** Apologies for Cross-postings -- please share **

============================================================

Call for Papers:

RAID 2021

24th International Symposium on Research in Attacks
Intrusions and Defenses

Donostia / San Sebastian, Spain October 6-8, 2021

https://raid2021.org/

Submission site: https://raid2021.hotcrp.com/


*** Submission deadline extended! (April 1st) ***

============================================================


Important Dates
===============
* Submission Deadline: April 1st, 2021, 23:59:59, Anywhere on earth
* Notification to Authors: June 6, 2021
* Camera Ready: July 2, 2021
* Conference: October 6-8, 2021

Location
========
San Sebastian (Donostia in Basque language) which was the 2016
European City of the Year, is a beautiful city famous by its cuisine,
boasting more Michelin stars per square metre than any other city on
the planet. It is also listed among the World’s 20 Best Surf Towns by
National Geographic.


About RAID
==========

Since its inception in 1997, the International Symposium on Research
in Attacks, Intrusions and Defenses (RAID) has established itself as a
venue where leading researchers and practitioners from academia,
industry, and the government are given the opportunity to present
novel research in a unique venue to an engaged and lively community.


The conference is known for the quality and thoroughness of the
reviews of the papers submitted, the desire to build a bridge between
research carried out in different communities, and the emphasis given
on the need for sound experimental methods and measurement to improve
the state of the art in cybersecurity.


This year we are soliciting research papers on topics covering all
well-motivated computer security problems. We care about techniques
that identify new real-world threats, techniques to prevent them, to
detect them, to mitigate them or to assess their prevalence and their
consequences. Measurement papers are encouraged, as well as papers
offering public access to new tools or datasets, or experience papers
that clearly articulate important lessons learned.


Topics
======

Specific topics of interest to RAID include, but are not limited to:

* Computer, network, and cloud computing security
* Malware and unwanted software
* Program analysis and reverse engineering
* Mobile Security
* Web security and privacy
* Vulnerability analysis techniques
* Usable security and privacy
* Intrusion detection and prevention
* Hardware security
* Cyber physical systems security and threats against critical infrastructures
* IoT security
* Statistical and adversarial learning for computer security
* Cyber crime and underground economies
* Denial-of-Service attacks and defenses
* Security measurement studies
* Digital forensics

Papers will be judged on novelty, significance, correctness, and
clarity. We expect all papers to provide enough detail to enable
reproducibility of their experimental results. We encourage authors to
make both the tools and data publicly available.


Submission Guidelines
========================

Papers
======

Submissions must be a PDF file in double-column ACM format (see
http://www.acm.org/publications/article-templates/proceedings-template.html)
no more than 12 pages long, excluding the bibliography, well-marked
appendices, and supplementary material. Note that reviewers are not
required to read the appendices or any supplementary material. Authors
should not change the font or the margins of the ACM format.
Submissions not following the required format may be rejected without
review.


The submission site is available here: https://raid2021.hotcrp.com/

New from last year: Proceedings by ACM
=======================================

Papers that have been formally reviewed and accepted will be presented
at RAID 2021 and published at the International Conference Proceedings
Series by ACM (ACM ICPS). By submitting a paper, you agree that at
least one of the authors will attend (hopefully physically) the
conference to present it.

Submission
==========

Reviewing will be double-blind, meaning the authors’ identities will
be hidden from the reviewers. All papers must be appropriately
anonymized: author names or affiliations must not appear in the
submission, you must refer to your own prior work in the third person,
you should not give the paper a title that corresponds to a publicly
available technical report, and should anonymize the bibliographic
section in an appropriate manner, etc. Papers that are not properly
anonymized may be rejected without review. While submitted papers must
be anonymous, authors may choose to give talks about their work, post
a preprint of the paper online, disclose security vulnerabilities to
vendors or the public, etc. during the review process.


All submissions will be judged on originality, relevance, correctness,
and clarity. Submissions must not substantially duplicate work that
has already been published elsewhere or submitted in parallel to a
journal or to any other conference or workshop with proceedings.
Simultaneous submission of the same work to multiple venues,
submission of previously published work, and plagiarism constitute
dishonesty or fraud. RAID, like other scientific and technical
conferences and journals, prohibits these practices and may, on the
recommendation of the program chair, take action against authors who
have committed them. RAID abides with policies for plagiarism,
submission confidentiality, reviewer anonymity, and prior and
concurrent paper submission that mirror those of the ACM (see
http://www.acm.org/publications/policies/).


Human Subjects and Ethical Considerations
==========================================

Submissions that describe experiments on human subjects, that analyze
data derived from human subjects (even anonymized data), or that
otherwise may put humans at risk should:


-- Disclose whether the research received approval or a waiver from
   each of the authors’ institutional ethics review boards (e.g., an
   IRB).

--  Discuss steps taken to ensure that participants and others who
    might have been affected by an experiment were treated ethically
    and with respect.

If the submission deals with vulnerabilities (e.g., software
vulnerabilities in a given program or design weaknesses in a hardware
system), the authors need to discuss in detail the steps they have
already taken or plan to take to address these vulnerabilities (e.g.,
by disclosing vulnerabilities to the vendors). The same applies if the
submission deals with personally identifiable information (PII) or
other kinds of sensitive data. If a paper raises significant ethical
and legal concerns, it might be rejected based on these concerns.

Authors who are unsure whether their submissions might meet these
guidelines, or who have specific questions about the guidelines, are
welcome to contact the program committee chair at:

leyla.bilge@nortonlifelock.com


Organizing Committee:
======================

General Chair:
  Urko Zurutuza (Mondragon Unibertsitatea)

Vice General Chairs:
  Enaitz Ezpeleta (Mondragon Unibertsitatea),
  Iñaki Garitano (Mondragon Unibertsitatea),
  Mikel Iturbe (Mondragon Unibertsitatea)

Program Committee Chair:
  Leyla Bilge (NortonLifeLock Research Group)

Program Committee Co-Chair:
  Tudor Dumitras (Maryland University)

Publication Chair:
  Igor Santos (Mondragon Unibertsitatea)

Publicity Chair:
  Joaquín García-Alfaro (Telecom SudParis, Institut Mines-Telecom)

Travel Grant Chair:
  Magnus Almgren (Chalmers University of Technology)

Program Committee:
  Adrian Dabrowski (University of California, Irvine)
  Amin Kharraz (Florida International University)
  Andrea Lanzi (University of Milan)
  Antonio Bianchi (Purdue University)
  Aravind Prakash (Binghamton)
  Brendan Saltaformaggio (Georgia Institute of Technology)
  BumJun Kwon (National Security Research Institute)
  Carrie Gates (Bank of America)
  Cong Wang (City University of Hong Kong)
  Daniel Gruss (Graz University of Technology)
  Dowoon Kim (University of Tennessee)
  Erik van der Kouwe (Vrije Universiteit Amsterdam)
  Erman Ayday (Case Western Reserve University)
  Gang Wang (UIUC)
  Gianluca Stringhini (Boston University)
  Hamed Okhravi (MIT Lincoln Laboratory)
  Iskander Sanchez (NortonLifeLock Research Group)
  Jelena Mirkovic (USC-ISI)
  Jiyong Jang (IBM)
  Juan Caballero (IMDEA Software Institute)
  Kaan Onarlioglu (Akamai)
  Kai Chen (Institute of Information Engineering)
  Kevin Alejandro Roundy (NortonLifeLock Research Group)
  Kevin Borgolte (Princeton University)
  Konrad Rieck (Technische Universitat Braunschweig)
  Lorenzo Cavallaro (King’s College London)
  Martina Lindorfer (TU Wien)
  Merve Sahin (SAP Research)
  Michael Weissbacher (Square)
  Mihai Chiroiu (Politehnica University, Bucharest)
  Mihai Christodorescu (Visa Research)
  Nathan Burow (MIT LL)
  Pierre Laperdrix (CNRS, Univ. Lille)
  Sanghyun Hong (University of Maryland)
  William Robertson (Northeastern University)
  Yan Shoshitaishvili (Arizona State University)
  Yanick Fratantonio (Cisco Talos)
  Yasemin Acar (Max Planck Institute for Security and Privacy)
  Yuseok Jeon (UNIST)
  Zachary Weinberg (Carnegie Mellon University)
  Zhiyun Qian (UC Riverside)