IEEE Symposium on Security and Privacy
Call For Papers

[PDF version for printing]

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

We solicit previously unpublished papers offering novel research contributions in any aspect of computer security or privacy. S & P is interested in all aspects of computer security and privacy. Papers may present advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems. Papers without a clear application to security or privacy will be considered out of scope and may be rejected without full review.

Topics of interest include, but are not limited to:

Access control Anonymity
Application-level security Attacks and defenses
Authentication Distributed systems security
Embedded system security Forensics
Hardware-based security Information flow
Information security Intrusion detection
Malicious code Language-based security
Network security Physical security
Privacy-preserving systems Recovery
Secure protocols Security architectures
Security and privacy policies System security
Usability and security Web security

The Symposium is also soliciting submissions for colocated workshops, tutorials, posters, and work-in-progress talks. See below for more information on these program elements.

Symposium Organizers

General chair: David Du (University of Minnesota)
Program chairs: Andrew Myers (Cornell University) and David Evans (University of Virginia)
Registration chair: Ulf Lindqvist (SRI International)
Treasurer: David Shambroom (Intersystems Corporation)
Publications chair: Carrie Gates (CA Labs)
Poster chair: Cristina Nita-Rotaru (Purdue University)
Web design chair: Adrienne Felt (Univ. of California, Berkeley)

Program Committee
Ben Adida, Harvard U., USA
William Aiello, U. of British Columbia, Canada
Ross Anderson, Cambridge U., UK
Michael Backes, Saarland U., Germany
Srdjan Capkun, ETH Zürich, Switzerland
Miguel Castro, Microsoft Research Cambridge, UK
Hao Chen, U. of California, Davis, USA
Jed Crandall, U. of New Mexico, USA
Bruno Crispo, U. of Trento, Italy
Weidong Cui, Microsoft Research, Redmond, USA
George Danezis, Microsoft Research, Cambridge, UK
Úlfar Erlingsson, Reykjavik U., Iceland
Michael Freedman, Princeton U., USA
Kevin Fu, U. of Massachusetts, USA
Jonathon Giffin, Georgia Inst. of Technology, USA
Ian Goldberg, U. of Waterloo, Canada
Andrew D. Gordon, Microsoft Research Cambridge, UK
Steve Gribble, U. of Washington, USA
Guofei Gu, Texas A&M U., USA
Peter Gutmann, U. of New Auckland, NZ
Michael Hicks, U. of Maryland, USA
Farnam Jahanian, U. of Michigan, USA
Xuxian Jiang, North Carolina State U., USA
Jonathan Katz, U. of Maryland, USA
Sam King, U. Illinois, Urbana-Champaign, USA
Tadayoshi Kohno, U. of Washington, USA
Farinaz Koushanfar, Rice U., USA
Wenke Lee, Georgia Inst. of Technology, USA
Kristen LeFevre, U. of Michigan, USA
David Lie, U. Toronto, Canada
John Mitchell, Stanford U., USA
Greg Morrisett, Harvard U., USA
Peng Ning, North Carolina State U., USA
Reiner Sailer, IBM TJ Watson Research Center
Stefan Savage, U. of California, San Diego, USA
R. Sekar, Stony Brook U., USA
Umesh Shankar, Google, New York, USA
Abhi Shelat, U. of Virginia, USA
Vitaly Shmatikov, U. of Texas, Austin, USA
Radu Sion, Stony Brook U., USA
Patrick Traynor, Georgia Tech, USA
Doug Tygar, U. of California, Berkeley, USA
Giovanni Vigna, U. of California, Santa Barbara, USA
David Wagner, U. of California, Berkeley, USA
Haining Wang, College of William and Mary, USA
Brent Waters, U. of Texas, Austin, USA
Rebecca Wright, Rutgers U., USA
Steve Zdancewic, U. of Pennsylvania, USA

There will be awards for the best paper, best student paper, and best practical paper from the accepted program. These awards will be chosen by the program committee. The best paper award will be given to the paper judged to have the highest overall quality. A student must be the first author to be eligible for the best student paper. The best practical paper award will be for the paper judged most likely to immediately improve current security practice.

Instructions for paper submission

Submissions received after the submission deadline or failing to conform to the submission guidelines risk rejection without consideration of their merits.

All submissions must reflect original work and must precisely document any overlap with previously published or simultaneously submitted papers from any of the authors. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed. Failure to clearly document such overlaps will lead to automatic rejection. If authors have any doubts regarding such overlaps, they should contact the program chairs prior to submission.

Papers should be submitted in Portable Document Format (.pdf) in US letter (not A4) paper size with a margin width of at least 3/4 inch. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3 1/4 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE standard Latex template, found at: (download the Transactions Style File). To produce the Oakland conference format, start your document with:

Authors are reminded to pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 8.

Papers must not exceed 12 pages, excluding the bibliography and well-marked appendices. Reviewers are not required to read appendices, so papers must be self-contained without them.

Papers must be submitted in a form suitable for anonymous review: remove author names and affiliations from the title page, and avoid explicit self-referencing in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program chairs you have any questions.

Please submit your paper through the submissions website at Submissions are accepted in .pdf form only. If you have any difficulty submitting a paper or have any questions about the submission process, please contact the program chairs at .

Submissions due:
Monday, 10 November 2008, 23:59:59 PST time (UTC-8)
—Absolutely no extensions!—
Acceptance notification: 30 January 2009
Final papers due: 1 March 2009

Authors are responsible for obtaining appropriate publication clearances; authors of accepted papers will be asked to sign IEEE copyright release forms.

Workshops and Tutorials

Workshop and tutorial proposals should be sent by Monday, 10 November 2008 to .

Workshops may be half-day or full-day in length. Submissions should include the title, a short description of the topic of the workshop, and a short biography of the organizer(s).

Tutorials may be 90 minutes or 3 hours long. Submissions should include the title, a brief description of the topic for the tutorial and intended audience, the intended length, and a short biography of the presenter(s).


There will be a poster session at an evening reception during the conference. Posters are solicited that present recent and ongoing research on security and privacy related topics. Posters are nice opportunities for students to obtain feedback on ongoing work. More information on submissions will be available on the conference website soon.

Work-in-Progress Talks

A continuing feature of the symposium is a session of 5-minute talks where attendees can present preliminary research results and new ideas. More information on work-in-progress talk submissions will be available on the conference website soon.

Registration and Reception
17 May 2009
Registration starts today (Sunday, 17 May) at 4:00pm. Join us at the reception in Lanai 2.
Accepted Posters
29 Mar 2009
These posters have been accepted for the poster session.
1999 Symposium Picture
22 Mar 2009
A picture (and registration information) of the attendees of the twentieth symposium ten years ago is here. Please help us identify more people in the picture.
Travel Grants
10 Mar 2009
Travel Grants information is now posted. Applications are requested by 15 April 2009.
Registration Open
4 Mar 2009
Registration is now open. The early registration deadline is 20 April 2009.
Call for Short Talks
9 Mar 2009
The Call for Short Talks is now posted.
Advance Program
3 Mar 2009
Advance Program released.
Workshops and Tutorials
7 Feb 2009
Information on Workshops and Tutorials is now available.

More News