Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Symposium Organizers
  • Registration Information
  • Registration Discounts
  • At a Glance
  • Calendar
  • Technical Sessions
  • Birds-of-a-Feather Sessions
  • Poster Session
  • Sponsorship
  • Workshops
  • Activities
  • Hotel and Travel Information
  • Services
  • Students
  • Questions
  • Help Promote!
  • Flyer PDF
  • For Participants
  • Call for Papers
    • Important Dates
    • Symposium Organizers
    • Symposium Topics
    • Refereed Papers
    • Symposium Activities
    • Submitting Papers
    • Paper Submission Form
    • Call for Papers PDF
  • Past Symposia

sponsors

Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Call for Papers » Symposium Topics
Tweet

connect with us

http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems and network security, including:

  • Analysis of network and security protocols
  • Applications of cryptographic techniques
  • Attacks with novel insights, techniques, or results
  • Authentication and authorization of users, systems, and applications
  • Automated tools for source code analysis
  • Botnets
  • Cryptographic implementation analysis and construction
  • Denial-of-service attacks and countermeasures
  • Embedded systems security
  • File and filesystem security
  • Forensics and diagnostics for security
  • Hardware security
  • Human-computer interaction, security, and privacy
  • Intrusion and anomaly detection and prevention
  • Malicious code analysis, anti-virus, anti-spyware
  • Mobile system security
  • Network infrastructure security
  • Operating system security
  • Privacy-enhancing technologies
  • Security architectures
  • Security education and training
  • Security for critical infrastructures
  • Security in heterogeneous and large-scale environments
  • Security in ubiquitous computing environments
  • Security policy
  • Self-protecting and self-healing systems
  • Techniques for developing secure systems
  • Technologies for trustworthy computing
  • Wireless security
  • Web security, including client-side and server-side security

The USENIX Security Symposium is primarily a systems security conference. Papers whose contributions are primarily new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc., may not be appropriate for this conference.

The program chair is not permitted to be author or co-author of any paper submissions.

Next Page

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us