Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.
Topics of interest include:
This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.
The Symposium is also soliciting submissions for co-located workshops. Further details on submissions can be found at http://www.ieee-security.org/TC/SP2016/workshops.html
All deadlines are 23:59:59 EST (UTC-5).
Paper submission deadline | November 13, 2015 No Extensions |
Early-reject notification and author appeal period | January 13-15, 2016 [Updated] |
Conference registration opens | February, 2016 |
Acceptance notification | February 7, 2016 |
Approval deadline for shepherded papers | February 26, 2016 |
Early-bird conference registration deadline | Mid-April, 2016 |
Camera-ready deadline | March 18, 2016 |
These instructions apply to both the research papers and systematization of knowledge papers.
All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy.
NEW THIS YEAR: To encourage authors to submit their very best work, no single author may appear on more than three (3) non-SoK submissions. Authors who wish to submit more than 3 papers must follow a special procedure for bulk submissions, described below. Also, as described below, early rejection with an option to appeal is being introduced, and a “Student PC” is being established.
Following a successful model used at other premier technical conferences, some paper submissions will be reviewed by a “shadow PC” of students and junior researchers, this year chaired by Joseph Bonneau of Stanford University/EFF. For more information see http://www.ieee-security.org/TC/SP2016/studentpc.html.
There will be no conventional rebuttal process. Papers that receive substantially negative initial reviews will be rejected early and, at the same time, the initial reviews of all submissions will be sent to the authors. Authors who substantively disagree with the reviews can appeal to the PC chairs. Authors’ appeals must clearly and explicitly identify concrete disagreements with factual statements in the initial reviews that should be adjudicated by a special arbitration reviewer who may be recruited by the PC chairs. Appealing a submission that was rejected early will keep it under consideration, and it cannot be withdrawn or resubmitted elsewhere until the final notification of acceptance or rejection.
Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.
Submitted papers may include up to 15 pages of text and up to 5 pages for references and appendices, totalling no more than 20 pages. The same applies to camera-ready papers, although, at the PC chairs’ discretion, additional pages may be allowed for references and appendices. Reviewers are not required to read appendices.
Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8. Failure to adhere to the page limit and formatting requirements can be grounds for rejection.
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.
Special rules apply to all submissions by authors who submit more than 3 non-SoK papers. If the paper has been previously considered at other conferences, journals, or workshops, the submitted version must include an appendix that lists: (a) the year and full name of those venues, (b) the complete set of reviews, and (c) detailed description of the changes made since. This appendix does not count towards the page limit. By their submission, the authors of these papers acknowledge and accept that the PC chairs may solicit further information about them (e.g., to verify the contents of the appendix) and pass such information on to the PC. Failure to comply with these rules will result in automatic rejection of the bulk submissions without consideration.
Papers must be submitted at http://oakland2016.hotcrp.org/ and may be updated at any time until the submission deadline. The submission site will open October 14, 2015.
Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference. Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without review.
Instructions for camera-ready versions of accepted papers are available here.
Authors of accepted papers must also complete and return the IEEE Copyright Release Form, available here.
For more information, contact the program co-chairs at: oakland16-pcchairs@ieee-security.org.
Úlfar Erlingsson | |
Vitaly Shmatikov | Cornell Tech |
Sadia Afroz | ICSI |
Davide Balzarotti | EURECOM |
Adam Barth | |
Karthikeyan Bhargavan | INRIA |
Joseph Bonneau | Stanford / EFF |
Nikita Borisov | UIUC |
Kevin Butler | U. of Florida |
Steve Checkoway | UIC |
Haibo Chen | SJTU |
Adam Chlipala | MIT |
Nicolas Christin | CMU |
Manuel Costa | MSRC |
Emiliano de Cristofaro | UCL |
Ittay Eyal | Cornell |
Adrienne Porter Felt | |
Arjun Guha | UMass |
Andreas Haeberlen | UPenn |
Nadia Heninger | UPenn |
Jason Hong | CMU |
Amir Houmansadr | UMass |
Brent Kang | KAIST |
Chris Kanich | UIC |
Sam King | |
Aleksandra Korolova | USC |
David Lie | Toronto |
Jay Lorch | MSR |
Matteo Maffei | CISPA, Saarland |
David Mazières | Stanford |
Ilya Mironov | |
Cristina Nita-Rotaru | Northeastern |
Marcus Peinado | MSR |
Frank Piessens | KU Leuven |
Benny Pinkas | BIU |
Mike Reiter | UNC Chapel Hill |
Franziska Roesner | U. of Washington |
Ulrich Rührmair | U. of Bochum |
Prateek Saxena | Singapore |
Thomas Schneider | TU Darmstadt |
Vyas Sekar | CMU |
Simha Sethumadhavan | Columbia |
Hovav Shacham | ICSI / UCSD |
Elaine Shi | Cornell |
Emin Gun Sirer | Cornell |
Matthew Smith | U. Bonn |
Nikhil Swamy | MSR |
Nina Taft | |
Gang Tan | Lehigh |
Mohit Tiwari | U. of Texas at Austin |
Eran Tromer | TAU |
Carmela Troncoso | IMDEA Software |
Giovanni Vigna | UCSB |
Bogdan Warinschi | Bristol University |
Robert Watson | U. of Cambridge |
Tao Xie | UIUC |
Jean Yang | CMU |
Junfeng Yang | Columbia |
Ben Zhao | UCSB |
Yinqian Zhang | Ohio State |