[TYPES/announce] CFP: 32nd IEEE Computer Security Foundations Symposium

Maffei, Matteo matteo.maffei at tuwien.ac.at
Mon Nov 19 10:39:53 EST 2018


32nd IEEE Computer Security Foundations Symposium

June 25-28, 2019, Hoboken NJ, USA


Call for Papers


The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, such as formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection.



Topics


New results in computer security are welcome. We also encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about security. Possible topics for all papers include, but are not limited to:


access control

accountability

anonymity and privacy

authentication

blockchain

computer-aided cryptography

data and system integrity

database security

decidability and complexity

distributed systems security

electronic voting

formal methods and verification

decision theory

hardware-based security

information flow control

intrusion detection

language-based security

machine learning

network security

data provenance

mobile security

security metrics

security protocols

smart contract

software security

socio-technical security

trust management

usable security

web security


SoK papers: Systematization of Knowledge Papers


CSF'19  solicits systematization of knowledge (SoK) papers in foundational computer security and privacy research. These papers systematize, re-formulate, or evaluate existing work in one established and significant research topic. Such papers must provide new insights. Survey papers without new insights are not appropriate. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. Accepted papers will be presented at the symposium and included in the proceedings.


Special Sessions


This year, we strongly encourage papers in three foundational areas of research we would like to promote at CSF:


MACHINE LEARNING MEETS SECURITY AND PRIVACY (Chair: Matt Fredrikson). Machine learning has revolutionized computer science. However, machine learning algorithms are often applied in ways that offer few guarantees in terms of fairness and transparency of the results or privacy of the dataset. We invite submissions on foundational work in this area. Topics include identifying security, privacy, and fairness issues in machine learning algorithms; new reasoning techniques necessary to justify the security and privacy properties of machine learning algorithms; techniques for ensuring security, fairness, and transparency of machine learning algorithms; and techniques for protecting the privacy of training data and models.


BLOCKCHAIN and SMART CONTRACTS (Chair: Aniket Kate). The rapid development of blockchain technology and smart contracts has led us to several non-traditional security and privacy challenges, as evidenced by a number of high-profile attacks that resulted in huge financial losses. There is a strong need to develop formal foundations for the security and privacy of blockchain and smart contracts. We invite submissions on foundational work in these areas. Topics include identifying security and privacy issues; analysis and verification of existing solutions; design of new systems with better security and privacy properties; broader foundational issues such as how blockchain mechanisms interoperate and fit into larger distributed ecosystems and foundational security aspects of applications built on top of blockchain mechanisms; and new programming languages for smart contracts.


COMPUTER-AIDED CRYPTOGRAPHY (Chair: Dominique Unruh). Modern cryptography is built on firm theoretical foundations. However, cryptography proofs that do not abstract away from the actual cryptography are often intricate and the gap from model to code is usually large, which opens the door to bugs and vulnerabilities. Computer-aided formal methods can provide assurance of the security of cryptographic protocols, primitives and their implementations in software and hardware. We invite submissions on foundational work in this area. Topics include, but are not limited to, verification of cryptographic protocols and primitives, verification of cryptographic software and hardware, tools to automate formal verification, models and proof techniques that are more verification-friendly, and formal proofs of side-channel countermeasures.


These papers will be reviewed under the supervision of the special session chairs. They will be presented at the conference, and will appear in the CSF proceedings, without any distinction from the other papers.


Proceedings will be published by the IEEE Computer Society Press and will be available at the symposium. Some small number of papers will be selected by the PC as "Distinguished Papers".


Important Dates

Abstracts due: February 22

Papers due: February 26

Notification: April 19

Camera ready: May 10

CSF Symposium: June 25-28


Program Committee


Thomas H. Austin        San Jose State University

Musard Balliu           KTH Royal Institute of Technology

Bruno Blanchet          INRIA

Tom Chothia             University of Birmingham

Véronique Cortier       CNRS

Cas Cremers             CISPA-Helmholtz Center

Riccardo Focardi        Ca'Foscari Univ. of Venice

Cédric Fournet          MSR

Matt Fredrikson         Carnegie Mellon University

Marco Gaboardi          University at Buffalo, SUNYs

Chris Hawblitzel        MSR

Justin Hsu              University of Wisconsin

Aniket Kate             Purdue University

Matteo Maffei           TU Wien

David Naumann           Stevens Institute of Technology

Catuscia Palamidessi    INRIA

Corina Pasareanu        NASA Ames Research Center

Christine Rizkallah     University of New South Wales

Peter Y.A. Ryan         University of Luxembourg

David Sands             Chalmers University of Technology

Ralf Sasse              ETH Zurich

Dominique Unruh         University of Tartu

Danfeng Zhang           Penn State University


Co-Chairs

Stephanie Delaune       Univ Rennes, CNRS, IRISA

Limin Jia               Carnegie Mellon University



Paper Submission Instructions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings.


Papers must be submitted using the two-column IEEE Proceedings style available for various document preparation systems at the IEEE Conference Publishing Services page. All papers should be at most 12 pages long, not counting bibliography and well-marked appendices. Committee members are not required to read appendices, and so the paper must be intelligible without them.


CSF'19 will employ a light form of double-blind reviewing. Submitted papers must (a) omit any reference to the authors' names or the names of their institutions, and (b) reference the authors' own related work in the third person (e.g., not "We build on our previous work ..." but rather "We build on the work of ..."). Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more difficult (e.g., important background references should not be omitted or anonymized). Please see the conference site for answers to frequently asked questions (FAQ) that address many common concerns. When in doubt, contact the program chairs.


Papers failing to adhere to any of the instructions above will be rejected without consideration of their merits.


Papers intended for one of the special sessions should select the "Computer-Aided Cryptography", "Blockchain and smart contract", "Machine learning meets security and privacy" option, as appropriate.


At least one co-author of each accepted paper is required to attend CSF to present the paper. In the event of difficulty in obtaining visas for travel, exceptions can be made and will be discussed on a case-by-case basis.


--
Univ. Prof. Matteo Maffei
Security and Privacy Group
TU Wien
Favoritenstrasse 9-11<x-apple-data-detectors://1>, Stiege 2, 1. Stock
Wien, A-1040
Website: secpriv.tuwien.ac.at<http://secpriv.tuwien.ac.at/>
Phone: +43158801184860<tel:+43158801184860>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://LISTS.SEAS.UPENN.EDU/pipermail/types-announce/attachments/20181119/d0130e56/attachment-0001.html>


More information about the Types-announce mailing list