The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA, USA.
Important: In 2023, USENIX Security introduced substantial changes to the review process, aimed to provide a more consistent path towards acceptance and reduce the number of times papers reenter the reviewing process. Detailed information is available at USENIX Security Publication Model Changes.
All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security.
- Paper submissions due: Tuesday, June 6, 2023, 11:59 pm AoE
- Early reject notification: Thursday, July 13, 2023
- Rebuttal Period: August 21–23, 2023
- Notification to authors: Friday, September 1, 2023
- Final paper files due: Tuesday, October 10, 2023
- Paper submissions due: Tuesday, October 17, 2023, 11:59 pm AoE
- Early reject notification: Monday, November 27, 2023
- Rebuttal Period: January 22–24, 2024
- Notification to authors: Thursday, February 1, 2024
- Final paper files due: Tuesday, March 5, 2024
- Paper submissions due: Thursday, February 8, 2024, 11:59 pm AoE
- Early reject notification: Monday, March 18, 2024
- Rebuttal Period: April 24–26, 2024
- Notification to authors: Wednesday, May 8, 2024
- Final paper files due: Thursday, June 13, 2024
- Invited talk and panel proposals due: Thursday, February 8, 2024
- Poster proposals due: Tuesday, July 9, 2024
- Notification to poster presenters: Tuesday, July 16, 2024
Program Vice Co-Chairs
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.
- System security
- Operating systems security
- Web security
- Mobile systems security
- Distributed systems security
- Cloud computing security
- Network security
- Intrusion and anomaly detection and prevention
- Network infrastructure security
- Denial-of-service attacks and countermeasures
- Wireless security
- Security analysis
- Malware analysis
- Analysis of network and security protocols
- Attacks with novel insights, techniques, or results
- Forensics and diagnostics for security
- Automated security analysis of hardware designs and implementation
- Automated security analysis of source code and binaries
- Program analysis
- Fuzzing and Vulnerability Discovery
- Formal methods for Security
- Machine learning security and privacy
- Machine learning applications to security and privacy
- Machine learning privacy issues and methods
- Adversarial machine learning
- Data-driven security and measurement studies
- Measurements of fraud, malware, spam
- Measurements of human behavior and security
- Privacy metrics
- Web and mobile privacy
- Privacy-preserving computation
- Privacy attacks
- Usable security and privacy
- User studies related to security and privacy
- Human-centered security and privacy design
- Language-based security
- Hardware security
- Secure computer architectures
- Embedded systems security
- Cyber-physical systems security
- Methods for detection of malicious or counterfeit hardware
- Side channels
- Research on surveillance and censorship
- Social issues and security
- Research on computer security law and policy
- Ethics of computer security research
- Research on security education and training
- Information manipulation, misinformation, and disinformation
- Protecting and understanding at-risk users
- Emerging threats, harassment, extremism, and online abuse
- Applications of cryptography
- Analysis of deployed cryptography and cryptographic protocols
- Cryptographic implementation analysis
- New cryptographic protocols with real-world applications
- Blockchains and distributed ledger security
Systematization of Knowledge
Starting this year, USENIX Security solicits the submission of Systematization of Knowledge (SoK) papers, which have been very valuable to help our community to clarify and put into context complex research problems.
It is important to stress that SoK papers go beyond simply summarizing previous research (like in a survey) but also include a thorough examination and analysis of existing approaches, identify gaps and limitations, and offer insights or new perspectives on a given, major research area.
While both SoK and survey papers may involve summarizing existing research, the key difference is that a SoK paper provides a more structured and insightful overview, which might also involve new experiments to replicate and compare previous solutions. Please refer to the IEEE Symposium on Security and Privacy for recent SoK papers at https://oaklandsok.github.io/.
We encourage the authors to distinguish SoK submissions by adding the "SoK:" prefix to the title.
Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Alternative arrangements will be made if global health concerns persist. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact firstname.lastname@example.org.
A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX's open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.
Go to Paper Submission Policies and Instructions page for more information.
The Call for Artifacts will be available soon.
Invited Talks, Panels, and Poster Session
In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, and a poster session. You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at email@example.com.
Invited Talks and Panel Discussions
Invited talks and panel discussions will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to firstname.lastname@example.org by Thursday, February 8, 2024.
Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year's USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.
To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form, which will be available here soon, by Tuesday, July 9, 2024. Decisions will be made by Tuesday, July 16, 2024. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors' names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.