Calls for Papers
Publish and Present Your Work at USENIX Conferences
The program committees of the following conferences are seeking submissions. CiteSeer ranks the USENIX Conference Proceedings among the the top ten highest-impact publication venues for computer science. By submitting a paper to a USENIX conference, you have the opportunity to present your work directly to your peers and to share it with a wide audience of readers of the Proceedings. Please see our Conference Submissions Policy.
Please note: All submission deadline times listed below are for the Pacific time zone.
CSET '15: 8th Workshop on Cyber Security Experimentation and TestAugust 10, 2015, Washington, D.C.
CSET invites submissions on the science of cyber security evaluation as well as experimentation, measurement, metrics, data, and simulations, as those subjects relate to computer and network security and privacy. The "science" of cyber security poses significant challenges: very little data are available for research use, and little is understood about what good data would look like if it were obtained. Experiments must recreate relevant, realistic features—including human behavior—in order to be meaningful, yet identifying those features and modeling them is hard. Repeatability and measurement accuracy are essential in any scientific experiment, yet hard to achieve in practice. Cyber security experiments carry significant legal and ethical risks if not properly contained and controlled, yet often require some degree of interaction with the larger world in order to be useful. Meeting these challenges requires transformational advances, including understanding the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability.
Submissions due: May 5, 2015 - 8:59 pm
3GSE '15: 2015 USENIX Summit on Gaming, Games, and Gamification in Security EducationAugust 11, 2015, Washington, D.C.
The 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE), to be co-located with USENIX Security, is designed to bring together educators and game designers working in the growing field of digital games, non-digital games, pervasive games, gamification, contests, and competitions for computer security education. The summit will attempt to represent, through invited talks, paper presentations, panels, and tutorials, a variety of approaches and issues related to using games for security education.
Submissions due: May 5, 2015 - 11:59 pm
FOCI '15: 5th USENIX Workshop on Free and Open Communications on the InternetAugust 10, 2015, Washington, D.C.
The 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI '15), to be held on August 10, 2015, seeks to bring together researchers and practitioners working on means to study, detect, or circumvent practices that inhibit free and open communication on the Internet.
Internet communications drive political and social change around the world. Governments and other actors seek to control, monitor, manipulate and block Internet communications for a variety of reasons, ranging from extending copyright law to suppressing free speech and assembly. Methods for controlling what content people post and view online are also multifarious. Whether it's traffic throttling by ISPs or man-in-the-middle attacks by countries seeking to identify those organizing protests, threats to free and open communications on the Internet raise a wide range of research challenges.
FOCI '15 invites submissions from technical as well as policy and social science-oriented research. Work that combines perspectives from multiple fields is especially encouraged.
Submissions due: May 12, 2015 - 8:59 pm
WOOT '15: 9th USENIX Workshop on Offensive TechnologiesAugust 10-11, 2015, Washington, D.C.
The USENIX Workshop on Offensive Technologies (WOOT) aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners in all areas of computer security. Offensive security has changed from a hobby to an industry. No longer an exercise for isolated enthusiasts, offensive security is today a large-scale operation managed by organized, capitalized actors. Meanwhile, the landscape has shifted: software used by millions is built by startups less than a year old, delivered on mobile phones and surveilled by national signals intelligence agencies.
Submissions due: May 21, 2015 - 11:59 pm