USENIX Security '21 Call for Papers

Symposium Overview

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 30th USENIX Security Symposium will be held August 11–13, 2021, in Vancouver, B.C., Canada.

Important: The USENIX Security Symposium moved to multiple submission deadlines in 2019 and included changes to the review process and submission policies. Detailed information is available at USENIX Security Publication Model Changes.

All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 9 and 10.

Important Dates

Summer Deadline

  • Refereed paper submissions due: Thursday, June 11, 2020, 11:59 pm AoE Thursday, June 18, 2020, 11:59 pm AoE (Extended)
  • Early reject notification: July 24, 2020
  • Rebuttal Period: August 31–September 2, 2020
  • Notification to authors: September 11, 2020
  • Final paper files due: October 13, 2020

Fall Deadline

  • Refereed paper submissions due: Thursday, October 15, 2020, 11:59 pm AoE
  • Early reject notification: November 20, 2020
  • Rebuttal Period: January 11–13, 2021
  • Notification to authors: January 21, 2021
  • Final paper files due: February 22, 2021

Winter Deadline

  • Refereed paper submissions due: Thursday, February 4, 2021, 11:59 pm AoE
  • Early reject notification: March 12, 2021
  • Rebuttal Period: April 19–21, 2021
  • Notification to authors: April 30, 2021
  • Final paper files due: June 2, 2021

  • Invited talk and panel proposals due: Thursday, February 4, 2021
  • Poster proposals due: Tuesday, July 6, 2021
    • Notification to poster presenters: July 13, 2021

Symposium Organizers

Program Co-Chairs

Michael Bailey, University of Illinois at Urbana–Champaign
Rachel Greenstadt, New York University

Program Committee

Yousra Aafer, University of Waterloo
Ruba Abu-Salma, University College London and Inria
Gunes Acar, Katholieke Universiteit Leuven
David Adrian, Censys
Sadia Afroz, International Computer Science Institute (ICSI), University of California, Berkeley, and Avast
Devdatta Akhawe, Figma
Benjamin Andow, Google
Sebastian Angel, University of Pennsylvania
Pauline Anthonysamy, Google
Manos Antonakakis, Georgia Institute of Technology
Jethro G. Beekman, Fortanix
Matthew Bernhard, University of Michigan
Battista Biggio, University of Cagliari, Italy
Leyla Bilge, NortonLifeLock Research Group
Vincent Bindschaedler, University of Florida
Tamara Bonaci, Northeastern University
Joseph C Bonneau, New York University
Sven Bugiel, CISPA Helmholtz Center for Information Security
Kevin Butler, University of Florida
Joseph Calandrino, Federal Trade Commission
Aylin Caliskan, George Washington University
Stefano Calzavara, Università Ca' Foscari Venezia
Yinzhi Cao, Johns Hopkins University
Alvaro A. Cardenas, University of California, Santa Cruz
Nicholas Carlini, Google
Lorenzo Cavallaro, King's College London
Rahul Chatterjee, University of Wisconsin—Madison
Qi Alfred Chen, University of California, Irvine
Marshini Chetty, University of Chicago
Sherman S. M. Chow, The Chinese University of Hong Kong
Omar Haider Chowdhury, The University of Iowa
Mihai Christodorescu, Visa Research
Erinn Clark, Google
Shaanan Cohney, Princeton University and University of Melbourne
Scott Coull, FireEye
Cas Cremers, CISPA Helmholtz Center for Information Security
Michel Cukier, University of Maryland
George Danezis, University College London and Facebook Calibra
Anupam Das, North Carolina State University
Sanchari Das, Indiana University Bloomington
Sauvik Das, Georgia Institute of Technology
Nathan Dautenhahn, Rice University
Lucas Davi, University of Duisburg-Essen
Roger Dingledine, The Tor Project
Brendan Dolan-Gavitt, New York University
Adam Doupé, Arizona State University
Zakir Durumeric, Stanford University
Manuel Egele, Boston University
Serge Egelman, International Computer Science Institute (ICSI), University of California, Berkeley, and AppCensus, Inc.
Pardis Emami-Naeini, Carnegie Mellon University
William Enck, North Carolina State University
Roya Ensafi, University of Michigan
Sascha Fahl, Leibniz University Hannover
Giulia Fanti, Carnegie Mellon University
Kassem Fawaz, University of Wisconsin—Madison
Nick Feamster, University of Chicago
Ariel J. Feldman, Google
Wu-chang Feng, Portland State University
Earlence Fernandes, University of Wisconsin—Madison
David Fifield, Unaffiliated
Simone Fischer-Hubner, Karlstad University
Christopher Wardlaw Fletcher, University of Illinois at Urbana–Champaign
Michael Franz, University of California, Irvine
Matt Fredrikson, Carnegie Mellon University
David Freeman, Facebook Inc.
Patrick Gage Kelley, Google
Siddarth Garg, New York University
Christina Garman, Purdue University
Carrie Gates, Bank of America
Daniel Genkin, University of Michigan
Irene Giacomelli, Protocol Labs
Ian Goldberg, University of Waterloo
Neil Gong, Duke University
Daniel Gruss, Graz University of Technology
Guofei Gu, Texas A&M University
J. Alex Halderman, University of Michigan
Mike Hamburg, Rambus
Hamza Harkous, Google
Wajih Ul Hassan, University of Illinois at Urbana–Champaign
Xiali (Sharon) Hei, University of Louisiana at Lafayette
Nadia Heninger, University of California, San Diego
Ryan Henry, University of Calgary
Alejandro Hevia, University of Chile
Matthew Hicks, Virginia Tech
Thorsten Holz, Ruhr-Universität Bochum
Nicholas Hopper, University of Minnesota
Amir Houmansadr, University of Massachusetts Amherst
Danny Yuxing Huang, New York University
Sotiris Ioannidis, Technical University of Crete
Cynthia Irvine, Naval Postgraduate School
Suman Jana, Columbia University
Rob Jansen, U.S. Naval Research Laboratory
Somesh Jha, University of Wisconsin—Madison
Anthony D Joseph, University of California, Berkeley
Chris Kanich, University of Illinois at Chicago
Apu Kapadia, Indiana University Bloomington
Vasileios Kemerlis, Brown University
Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
Sam King, University of California, Davis
Engin Kirda, Northeastern University
Tadayoshi Kohno, University of Washington
Kevin T. Kornegay, Morgan State University
Katharina Krombholz, CISPA Helmholtz Center for Information Security
Christopher Kruegel, University of California, Santa Barbara
Negar Kyavash, École Polytechnique Fédérale de Lausanne (EPFL)
Andrea Lanzi, University of Milan
Mathias Lécuyer, Microsoft Research
Wenke Lee, Georgia Institute of Technology
Anja Lehmann, Hasso-Plattner-Institute, University of Potsdam
Corrado Leita, VMWare
Tancrède Lepoint, Google
Dave Levin, University of Maryland
Frank Li, Georgia Institute of Technology
Mingyan Liu, University of Michigan
Wouter Lueks, École Polytechnique Fédérale de Lausanne (EPFL)
Mateo Maffei, Technische Universität Wien
Stefan Mangard, Graz University of Technology
Ivan Martinovic, University of Oxford
Michelle Mazurek, University of Maryland
Stephen McCamant, University of Minnesota
Jon McCune, Google
Patrick McDaniel, The Pennsylvania State University
Susan E. McGregor, Columbia University
Andrew Miller, University of Illinois at Urbana–Champaign
Esfandiar Mohammadi, University of Lübeck
Veelasha Moonsamy, Radboud University and Ruhr-University Bochum
Tyler Moore, The University of Tulsa
Takao Murakami, AIST
Adwait Nadkarni, College of William & Mary
Nick Nikiforakis, Stony Brook University
Shirin Nilizadeh, The University of Texas at Arlington
Rishab Nithyanand, The University of Iowa
Guevara Noubir, Northeastern University
Cristina Onete, University of Limoges/XLIM/CNRS 7252
Yossi Oren, Ben-Gurion University of the Negev
Rebekah Overdorf, École Polytechnique Fédérale de Lausanne (EPFL)
Chris Palmer, Google
Nicholas Papernot, University of Toronto and Vector Institute
Aleatha Parker-Wood, Unaffiliated
Mathias Payer, École Polytechnique Fédérale de Lausanne (EPFL)
Paul Pearce, Georgia Institute of Technology and International Computer Science Institute (ICSI)
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
Roberto Perdisci, University of Georgia
Radia Perlman, Dell Technologies
Zachary Peterson, California Polytechnic State University
Jason Polakis, University of Illinois at Chicago
Christina Pöpper, New York University Abu Dhabi
Niels Provos, Stripe
Sara Rampazzi, University of Michigan and University of Florida
Aanjhan Ranghanathan, Northeastern University
Bradley Reaves, North Carolina State University
Elissa M. Redmiles, Microsoft Research
Konrad Rieck, Technische Universität Braunschweig
Thomas Ristenpart, Cornell Tech
William Robertson, Northeastern University
Stefanie Roos, Delft University of Technology
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Merve Sahin, SAP Security Research
Brendan Saltaformaggio, Georgia Institute of Technology
Nolen Scaife, University of Colorado Boulder
Bruce Schneier, Harvard Kennedy School
Kent Seamons, Brigham Young University
Vyas Sekar, Carnegie Mellon University
Wendy Seltzer, W3C and Massachusetts Institute of Technology
Fatemeh Shirazi, Web3 Foundation
Haya Shulman, Fraunhofer SIT
Angelos Stavrou, Virginia Tech
Deian Stefan, University of California, San Diego
Ben Stock, CISPA Helmholtz Center for Information Security
Gianluca Stringhini, Boston University
Cynthia Sturton, The University of North Carolina at Chapel Hill
Nick Sullivan, Cloudflare
Yixin Sun, University of Virginia
Paul Syverson, U.S. Naval Research Laboratory
Patrick Tague, Carnegie Mellon University
Kurt Thomas, Google
Dave (Jing) Tian, Purdue University
Yuan Tian, University of Virginia
Laura Tinnel, SRI International
Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Jacob Torrey, DARPA
Florian Tramèr, Stanford University
Patrick Traynor, University of Florida
Blase Ur, University of Chicago
Ingrid Verbauwhede, Katholieke Universiteit Leuven
Bimal Viswanath, Virginia Tech
David Wagner, University of California, Berkeley
Gang Wang, University of Illinois at Urbana–Champaign
Byron Williams, University of Florida
Matthew Wright, Rochester Institute of Technology
Eric Wustrow, University of Colorado Boulder
Dongyan Xu, Purdue University
Wenyuan Xu, Zhejiang University
Jason Minhui Xue, The University of Adelaide
Yuval Yarom, The University of Adelaide and Data61
Tuba Yavuz, University of Florida
Daniel Zappala, Brigham Young University
Mary Ellen Zurko, MIT Lincoln Laboratory

Steering Committee

Matt Blaze, University of Pennsylvania
Dan Boneh, Stanford University
William Enck, North Carolina State University
Kevin Fu, University of Michigan
Casey Henderson, USENIX Association
Nadia Heninger, University of California, San Diego
Thorsten Holz, Ruhr-Universität Bochum
Jaeyeon Jung, Samsung Electronics
Engin Kirda, Northeastern University
Tadayoshi Kohno, University of Washington
Thomas Ristenpart, Cornell Tech
Patrick Traynor, University of Florida
David Wagner, University of California, Berkeley

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:

  • System security
    • Operating systems security
    • Web security
    • Mobile systems security
    • Distributed systems security
    • Cloud computing security
  • Network security
    • Intrusion and anomaly detection and prevention
    • Network infrastructure security
    • Denial-of-service attacks and countermeasures
    • Wireless security
  • Security analysis
    • Malware analysis
    • Analysis of network and security protocols
    • Attacks with novel insights, techniques, or results
    • Forensics and diagnostics for security
    • Automated security analysis of hardware designs and implementation
    • Automated security analysis of source code and binaries
    • Machine learning in a secure systems context
    • Program analysis
  • Data-driven security and measurement studies
    • Measurements of fraud, malware, spam
    • Measurements of human behavior and security
  • Privacy-enhancing technologies and anonymity
  • Usable security and privacy
  • Language-based security
  • Hardware security
    • Secure computer architectures
    • Embedded systems security
    • Methods for detection of malicious or counterfeit hardware
    • Side channels
  • Research on surveillance and censorship
  • Social issues and security
    • Research on computer security law and policy
    • Ethics of computer security research
    • Research on security education and training
    • Information manipulation
    • Online abuse and harassment
  • Applications of cryptography
    • Analysis of deployed cryptography and cryptographic protocols
    • Cryptographic implementation analysis
    • New cryptographic protocols with real-world applications

This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.

Refereed Papers

Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Alternative arrangements will be made if global health concerns persist. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix.org.

A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX’s open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.

Go to Paper Submission Policies and Instructions page for more information.

Artifact Evaluation

The Call for Artifacts will be available soon.

Symposium Activities

Invited Talks, Panels, Poster Session, Lightning Talks, and BoFs

In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a poster session, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at sec21chairs@usenix.org.

Invited Talks and Panel Discussions

Invited talks and panel discussions will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to sec21it@usenix.org by Thursday, February 4, 2021.

Poster Session

Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year’s USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.

To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form, which will be available here soon, by July 6, 2021. Decisions will be made by July 13, 2021. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors’ names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.

Lightning Talks

Information about lightning talks will be available soon.

Birds-of-a-Feather Sessions (BoFs)

Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on site or in advance. To schedule a BoF, please send email to the USENIX Conference Department at bofs@usenix.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time.

Go to Paper Submission Policies and Instructions