WOOT 2012 : 6th USENIX Workshop on Offensive Technologies
Call For Papers
Sponsored by USENIX, the Advanced Computing Systems Association
WOOT '12 will be co-located with the 21st USENIX Security Symposium (USENIX Security '12), which will take place August 8–10, 2012.
•Submissions due: May 10, 2012, 11:59 p.m. PDT
•Notification to authors: June 11, 2012
•Final paper files due: July 12, 2012
Elie Bursztein, Google
Thomas Dullien, Google
Thanassis Avgerinos, Carnegie Mellon University
Michael Bailey, University of Michigan
Claude Castelluccia, INRIA Rhône-Alpes
Aurélien Francillon, Eurecom
Sean Heenan, Immunity Inc.
Mario Heiderich, Ruhr-Universität Bochum
Thorsten Holz, Ruhr-Universität Bochum
Collin Jackson, Carnegie Mellon University
Sebastian Krahmer, Novell/SuSe
Charlie Miller, Accuvant LABS
David Molnar, Microsoft Research
Daniele Perito, University of California, Berkeley
Willem Pinckaers, Matasano Security
Giovanni Vigna, University of California, Santa Barbara
Ralf-Philipp Weinmann, University of Luxembourg
Michal Zalewski, Google
Progress in the field of computer security is driven by a symbiotic relationship between our understandings of attack and of defense. The USENIX Workshop on Offensive Technologies (WOOT) aims to bring together researchers and practitioners in systems security to present research advancing the understanding of attacks on operating systems, networks, and applications.
To reflect the huge increase of breaches induced by Web attacks and the numerous issues surrounding HTTPS, this year WOOT will feature two special sessions with invited talks and discussion. The first session will be dedicated to the future of Web exploitation and the second to the future of HTTPS. To support interactions and have room for sessions on every aspect of offensive technologies, WOOT will last two days.
WOOT '12 will be held on August 6-7, 2012, in Bellevue, WA. WOOT '12 is co-located with the 21st USENIX Security Symposium (USENIX Security '12), which will take place August 8-10, 2012. WOOT this year will feature a Best Paper Award and a Best Student Paper Award.
Computer security is unique among systems disciplines, in that practical details matter and concrete case studies keep the field grounded in practice. WOOT provides a forum for high-quality, peer-reviewed papers discussing tools and techniques for attack. Submissions should reflect the state of the art in offensive computer security technology, either surveying previously poorly known areas or presenting entirely new attacks.
WOOT accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will inform future work in the field. Submissions will be peer-reviewed and shepherded as appropriate.
Submission topics include but are not limited to:
•Vulnerability research (software auditing, reverse engineering)
•Exploit techniques and automation
•Network-based attacks (routing, DNS, IDS/IPS/firewall evasion)
•Reconnaissance (scanning, software, and hardware fingerprinting)
•Malware design and implementation (rootkits, viruses, bots, worms)
•Web and database security
•Weaknesses in deployed systems (VoIP, telephony, wireless, games)
•Practical cryptanalysis (hardware, DRM, etc.)
For industry researchers: Did you just give a cool talk at SOURCE Boston? Got something interesting planned for Black Hat or DEFCON? This is exactly the type of work we'd like to see at WOOT. Please submit. It will also give you a chance to have your work reviewed and to receive suggestions and comments from some of the best researchers in the world.
Systematization of Knowledge and Invited Talks
In addition to new work, WOOT will be accepting "Systematization of Knowledge" (SoK) papers and invited talk papers. The goal of a SoK paper is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will prove highly valuable to our community but would not be accepted as refereed papers because they lack novel research contributions. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Be sure to select "Systematization of Knowledge paper" in the submissions system to distinguish it from research paper submissions.
The presenters will be authors of accepted papers, as well as two keynotes speakers and a selection of invited speakers for our two special sessions. This year we ask presenters to choose how long they would like to present their paper to keep the workshop fast-paced. Each presenter can request between 10 and 25 minutes to present their idea. Regardless of the talk length, we will allocate an extra 5 minutes for questions.
All accepted papers will be available online to registered attendees prior to the workshop and will be available online to everyone beginning on the first day of the workshop, August 6, 2012. If your paper should not be published prior to the event, please notify email@example.com.
Papers must be received by 11:59 p.m. Pacific time on Thursday, May 10, 2012. There is no arbitrary minimum or maximum length imposed on papers. Rather, reviewers will be instructed to weigh the contribution of a paper relative to its length. Papers should be succinct but thorough in presenting the work. Typical research papers will be 4-10 pages long, but papers can be shorter if the contribution is smaller. While we will review papers longer than 10 pages, the contributions must warrant the extra length. Shorter, more focused papers are encouraged and will be reviewed like any other paper. Papers whose length is incommensurate with their contribution will be rejected.
Paper guideline lengths exclude bibliography and well-marked appendices. The submission must be formatted in 2 columns, using 10 point Times Roman type on 12 point leading, in a text block of 6.5" by 9". Please number the pages. There is no limit on the length of the appendices, but reviewers are not required to read them. All submissions will be electronic and must be in PDF.
Paper submissions are single-blind. Author names and affiliations should appear on the title page. Submit papers using the Web form, which will be available here soon.
Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX WOOT '12 Web site; rejected submissions will be permanently treated as confidential.
Policies and Contact Information
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details.
Note: Work presented at industry conferences, such as Black Hat, is not considered to have been "previously published" for the purposes of WOOT '12. We strongly encourage the submission of such work to WOOT, particularly work that is well suited to a more formal and complete treatment in a published, peer-reviewed setting. In your submission, please do note any previous presentations of the work.
Authors uncertain whether their submission meets USENIX's guidelines should contact the program co-chairs, firstname.lastname@example.org, or the USENIX office, email@example.com.