2nd USENIX Workshop on Hot Topics in Security (HotSec '07)
August 7, 2007
Boston, MA, USA
Sponsored by USENIX, the Advanced Computing Systems Association
HotSec '07 will be co-located with the 16th USENIX Security Symposium (Security '07), which will take place August 610, 2007.
Position paper submissions due: June 4, 2007, 11:59 p.m. PDT Deadline Extended!
Notification of acceptance: July 6, 2007
Final files due: July 31, 2007
Chair: Trent Jaeger, Pennsylvania State University
Matt Blaze, University of Pennsylvania
Angelos D. Keromytis, Columbia University
Patrick McDaniel, Pennsylvania State University
Fabian Monrose, Johns Hopkins University
Niels Provos, Google
Reiner Sailer, IBM Research
Leendert van Doorn, AMD
Helen Wang, Microsoft Research
Steve Zdancewic, University of Pennsylvania
Position papers are solicited for the 2nd USENIX Workshop on Hot Topics in Security (HotSec '07).
HotSec is intended as a forum for lively discussion of aggressively innovative and potentially disruptive ideas in all aspects of systems security. Surprising results and thought-provoking ideas will be strongly favored; complete papers with polished results in well-explored research areas are discouraged. Papers will be selected for their potential to stimulate discussion in the workshop.
HotSec '07 will be a one-day event, Tuesday, August 7, 2007,
co-located with the 16th USENIX Security Symposium in Boston, MA,
Attendance will be by invitation only, limited to 3540 participants, with preference given to the authors of accepted position papers/presentations.
Each author will have 1015 minutes to present his or her idea, followed by 1520 minutes of discussion with the workshop participants.
Instructions for Authors
The goal of the workshop is to stimulate discussion of and thinking about aggressive ideas and issues in systems security.
Position papers are expected to fit into one of the following categories:
While our goal is to solicit ideas that are not completely worked out, we expect submissions to be supported by some evidence of feasibility or preliminary quantitative results.
- Fundamentally new techniques for and approaches to dealing with current security problems
- New major problems arising from new technologies that are now being developed or deployed
- Truly surprising results that cause rethinking of previous approaches
Possible topics of interest include but are not limited to:
- Secure operation, management, and event response of/for ultra-large-scale systems
- Designing secure large-scale systems and networks
- Self-organizing and self-protecting systems
- Security assurance for non-expert users
- Balancing security and privacy/anonymity
- Approaches and technologies to improve security in programming
- Interactions between security technology and public policy
Submitted position papers must be no longer than five (5) single-spaced 8.5" x 11" pages, including figures, tables, and references. Author names and affiliations should appear on the title page.
Submissions must be in PDF format and must be submitted via the Web
Authors will be notified of acceptance by July 6, 2007. Authors of
accepted papers will produce a final PDF and the equivalent HTML by
July 31, 2007. All papers will be available online to participants
prior to the workshop and will be generally available online after the
Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chair, take action against authors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to ensure the integrity of papers under consideration. If a violation of these principles is found, sanctions may include, but are not limited to, barring the authors from submitting to or participating in USENIX conferences for a set period, contacting the authors' institutions, and publicizing the details of the case.
Note, however, that we expect that many position papers accepted for HotSec '07 will eventually morph into finished, full papers presented at future conferences.
Authors uncertain whether their submission meets USENIX's guidelines should contact the workshop organizers at firstname.lastname@example.org or the USENIX office, email@example.com.