Calls for Papers
Publish and Present Your Work at USENIX Conferences
The program committees of the following conferences are seeking submissions. CiteSeer ranks the USENIX Conference Proceedings among the the top ten highest-impact publication venues for computer science. By submitting a paper to a USENIX conference, you have the opportunity to present your work directly to your peers and to share it with a wide audience of readers of the Proceedings. Please see our Conference Submissions Policy.
Please note: All submission deadline times listed below are for the Pacific time zone.
OSDI '16: 12th USENIX Symposium on Operating Systems Design and ImplementationNovember 2-4, 2016, Savannah, GA
The 12th USENIX Symposium on Operating Systems Design and Implementation seeks to present innovative, exciting research in computer systems. OSDI brings together professionals from academic and industrial backgrounds in a premier forum for discussing the design, implementation, and implications of systems software. The OSDI Symposium emphasizes innovative research as well as quantified or insightful experiences in systems design and implementation.
OSDI takes a broad view of the systems area and solicits contributions from many fields of systems practice, including, but not limited to, operating systems, file and storage systems, distributed systems, cloud computing, mobile systems, secure and reliable systems, systems aspects of big data, embedded systems, virtualization, networking as it relates to operating systems, and management and troubleshooting of complex systems. We also welcome work that explores the interface to related areas such as computer architecture, networking, programming languages, analytics and databases. We particularly encourage contributions containing highly original ideas, new approaches, and/or groundbreaking results.
Abstract registration due: May 3, 2016 - 2:59 pm
ASE '16: 2016 USENIX Workshop on Advances in Security EducationAugust 9, 2016, Austin, TX
The 2016 USENIX Advances in Security Education Workshop (ASE ’16) is a new workshop, co-located with the 25th USENIX Security Symposium, designed to be a top-tier venue for cutting-edge research, best practices, and experimental curricula in computer security education.
The workshop welcomes a broad range of paper submissions on the subject of computer security education in any setting (K-12, undergraduate, graduate, non-traditional students, professional development, and the general public) with a diversity of goals, including developing or maturing specific knowledge, skills and abilities (KSAs), or improving awareness of issues in the cyber domain (e.g., cyber literacy, online citizenship). ASE is intended to be a venue for educators, designers, and evaluators to collaborate, share knowledge, improve existing practices, critically review state-of-the-art, and validate or refute widely held beliefs.
ASE is the evolution of the USENIX Summit on Gaming, Games, and Gamification (3GSE), expanded to welcome a wider range of contributions to security education research. This broadened workshop scope is intended to attract those already working in this space within the traditional USENIX Security community, as well as those from outside the technical communities, including education researchers, social scientists, and practitioners. The workshop will attempt to represent, through invited talks, paper presentations, panels, and tutorials, a variety of approaches and issues related to security education.
Paper submissions due: May 3, 2016 - 11:59 pm
CSET '16: 9th Workshop on Cyber Security Experimentation and TestAugust 8, 2016, Austin, TX
The CSET workshop invites submissions on cyber security evaluation, experimentation, measurement, metrics, data, simulations, and testbeds.
The science of cyber security poses significant challenges. For example, experiments must recreate relevant, realistic features in order to be meaningful, yet identifying those features and modeling them is very difficult. Repeatability and measurement accuracy are essential in any scientific experiment, yet hard to achieve in practice. Few security-relevant datasets are publicly available for research use and little is understood about what "good datasets" look like. Finally, cyber security experiments carry significant risks if not properly contained and controlled, yet often require some degree of interaction with the larger world in order to be useful.
Meeting these challenges requires transformational advances, including understanding the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability.
Submissions due: May 3, 2016 - 11:59 pm
SOUPS 2016: Twelfth Symposium on Usable Privacy and SecurityJune 22-24, 2016, Denver, CO
Posters: High-quality poster presentations are an integral part of SOUPS. We seek poster abstracts describing recent or ongoing research related to usable privacy and security. SOUPS will include a poster session in which authors will exhibit their posters. Accepted poster abstracts will be distributed to symposium participants and made available on the symposium Web site. Interactive demos alongside posters are welcome and encouraged. We also welcome authors of recent papers on usable privacy and security (2015 to 2016) to present their work at the SOUPS poster session.
Lightning Talks: A continuing feature of SOUPS is a session of 5-minute talks and 5- to 10-minute demos. These could include emerging hot topics, preliminary research results, practical problems encountered by end users or industry practitioners, a lesson learned, a research challenge that could benefit from feedback, a war story, ongoing research, a success, a failure, a future experiment, tips and tricks, a pitfall to avoid, exciting visualization, new user interface or interaction paradigm related to security and privacy. etc. Demo presentations should convey the main idea of the interface and one or more scenarios or use cases.
Workshops and Tutorials: We are soliciting proposals for a small number of in-depth sessions on usable security and privacy. These sessions could run either a half or full day, and could be lecture-oriented (tutorial) or a group-oriented session designed to widely share experience (workshop).
Panels: SOUPS is seeking proposals for panels. A good panel focuses on an issue of current concern, and has a strong and clear point of contention in the topic, in the questions, and in the panelist points of view. Full proposals should contain a title, description of the topic, and suggested panelists (with pertinent biographical information). We encourage panels structured as debates rather than just a series of short talks. We are also interested in ideas for panels you would like to see on the program, even if you do not wish to be a panel organizer.
Invited Talks: We're looking for ideas for invited speakers. Please suggest a speaker you would like to hear from, or have heard recently with something provocative or visionary to say on the topic of usable security and privacy.
Please see the full Call for Posters and Proposals for submission details.
Poster submissions due: May 16, 2016 - 5:00 pm
FOCI '16: 6th USENIX Workshop on Free and Open Communications on the InternetAugust 8, 2016, Austin, TX
The 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16), to be held on August 8, 2016 in Austin, TX, seeks to bring together researchers and practitioners working on means to study, detect, or circumvent practices that inhibit free and open communication on the Internet.
Internet communications drive political and social change around the world. Governments and other actors seek to control, monitor, manipulate, and block Internet communications for a variety of reasons, ranging from extending copyright law to suppressing free speech and assembly. Methods for controlling what content people post and view online are also multifarious. Whether it's traffic throttling by ISPs or man-in-the-middle attacks by countries seeking to identify those organizing protests, threats to free and open communications on the Internet raise a wide range of research challenges.
Submissions due: May 16, 2016 - 8:59 pm
WOOT '16: 10th USENIX Workshop on Offensive TechnologiesAugust 8-9, 2016, Austin, TX
The USENIX Workshop on Offensive Technologies (WOOT) aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners in all areas of computer security. Offensive security has changed from a hobby to an industry. No longer an exercise for isolated enthusiasts, offensive security is today a large-scale operation managed by organized, capitalized actors. Meanwhile, the landscape has shifted: software used by millions is built by startups less than a year old, delivered on mobile phones and surveilled by national signals intelligence agencies.
Submissions due: May 17, 2016 - 8:59 pm
NSDI '17: 14th USENIX Symposium on Networked Systems Design and ImplementationMarch 27-29, 2017, Boston, MA
NSDI focuses on the design principles, implementation, and practical evaluation of networked and distributed systems. Our goal is to bring together researchers from across the networking and systems community to foster a broad approach to addressing overlapping research challenges.
NSDI provides a high-quality, single-track forum for presenting results and discussing ideas that further the knowledge and understanding of the networked systems community as a whole, continue a significant research dialog, or push the architectural boundaries of network services.
Paper titles and abstracts due: September 14, 2016 - 4:59 pm
FAST '17: 15th USENIX Conference on File and Storage TechnologiesFebruary 27-March 2, 2017, Santa Clara, CA
The 15th USENIX Conference on File and Storage Technologies (FAST '17) brings together storage-system researchers and practitioners to explore new directions in the design, implementation, evaluation, and deployment of storage systems. The program committee will interpret "storage systems" broadly; everything from low-level storage devices to information management is of interest. The conference will consist of technical presentations including refereed papers, Work-in-Progress (WiP) reports, poster sessions, and tutorials.
FAST accepts both full-length and short papers. Both types of submissions are reviewed to the same standards and differ primarily in the scope of the ideas expressed. Short papers are limited to half the space of full-length papers. The program committee will not accept a full paper on the condition that it is cut down to fit in the short paper page limit, nor will it invite short papers to be extended to full length. Submissions will be considered only in the category in which they are submitted.
Submissions due: September 27, 2016 - 9:00 pm