[ietf-privacy] CfP: First Workshop on Privacy and Security in XR (SePAR)

Thorsten Strufe <strufe.pub@googlemail.com> Fri, 15 December 2023 07:53 UTC

Return-Path: <strufe.pub@googlemail.com>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88E8AC14CEFD for <ietf-privacy@ietfa.amsl.com>; Thu, 14 Dec 2023 23:53:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.104
X-Spam-Level:
X-Spam-Status: No, score=-1.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, URI_DOTEDU=1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=googlemail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j18nvqrIq6ut for <ietf-privacy@ietfa.amsl.com>; Thu, 14 Dec 2023 23:53:40 -0800 (PST)
Received: from mail-wm1-x332.google.com (mail-wm1-x332.google.com [IPv6:2a00:1450:4864:20::332]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 301CFC14F5F2 for <ietf-privacy@ietf.org>; Thu, 14 Dec 2023 23:53:40 -0800 (PST)
Received: by mail-wm1-x332.google.com with SMTP id 5b1f17b1804b1-40c6a71e88cso4838675e9.0 for <ietf-privacy@ietf.org>; Thu, 14 Dec 2023 23:53:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20230601; t=1702626818; x=1703231618; darn=ietf.org; h=content-language:to:subject:user-agent:mime-version:date:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=GTis17BQGVUAkXpasNBwsYtrwsZ6VzTaIu7UQpf8cA4=; b=dZHPi0gVN7zIOnqGO2u+6fDCgu8ywbHfeNTgMdnOXw9K8um6JdoZA4MN6K0FFWzY3Q 8fwyPZwReQlDZ/KJcOOse1PnBujOUzUvUfvqhU5fuEfvV1nNuRaiq7lEQ+MaGFNy/ggg PztUpXBqJeeBVMv7nJ4CoYbAb2RahL1N0i3/lIRjbvW6qTSJGfK2yBmTL40bnkbVcFGQ Tz2PQhfNSOgODkB6RIDbi5oGyaBvhIdPzbS7gb+pVzHhDEc33TKrqT63FDmUnVlaaeKQ QALCc+lLk77COUMQldhlkzeQUwbzdt+ubnVXJXm4zaVdyEsASPL+mAxr068ZI3qWXu+d 3fVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702626818; x=1703231618; h=content-language:to:subject:user-agent:mime-version:date:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=GTis17BQGVUAkXpasNBwsYtrwsZ6VzTaIu7UQpf8cA4=; b=rQwNukqW+yzER1JOcM4mDZWk4bY+CEdD3+5XsxORuaP2D6hdqFCciCKmWCepFmCHGk 07LYkN3U69+U9F+e/bvsEQwbYZ5IiammE3vYucSJnizPutv+qLM59LGFxfIqH7aMyef7 c3oD/LIddqQWQ1QttDqGdWNrwMIqZMB6ajWvdYqiTMSV6Gj/A02oFbYXK8Z71uZkgL/R z9cDY7v3WVceRzA9QikryYir09r7ZXdhLHvfcZUbjT7PqagwWyU9+xu5ZkZRx1zzSK0u 5yPykM6YZPDBi5QrTfvem98670RMrQtByP/K2Yrkgsg9C+vjwxLSkyFssmwAQjL8/PWM sviw==
X-Gm-Message-State: AOJu0YykI/leojO32fERX1GI/J0hUpSdgRpTfwNv/J1tXYdzINfyLy9x kNJ1cInrts6xAp9fTG1sNu22q8dY4ZPoFg==
X-Google-Smtp-Source: AGHT+IHR7aN4CK1CPTwc3nNfz8M58uPHR35sUnOyPxQ7hlsrfiWJp+HcB9OoZQ9J7whPiIIEXadjIA==
X-Received: by 2002:a05:600c:3781:b0:40c:35c4:a128 with SMTP id o1-20020a05600c378100b0040c35c4a128mr6255046wmr.121.1702626817780; Thu, 14 Dec 2023 23:53:37 -0800 (PST)
Received: from ?IPV6:2a00:1398:2:8c00:e93e:9be6:3bd5:b0c2? ([2a00:1398:2:8c00:e93e:9be6:3bd5:b0c2]) by smtp.gmail.com with ESMTPSA id z14-20020a05600c0a0e00b0040b3867a297sm28470780wmp.36.2023.12.14.23.53.37 for <ietf-privacy@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 14 Dec 2023 23:53:37 -0800 (PST)
From: Thorsten Strufe <strufe.pub@googlemail.com>
X-Google-Original-From: Thorsten Strufe <strufe.pub@gmail.com>
Content-Type: multipart/alternative; boundary="------------WNZyHnsxxUcnLY6HlL0RDUvi"
Message-ID: <416914d9-d6ba-4388-b0bb-03b77cfb6f32@gmail.com>
Date: Fri, 15 Dec 2023 08:53:37 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: ietf-privacy@ietf.org
Content-Language: en-US, de-DE
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-privacy/OZbydTUnwPef58bCY9RCaHDB3Ew>
Subject: [ietf-privacy] CfP: First Workshop on Privacy and Security in XR (SePAR)
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Dec 2023 07:53:44 -0000

Apologies for cross posting.

* * * * * * * * * * * * * * * * * * * * * * * * * * *
Call for Papers

First International Workshop on Privacy and Security in AR, VR, and XR 
(SePAR)
June 4th-7th, 2024 - Perth, Australia
https://separ-workshop.github.io/

The  Security and Privacy of AR, VR, and XR (SePAR) workshop aims to 
raise awareness and advocate for novel solutions regarding security 
vulnerabilities and privacy risks of XR applications. It will be held in 
Perth, Australia, in conjunction with the 25th IEEE International 
Symposium on a World of Wireless,  Mobile and Multimedia Networks 
(WoWMoM). We are lookingfor new and innovative work, 
includingin-progressdevelopments, which can raise awareness and 
interesting discussions and potentially be published as animproved paper 
at a first-tier venue,after.

The  workshop will bring together researchers and practitioners from  
academia, industry, and government to discuss the latest advances in 
AR/VR security and privacy topics, including:
* Security: Threats to AR/VR systems and applications, and defense 
mechanisms.
* Privacy: Collection and use of personal data in AR/VR systems, user 
privacy controls, and privacy enhancing technologies.
* Policy and regulation: Legal and ethical implications of AR/VR, and 
regulatory frameworks.
* In-Network Computing: to preserve user privacy as a default feature of 
networks

*** Topics of interest include, but are not limited to:
* Studies on the disclosure of threats in XR applications
* Attacks on XR applications and users on the network level
* Privacy and utility metrics in the context of VR and AR
* Techniques for anonymization or removal of sensitive information from 
XR data streams
* Privacy-enhancing techniques for XR networking traffic
* Anomaly detection in encrypted XR traffic
* Analysis of encryption protocols used in the context of XR on all 
network layers
* Privacy policies in the context of XR applications
* Privacy preserving as a virtualized network function
* Programmable networks for delay-sensitive applications such as AR/XR

*** Important Dates:
* Paper submission deadline: February 23rd, 2024
* Notification of acceptance: March 31st, 2024
* Camera-ready version due: April 14, 2024
* Workshop date: June 4th, 2024 (tentative)

*** Submission Guidelines:
Papers  should be submitted in PDF format and should not exceed 6 pages 
in length (including figures and references), formatted in two-column 
IEEE conference style with font size 10 points or greater. See: IEEE 
Manuscript Templates for Conference Proceedings. Papers should be  
original and unpublished work that is not currently under review for  
another conference or journal. Submissions should be made 
electronically  through EDAS 
(https://edas.info/newPaper.php?c=31893&track=121696) 
<https://edas.info/newPaper.php?c=31893&track=121696)>.

*** PC Chairs
* Stefanie Roos (University of Kaiserslautern)
* Giang Nguyen (Centre for Tactile Internet, CeTI, TU Dresden)
* Thorsten Strufe (Karlsruhe Institute of Technology)

*** TPC (preliminary)
* Patricia Arias-Cabarcos (Universität Paderborn)
* Frederik Armknecht (Universität Mannheim)
* Robin Berjon (Protocol Labs)
* Christian Becker (Universität Stuttgart)
* Aurélien Bellet (INRIA Montpellier)
* Franziska Boehm (Leibniz Institute for Information Infrastructure)
* Ulf Brefeld (Leuphana Uni Lüneburg)
* Ana-Maria Cretu (EPFL)
* Tung Doan (TU Dresden)
* Jordi Forné (Universitat Politècnica de Catalunya)
* Sébastien Gambs (Université du Québec à Montréal)
* Oana Goga (CNRS)
* Maria Gorlatova (Duke University)
* Jaap-Henk Hoepman (iHub and Radboud University Nijmegen)
* Dali Kaafar (Macquarie University)
* Jussi Kangasharju (Helsinki University)
* Katharina Kaesling (TU Dresden)
* Stefan Katzenbeisser (Uni Passau)
* Mark Roman Miller (Illinois Institute of Technology)
* Melek Önen (EURECOM)
* Franziska Roesner (University of Washington)
* Anthony Steed (University College London)
* Xiang Su (Norwegian University of Science and Technology)
* Hinako Sugiyama (International Justice Clinic, UC Irvine Law School)
* Florian Tschorsch (TU Dresden)
* Xin Wang (National Institute of Informatics)
* Christiane Weis (NECLabs Europe)
* Limin Zheng (Zhejiang University)

*** Web co-chairs:
* Simon Hanisch (Centre for Tactile Internet, CeTI, TU Dresden)
* Fritz Windisch (Karlsruhe Institute of Technology)

For up-to-date information, please visit the workshop’s website: 
https://separ-workshop.github.io/


-- 
Thorsten Strufe                           Chair of Privacy and Security
KIThttps://ps.tm.kit.edu/
Excellence Centre Tactile Internet/Dresdenhttps://ceti.one/