Mobile devices such as smartphones and Internet tablets have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become source of pain for adopting users and organizations. For example, the wide-spread presence of information-stealing applications raises substantial security and privacy concerns. The operating systems supporting these new devices have both advantages and disadvantages with respect to offered security. On one hand, they use application sandboxing to contain exploits and limit privileges given to malware. On the other hand, they collect and organize many forms of security and privacy sensitive information simply as a matter of operation, and make that information easily accessible to downloaded third-party applications.

Recognizing smartphone security and privacy as the emerging area, this workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas, thus to deepen our understanding to various security and privacy issues on smartphones, specifically the platforms such as iOS and Android. Topics of interests include (but are not limited to) the following subject categories:

We also would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a venue for creative debate and interaction in security- and privacy-sensitive areas of computing and communication impacted by smartphones.

Important Dates

Manuscript Submission: July 13, 2012 (23:59 UTC-11)
Acceptance Notification: August 13, 2012
Final Manuscript due: August 24, 2012 (12 noon EDT), required by Sheridan Printing!
Workshop Date: Friday, October 19, 2012


Authors are invited to submit either Full Research Papers (of up to 12 pages) or Short Papers (of up to 6 pages). Full Research Papers that present relatively complete and mature research results on security and privacy in smartphones and mobile devices are solicited. Short Papers that define new problems in security and privacy related to smartphones and mobile devices or provide inspiring visions are also solicited.

Submissions must be in double-column ACM format (available at the ACM Website) with a font no smaller than 9 point. Only PDF files will be accepted. Submissions need to be numbered and should not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All authors and their affiliations must be listed. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

The submission website is here.

For questions, email

Organizing Commitees

Program Co-chairs

William Enck, North Carolina State University
Xuxian Jiang, North Carolina State University

Technical Program Committee

David Barrera, Carleton University
Songqing Chen, George Mason University
Rajarshi Gupta, Qualcomm Research Silicon Valley
Jaeyeon Jung, Microsoft Research
Zhenkai Liang, National University of Singapore
Patrick McDaniel, Pennsylvania State University
Adrienne Porter Felt, University of California, Berkeley
Ahmad-Reza Sadeghi, TU Darmstadt and Intel Research Institute for Secure Computing at TU Darmstadt
Kapil Singh, IBM T.J. Watson Research Center
Patrick Traynor, Georgia Institute of Technology
Glenn Wurster, Research in Motion Limited
Xinwen Zhang, Huawei Research Center