------------------------------------------------------------------------ 2012 ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) in conjunction with the 19th ACM Conference on Computer and Communications Security (CCS), October 16-18 2012, Raleigh, NC Mobile devices such as smartphones and Internet tablets have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become source of pain for adopting users and organizations. For example, the wide-spread presence of information-stealing applications raises substantial security and privacy concerns. The operating systems supporting these new devices have both advantages and disadvantages with respect to offered security. On one hand, they use application sandboxing to contain exploits and limit privileges given to malware. On the other hand, they collect and organize many forms of security and privacy sensitive information simply as a matter of operation, and make that information easily accessible to downloaded third-party applications. Recognizing smartphone security and privacy as the emerging area, this workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas, thus to deepen our understanding to various security and privacy issues on smartphones, specifically the platforms such as iOS and Android. Topics of interests include (but are not limited to) the following subject categories: * Device/hardware security * OS/Middleware security * Application security * Authenticating users to devices and services * Mobile Web Browsers * Usability * Privacy * Rogue application detection and recovery * Vulnerability detection and remediation * Secure application development * Cloud support for mobile security We also would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a venue for creative debate and interaction in security- and privacy-sensitive areas of computing and communication impacted by smartphones. ------------------------------------------------------------------------ Important Dates Manuscript submission: July 13, 2012 Acceptance notification: August 13, 2012 Final Manuscript due: August 24, 2012 Workshop Date: October 19, 2012 (Friday) ------------------------------------------------------------------------ Submissions Authors are invited to submit either Full Research Papers (of up to 12 pages) or Short Papers (of up to 6 pages). Full Research Papers that present relatively complete and mature research results on security and privacy in smartphones and mobile devices are solicited. Short Papers that define new problems in security and privacy related to smartphones and mobile devices or provide inspiring visions are also solicited. Submissions must be in double-column ACM format (available at http://www.acm.org/sigs/publications/proceedings-templates) with a font no smaller than 9 point. Only PDF files will be accepted. Submissions need to be numbered and should not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All authors and their affiliations must be listed. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library. The submission information can be found at: http://www.spsm-workshop.org/2012/ ------------------------------------------------------------------------ Organizing Committees Program Co-chairs * William Enck, North Carolina State University * Xuxian Jiang, North Carolina State University Technical Program Committee * David Barrera, Carleton University * Songqing Chen, George Mason University * Rajarshi Gupta, Qualcomm Research Silicon Valley * Jaeyeon Jung, Microsoft Research * Zhenkai Liang, National University of Singapore * Patrick McDaniel, Pennsylvania State University * Adrienne Porter Felt, University of California, Berkeley * Ahmad-Reza Sadeghi, TU Darmstadt and Intel Research Institute for Secure Computing at TU Darmstadt * Kapil Singh, IBM T.J. Watson Research Center * Patrick Traynor, Georgia Institute of Technology * Glenn Wurster, Research in Motion Limited * Xinwen Zhang, Huawei Research Center ------------------------------------------------------------------------