posted by organizer: youki30 || 2386 views || tracked by 30 users: [display]

RAID 2015 : 18th International Symposium on Research in Attacks, Intrusions and Defenses


Conference Series : Recent Advances in Intrusion Detection
When Nov 2, 2015 - Nov 4, 2015
Where Kyoto, Japan
Submission Deadline Jun 5, 2015
Notification Due Aug 14, 2015

Call For Papers

RAID 2015
Kyoto, Japan, November 2-4, 2015

Call for Papers
The 18th International Symposium on Research in Attacks, Intrusions and Defenses
(RAID 2015) aims at bringing together leading researchers and practitioners from
academia, government, and industry to discuss novel research contributions
related to any area of computer and information security.

Papers on all topics related to intrusion detection and prevention are within
scope, including papers on:

Malware and botnet analysis, detection, and mitigation
Smartphone and other embedded systems security
Network & active defenses
Web application security
New attacks against computers and networks
Denial-of-Service Attacks
Insider attack detection
Formal models, analysis, and standards
Deception systems and honeypots
Vulnerability analysis
Secure software development
Machine learning for security
Computer security visualization techniques
Network exfiltration
Online money laundering and underground economy
Hardware vulnerabilities
Binary analysis and reverse engineering
Digital forensics
Security and Privacy
Intrusion detection and prevention

Papers will be judged on novelty, significance, correctness, and clarity. We
encourage papers that bridge research in different communities. We also welcome
experience papers that clearly articulate lessons learnt and papers that refute
prior published results.

Submission Guideline
Reviewing will be double-blind, meaning the authors' identities will be hidden
from the reviewers. There will not be a response/rebuttal phase. RAID 2015 will
follow policies for plagiarism, submission confidentiality, reviewer anonymity,
and prior and concurrent paper submission that mirror those of the ACM (see

RAID 2015 invites two types of submissions:

1. *Full papers* papers presenting mature and novel research results. Papers
accepted by the Program Committee will be presented at RAID 2015 and included in
the Symposium's proceedings published by Springer in its Lecture Notes in
Computer Science series. Each paper must include an abstract and a list of
keywords, and must not exceed 20 pages in total length, formatted in LNCS-style
and including the bibliography and any appendices. If needed, we will grant
accepted papers upto 2 additional pages to address the reviewers' comments
*Note*: unlike in previous years, the RAID 2015 review procedure is *double
blind*. All papers should be appropriately anonymized. In other words: leave the
author names off the paper, refer to your own prior work in the third person, do
not give the paper a title that corresponds to a publicly available technical
report, etc. Papers that are not anonymized will not be reviewed.

2. *Poster abstracts* describing works in progress, or innovative ideas not
mature enough to be presented as a full paper. The poster track will provide an
opportunity to present early-stage work and receive feedback from the community,
especially on thought-provoking or controversial work, approaches, or ideas from
students. We also welcome submissions of posters corresponding to papers
presented at RAID-affiliated workshops. Posters are submitted for review in the
form of an extended abstract that has to be formatted in LNCS-style and not
exceed 1 page in length, with a PDF draft of the proposed poster included as
page 2 of the submission. In addition, poster titles should always start with
the phrase "Poster Abstract:". Accepted posters will be presented at the
symposium in a separate session. Authors of accepted full papers are also
encouraged to submit and present posters of their paper in the poster session.
*The board where posters will be fastened is in portrait mode; height: 1,60m,
width: 1,20m.*

For accepted papers, at least one of the authors must attend the conference to
present the paper. Submissions must not substantially duplicate work that has
already been published elsewhere or is submitted in parallel to a journal or to
any other conference or workshop with proceedings. Simultaneous submission of
the same work to multiple venues, submission of previously published work, and
plagiarism constitute dishonesty or fraud. RAID, like other scientific and
technical conferences and journals, prohibits these practices and may, on the
recommendation of the program chair, take action against authors who have
committed them. Further questions on the submission process may be sent to the
program chairs.

Authors who are unsure whether or not their submissions might meet these
guidelines, or with specific questions about the guidelines, are welcome to
contact the program committee co-chairs: raid2015-chairs [at]

Submission Site
Please visit for submissions.

Important Dates
Paper Submission Deadline: June 5, 2015 (extended)
Paper Acceptance Notification: August 14, 2015
Poster Submission Deadline: August 28, 2015
Poster Acceptance Notification: September 11, 2015
Conference: November 2-4, 2015

Organizing Committee
General Chair:
Youki Kadobayashi, NAIST

PC Chair:
Herbert Bos, Vrije Universiteit, VU University Amsterdam

PC Co-Chair:
Fabian Monrose, University of North Carolina at Chapel Hill

Local Arrangement Chair:
Kazuya Okada, NAIST

Publication Chair:
Gregory Blanc, Telecom SudParis

Publicity Chair:
Giorgos Vasiliadis, FORTH

Program Committee
Manos Antonakakis, Georgia Tech
Elias Athanasopoulos, FORTH
Herbert Bos, Vrije Universiteit / VU University Amsterdam
Gabriela Ciocarlie, SRI International
Lucas Davi, Intel CRI-SC at TU Darmstadt
Tudor Dumitras, University of Maryland
Petros Efstathopoulos, Symantec Research Labs
William Enck, North Carolina State University
Bryan Ford, EPFL
Aurélien Francillon, Eurecom
Flavio Garcia, University of Birmingham
Chris Kanich, University of Illinois at Chicago
Christopher Kruegel, UC Santa Barbara
Andrea Lanzi, U. of Milan
Corrado Leita, LastLine, Inc.
Brian Levine, UMass Amherst
Fabian Monrose, University of North Carolina at Chapel Hill
Zachary Peterson, Cal Poly, San Luis Obispo
Georgios Portokalidis, Stevens Institute of Technology
Niels Provos, Google
Konrad Rieck, University of Göttingen
William Robertson, Northeastern University
Christian Rossow, Saarland University
Andrei Sabelfeld, Chalmers
Stelios Sidiroglou-Douskos, MIT
Patrick Traynor, U. of Florida
XiaoFeng Wang, Indiana University
Dongyan Xu, Purdue University

Related Resources

RAID 2016   19th International Symposium on Research in Attacks, Intrusions and Defenses
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
DIMVA 2016   13th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment
BigData-FAB 2016   Special Issue on “Big Data and Machine Learning in Finance, Accounting and Business” in Electronic Commerce Research (Springer)
EACL SRW 2017   EACL 2017 Student Research Workshop
NFM 2017   The 9th NASA Formal Methods Symposium
AsianHOST 2016   IEEE Asian Hardware-Oriented Security and Trust Symposium 2016
ECRM 2017   16th European Conference on Research Methodology for Business and Management Studies
CPAIOR 2017   Fourteenth International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming
ICCCRI 2017   5th International Conference on Cloud Computing Research and Innovation (ICCCRI 2017)