Over the last 20 years, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community.
The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.
RAID features a traditional poster session with a walking dinner on the first evening to encourage the presentation of work in progress and the active participation of younger members of the community.
In this special year, the 20th anniversary of RAID’s creation, we are soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:
- Computer, network and cloud computing security
- SDN for/against security
- Malware and unwanted software
- Program analysis and reverse engineering
- Mobile and Web security and privacy
- Vulnerability analysis techniques
- Usable security and privacy
- Intrusion detection and prevention
- Cyber intelligence techniques and (privacy preserving) threats intel sharing
- Threats against critical infrastructures and mitigation thereof
- Hardware security, Cyber physical systems, IoT security
- Statistical and adversarial learning for computer security
- Cyber crime and underground economies
- The ecosystem behind Denial-of-Service attacks
- Security measurement studies
- Digital forensics
- Computer security visualization techniques
Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.
|Paper Submission Deadline:||March 29, 2017, 12AM HADT|
|Rebuttal Period:||May 19-21, 2017|
|Notification to Authors:||May 30, 2017|
|Camera Ready Submission Deadline:||June 27, 2017|
|Poster Submission Deadline:||August 21, 2017|
|Poster Acceptance Notification:||August 28, 2017|
|Conference:||September 18-20, 2017|
Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. Papers can be submitted on the following web site: https://raid2017.hotcrp.com
Reviewing will be double-blind, meaning the authors’ identities will be hidden from the reviewers. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, and should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not anonymized will not be reviewed.
Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM (see http://www.acm.org/publications/policies/).
Papers accepted by the Program Committee will be presented at RAID 2017 and included in the Symposium’s proceedings published by Springer in its Lecture Notes in Computer Science series.
As in previous years, presentations will be recorded and posted on the official RAID YouTube Channel.
If needed, we will grant accepted papers up to two additional pages to address comments from the reviewers. A summary of the reviews will be published alongside each accepted paper.
Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee co-chairs at email@example.com
We also welcome the submissions of posters abstracts presenting works in progress, or innovative ideas not mature enough to be presented as a full paper. The poster track will provide an opportunity to present early-stage work and receive feedback from the community, especially on thought-provoking or controversial work, approaches, or ideas from students. Posters are submitted for review in the form of an extended abstract that has to be formatted in LNCS-style and not exceed 1 page in length, with a PDF draft of the proposed poster included as page 2 of the submission. Poster titles should always start with the phrase “Poster Abstract:”. Accepted posters will be presented at the symposium in a separate session. Authors of accepted full papers are also encouraged to submit and present posters of their paper in the poster session.
Posters can be submitted by sending an e-mail directly to firstname.lastname@example.org. Notification will be handled in a rolling fashion until we’ve reached our limit for accepted posters.
For both accepted papers and posters, at least one of the authors must attend the conference to present the submitted work.
|General Chair:||Manos Antonakakis, Georgia Tech|
|Program Committee Chair:||Marc Dacier, QCRI / HBKU|
|Program Committee Co-Chair:||Michael Bailey, Univ. of Illinois at Urbana Champaign|
|Publication Chair:||Michalis Polychronakis, Stony Brook University|
|Publicity Chair:||Nick Nikiforakis, Stony Brook University|
|Sponsor Chair:||Yacin Nadji, Georgia Tech|
|Local Arrangement Chair:||Roberto Perdisci, University of Georgia|
|Local Infrastructure Chair:||William R. Garrison, Georgia Tech|
|Poster Chair and Webmaster:||Chaz Lever, Georgia Tech|
|Almgren, Magnus||Chalmers University of Technology|
|Bilge, Leyla||Symantec Research Labs|
|Cavallaro, Lorenzo||Royal Holloway, University of London|
|Christodorescu, Mihai||Qualcomm Research|
|Debar, Herve||Telecom SudParis|
|Egele, Manuel||Boston University|
|Ettale, Sandro||Technical University Eindhoven|
|Giffin, Jon||HPE Fortify|
|Gligor, Virgil||Carnegie Mellon University|
|Gu, Guofei||Texas A&M University|
|Kim, Yongdae||Korea Advanced Institute of Science and Technology|
|Lanzi, Andrea||University of Milan|
|Lee, Wenke||Georgia Tech|
|Naccache, David||ENS Paris|
|Perdisci, Roberto||University of Georgia|
|Polakis, Jason||University of Illinois at Chicago|
|Sanders, Bill||University of Illinois at Urbana-Champaign|
|Stavrou, Angelos||George Mason University|
|Stolfo, Sal||Columbia University|
|Su, Purui||Institute of Software/CAS, China|
|Tehranipoor, Mark||University of Florida|
|Valdes, Al||University of Illinois at Urbana Champaign|
|Wang, X. Sean||Fudan University|
|Wang, Xiaogang (Cliff)||US Army Research Office and adjunct with NC State U|
|Yen, Ting Fang||DataVisor, Inc|
|Zhang, Kehuan||Chinese University of Hong Kong|
|Balzarotti, Davide||Eurecom, France|
|Bos, Herbert||Vrije Universiteit Amsterdam, Netherlands|
|Debar, Herve||Telecom SudParis, France|
|Frincke, Deborah||NSA Research, USA|
|Huang, Ming-Yuh||Northwest Security Institute, USA|
|Jha, Somesh||University of Wisconsin, USA|
|Jonsson, Erland||Chalmers University of Technology, Sweden|
|Kirda, Engin||Northeastern University, USA|
|Kruegel, Christopher||UC Santa Barbara, USA|
|Lee, Wenke||Georgia Tech, USA|
|Lippmann, Richard||MIT Lincoln Laboratory, USA|
|Me, Ludovic||CentraleSupélec, France|
|Sommer, Robin||ICSI/LBNL, USA|
|Stavrou, Angelous||George Mason University, USA|
|Stolfo, Sal||Columbia University, USA|
|Valdes, Alfonso||University of Illinois at Urbana Champaign, USA|
|Vigna, Giovanni||UC Santa Barbara, USA|
|Wespi, Andreas||IBM Research, Switzerland|
|Wu, S. Felix||UC Davis, USA|
|Zamboni, Diego||Swisscom, Switzerland|