Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Symposium Organizers
  • At a Glance
  • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
  • Technical Sessions
  • Co-Located Workshops
  • Accepted Posters
  • Activities
    • Birds-of-a-Feather Sessions
    • Work-in-Progress Reports
  • Sponsorship
  • Students and Grants
  • Services
  • Questions?
  • Help Promote!
  • Flyer PDF
  • For Participants
  • Call for Papers
    • Important Dates
    • Symposium Organizers
    • Symposium Topics
    • Refereed Papers
    • Shadow PC
    • Symposium Activities
    • Submitting Papers
  • Past Symposia

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Call for Papers » Symposium Topics
Tweet

connect with us

http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:

  • Cloud computing security
  • Cryptographic implementation analysis and construction, applied cryptography
  • Distributed systems security
  • Forensics and diagnostics for security
  • Hardware security
    • Embedded systems security
    • Methods for detection of malicious or counterfeit hardware
    • Randomness
    • Secure computer architectures
    • Side channels
  • Human-computer interaction, security, and privacy
  • Intrusion and anomaly detection and prevention
  • Malware
    • Detection, mitigation
    • Malicious code analysis, anti-virus, anti-spyware
  • Mobile system security
  • Network security
    • Botnets
    • Denial-of-service attacks and countermeasures
    • Network infrastructure security
  • Operating system security
  • Privacy-enhancing technologies, anonymity
  • Programming language security
  • Public good
    • Research on computer security law and policy
    • Research on security education and training
    • Research on social values, surveillance, and censorship
  • Security analysis
    • Analysis of network and security protocols
    • Attacks with novel insights, techniques, or results
  • Security applications
    • Security in critical infrastructures
    • Security in electronic voting
    • Security in health care and medicine
    • Security in ubiquitous computing, sensors, actuators
  • Security economics, electronic commerce
  • Security measurement studies
    • Large-scale measurement of fraud, malware, spam
    • Large-scale measurement of human behavior and security
  • Security tools
    • Automated security analysis of hardware designs and implementation
    • Automated security analysis of source code and binaries, program analysis
    • Novel tools to improve the trustworthiness of computer systems
  • Storage security
    • Database security and privacy
    • File systems
  • Web security
  • Wireless security

This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

The program chair is not permitted to be author or co-author of any paper submissions.

Next Page

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us