.

For those who choose to submit poster graphics: The intent is that this graphic is substantially similar to what you will present at the conference. Include enough information that a security-savvy conference attendee can walk up, read the poster, and, within a reasonable amount of time, go from no knowledge of your work to an understanding sufficient to have a worthwhile conversation with you about your work and where it is headed.

Some considerations for either submission type: Preference will be given to new and exciting problems as opposed to thorough but incremental pieces of work. Either variety of submission should include a list of authors, with an institutional affiliation and status (student, faculty, and so on) for each.

At least one author of each accepted poster will be required to register for the conference and attend the poster session, to present the poster. This should be the most valuable part of participation, as authors will be able to engage conference attendees in extended conversations about their ongoing work!

Important Dates

All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!

Poster abstracts due: April 6, 2012 (E-mail as an attachment to sp2012-posters@lists.csail.mit.edu.)
Poster acceptance notifications: April 12, 2012
Poster abstracts final (for conference web site): May 13, 2012

For more information about the IEEE Symposium on Security and Privacy 2012 poster session, please contact the poster session chair (Adam Chlipala, adamc@csail.mit.edu).

Call For Papers

[PDF version for printing]

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of computer security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation of secure systems.

Topics of interest include:

Access controlAccountability
AnonymityApplication security
Attacks and defensesAuthentication
Censorship and censorship-resistanceDistributed systems security
Embedded systems securityForensics
Hardware securityIntrusion detection
Language-based securityMalware
MetricsNetwork security
Privacy-preserving systemsProtocol security
Secure information flowSecurity and privacy policies
Security architecturesSystem security
Usability and securityWeb security

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review. See back for detailed submission instructions.

Systematization of Knowledge Papers

Following the success of the previous year's conferences, we are also soliciting papers focused on systematization of knowledge (SoK). The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will provide a high value to our community but would otherwise not be accepted because they lack novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Submissions will be distinguished by a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

Workshops

The Symposium is also soliciting submissions for co-located workshops. Workshop proposals should be sent by Friday, 15 August 2011. Details on submissions can be found at this website: http://ieee-security.org/TC/SPW2012/.

Important Dates

All deadlines are 23:59 PST (UTC-8). Absolutely no extensions!

Workshop proposals due: Monday, 15 August 2011
Research papers and SoK papers due: Wednesday, 16 November 2011
Acceptance notification: Wednesday, 1 February 2012
Final papers due: Monday, 5 March 2012

Instructions for Paper Submission

These instructions apply to both the research papers and systematization of knowledge papers.

All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy. Papers must submitted using the conference submission server: https://oakland12-submit.cs.wisc.edu/. Submissions may be started now, and updated at any time until the submission deadline expires.

Submission Server. Papers should be submitted using the conference submission server. https://oakland12-submit.cs.wisc.edu/.

Submissions may be started now, and updated at any time until the submission deadline expires.

Anonymous Submission. Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Page Limit and Formatting. Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found at: http://www.computer.org/portal/web/cscps/formatting.

Submission. Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Publication and Presentation. Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference. Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without review.

For more information, contact the Program Co-Chairs at:
oakland12-pcchairs@ieee-security.org.

Work-In-Progress Talks

A continuing feature of the symposium is a session of 5- minute talks where attendees can present preliminary research results and new ideas. More information on work- in-progress talk submissions will be available on the conference website.

Program Committee

Program Committee Chairs:
Somesh Jha, University of Wisconsin, Madison
Wenke Lee, Georgia Institute of Technology

Program Committee Members:

Guiseppe Ateniese, Johns Hopkins Michael Backes, Max Planck Institute
Michael Bailey, University of Michigan Kevin Borders, NSA
Hebert Bos, Vrije Universiteit Amsterdam David Brumley, Carnegie Mellon University
Kevin Butler, University of Oregon Juan Caballero, IMDEA Software Institute, Spain
Cristian Cadar, Imperial College Shuo Chen, Microsoft Research
Weidong Cui, Microsoft Research Robert Cunningham, MIT Lincoln Laboratory
Anupam Datta, Carnegie Mellon University William Enck, North Carolina State
David Evans, University of Virginia Nick Feamster, Georgia Tech
Debin Gao, Singapore Management Univ. Jon Giffin, Georgia Tech
Virgil Gligor, Carnegie Mellon University Steve Gribble, University of Washington
Guofei Gu, Texas A&M Engin Kirda, Northeastern
Shriram Krishnamurthi, Brown University Christopher Kruegel, UCSB
David Molnar, Microsoft Research Cristina Nita-Rotaru, Purdue
Brian Payne, Sandia National Labs Adrian Perrig, Carnegie Mellon University
J. Alex Halderman, University of Michigan Thorsten Holz, ISEC Lab
Ninghui Li, Purdue Ben Livshits, Microsoft Research
Z. Morley Mao, University of Michigan Jonathan McCune, Carnegie Mellon University
Patrick McDaniel, Penn State Andrew Myers, Cornell
Arvind Narayanan, Stanford Roberto Perdisci, University of Georgia
Zachary N. J. Peterson, Naval Postgrad. School Thomas Ristenpart, University of Wisconsin
William Robertson, Berkeley R. Sekar, Stony Brook
Greg Shannon, Carnegie Mellon Univ./CERT Kapil Singh, IBM Research
Radu Sion, Stony Brook Angelos Stavrou, Goerge Mason University
Patrick Traynor, Georgia Tech Dan Wallach, Rice University
Xiaofeng Wang, Indiana University Simha Sethumadhavan, Columbia
Venkat Venkatakrishnan, U. of Illinois, Chicago Tadayoshi Kohno, University of Washington


Conference News
Panel Preparation
May 22, 2012
Participants who wish to prepare for the discussion on Science of Security on Wednesday afternoon should take a look at the Wikipedia entry on "Strong Inference", link. In particular, if you have time, skim Platt's paper.
Best Paper Awards!
May 22, 2012 Congratulations to the paper award winners.
Best paper award: Don't Trust Satellite Phones
Best student paper award sponsored by Google: Memento
Best practical paper award sponsored by IEEE Security and Privacy Magazine: User-Driven Access Control
Short Talks Announced
May 17, 2012
The eleven short talks for the Tuesday evening session have been announced. The list is available here.
Airport Westin Shuttle Schedule Posted
May 15, 2012
The schedule for the shuttle between the Westing San Francisco Airport and the Westin St. Francis has been posted on the travel page and the hotels page.
Poster Abstracts Added
May 14, 2012
Abstracts for (almost) all the posters in the Monday evening poster session can be viewed here.
Special Rebate Offer!
April 22, 2012
$100 off of the symposium price, for anyone paying full price in his/her category and staying at the Airport Westin and registering with our room block. See the hotels page for more details.
Call for Short Talks posted
April 20, 2012
The Call for Short Talks has been posted on the Call for Papers page. The deadline for submission of abstracts is May 11, 2012.
List of accepted posters available
April 15, 2012
The list of accepted posters can now be viewed posters. The poster session will be Monday, May 21 from 5:45-8:00pm.
Panel of experts formed
April 6, 2012
The panel discussion on Wednesday afternoon will be titled: "How can a focus on "science" advance research in cybersecurity?". Discussion will be moderated by Carl Landwehr. See the program for a detailed description and list of distinguished panelists.
Student Travel Grants Awarded
April 5, 2012
The IEEE S&P 2012 Organizing Committee has awarded 24 student travel grants. More information is available in the "News Bulletin" section of the press page.
Registration Open
March 1, 2012
Registration for the 2012 symposium is now open.
Program Posted
February 22, 2012
The conference program has been posted.
Hotel Booking Available
February 13, 2012
Hotel details have been posted. There are room blocks available at two San Francisco area hotels. Conference registration information will follow shortly.
Call For Posters
February 13, 2012
Adam Chlipala has been named as this years Poster Session Chair. Poster submission details have been posted. The deadline for abstracts is April 6, 2012.
Tentative Skeleton Program Posted
January 28, 2012
Program details are still being finalized. Attendees from past years should be aware that the conference is likely to continue later into Wednesday afternoon than in prior years.
Student Travel Grants
January 10, 2012
Information for students who wish to apply for travel grants is now posted here.
2012 Donors Rolling In
December 16, 2011
Many have already generously donated to the 2012 symposium. Information about donating and the benefits therein can be found here.
2011 Proceedings Available Online
November 1, 2011
All the papers for the 2011 symposium have been made available free of charge at ieee-security.org.
New Venue Confirmed!
October 10, 2011
The 2012 conference will be held at the Westin St. Francis. Detailed hotel and travel information has been posted on the travel page.
Call For Donors Posted
September 12, 2011
Information about donating to the IEEE Symposium on Security and Privacy and the IEEE Security and Privacy Workshops has been posted here.
Call For Papers Posted
August 12, 2011
The 2012 IEEE Symposium on Security and Privacy Call for Papers is now posted here.
Workshop Proposal Deadlines Approaching
August 11, 2011
IEEE S&P Workshop proposals have been accepted, but room is still available, and the deadline, August 15, 2011, is approaching for the second round of proposals. More information available here.
New Website Up
June 21, 2011
The new version of the 2012 conference website is now up.

Find ieeesp2012 on Facebook Follow IEEE_SP2012 on Twitter

Found an error? E-mail ajohnson@seas.harvard.edu.