| SRUTI '05 Call for Papers 
Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI '05)
July 7, 2005
 Cambridge, Massachusetts, USA
 
Sponsored by USENIX
 
Important
DatesSubmissions due: March 30, 2005, 11:59 p.m. EST (hard deadline)
 Notification of acceptance: May 3, 2005
 Final papers due: May 23, 2005
 
 
Conference
Organizers 
Program ChairsDina Katabi, MIT
 Balachander Krishnamurthy, AT&T LabsResearch
 
 
Program CommitteePaul Barford, University of Wisconsin
 Steven M. Bellovin, Columbia University
 Herve Debar, France Telecom R&D
 Mark Handley, University College London
 Doug Maughan, U.S. Department of Homeland Security
 Chris Morrow, UUNET
 Vern Paxson, ICIR/ICSI
 Dawn Song, Carnegie Mellon University
 Paul Vixie, ISC
 
Steering CommitteeClem Cole, Ammasso, USENIX Liaison
 Dina Katabi, MIT
 Balachander Krishnamurthy, AT&T LabsResearch
 
 
OverviewThe Internet is under increasing attack with unwanted traffic in the form of spam, distributed denial of service, virus, worms, etc. Unwanted traffic on the Internet has manifested itself as attacks via many protocols (IP, TCP, DNS, BGP, and HTTP) and popular applications (e.g., email, Web). Recently, attacks combining multiple exploits have become common. Many solutions have been proposed for specific attacks, some of which have had limited success. SRUTI seeks research on the unwanted traffic problem that looks across the protocol stack, examines attack commonalities, and investigates how various solutions interact and whether they can be combined to increase security. Original research, promising ideas, and steps toward practical solutions at all levels are sought. We look for ideas in networking and systems, and insights from other areas such as 
databases, data mining, and economics. SRUTI aims to bring academic and industrial research communities together with those who face the problems at the operational level. SRUTI '05 will be a one-and-a-half-day event. Each session chair will play the role of a discussant and present a summary of the papers in the session and a state-of-the-art synopsis of the topic. The workshop will be highly interactive, with substantial time devoted to questions and answers. Submissions must contribute to improving the current understanding of unwanted traffic and/or suggestions for reducing it. The Proceedings of the workshop will be published. To ensure a productive workshop environment, attendance will be by invitation 
 and/or acceptance of paper submission.
 
TopicsRelevant topics include:
 
	Architectural solutions to the unwanted traffic problemScientific assessment of the spread and danger of the attacksPractical countermeasures to various aspects of unwanted traffic (Spam, DoS, worms, etc.)Cross-layer solutions and solutions to combination attacksAttacks on emerging technologies (e.g., sensors, VOIP, PDAs) and their countermeasuresPrivacy and anonymityIntrusion avoidance, detection, and responseVirus, worms, and other malicious codeAnalysis of protocols and systems vulnerabilitiesHandling errors/misconfigurations that might lead to unwanted trafficAttacks on specific distributed systems or network technologies (e.g., P2P, wireless networks)Data mining with application to unwanted trafficNew types of solutions: incentive-based, economic, statistical, collaborative, etc. 
What to SubmitAll submissions must be in English and must include a title and the authors' names and affiliations. Submissions should be no more than six (6) pages long and must be formatted in 2 columns, using 10 point Times Roman type on 12 point leading, in a text block of 6.5" by 9". Papers should be submitted in PDF or Postscript only. Each submission should have a contact author who should provide full contact information (email, phone, fax, mailing address). One author of each accepted paper will be required to present the work at the workshop.
 
Authors must submit their papers by 11:59 p.m. EST, March 30, 2005.
This is a hard deadlineno extensions will be given. Final papers are due on May 23, 2005, and will be included in the workshop Proceedings.
 
The SRUTI workshop, like most conferences and journals, does not allow submissions that are substantially similar to works that have been published or are under review for publication elsewhere. Accepted material may not be published in other conferences or journals for one year from the date of acceptance by USENIX. Papers accompanied by nondisclosure agreement forms will not be read or reviewed. All submissions will be held in confidence prior to publication of the technical program, both as a matter of policy and in accordance with the U.S. Copyright Act of 1976.
 
How to Submit
Authors are required to submit papers by 11:59 p.m. EST, March 30, 2005. This is a hard deadlineno extensions will be given. All submissions to SRUTI '05 must be electronic, in PDF or PostScript, via this Web form.
  
Authors will be notified of acceptance decisions via email by May 3, 2005. If you do not receive notification by that date, contact the Program Chairs at sruti05chairs@usenix.org.
 |