Message posted on 09/03/2020

NSPW 2020 Call for Papers

                NSPW 2020: Call for Papers
<br>New Hampshire, USA
<br>October 26-29, 2020
<br>www.nspw.org
<br>
<br>Submission deadline:             May 8, 2020  23:59 (UTC -11) firm
<br>Format:                                   PDF file (ACM SIG formatting) via Easychair
<br>Notification of acceptance:     July 10, 2020
<br>Pre-proceedings deadline:     August 7, 2020
<br>Invitations sent:                      July 20, 2019
<br>Workshop:                              October 26 - 29, 2020
<br>Final version:                          December 5, 2020
<br>
<br>The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and unconventional ideas on information and cyber security that benefit from early, in-depth, and constructive feedback. Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or discuss problems from an entirely novel angle, leading to new solutions. We welcome papers both from computer science and other disciplines that study adversarial relationships, as well as from practice. The workshop is invitation-only; all accepted papers receive a 1 hour plenary time slot for presentation and discussion. In order to maximize diversity of perspectives, we particularly encourage submissions from new NSPW authors, from Ph.D. students, and from non-obvious disciplines and institutions.
<br>
<br>In 2020, NSPW invites theme submissions relating to “Automated Reasoning for Security” in addition to regular submissions. Computers are making ever more decisions on behalf of humans. This recent growth in deployment of automated reasoning has also led to the development and application of technologies for automated reasoning in security. At NSPW 2020, we invite authors to consider how the cybersecurity community should deal with the rise of automation: how do we secure automated reasoning, and how should it be used for security of other systems?
<br>
<br>NSPW is interested in methods of securing automated reasoning; applications of technology for automated reasoning (e.g., machine learning (ML)) to security; the implications of such applications; and how it might create or affect new security paradigms, including how we understand human reasoning before automating it. Any attack papers should follow guidelines for writing up case studies, and should clearly explain why understanding of this particular attack is transferable, trustworthy, and contributes to more general understanding of automated reasoning and security.
<br>
<br>Possible topics include, but are not limited to:
<br>
<br>  *   prevention (e.g., program verification to provide improved security)
<br>
<br>  *   protection (e.g., anti-virus or intrusion detection systems containing ML)
<br>  *   attacker use of automation
<br>
<br>  *   adversarial ML (all the different ways that machine learning can be attacked and protected)
<br>  *   the vulnerabilities in ML or automated reasoning systems, and how they are coordinated, disclosed, and remediated?
<br>  *   understanding human reasoning
<br>NSPW 2020 will be held at the White Mountain Hotel and Resort in North Conway, NH USA. As in the past, this choice of venue is designed to facilitate interactions between the invited attendees throughout the workshop.
<br>Submission Instructions
<br>NSPW accepts three categories of submissions:
<br>
<br>  *   Regular Submissions present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus.
<br>  *   Theme Submissions are focused on “Automated reasoning for Security”, and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission.
<br>  *   Panel Proposals describe a debatable topic of interest to the security community that merits significant discussion. Proposals should describe the major perspectives on the chosen topic. They should also present the background of the panelists, explaining how they are the right people to discuss the chosen topic at NSPW.
<br>Submissions must be made in PDF format, 6-15 pages, ACM SIG formatting, through EasyChair. Submissions must include a cover page with authors' names, affiliation, justification statement and participation statement. Papers not including these risk rejection without review. The justification statement briefly explains why the submission is appropriate for NSPW and the chosen submission category. The participation statement must specify which author(s) will attend upon acceptance/invitation, that all authors will engage in good faith with the feedback given in the review and revision periods, and that all authors will abide by the NSPW code of conduct. Submissions should not be blinded. Organizers and PC members are allowed to submit, but will not be involved in the evaluation of their own papers. All submissions are treated as confidential as a matter of policy. NSPW does not accept previously published or concurrently submitted papers.
<br>
<br>Acceptance to the workshop is conditional; all accepted papers are shepherded, with final proceedings published after the workshop.
<br>Attendance
<br>The workshop itself is invitation-only, with typically 30-35 participants consisting of authors of about 12 accepted papers, panelists, program committee members, and organizers. One author of each accepted paper must attend; additional authors may be invited if space permits. All participants must commit to a “social contract”: no one arrives late, no one leaves early, no electronic distractions (including laptops, tablets, and mobile devices), and all attend all sessions of the 2.5 day program, sharing meals in a group setting and complying with the code of conduct. The workshop is preceded by an evening reception allowing attendees to meet each other beforehand.
<br>
<br>Program Committee Co-chairs:
<br>Elizabeth Stobert, Carleton University, elizabeth.stobert@carleton.ca
<br>Jonathan Spring, CERT/CC, SEI, Carnegie Mellon University, jspring@sei.cmu.edu
<br>
<br>Program Committee:
<br>Alisa Frik, ICSI UC Berkeley
<br>Anil Somayaji, Carleton University
<br>Brian Lindauer, Duo Security
<br>Carrie Gates, Securelytics
<br>Hadi Asghari, TU Delft
<br>Joel Wilbanks, McAfee
<br>John Bambenek, University of Illinois at Urbana-Champaign
<br>Julie Thorpe, Ontario Tech University
<br>Laura Kocksch, Ruhr-University Bochum
<br>Mansoor Ahmed-Rengers, University of Cambridge
<br>Mary Ellen Zurko, MIT Lincoln Laboratory
<br>Olgierd Pieczul, Oracle
<br>Simon Parkin, University College London
<br>Trent Jaeger, Pennsylvania State University
<br>Wolter Pieters, TU Delft
<br>
<br>[demime 1.01d removed an attachment of type application/pdf which had a name of NSPW 2020 CfP.pdf]
<br>_______________________________________________
<br>EASST's Eurograd mailing list
<br>Eurograd (at) lists.easst.net
<br>Unsubscribe or edit subscription options: http://lists.easst.net/listinfo.cgi/eurograd-easst.net
<br>
<br>Meet us via https://twitter.com/STSeasst
<br>
<br>Report abuses of this list to Eurograd-owner@lists.easst.net
            
view formatted text

EASST-Eurograd RSS

mailing list
30 recent messages