MAY 18-20, 2015 AT THE FAIRMONT, SAN JOSE, CA

36th IEEE Symposium on
Security and Privacy

Call For Papers


Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.

Topics of interest include:

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Given the rapidly expanding and maturing security and privacy community, we hope to increase the acceptance rate of papers that are more far-reaching and risky, as long as those papers also show sufficient promise for creating interesting discussions and questioning widely-held beliefs.

Systematization of Knowledge Papers

Following the success of recent years’ conferences, we are also soliciting papers focused on systematization of knowledge (SoK). The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. Such work can provide a high value to our community but may not be accepted because of a lack of novel research contributions. Suitable papers are those that provide important new insights on established, major research areas or support or challenge long-held beliefs with compelling evidence. Papers that survey research areas without providing such insights are not appropriate. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

Workshops

The Symposium is also soliciting submissions for co-located workshops. Further details on submissions can be found at http://www.ieee-security.org/TC/SP2015/workshops.html

Important Dates

All deadlines are 23:59:59 EST (UTC-5).

Paper submission deadline November 14, 2014  No Extensions
Author response period January 14-16, 2015
Acceptance notification February 8, 2015
Shepherded papers approval deadline February 27, 2015
Camera-ready deadline March 5, 2015

Instructions for Paper Submission


These instructions apply to both the research papers and systematization of knowledge papers.

All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Papers may not be withdrawn between the start of the author response period and acceptance notification. Contact the program committee chairs if there are questions about this policy.

Anonymous Submission

Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Page Limit and Formatting

Submitted papers may include up to 15 pages of text and up to 5 pages for references and appendices, totalling no more than 20 pages. Camera-ready papers must not exceed 16 pages total including references and appendices. Reviewers are not required to read appendices.

Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8. Failure to adhere to the page limit and formatting requirements can be grounds for rejection.

Submission

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Conference Submission Server

Papers must be submitted at https://oakland2015.ece.cmu.edu and may be updated at any time until the submission deadline. The submission site will open October 14, 2015.

Publication and Presentation

Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference. Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without review.

For more information, contact the program co-chairs at: oakland15-pcchairs@ieee-security.org.

Program Committee


Chairs

Lujo Bauer Carnegie Mellon University
Vitaly Shmatikov The University of Texas at Austin

Members

Michael Bailey University of Illinois at Urbana Champaign
David Basin ETH Zurich
Lujo Bauer Carnegie Mellon University
Konstantin Beznosov University of British Columbia
Joseph Bonneau Stanford University & EFF
Herbert Bos Vrije Universiteit / VU University Amsterdam
Srdjan Capkun ETH Zurich
Hao Chen UC Davis
Shuo Chen Microsoft Research
Nicolas Christin Carnegie Mellon University
Emiliano De Cristofaro UCL
David Evans University of Virginia
Bryan Ford Yale University
Cedric Fournet Microsoft Research
Deepak Garg MPI-SWS
Matt Green Johns Hopkins University
Carl Gunter University of Illinois
Nadia Heninger University of Pennsylvania
Cormac Herley Microsoft Research
Michael Hicks University of Maryland, College Park
Sotiris Ioannidis Foundation for Research and Technology - Hellas
Trent Jager Pennsylvania State University
Limin Jia Carnegie Mellon University
Ari Juels Cornell Tech
Chris Kanich University of Illinois at Chicago
Jonathan Katz University of Maryland, College Park
Yongdae Kim KAIST
Farinaz Koushanfar Rice University
Ralf Kuesters University of Trier
David Lie University of Toronto
Michelle Mazurek University of Maryland, College Park
Jelena Mirkovic USC ISI
Greg Morrisett Harvard University
Andrew Myers Cornell University
Arvind Narayanan Princeton University
Alina Oprea RSA Labs
Bryan Parno Microsoft Research
Frank Piessens KU Leuven
Raluca Ada Popa MIT
Niels Provos Google
Michael K. Reiter UNC Chapel Hill
Thomas Ristenpart University of Wisconsin
William Robertson Northeastern University
Franziska Roesner University of Washington
Andrei Sabelfeld Chalmers University
Prateek Saxena National University of Singapore
Vyas Sekar Carnegie Mellon University
Vitaly Shmatikov University of Texas at Austin
Matthew Smith University of Bonn
Robin Sommer ICSI/LBNL
Jessica Staddon Google
Edward Suh Cornell University
Mohit Tiwari University of Texas at Austin
Haining Wang University of Delaware
Robert Watson University of Cambridge
Matthew Wright University of Texas at Arlington
Dongyan Xu Purdue University
Xiaowei Yang Duke University
Vinod Yegneswaran SRI International
Ben Zhao UC Santa Barbara