SOUPS 2020 Call for Workshops Submissions

The Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) will take place on August 7–11, 2020, and will be co-located with the 29th USENIX Security Symposium.

In cooperation with USENIX, the Advanced Computing Systems Association

Important Dates

All dates are at 23:59 AoE (Anywhere on Earth) time.

  • Workshop paper submission deadline: Thursday, May 28, 2020 Thursday, June 25, 2020
  • Workshop paper acceptance notification to authors: Thursday, June 11, 2020 Thursday, July 9, 2020
  • Workshop final papers due: Thursday, June 25, 2020 Thursday, July 23, 2020

Update: SOUPS workshops are working to finalize the details of how they will conduct their virtual workshops, including dates and times. Please refer to each workshop's webpage and call for papers for further details.

Organizers

Tutorials and Workshops Co-Chairs

Katharina Krombholz, CISPA Saarland

Daniel Zappala, Brigham Young University

Workshop Schedule

Please check each workshop's website for the specific program schedule.

5th Workshop on Inclusive Privacy and Security (WIPS 2020): Friday, August 7, 2020, and Sunday, August 9, 2020
6th Workshop on Security Information Workers (WSIW 2020): Sunday, August 9, 2020
Who Are You!? Adventures in Authentication (WAY 2020): Friday, August 7, 2020

5th Workshop on Inclusive Privacy and Security (WIPS 2020)

Security and privacy challenges confront all participants in modern society, but particular groups may experience unique or uneven privacy and security concerns. These groups may face distinctive obstacles to addressing issues, and their particular needs and concerns may not be well understood beyond those groups. Traditionally, inclusive design has addressed physical accessibility as well as needs arising from age, disability, or environment. While this work remains critical, our community also increasingly recognizes the importance of accounting for the needs of vulnerable users or marginalized groups. The workshop deliberately avoids any concrete definitions of what "vulnerable" means in this context. We encourage a diverse discussion of any group or situation that could be deemed as vulnerable, without prejudice.

In this workshop, we explore the privacy and security experiences and needs of vulnerable user groups. We are also interested in populations or roles in our society (e.g., lawyers, journalists, politicians, activists, medical providers) that support and/or affect the lives of vulnerable individuals. We will endeavor to uncover new ways of taking a more inclusive approach to appreciating and addressing privacy and security challenges. We also seek to identify the unintended harms that can result from privacy and security technology.

The objectives of our workshop are as follows:

  1. To broaden participants' awareness of diverse privacy and security concerns.
  2. To compile design guidelines and best practices that are relevant to inclusive design.
  3. To explore the application, adaption, and extension of inclusive design guidelines to privacy and security challenges.

View the Call for Papers

6th Workshop on Security Information Workers (WSIW 2020)

The human element is often considered the weakest element in security. Although many kinds of humans interact with systems that are designed to be secure, one particular type of human is especially important: the security information workers who develop, use, and manipulate security-related information and data as a significant part of their jobs. Security information workers include:

  • Software developers, who design and build software that manages and protects sensitive information;
  • Security and system administrators, who deploy and manage security-sensitive software and hardware systems;
  • IT professionals whose decisions have impact on end-users' security and privacy;
  • Intelligence analysts, who collect and analyze data about security matters to understand information and make predictions; and
  • Security consultants and educators, who provide guidance to individuals and organizations on practicing good security behaviors and implementing security technologies

This workshop aims to develop and stimulate discussion about security information workers. We will consider topics including but not limited to:

  • Empirical studies of security information workers, including case studies, experiments, field studies, and surveys;
  • New tools designed to assist security information workers;
  • Infrastructure for better understanding security information workers;
  • Information visualization and other techniques designed to help security information workers do their jobs;
  • Evaluations of tools and techniques for security information workers.

View the Call for Papers

Who Are You!? Adventures in Authentication (WAY 2020)

The purpose of this workshop is to bring together researchers, practitioners, and industry to share experiences, concerns, and ideas about known and new authentication techniques. We are interested in discussing methods of evaluating the impact and usability of various authentication techniques, and ideas about novel authentication techniques that are secure, robust and usable. This year, WAY will also accept short reports from industry and public entities on authentication.

Authentication, or the act of proving that someone is who they claim to be, is a cornerstone of security. The importance of authentication continues to grow as users must prove their identity to maintain a continuous presence with a wide variety of computing devices and services.

The goal of this workshop is to explore these and related topics across the broad range of contexts, including enterprise systems, personal systems, and especially mobile and embedded systems (such as healthcare, smart home, IoT, and wearable systems). This workshop provides an informal and interdisciplinary setting at the intersection of security, psychological, and behavioral science.

View the Call for Papers