Calls for Papers
Publish and Present Your Work at USENIX Conferences
The program committees of the following conferences are seeking submissions. CiteSeer ranks the USENIX Conference Proceedings among the the top ten highest-impact publication venues for computer science. By submitting a paper to a USENIX conference, you have the opportunity to present your work directly to your peers and to share it with a wide audience of readers of the Proceedings. Please see our Conference Submissions Policy.
Please note: All submission deadline times listed below are for the Pacific time zone.
SREcon16: SREcon16April 7-8, 2016, Santa Clara, CA
Last March, we held the second SREcon, a conference focused on site reliability and production systems at scale, with 370 attendees. The demand for SREcon16 is high, and we are looking for experts in the site reliability space to drive another outstanding conference.
SREcon16 will take place on April 7–8, 2016, in Santa Clara, CA. Last year, we added a second day to cover more subjects; based on last year's success, we've decided to keep the same two-day format. We're excited to hear your proposals so that we can have a great conference! Save the date and come join us for two days of highly technical subjects around site reliability and production at scale.
Submissions due: February 8, 2016 - 11:59 pm
USENIX Security '16: 25th USENIX Security SymposiumAugust 10-12, 2016, Austin, TX
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 25th USENIX Security Symposium will be held August 10–12, 2016, in Austin, TX.
All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. Submissions are due on Thursday, February 18, 2016, 9:00 pm EST. The Symposium will span three days, with a technical program including refereed papers, invited talks, panel discussions, posters, a Work-in-Progress session, Doctoral Colloquium, and Birds-of-a-Feather sessions (BoFs). Co-located workshops will precede the Symposium on August 8 and 9.
Submissions due: February 18, 2016 - 6:00 pm
TaPP '16: 8th USENIX Workshop on the Theory and Practice of ProvenanceJune 8-9, 2016, Washington, D.C.
TaPP 2016 continues the tradition of providing a genuine workshop environment for discussing and developing new ideas and exploring connections between disciplines and between academic research on provenance and practical applications.
We invite innovative and creative contributions, including papers outlining new challenges for provenance research, promising formal approaches to provenance, innovative use of provenance, experience-based insights, resourceful experiments, and visionary (and possibly risky) ideas.
Proposals for tutorials, panel or group discussions, reports on early stage research, or any other activities that will create a successful workshop are encouraged.
Abstracts due: February 22, 2016 - 11:59 pm
SOUPS 2016: Twelfth Symposium on Usable Privacy and SecurityJune 22-24, 2016, Denver, CO
The 2016 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. We invite authors to submit original papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches.
Paper registration due: March 1, 2016 - 5:00 pm
HotCloud '16: 8th USENIX Workshop on Hot Topics in Cloud ComputingJune 20-21, 2016, Denver, CO
HotCloud brings together researchers and practitioners from academia and industry working on cloud computing technologies to share their perspectives, report on recent developments, discuss research in progress, and identify new/emerging "hot" trends in this important area. While cloud computing has gained traction over the past few years, many challenges remain in the design, implementation, and deployment of cloud computing.
HotCloud is open to examining all models of cloud computing, including the scalable management of in-house servers, remotely hosted Infrastructure-as-a-Service (IaaS), infrastructure augmented with tools and services that provide Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS).
Submissions due: March 8, 2016 - 11:59 pm
HotStorage '16: 8th USENIX Workshop on Hot Topics in Storage and File SystemsJune 20-21, 2016, Denver, CO
The purpose of the HotStorage workshop is to provide a forum for the cutting edge in storage research, where researchers can exchange ideas and engage in discussions with their colleagues. The workshop seeks submissions that explore longer-term challenges and opportunities for the storage research community. Submissions should propose new research directions, advocate non-traditional approaches, or report on noteworthy actual experience in an emerging area. We particularly value submissions that effectively advocate fresh, unorthodox, unexpected, controversial, or counterintuitive ideas for advancing the state of the art.
Submissions will be judged on their originality, technical merit, topical relevance, and likelihood of leading to insightful discussions that will influence future storage systems research. In keeping with the goals of the HotStorage workshop, the review process will heavily favor submissions that are forward-looking and open-ended, as opposed to those that summarize mature work or are intended as a stepping stone to a top-tier conference publication in the short term.
Submissions due: March 10, 2016 - 11:59 pm
LISA16: 30th Large Installation System Administration ConferenceDecember 4-9, 2016, Boston, MA
USENIX’s Large Installation System Administration (LISA) conference—now in its 30th year—is the premier conference for IT operations, where systems engineers, operations professionals, and academic researchers share real-world knowledge about designing, building, and maintaining the critical systems of our interconnected world.
Industry Call for Participation
We invite industry leaders to propose topics that demonstrate the present and future of IT operations. LISA submissions should inspire and motivate attendees to take actions that will positively impact their business operations.
Submissions due: April 25, 2016 - 11:59 pm
OSDI '16: 12th USENIX Symposium on Operating Systems Design and ImplementationNovember 2-4, 2016, Savannah, GA
The 12th USENIX Symposium on Operating Systems Design and Implementation seeks to present innovative, exciting research in computer systems. OSDI brings together professionals from academic and industrial backgrounds in a premier forum for discussing the design, implementation, and implications of systems software. The OSDI Symposium emphasizes innovative research as well as quantified or insightful experiences in systems design and implementation.
OSDI takes a broad view of the systems area and solicits contributions from many fields of systems practice, including, but not limited to, operating systems, file and storage systems, distributed systems, cloud computing, mobile systems, secure and reliable systems, systems aspects of big data, embedded systems, virtualization, networking as it relates to operating systems, and management and troubleshooting of complex systems. We also welcome work that explores the interface to related areas such as computer architecture, networking, programming languages, analytics and databases. We particularly encourage contributions containing highly original ideas, new approaches, and/or groundbreaking results.
Abstract registration due: May 3, 2016 - 2:59 pm
ASE '16: 2016 USENIX Workshop on Advances in Security EducationAugust 9, 2016, Austin, TX
The 2016 USENIX Advances in Security Education Workshop (ASE ’16) is a new workshop, co-located with the 25th USENIX Security Symposium, designed to be a top-tier venue for cutting-edge research, best practices, and experimental curricula in computer security education.
The workshop welcomes a broad range of paper submissions on the subject of computer security education in any setting (K-12, undergraduate, graduate, non-traditional students, professional development, and the general public) with a diversity of goals, including developing or maturing specific knowledge, skills and abilities (KSAs), or improving awareness of issues in the cyber domain (e.g., cyber literacy, online citizenship). ASE is intended to be a venue for educators, designers, and evaluators to collaborate, share knowledge, improve existing practices, critically review state-of-the-art, and validate or refute widely held beliefs.
ASE is the evolution of the USENIX Summit on Gaming, Games, and Gamification (3GSE), expanded to welcome a wider range of contributions to security education research. This broadened workshop scope is intended to attract those already working in this space within the traditional USENIX Security community, as well as those from outside the technical communities, including education researchers, social scientists, and practitioners. The workshop will attempt to represent, through invited talks, paper presentations, panels, and tutorials, a variety of approaches and issues related to security education.
Paper submissions due: May 3, 2016 - 11:59 pm
CSET '16: 9th Workshop on Cyber Security Experimentation and TestAugust 8, 2016, Austin, TX
The CSET workshop invites submissions on cyber security evaluation, experimentation, measurement, metrics, data, simulations, and testbeds.
The science of cyber security poses significant challenges. For example, experiments must recreate relevant, realistic features in order to be meaningful, yet identifying those features and modeling them is very difficult. Repeatability and measurement accuracy are essential in any scientific experiment, yet hard to achieve in practice. Few security-relevant datasets are publicly available for research use and little is understood about what "good datasets" look like. Finally, cyber security experiments carry significant risks if not properly contained and controlled, yet often require some degree of interaction with the larger world in order to be useful.
Meeting these challenges requires transformational advances, including understanding the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability.
Submissions due: May 3, 2016 - 11:59 pm
SOUPS 2016: Twelfth Symposium on Usable Privacy and SecurityJune 22-24, 2016, Denver, CO
Posters: High-quality poster presentations are an integral part of SOUPS. We seek poster abstracts describing recent or ongoing research related to usable privacy and security. SOUPS will include a poster session in which authors will exhibit their posters. Accepted poster abstracts will be distributed to symposium participants and made available on the symposium Web site. Interactive demos alongside posters are welcome and encouraged. We also welcome authors of recent papers on usable privacy and security (2015 to 2016) to present their work at the SOUPS poster session.
Lightning Talks: A continuing feature of SOUPS is a session of 5-minute talks and 5- to 10-minute demos. These could include emerging hot topics, preliminary research results, practical problems encountered by end users or industry practitioners, a lesson learned, a research challenge that could benefit from feedback, a war story, ongoing research, a success, a failure, a future experiment, tips and tricks, a pitfall to avoid, exciting visualization, new user interface or interaction paradigm related to security and privacy. etc. Demo presentations should convey the main idea of the interface and one or more scenarios or use cases.
Workshops and Tutorials: We are soliciting proposals for a small number of in-depth sessions on usable security and privacy. These sessions could run either a half or full day, and could be lecture-oriented (tutorial) or a group-oriented session designed to widely share experience (workshop).
Panels: SOUPS is seeking proposals for panels. A good panel focuses on an issue of current concern, and has a strong and clear point of contention in the topic, in the questions, and in the panelist points of view. Full proposals should contain a title, description of the topic, and suggested panelists (with pertinent biographical information). We encourage panels structured as debates rather than just a series of short talks. We are also interested in ideas for panels you would like to see on the program, even if you do not wish to be a panel organizer.
Invited Talks: We're looking for ideas for invited speakers. Please suggest a speaker you would like to hear from, or have heard recently with something provocative or visionary to say on the topic of usable security and privacy.
Please see the full Call for Posters and Proposals for submission details.
Poster submissions due: May 16, 2016 - 5:00 pm
WOOT '16: 10th USENIX Workshop on Offensive TechnologiesAugust 8-9, 2016, Austin, TX
The USENIX Workshop on Offensive Technologies (WOOT) aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners in all areas of computer security. Offensive security has changed from a hobby to an industry. No longer an exercise for isolated enthusiasts, offensive security is today a large-scale operation managed by organized, capitalized actors. Meanwhile, the landscape has shifted: software used by millions is built by startups less than a year old, delivered on mobile phones and surveilled by national signals intelligence agencies.
Submissions due: May 17, 2016 - 8:59 pm