Spam Conference 2010 - Call for Papers Spam has become the crowbar for crime. ~ quote from Spam Conference 2009 The Expanded MIT Spam Conference 2010 invites the submission of original, unpublished papers on all aspects of spam and other types of electronic communications brand malware. Topics of interest include: * phishing, spyware * spit (spam over internet telephony) * spim (spam over instant messenger) * SMS spam * MMORPG spam * blog spam * trackback spam * image spam * stock pump-and-dumps * email con games * exploit marketing * identity theft * zombie bots and bot armies * hardware and software antispam countermeasures * wetware (a.k.a., liveware, meatware, i.e., user errors) * blue-ware (i.e. employing the police). The common thread remains the same - dealing with undesired and unsolicited electronic communications; that's the central theme of this conference and proposals should relate to that. We welcome submissions from anyone doing work in the spam, anti-spam, or other related cyber crimes is welcome to submit their results, including, but not limited to: academic, corporate, or private researchers; everyone competes on an equal footing. Even spammers are welcome to share their point of view! Key Dates * Submission deadline: February 1, 2010 (later submissions may be reviewed but will not be guaranteed) * Notification of acceptance: No later than March 1, possibly earlier. * Conference: March 25 - 26, 2010 Evaluation Criteria A committee of experts from academic and industrial research centers will review papers. Papers should be technical in nature, and should give enough information so that a reasonable coder could reproduce your work and see if it works for them as well (science requires a reproducible experiment; without reproducible results we are not doing science). Statistical analysis papers and papers that use unique facilities to gather that information are welcome as well; assume that the reasonable coder could have access to big-ISP facilities, computation, or bandwidth if your method requires it. Papers should not be sales pitches or "high level overviews"; lack of enough technical information to reproduce your results will probably cause your paper to be rejected. One notable exception to this is that text corpora of private communications are not expected to be published. Submission Requirements The conference publication method is strictly electronic; therefore, we have no rigid limits on page count. Make your paper exactly as long as it needs to be, and no longer. if you bore the judges, that will influence their scoring. We can accept papers in any of the following formats: PDF, Microsoft Word, OpenOffice, and plain ASCII text papers. Additionally, we can accept "enhanced" submissions, so include proposed slides (even drafts) if you feel it will help the judges in their decision. We don't require 'blinded' papers. Perfected final drafts are due at the time of the conference. Please name your paper's filenames by the last name of the author who should be "first contact" on the paper; for example, if you were Max Brooks and writing about zombie armies, then you submission should be named: Brooks.pdf. Submission(s) should be emailed to liszka@uakron.edu Paper republication/replication and copyright By submitting a paper to the MIT Spam Conference 2010, you grant a universal right for your paper to be electronically reproduced by any interested party for the purposes of learning and research. Authors will retain copyright of their work. Registration All MIT Spam Conferences are free for all interested parties to attend events. The primary goal is to get dialogs going and ideas flowing. Program Chair Kathy J. Liszka Professor, Computer Science The University of Akron liszka@uakron.edu