CALL FOR PAPERS
Submission Guidelines for Papers/Posters
We accept the following submissions:
Regular papers: Up to 8 pages.
Short papers or Work-in-Progress (WIP) papers: Up to 5 pages.
Poster papers: Up to 1 page.
All submissions should be in the double-column NDSS format, including both references and appendices. Additionally, we welcome Systemization of Knowledge (SoK) papers, which can be up to 12 pages in length, excluding references and clearly marked appendices. Please note that reviewers are not obligated to read the appendices or any supplementary material provided.
Authors must adhere to the NDSS format without altering the font size or margins. For regular papers, submissions that are concise will not be at a disadvantage. As such, we encourage authors to submit papers that reflect the depth and breadth of their research contribution, without undue length.
Paper Formatting Guidelines
Size & Layout: Papers should be set to US letter size (not A4). Use a two-column layout with each column not exceeding 9.25 in. in height and 3.5 in. in width.
Font & Spacing: The text should be in Times font. Font size should be 10-point or larger and line spacing should be 11-point or larger.
Templates: Authors are required to use NDSS templates for their submissions. The templates for NDSS 2024 are available here.
File Format: All submissions must be in Portable Document Format (.pdf).
Visual Elements: Ensure that any special fonts, images, and figures are correctly rendered. When printed in black and white using Adobe Reader, all components should be clear and legible.
Anonymization: All submissions should be anonymized for the review process.
Special Categories: If your paper falls under the Short/WIP/SoK/poster category, please prefix your title with "Short:", "WIP:", "SoK:", or "Poster:" respectively.
All accepted submissions will be presented at the workshop and included in the NDSS workshop proceedings.
One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.
For any questions, please contact one the workshop organizers at zhu11@iu.edu
Important Dates
Paper submission deadline: Jan 13, 2024 (all deadlines are AoE, UTC-12)
Reviews due: Jan 27, 2024
Review Released and Acceptance notification: Jan 31, 2024
Camera-ready due: Feb 12, 2024
Workshop: Feb 26, 2024
Topics of Interest
The primary themes for the workshop's call for papers include but not limited to:
Basics of Confidential Computing in AI Context.
An overview of confidential computing principles tailored to AI applications, emphasizing its significance in safeguarding AI models and data.
Protecting AI Models with Confidential Computing.
Demonstrating how confidential computing can shield AI models against threats, from the training phase to deployment.
Challenges and Limitations of Confidential Computing for AI.
Discussing the specific challenges of integrating confidential computing in AI systems, such as computational overheads and potential scalability concerns.
Holistic Approaches to AI Security.
Going beyond just confidential computing to explore comprehensive strategies for AI protection, including hardware, software, and human-centric measures.
Combination of Confidential Computing and Other AI Defense Strategies.
Investigating how confidential computing can synergize with other defense techniques, such as differential privacy, for robust AI protection.
Integration of Confidential Computing into the AI Lifecycle.
Addressing the role of confidential computing throughout the AI model lifecycle, ensuring security from development and training to deployment and updates.
Data Privacy Assurance via Confidential Computing.
Evaluating the potency of confidential computing in maintaining data privacy, especially in sectors with highly sensitive data.
Enforcing Data Policies with Confidential Computing.
Demonstrating the capability of confidential computing to uphold strict data policies, ensuring AI processes data in line with organizational and legal standards.
Confidential Computing in the AI Supply Chain.
Emphasizing the integration of confidential computing principles in the broader AI supply chain, from data acquisition to model deployment.
AI-Driven Confidential Computing.
Highlighting the strategies for ensuring trustworthy computing of AI models and the middleware tools that can facilitate this.
AI-centric Trustworthiness Metrics.
Proposing and refining metrics to evaluate the trustworthiness and reliability of AI systems running within TEEs.
Side Channel Attacks in AI Systems.
Delving into the vulnerabilities, implications, and countermeasures of side channel attacks, particularly when AI systems are executed within TEEs.
Ethic and Usability in the AI Confidential Computing.
Other Important Things
Double and Concurrent Submissions
Technical papers should not have substantially overlap with papers that are either already published or concurrently submitted to another journal or a conference/workshop with proceedings. Any instances of double-submission will lead to the paper being rejected immediately. To identify such cases, the Program Committee reserves the right to exchange information with chairs of other conferences and editors of journals.
Ethical Considerations
Human Subjects Research: For papers involving human subjects, analyzing data derived from such subjects, potentially endangering humans, or introducing other ethical or legal implications that might concern the VehicleSec community, authors should indicate whether an ethical review (e.g., IRB approval) took place. Additionally, the paper should elaborate on how ethical and legal issues were addressed.
Vulnerability Disclosure: When a paper uncovers a potentially high-impact vulnerability, authors are expected to outline their strategy for responsible disclosure. Should there be any concerns, the chairs will reach out to the authors. Please note that the Program Committee retains the discretion to reject submissions that don't adequately demonstrate the proper handling of ethical or relevant legal matters.
Conflicts of Interest
Authors and Program Committee (PC) members must declare any conflicts of interest and specify their nature. Conflicts of interest exist in the following cases:
Between advisors and their advisees.
Between authors and PC members who share an institutional affiliation.
Professional collaborations in the past 2 years, regardless of whether they resulted in a publication or funding.
Close personal relationships.
PC members, including chairs, with a conflict of interest concerning a particular paper will be completely excluded from evaluating that paper.
Special Note on "Fake Conflicts": It is prohibited to declare conflicts of interest merely to evade certain PC members who would otherwise have no conflict. Engaging in such behavior may result in paper rejection. The PC Chairs hold the authority to inquire further about any declared conflict. If authors feel uncertain about the impartiality of their paper's treatment, they should directly communicate with the chairs, outlining substantial reasons for any special consideration they seek.