The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and unconventional ideas on information and cyber security that benefit from early feedback. Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or discuss problems from an entirely novel angle, leading to new solutions. We welcome papers both from computer science and other disciplines that study adversarial relationships, as well as from practice. The workshop is invitation-only; all accepted papers receive a 1-hour plenary time slot for presentation and discussion. In order to maximize the diversity of perspectives, we particularly encourage submissions from new NSPW authors, from Ph.D. students, and from non-obvious disciplines and institutions.
In 2018, NSPW invites theme submissions around Security in 2038 next to regular submissions. We know from past experience that every security advance brings with it new security failures. Automated software updates open the door to malicious software updates; DNSSEC is subject to cryptography-based denial-of-service attacks; antivirus software can be compromised by data files that are otherwise harmless. We encourage authors to imagine the security problems of the next 20 years, how they are currently being created through fallible solutions and paradigms, and what alternative paradigms would be available to mitigate those anomalies (as meant by Kuhn). Theme submissions can take any form, but we suggest writing them as if they were a submission for NSPW 2038 (including citations to future work). We particularly invite submissions (co-)authored by historians and futurologists.
NSPW will be held at the Cumberland Lodge in Windsor, UK from August 28-31, 2018. As in the past, this choice of venue is designed to facilitate interactions between the invited attendees throughout the workshop.
Submission deadline: April 13, 2018 23:59 (UTC-11) firm
Author responses: May 25-June 1, 2018
Notification of acceptance: June 11, 2018
Pre-proceedings deadline: July 2, 2018
Invitations sent: July 6, 2018
Early registration: July 20, 2018
Late registration: July 27, 2018
Workshop: August 28-31, 2018
Final version: October 15, 2018
NSPW accepts three categories of submissions:
Submissions must be made in PDF format, 6-15 pages, ACM SIG formatting, through EasyChair, as linked on the NSPW site. Submissions must include a cover page with authors' names, affiliation, justification statement and attendance statement. Papers not including these risk rejection without review. The justification statement briefly explains why the submission is appropriate for NSPW and the chosen submission category. The attendance statement must specify which author(s) will attend upon acceptance/invitation. Submissions should not be blinded. Organizers and PC members are allowed to submit, but will not be involved in the evaluation of their own papers. All submissions are treated as confidential as a matter of policy. NSPW does not accept previously published or concurrently submitted papers. Authors may submit review responses during the review process indicating the changes they wish to commit to. Papers are accepted conditionally and are shepherded, with final proceedings being published after the workshop.
The workshop itself is invitation-only, with typically 30-35 participants consisting of authors of about 12 accepted papers, panelists, program committee members, and organizers. One author of each accepted paper must attend; additional authors may be invited if space permits. All participants must commit to a ?social contract?: no one arrives late, no one leaves early, no laptops, and all attend all sessions of the 2.5 day program, sharing meals in a group setting. The workshop is preceded by an evening reception allowing attendees to meet each other beforehand.
***Financial Aid: NSF has provided financial aid especially for U.S.-based students and junior faculty. We have a limited amount of financial aid available for others, as well. We encourage submissions from students, junior faculty, and others, especially if support may be required to attend.
Mark Burgess, Consultant
Markus Christen, Universitat Zurich
Benjamin Edwards, IBM
Carrie Gates, Securelytix
Eireann Leverett, University of Cambridge
Sean Peisert, Lawrence Berkeley National Laboratory & University of California Davis
Christian W. Probst, Unitech Institute of Technology
Karen Renaud, Abertay University
Jonathan M. Spring, University College London