CINXE.COM
IEEE Symposium on Security and Privacy 2015
<!DOCTYPE html> <html lang="en"> <head> <title>IEEE Symposium on Security and Privacy 2015</title> <meta http-equiv="Content-type" content="text/html;charset=UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <!-- icons --> <link href="images/favicon.png" rel="icon" type="image/png"> <link href="images/favicon.png" rel="apple-touch-icon" type="image/png"> <!-- bootstrap --> <script src="js/jquery-2.1.4.min.js"></script> <script src="js/bootstrap.min.js"></script> <link rel="stylesheet" href="css/bootstrap.min.css"> <link rel="stylesheet" href="css/bootstrap-theme.min.css"> <!-- glyphs --> <link rel="stylesheet" href="css/font-awesome.min.css"> <!-- fonts --> <link rel="stylesheet" href="css/webfonts.css" type="text/css"> <!-- custom css --> <link href="css/main.css" rel="stylesheet" type="text/css"> <!-- workaround for ie 7, 8 --> <script type="text/javascript" src="js/css3-mediaqueries.js"></script> <!--[if lt IE 9]> <script type="text/javascript" src="http://html5shiv.googlecode.com/svn/trunk/html5.js"></script> <script type="text/javascript" src="//cdnjs.cloudflare.com/ajax/libs/respond.js/1.4.2/respond.js"></script> <![endif]--> <!-- google analytics --> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-54630225-1', 'auto'); ga('send', 'pageview'); </script> </head> <body> <!-- https://github.com/twbs/bootstrap/issues/10601 --> <div class="navbar navbar-inverse navbar-fixed-top" role="banner"> <div class="container-fluid"> <div class="navbar-header"> <button class="navbar-toggle" type="button" data-toggle="collapse" data-target=".navbar-collapse"> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#">S & P</a> </div> <div class="collapse navbar-collapse" role="navigation"> <ul class="nav navbar-nav"> <li><a href="index.html"><i class="fa fa-home"></i> Home</a></li> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> Program <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu"> <li><a href="program.html">Program</a></li> <li><a href="program-compact.html">Program (Compact)</a></li> <li><a href="downloads/SPW-Prog-legal-v3.pdf">Workshops</a></li> <li><a href="program-posters.html">Posters</a></li> <li><a href="awards.html">Awards</a></li> </ul> </li> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> Call For... <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu"> <li><a href="cfpapers.html">Papers</a></li> <li><a href="cfposters.html">Posters</a></li> <li><a href="cfworkshops.html">Workshops</a></li> <li><a href="cftalks.html">Short Talks</a></li> <li><a href="cfdonors.html">Donors</a></li> </ul> </li> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> Travel <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu"> <li><a href="venue.html">Venue Info</a></li> <li><a href="travel_grants.html">Student Travel Grants</a></li> </ul> </li> <li class="dropdown active"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> Workshops <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu"> <li><a href="workshops.html">General Info</a></li> </ul> </li> </ul> <ul class="nav navbar-nav navbar-right"> <li class="hidden-sm"><a href="past.html">Past</a></li> <li class="hidden-sm"><a href="press.html">Press</a></li> <li class="hidden-sm"> <a href="https://www.youtube.com/channel/UC6pXMS7qre9GZW7A7FVM90Q"> <i class="fa fa-youtube-play hidden-xs"></i> <span class="visible-xs">YouTube</span> </a> </li> <li class="hidden-sm"> <a href="https://twitter.com/ieeessp"> <i class="fa fa-twitter hidden-xs"></i> <span class="visible-xs">Twitter</span> </a> </li> <li class="hidden-sm"> <a href="https://www.facebook.com/ieeessp"> <i class="fa fa-facebook hidden-xs"></i> <span class="visible-xs">Facebook</span> </a> </li> <li class="hidden-sm"> <a href="http://www.linkedin.com/groups?gid=7403306"> <i class="fa fa-linkedin hidden-xs"></i> <span class="visible-xs">LinkedIn</span> </a> </li> <li> <a href="contact.html"> <i class="fa fa-envelope hidden-xs"></i> <span class="visible-xs">Contact</span> </a> </li> </ul> </div> </div> </div> <div class="jumbotron"> <div class="container"> <p class="location"> MAY 21, 2015 AT THE FAIRMONT, SAN JOSE, CA </p> <p class="title"> 36th IEEE Symposium on<br>Security and Privacy Workshops </p> <p class="sponsors hidden-xs"> Sponsored by the <a href="http://ieee-security.org/">IEEE Computer Society Technical Committee on Security and Privacy</a> in cooperation with the <a href="http://www.iacr.org">International Association for Cryptologic Research</a> </p> <!--<p class="sponsors"> <a class="btn btn-default btn-lg" href="https://www.regonline.com/ieee2015SSPandSPW"> <i class="fa fa-chevron-circle-right fa-lg"></i> Register </a> </p>--> </div> </div> <div class="container"> <div class="lead" style="margin-top: 3ex"> <p> To expand opportunities for scientific exchanges, the IEEE CS Technical Committee on Security and Privacy created the Security and Privacy Workshops (SPW), which are now tightly integrated with SP. The typical purpose of a workshop is to cover a specific aspect of security and privacy in more detail, making it easy for the participants to attend IEEE SP and a specialized workshop at IEEE SPW with just one trip. Furthermore, the co-location offers synergies for the organizers. The number of workshops and attendees have grown steadily during recent years. </p> <p> The combined <a href="downloads/SPW-Prog-legal-v3.pdf">workshops program</a> for 2015 is now available. </a> </div> <h1>Workshops</h1> <hr> <table class="table table-nonfluid table-workshops"> <tr> <td><img src="images/trojan-teal.png" class="logo-workshops"></td> <td> <a href="http://ieee-security.org/TC/SPW2015/IWPE/"><b>IWPE</b>: First International Workshop on Privacy Engineering</a> <a href="#IWPE" style="color: black"><i class="fa fa-info-circle hidden-xs" data-toggle="modal" data-target="#IWPE"></i></a> </td> </tr> <tr> <td><img src="images/trojan-red.png" class="logo-workshops"></td> <td> <a href="http://2015.genopri.org/"><b>GenoPri</b>: Second International Workshop on Genome Privacy and Security</a> <a href="#GenoPri" style="color: black"><i class="fa fa-info-circle hidden-xs" data-toggle="modal" data-target="#GenoPri"></i></a> </td> </tr> <tr> <td><img src="images/trojan-orange.png" class="logo-workshops"></td> <td> <a href="http://spw15.langsec.org"><b>LangSec</b>: Second Workshop on Language Theoretic Security</a> </td> </tr> <tr> <td><img src="images/trojan-green.png" class="logo-workshops"></td> <td> <a href="http://ieee-security.org/TC/SPW2015/MoST/"><b>MoST</b>: Mobile Security Technology</a> <a href="#MoST" style="color: black"><i class="fa fa-info-circle hidden-xs" data-toggle="modal" data-target="#MoST"></i></a> </td> </tr> <tr> <td><img src="images/trojan-purple.png" class="logo-workshops"></td> <td> <a href="http://ieee-security.org/TC/SPW2015/W2SP/"><b>W2SP</b>: Web 2.0 Security and Privacy</a> <a href="#W2SP" style="color: black"><i class="fa fa-info-circle hidden-xs" data-toggle="modal" data-target="#W2SP"></i></a> </td> </tr> </table> <div class="modal fade" id="IWPE" tabindex="-1"> <div class="modal-dialog"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button> <h4 class="modal-title">First International Workshop on Privacy Engineering</h4> </div> <div class="modal-body"> <div>Engineers are increasingly expected to build and maintain privacy-preserving and data-protection compliant systems following varying methodologies, in different ICT domains, and based on different infrastructures. While there is a consensus on the benefits of an engineering approach to privacy, research is needed in developing techniques that can aid the translation of legal and normative concepts, and user expectations into systems requirements, as well as methods that can support organizations and engineers in developing (socio-) technical systems that address these requirements.</div> <br> <div>To cover this gap, the goal of the 1st International Workshop on Privacy Engineering is to provide an environment where ICT researchers and practitioners, seeking to develop and deploy innovative methods to practically apply privacy solutions into systems designs, can meet and discuss their latest advances. In particular, the workshop aims to foster discussion in the area of privacy engineering process and supporting activities and tools, and the specificities of privacy engineering in the different stages of a software development process (e.g. in requirements elicitation, analysis, design, testing, evaluation, etc.). The workshop is also interested in gathering interdisciplinary reflections on privacy engineering concepts and frameworks, including organizational, legal, political and economic aspects.</div> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="modal fade" id="GenoPri" tabindex="-1"> <div class="modal-dialog"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button> <h4 class="modal-title">Second International Workshop on Genome Privacy and Security</h4> </div> <div class="modal-body"> <div>Genome sequencing technologies have evolved from slow and expensive systems limited to a select few scientists and forensics investigators to high-throughput, relatively low-cost tools that are available to consumers. Widespread and affordable availability of whole genomes immediately opens up important opportunities as genome-enabled medicine becomes increasingly preventive and personalized. However, the very same progress also amplifies worrisome privacy and security concerns: a genome represents a treasure trove of highly personal and sensitive information, as it reveals predisposition to diseases and conditions, ethnic heritage, etc. -- not only of a given individual, but also of close relatives.</div> <br> <div>Failure to adequately protect genomic information could lead to a serious backlash, impeding genomic research, that could affect the well-being of our society as a whole. This prompts the need for research and innovation in all aspects of genome privacy and security, and calls for the rise of a novel, highly interdisciplinary research community. GenoPri'15 builds on the success of the first workshop's edition and seeks submissions not only from the Computer Science and Bioinformatics communities, but also from researchers and practitioners studying the Ethical, Legal, and Societal issues with genomics.</div> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="modal fade" id="MoST" tabindex="-1"> <div class="modal-dialog"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button> <h4 class="modal-title">Mobile Security Technology</h4> </div> <div class="modal-body"> <div>With the development of new mobile platforms, such as Android and iOS, mobile computing has shown exponential growth in popularity in recent years. To benefit from the availability of constantly-growing consumer base, new services and applications are being built from the composition of existing ones at breakneck speed. This rapid growth has also been coupled with new security and privacy concerns and challenges. For instance, more and more sensitive content is being collected and shared by third-party applications that, if misused, can have serious security and privacy repercussions. Consequently, there is a growing need to study and address these new challenges.</div> <br> <div>The goal of the MoST workshop is to bring together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. The scope of MoST 2015 includes, but is not limited to, security and privacy specifically for mobile devices and services related to: device hardware, operating systems, middleware, mobile web, secure and efficient communication, secure application development tools and practices, privacy, vulnerabilities and remediation techniques, usable security, identity and access control, risks in putting trust in the device vs. in the network/cloud, special applications, such as medical monitoring and records, mobile advertisement, secure applications and application markets, and economic impact of security and privacy technologies. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages).</div> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="modal fade" id="W2SP" tabindex="-1"> <div class="modal-dialog"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button> <h4 class="modal-title">Web 2.0 Security and Privacy</h4> </div> <div class="modal-body"> <div>W2SP brings together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers and their eco-system. We have had seven years of successful W2SP workshops. The scope of W2SP 2015 includes, but is not limited to: Trustworthy cloud-based services, privacy and reputation in social networks, security and privacy as a service, usable security and privacy, security for the mobile web, identity management and psuedonymity, web services/feeds/mashups, provenance and governance, security and privacy policies for composable content, next-generation browser technology, secure extensions and plug-ins, advertisement and affiliate fraud, measurement study for understanding web security and privacy.</div> <br> <div>We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). Authors are encouraged to use the IEEE conference proceedings templates. W2SP will continue to be open-access: all papers will be made available on the workshop website, and authors will not need to forfeit their copyright.</div> </div> <div class="modal-footer"> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <h1>Organizing Committee</h1> <hr> <table class="table table-hover table-nonfluid"> <tr> <td><a href="mailto:oakland15-workshopchair@ieee-security.org">Workshops Chair</a></td> <td>Cynthia Irvine</td> <td>Naval Postgraduate School</td> </tr> <tr> <td><a href="mailto:oakland15-workshoppublicity@ieee-security.org">Workshops Vice Chair</a></td> <td>Zachary Peterson</td> <td>Cal Poly</td> </tr> <tr> <td><a href="mailto:oakland15-workshoptreasurer@ieee-security.org">Workshops Treasurer</a></td> <td>Gabriela Ciocarlie</td> <td>SRI International</td> </tr> <tr> <td><a href="mailto:oakland15-workshoppublication@ieee-security.org">Workshops Publications Chair</a></td> <td>Ashley Podhradsky</td> <td>Dakota State University</td> </tr> </table> <h1>Steering Commitee</h1> <hr> <table class="table table-hover table-nonfluid"> <tr> <td>Terry Benzel</td> <td>USC Information Sciences Institute</td> </tr> <tr> <td>Rob Cunningham</td> <td>MIT Lincoln Laboratory</td> </tr> <tr> <td>Sven Dietrich</td> <td>CUNY John Jay College of Criminal Justice</td> </tr> <tr> <td>Deborah Frincke</td> <td>National Security Agency</td> </tr> </table> <h1>Workshop Donors</h1> <hr> <div class="row row-same-height"> <div style="padding-bottom: 1.5em"> <a href="http://www.nsf.gov"><img src="images/logo-nsf.png" alt="National Science Foundation" class="img-responsive logo center-block"></a> </div> <div> <a href="http://www.research.ibm.com"><img src="images/logo-ibm_research.png" alt="IBM Research" class="img-responsive logo center-block" style="max-width: 35ex"></a> </div> </div> </div> <footer class="footer hidden-xs"> <div class="container text-center"> <a href="http://www.ieee.org"><img src="images/logo-ieee.jpg" height="44" alt="IEEE"></a> <a href="http://www.computer.org"><img src="images/logo-ieee-cs.gif" height="44" alt="IEEE Computer Society" style="padding: 0ex 4ex"></a> <a href="http://www.ieee-security.org"><img src="images/trojan.png" height="44" alt="IEEE Technical Committee on Security and Privacy"></a> </div> </footer> </body> </html>