CSF 2015 - 28th IEEE Computer Security Foundations Symposium (CSF 2015)
Date2015-07-14 - 2015-07-17
Deadline2015-02-10
VenueVerona, Italy
Keywords
Websitehttps://csf2015.di.univr.it
Topics/Call fo Papers
CSF 2015 Call for Papers
28th IEEE Computer Security Foundations Symposium
http://csf2015.di.univr.it/
July 14 - 17, 2015
Verona, Italy
The Computer Security Foundations Symposium is an annual conference
for researchers in computer security. CSF seeks papers on foundational
aspects of computer security, such as formal security models,
relationships between security properties and defenses, principled
techniques and tools for design and analysis of security mechanisms,
as well as their application to practice. While CSF welcomes
submissions beyond the topics listed below, the main focus of CSF is
foundational security: submissions that lack foundational aspects risk
rejection.
This year, CSF will use a light form of double blind reviewing; see
below.
Topics
---
New results in computer security are welcome. We also encourage
challenge/vision papers, which may describe open questions and raise
fundamental concerns about security. Possible topics for all papers
include, but are not limited to: access control, accountability,
anonymity, authentication, critical infrastructure security,
cryptography, data and system integrity, database security,
decidability and complexity, distributed systems, electronic voting,
executable content, formal methods and verification, game theory and
decision theory, hardware-based security, humans and computer
security, information flow, intrusion detection, language-based
security, network security, novel insights on attacks, privacy,
provenance, resource usage control, security for mobile computing,
security models, security protocols, software security,
socio-technical security, trust management, usable security, web
security.
Special Sessions
---
This year, we strongly encourage papers in three foundational areas of
research we would like to promote at CSF:
PRIVACY. (Chair: Catuscia Palamidessi.) CSF 2015 will include a
special session on privacy foundations and invites submissions on
definitions, models, and frameworks for communication and data
privacy, principled analysis of deployed or proposed privacy
protection mechanisms, and foundational aspects of practical privacy
technologies. We especially encourage submissions aiming at
connecting the computer science point of view on privacy with that
of other disciplines (law, economics, sociology,...)
VOTING. (Chair: Olivier Pereira.) CSF 2015 will include a special
session on voting technologies and invites submissions on
definitions, models and analysis of voting systems or their
components, including (but not limited to) vote authentication
mechanisms, ballot tallying techniques, election verifiability and
audit techniques, election problem recovery. As several countries
are currently looking for the adoption of voting systems with
enhanced security features, submissions that inform on deployed
voting systems or propose original approaches for the design or
improvement of voting systems are both welcome.
SECURE SYSTEMS. (Chair: Frank Piessens.) The need for principled
secure systems is higher than ever, with Internet connectivity
extending its reach from servers and desktops to mobile devices, and
(sometimes tiny) embedded systems. Interesting new security designs
are being studied at all system layers, from protected module
architectures at the hardware level to language based software
security. CSF 2015 invites submissions of papers that study
foundational aspects of such designs and the relations between them,
including papers on hardware and/or software security architectures,
policy enforcement mechanisms, secure programming languages, secure
compilation, and operating system or browser security.
These papers will be reviewed under the supervision of the special
session chairs. They will be presented at the conference, and will
appear in the CSF proceedings, without any distinction from the other
papers.
Proceedings, published by the IEEE Computer Society Press (pending
approval), will be available at the symposium, and selected papers
will be invited for submission to the Journal of Computer Security.
***
IMPORTANT DATES
Papers due: February 10, 2015, 11:59pm EST
Author response period: March 23-24, 2015, ending at 11:59pm EST
Notification: April 6, 2015
Camera ready: May 9, 2015
Symposium: July 14--17, 2015
***
PROGRAM COMMITTEE
Michele Bugliesi, Universita Ca Foscari Venezia
Jason Crampton, Royal Holloway
Cas Cremers, University of Oxford
Ulfar Erlingsson, Google
Cedric Fournet, Microsoft Research (Program Co-Chair)
Deepak Garg, Max Planck Institute for Software Systems
Joshua Guttman, Worcester Polytechnic Institute and MITRE
Michael Hicks, University of Maryland (Program Co-Chair)
Sushil Jajodia, George Mason University
Boris Koepf, IMDEA Software Institute
Ralf Kuesters, University of Trier
Andrew Myers, Cornell University
David Naumann, Stevens Institute of Technology
Catuscia Palamidessi, INRIA (Area Chair on Privacy)
Olivier Pereira, UC Louvain (Area Chair on Voting)
Frank Piessens, KU Leuven (Area Chair on Secure Systems)
Tamara Rezk, INRIA
James Riely, DePaul University
Dave Sands, Chalmers University of Technology
Nikhil Swamy, Microsoft Research
Mudhakar Srivatsa, IBM T J Watson Center
Santiago Zanella Beguelin, MSR-INRIA
Jianying Zhou, Institute for Infocomm Research
***
PAPER SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with published proceedings.
Papers must be submitted using the two-column IEEE Proceedings style
available for various document preparation systems at the IEEE
Conference Publishing Services page. All papers should be at most 12
pages long, not counting bibliography and well-marked appendices.
Committee members are not required to read appendices, and so the
paper must be intelligible without them.
Following the recent history of other top-quality conferences and
symposia in security, CSF'15 will employ a light form of double-blind
reviewing. To facilitate this, submitted papers must (a) omit any
reference to the authors' names or the names of their institutions,
and (b) reference the authors' own related work in the third person
(e.g., not "We build on our previous work ..." but rather "We build on
the work of ..."). Nothing should be done in the name of anonymity
that weakens the submission or makes the job of reviewing the paper
more difficult (e.g., important background references should not be
omitted or anonymized). Please see the conference site for answers to
frequently asked questions (FAQ) that address many common
concerns. When in doubt, contact the program chairs.
Papers failing to adhere to any of the instructions above will be
rejected without consideration of their merits.
Papers should be submitted in Portable Document Format (PDF) to the
CSF 2015 submission site:
https://csf15.hotcrp.com/.
Papers intended for one of the special sessions should select the
"Privacy", "Voting", or "Secure Systems" option, as appropriate.
At least one coauthor of each accepted paper is required to attend CSF
to present the paper.
***
PC Chairs
Cedric Fournet, Microsoft Research
Michael Hicks, University of Maryland
General Chair
Luca Vigano, King's College London
Publications Chair
Deepak Garg, Max Planck Institute for Software Systems
Publicity Chair
Matteo Maffei, CISPA, Saarland University
28th IEEE Computer Security Foundations Symposium
http://csf2015.di.univr.it/
July 14 - 17, 2015
Verona, Italy
The Computer Security Foundations Symposium is an annual conference
for researchers in computer security. CSF seeks papers on foundational
aspects of computer security, such as formal security models,
relationships between security properties and defenses, principled
techniques and tools for design and analysis of security mechanisms,
as well as their application to practice. While CSF welcomes
submissions beyond the topics listed below, the main focus of CSF is
foundational security: submissions that lack foundational aspects risk
rejection.
This year, CSF will use a light form of double blind reviewing; see
below.
Topics
---
New results in computer security are welcome. We also encourage
challenge/vision papers, which may describe open questions and raise
fundamental concerns about security. Possible topics for all papers
include, but are not limited to: access control, accountability,
anonymity, authentication, critical infrastructure security,
cryptography, data and system integrity, database security,
decidability and complexity, distributed systems, electronic voting,
executable content, formal methods and verification, game theory and
decision theory, hardware-based security, humans and computer
security, information flow, intrusion detection, language-based
security, network security, novel insights on attacks, privacy,
provenance, resource usage control, security for mobile computing,
security models, security protocols, software security,
socio-technical security, trust management, usable security, web
security.
Special Sessions
---
This year, we strongly encourage papers in three foundational areas of
research we would like to promote at CSF:
PRIVACY. (Chair: Catuscia Palamidessi.) CSF 2015 will include a
special session on privacy foundations and invites submissions on
definitions, models, and frameworks for communication and data
privacy, principled analysis of deployed or proposed privacy
protection mechanisms, and foundational aspects of practical privacy
technologies. We especially encourage submissions aiming at
connecting the computer science point of view on privacy with that
of other disciplines (law, economics, sociology,...)
VOTING. (Chair: Olivier Pereira.) CSF 2015 will include a special
session on voting technologies and invites submissions on
definitions, models and analysis of voting systems or their
components, including (but not limited to) vote authentication
mechanisms, ballot tallying techniques, election verifiability and
audit techniques, election problem recovery. As several countries
are currently looking for the adoption of voting systems with
enhanced security features, submissions that inform on deployed
voting systems or propose original approaches for the design or
improvement of voting systems are both welcome.
SECURE SYSTEMS. (Chair: Frank Piessens.) The need for principled
secure systems is higher than ever, with Internet connectivity
extending its reach from servers and desktops to mobile devices, and
(sometimes tiny) embedded systems. Interesting new security designs
are being studied at all system layers, from protected module
architectures at the hardware level to language based software
security. CSF 2015 invites submissions of papers that study
foundational aspects of such designs and the relations between them,
including papers on hardware and/or software security architectures,
policy enforcement mechanisms, secure programming languages, secure
compilation, and operating system or browser security.
These papers will be reviewed under the supervision of the special
session chairs. They will be presented at the conference, and will
appear in the CSF proceedings, without any distinction from the other
papers.
Proceedings, published by the IEEE Computer Society Press (pending
approval), will be available at the symposium, and selected papers
will be invited for submission to the Journal of Computer Security.
***
IMPORTANT DATES
Papers due: February 10, 2015, 11:59pm EST
Author response period: March 23-24, 2015, ending at 11:59pm EST
Notification: April 6, 2015
Camera ready: May 9, 2015
Symposium: July 14--17, 2015
***
PROGRAM COMMITTEE
Michele Bugliesi, Universita Ca Foscari Venezia
Jason Crampton, Royal Holloway
Cas Cremers, University of Oxford
Ulfar Erlingsson, Google
Cedric Fournet, Microsoft Research (Program Co-Chair)
Deepak Garg, Max Planck Institute for Software Systems
Joshua Guttman, Worcester Polytechnic Institute and MITRE
Michael Hicks, University of Maryland (Program Co-Chair)
Sushil Jajodia, George Mason University
Boris Koepf, IMDEA Software Institute
Ralf Kuesters, University of Trier
Andrew Myers, Cornell University
David Naumann, Stevens Institute of Technology
Catuscia Palamidessi, INRIA (Area Chair on Privacy)
Olivier Pereira, UC Louvain (Area Chair on Voting)
Frank Piessens, KU Leuven (Area Chair on Secure Systems)
Tamara Rezk, INRIA
James Riely, DePaul University
Dave Sands, Chalmers University of Technology
Nikhil Swamy, Microsoft Research
Mudhakar Srivatsa, IBM T J Watson Center
Santiago Zanella Beguelin, MSR-INRIA
Jianying Zhou, Institute for Infocomm Research
***
PAPER SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with published proceedings.
Papers must be submitted using the two-column IEEE Proceedings style
available for various document preparation systems at the IEEE
Conference Publishing Services page. All papers should be at most 12
pages long, not counting bibliography and well-marked appendices.
Committee members are not required to read appendices, and so the
paper must be intelligible without them.
Following the recent history of other top-quality conferences and
symposia in security, CSF'15 will employ a light form of double-blind
reviewing. To facilitate this, submitted papers must (a) omit any
reference to the authors' names or the names of their institutions,
and (b) reference the authors' own related work in the third person
(e.g., not "We build on our previous work ..." but rather "We build on
the work of ..."). Nothing should be done in the name of anonymity
that weakens the submission or makes the job of reviewing the paper
more difficult (e.g., important background references should not be
omitted or anonymized). Please see the conference site for answers to
frequently asked questions (FAQ) that address many common
concerns. When in doubt, contact the program chairs.
Papers failing to adhere to any of the instructions above will be
rejected without consideration of their merits.
Papers should be submitted in Portable Document Format (PDF) to the
CSF 2015 submission site:
https://csf15.hotcrp.com/.
Papers intended for one of the special sessions should select the
"Privacy", "Voting", or "Secure Systems" option, as appropriate.
At least one coauthor of each accepted paper is required to attend CSF
to present the paper.
***
PC Chairs
Cedric Fournet, Microsoft Research
Michael Hicks, University of Maryland
General Chair
Luca Vigano, King's College London
Publications Chair
Deepak Garg, Max Planck Institute for Software Systems
Publicity Chair
Matteo Maffei, CISPA, Saarland University
Other CFPs
- 40th International Symposium on Mathematical Foundations of Computer Science
- 8th International Workshop on Virtualization Technologies in Distributed Computing
- International Journal of Big Data Intelligence (IJBDI)
- National Seminar on “Holistic Development of Agroforestry: Potential and Policy Issues”
- Second Congress on Multicore and GPU Programming
Last modified: 2014-12-13 16:05:10