You are here
FOCI '12 Call for Papers
Website Maintenance Alert
Due to scheduled maintenance on Wednesday, October 16, from 10:30 am to 4:30 pm Pacific Daylight Time (UTC -7), parts of the USENIX website (e.g., conference registration, user account changes) may not be available. We apologize for the inconvenience.
If you are trying to register for LISA19, please complete your registration before or after this time period.
Sponsored by USENIX, the Advanced Computing Systems Association
FOCI '12 will be co-located with the 21st USENIX Security Symposium (USENIX Security '12), which will take place August 8–10, 2012.
- Submissions due: Thursday, May 3, 2012, 11:59 p.m. PDT
- Notification to authors: Monday, June 11, 2012
- Final files due: Tuesday, July 10, 2012
The 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI '12) seeks to bring together researchers and practitioners from technology, law, and policy who are working on means to study, detect, or circumvent practices that inhibit free and open communications on the Internet.
The Internet offers great promise for improving the communication capabilities of citizens, but our increasing dependence on networked communications also makes it easier for organizations to control, monitor, and block communications. ISPs and governments routinely restrict access to Internet content and services, either by censoring access to information or by degrading the performance of services or blocking them entirely. Similarly, ISPs can degrade network performance for certain sets of users for some or all services, for arbitrary purposes. ISPs have been found to block or throttle certain application traffic routinely. This growing trend toward blocking, tampering, or otherwise restricting communications on the Internet calls for improved techniques both for monitoring the state of restrictions on Internet content and communications, in order to inform users, and for circumventing attempts to censor, degrade, or otherwise tamper with Internet communications.
The broadening scope of attacks on Internet freedom is forcing more disciplines to address the issue. Last year's workshop brought together four research communities:
- Those studying network neutrality and performance degradation
- Those measuring content censorship and blocking of resources and services
- Those designing and evaluating censorship circumvention tools
- Those who work on the wider implications of censorship, bringing perspectives from the worlds of policy, law, ethics, and political and social sciences
This second workshop aims to repeat and promote this critical interdisciplinary approach.
We encourage submission of new, interesting work on a wide variety of topics of interest, including but not limited to the following areas:
- Evaluation or analysis of existing anti-censorship systems
- Comparisons of existing performance-measurement tools that might be used to detect tampering, blocking, or violations of net neutrality
- Studies and findings on real-world censorship or tampering from field deployments or other methods, such as the content that states censor or the extent to which ISPs are degrading certain types of content or service
- Metrics and analysis of plausible deniability and robustness
- Metrics and benchmarks for content tampering or performance degradation
- Detection, measuring, and analysis of the censorship of search results
- Design of network protocols and topologies that resist tampering or censorship
- Techniques to counter mass surveillance or its effects
- The role of private corporations in spreading or enabling surveillance and censorship
- Capabilities of deep packet inspection (DPI) and robust mechanisms to circumvent DPI
- Legality of censorship-resistant systems or bypassing censorship
- Economic considerations in the design and deployment of censorship-resistant systems
- Analysis of the economic impact of censorship
- Usability in censorship-resistant systems
- Effects of censorship on society, business, or political processes
We emphasize that this workshop seeks to draw submissions from a range of disciplines. As such, non-technical work that examines the wider implications of censorship and its effects will be considered favorably.
What to Submit
We invite short position papers or work-in-progress reports. FOCI will favor interesting and new ideas and early results that lead to well-founded position papers. We envision that work presented at FOCI will ultimately be published at relevant, high-quality conferences. Papers will be selected primarily based on technical merit and originality, with additional consideration given to their potential to generate discussion at the workshop.
Submitted papers must be no longer than six 8.5" x 11" pages, based on the standard USENIX format. Specifically, your paper should be typeset in two-column format in 10-point type on 12 point (single-spaced) leading, with a text block no more than 6.5" wide by 9" deep. Papers must be submitted via the Web submission form.
Paper submissions must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and authors should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the program co-chairs at email@example.com if you have any questions.
Papers that do not comply with the submission requirements, including length and anonymity, may be rejected without review.
All accepted papers will be available online to registered attendees before the workshop. If your paper should not be published prior to the event, please notify firstname.lastname@example.org. The papers will be available online to everyone beginning on the day of the workshop, August 6, 2012.
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program co-chairs, email@example.com, or the USENIX office, firstname.lastname@example.org. Note, however, that we expect that many papers accepted for FOCI '12 will eventually be extended as full papers suitable for presentation at future conferences.
Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX FOCI '12 Web site; rejected submissions will be permanently treated as confidential.