28th IEEE Computer Security Foundations Symposium


Call for papers


The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, such as formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection. This year, CSF will use a light form of double blind reviewing; see below.


Topics

New results in computer security are welcome. We also encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about security. Possible topics for all papers include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware-based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.


Special Sessions

This year, we strongly encourage papers in three foundational areas of research we would like to promote at CSF:

  • PRIVACY: (Chair: Catuscia Palamidessi.) CSF 2015 will include a special session on privacy foundations and invites submissions on definitions, models, and frameworks for communication and data privacy, principled analysis of deployed or proposed privacy protection mechanisms, and foundational aspects of practical privacy technologies. We especially encourage submissions aiming at connecting the computer science point of view on privacy with that of other disciplines (law, economics, sociology,...)
  • VOTING: (Chair: Olivier Pereira.) CSF 2015 will include a special session on voting technologies and invites submissions on definitions, models and analysis of voting systems or their components, including (but not limited to) vote authentication mechanisms, ballot tallying techniques, election verifiability and audit techniques, election problem recovery. As several countries are currently looking for the adoption of voting systems with enhanced security features, submissions that inform on deployed voting systems or propose original approaches for the design or improvement of voting systems are both welcome.

These papers will be reviewed under the supervision of the special session chairs. They will be presented at the conference, and will appear in the CSF proceedings, without any distinction from the other papers.

Proceedings, published by the IEEE Computer Society Press (pending approval), will be available at the symposium, and selected papers will be invited for submission to the Journal of Computer Security.


IMPORTANT DATES

Papers due:   February 10, 2015, 11:59 pm   (Eastern Standard Time)
Author response period:   March 23-24, 2015, ending at 11:59 pm   (Eastern Standard Time)
Notification:   April 6, 2015
Camera ready:   May 9, 2015
Symposium:   July 14 - 17, 2015

Program Committee

  • Michele Bugliesi, Università Ca Foscari Venezia
  • Jason Crampton, Royal Holloway
  • Cas Cremers, University of Oxford
  • Ulfar Erlingsson, Google
  • Cedric Fournet, Microsoft Research (Program Co-Chair)
  • Deepak Garg, Max Planck Institute for Software Systems
  • Joshua Guttman, Worcester Polytechnic Institute and MITRE
  • Michael Hicks, University of Maryland (Program Co-Chair)
  • Boris Köpf, IMDEA Software Institute
  • Ralf Küsters, University of Trier
  • Andrew Myers, Cornell University
  • David Naumann, Stevens Institute of Technology
  • Catuscia Palamidessi, INRIA (Area Chair on Privacy)
  • Olivier Pereira, UC Louvain (Area Chair on Voting)
  • Frank Piessens, KU Leuven (Area Chair on Secure Systems)
  • Tamara Rezk, INRIA
  • James Riely, DePaul University
  • Dave Sands, Chalmers University of Technology
  • Elaine Shi, University of Maryland
  • Nikhil Swamy, Microsoft Research
  • Mudhakar Srivatsa, IBM T J Watson Center
  • Santiago Zanella Beguelin, MSR-INRIA
  • Jianying Zhou, Institute for Infocomm Research

Paper submission instructions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings.

Papers must be submitted using the two-column IEEE Proceedings style available for various document preparation systems at the IEEE Conference Publishing Services page. All papers should be at most 12 pages long, not counting bibliography and well-marked appendices. Committee members are not required to read appendices, and so the paper must be intelligible without them.

Following the recent history of other top-quality conferences and symposia in security, CSF'15 will employ a light form of double-blind reviewing. To facilitate this, submitted papers must (a) omit any reference to the authors' names or the names of their institutions, and (b) reference the authors' own related work in the third person (e.g., not "We build on our previous work ..." but rather "We build on the work of ..."). Nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more difficult (e.g., important background references should not be omitted or anonymized). Please see the following answers to frequently asked questions (FAQ) that address many common concerns. When in doubt, contact the program chairs.

Papers failing to adhere to any of the instructions above will be rejected without consideration of their merits.

Papers should be submitted in Portable Document Format (PDF) to the CSF 2015 submission site: https://csf15.hotcrp.com/

Papers intended for one of the special sessions should select the "Privacy", "Voting", or "Secure Systems" option, as appropriate. At least one coauthor of each accepted paper is required to attend CSF to present the paper.



Program Chairs

Cedric Fournet
Cedric Fournet
Microsoft Research
Cambridge, UK
Anupam Datta
Michael Hicks
University of Maryland
College Park, USA

General Chair

Luca Viganò
General Chair
Luca Viganò
King's College London, UK

Pubblication Chair

Deepak Garg
Publications chair
Deepak Garg
Max Planck Institute for
Software Systems, Germany

Publicity Chair

Matteo Maffei
Publicity chair
Matteo Maffei
CISPA, Saarland University,
Germany


Call For Paper (txt)
Call For Paper (PDF)