RAID 2018

The 21th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), previously known as Recent Advances in Intrusion Detection, aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. RAID 2018 will be held in Heraklion, Crete, Greece on 10-12 September 2018

Since its inception in 1997, RAID has established itself as a venue where leading researchers and practitioners are given the opportunity to present novel research in a unique venue to an engaged and lively community. Attendees are from prestigious universities, government, and high technology companies all over the world.

Attendees typically include:

  • Researchers working in the field of computer and information security
  • Academics studying the field of cyber security
  • Incident response and security teams with responsibility for coordinating computer security
  • Technical staff who determine security product needs and implement solutions
  • Anyone wanting to learn more about computer security in general

RAID2018, the 21st RAID Symposium, will be organized by FORTH . Please monitor this page, as more details will follow soon.

Important Dates

Submission Deadline: March 27, 2018, 11:59:59 PM, Anywhere on earth (UTC -12)
Notification to Authors: May 29, 2018
Camera Ready Deadline: June 29, 2018
Conference: September 10-12, 2018

Call for papers

The RAID conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.

This year, RAID 2018 is soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them, or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:

  • Computer, network, and cloud computing security
  • Malware and unwanted software
  • Program analysis and reverse engineering
  • Mobile Security
  • Web security and privacy
  • Vulnerability analysis techniques
  • Usable security and privacy
  • Intrusion detection and prevention
  • Hardware security
  • Cyber physical systems security and threats against critical infrastructures
  • IoT security
  • Statistical and adversarial learning for computer security
  • Cyber crime and underground economies
  • Denial-of-Service attacks
  • Security measurement studies
  • Digital forensics

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.

Submission Guidlines

Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices.

Reviewing will be double-blind, meaning the authors’ identities will be hidden from the reviewers. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, and should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not anonymized will not be reviewed.

Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM (see http://www.acm.org/publications/policies/).

Papers accepted by the Program Committee will be presented at RAID 2018 and included in the Symposium’s proceedings published by Springer in its Lecture Notes in Computer Science series.

Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee co-chairs.

Committees

Organizing Committee

General Chair: Sotiris Ioannidis, Foundation for Research and Technology - Hellas
Program Committee Chair: Michael Bailey, University of Illinois at Urbana Champaign
Program Committee Co-Chair: Thorsten Holz, Ruhr-Universität Bochum
Publication Chair: Manolis Stamatogiannakis, Vrije Universiteit Amsterdam
Publicity Chair: Michalis Polychronakis, Stony Brook University
Local Arrangement Chair: Ioannis Askoxylakis, Foundation for Research and Technology - Hellas

Program Committee

Sadia Afroz University of California at Berkeley
Magnus Almgren Chalmers University of Technology
Johanna Amann International Computer Science Institute
Leyla Bilge Symantec
Srdjan Capkun ETH Zurich
Lorenzo Cavallaro Royal Holloway, University of London
Lucas Davi University Duisburg-Essen
Tudor Dumitras University of Maryland
Zakir Durumeric Stanford University and Zcorp
Manuel Egele Boston University
Roya Ensafi University of Michigan
Giulia Fanti Carniegie Mellon University
Carrie Gates Securelytix
Jon Giffin Google, Inc.
Guofei Gu Texas A&M University
Amin Kharraz University of Illinois at Urbana-Champaign
Tim Leek MIT Lincoln Laboratory
Bo Li University of Illinois at Urbana-Champaign
Sarah Meiklejohn University College London
Fabian Monrose University of North Carolina at Chapel Hill and ZeroPoint Dynamics, LLC
Benjamin Morin French Network and Information Security Agency (ANSSI)
Alina Oprea Northeastern University
Jason Polakis University of Illinois at Chicago
Christina Pöpper New York University
William Robertson Northeastern University
Brendan Saltaformaggio Georgia Institute of Technology
Angelos Stavrou George Mason University
Kurt Thomas Google, Inc.
Eric Wustrow University of Colorado Boulder
Dongyun Xu Purdue University

Steering Committee

Johanna Amann: International Computer Science Institute
Davide Balzarotti: Eurecom Graduate School and Research Center
Marc Dacier: Eurecom Graduate School and Research Center
Zhiqiang Lin: University of Texas at Dallas
Mathias Payer: Purdue University
Michalis Polychronakis: Stony Brook University
Salvatore Stolfo: Columbia University
Angelos Stavrou: George Mason University