Check out the new USENIX Web site.


HotSec '10 Home

HotSec '10 will be co-located with USENIX Security '10.

Important Dates

Workshop Organizers


Workshop Format


Web Submission Form

PDF Call for Papers
in PDF

Interested in sponsorship opportunities for HotSec '10? Contact

HotSec '10 Call for Papers

5th USENIX Workshop on Hot Topics in Security (HotSec '10)

August 10, 2010
Washington, DC

Sponsored by USENIX, the Advanced Computing Systems Association

HotSec '10 will be co-located with the 19th USENIX Security Symposium (USENIX Security '10), which will take place August 11–13, 2010.

Important Dates

  • Submissions due: May 3, 2010, 11:59 p.m. PDT
  • Notification of acceptance: June 28, 2010
  • Final files due: July 12, 2010

Workshop Organizers

Program Chair
Wietse Venema, IBM Research

Program Committee
Lucas Ballard, Google Inc.
Dan Boneh, Stanford University
Herbert Bos, Vrije Universiteit Amsterdam
Manuel Costa, Microsoft Research
Trent Jaeger, Pennsylvania State University
Angelos D. Keromytis, Columbia University
Engin Kirda, Institute Eurecom
Christopher Kruegel, University of California, Santa Barbara
Wenke Lee, Georgia Institute of Technology
Patrick McDaniel, Pennsylvania State University
Vern Paxson, University of California, Berkeley, and International Computer Science Institute
Niels Provos, Google Inc.
Leendert van Doorn, AMD
Paul van Oorschot, Carleton University
Helen Wang, Microsoft Research


Position papers are solicited for the 5th USENIX Workshop on Hot Topics in Security (HotSec '10). We favor papers that propose new directions of research, advocate non-traditional approaches, report on noteworthy experience in an emerging area, or generate lively discussion around an important topic. Papers in well-explored research areas are discouraged.

While pragmatic and systems-oriented, HotSec takes a broad view of security and privacy and encompasses research on topics including, but not limited to, large-scale threats, network security, hardware security, software security, programming languages, applied cryptography, anonymity, human-computer interaction, sociology, and economics.

We expect that most accepted papers will fall into one or more of the following categories:

  • Fundamentally new techniques, approaches, or perspectives for dealing with current security problems
  • New, major problems arising from new technologies that are now being developed or deployed
  • Truly surprising results that cause rethinking of previous approaches

Further, while our goal is to solicit innovative ideas in their formative stages, we expect submissions to be supported by some evidence of feasibility or preliminary quantitative results. We also expect that many accepted position papers will eventually evolve into finished, full papers presented at future conferences.

Workshop Format

Attendance will be limited to 35–50 participants, with preference given to the authors of accepted position papers/presentations.

Each author will have 10–15 minutes to present his or her idea, followed by 15–20 minutes of discussion with the workshop participants.


Submissions must be no longer than 6 pages including figures, tables, and references. Text should be formatted in two columns on 8.5" x 11" paper using 10 point type on 12 point leading ("single-spaced"), with the text block being no more than 6.5" wide by 9" deep. Author names and affiliations should appear on the title page (reviewing is not blind). Pages should be numbered, and figures and tables should be legible in black and white without requiring magnification. Papers not meeting these criteria will be rejected without review, and no deadline extensions will be granted for reformatting.

Submissions must be in PDF and must be submitted via the Web submission form.

Authors will be notified of acceptance by June 28, 2010. Authors of accepted papers will produce a final PDF by July 12, 2010. All papers will be available online to registered attendees before the workshop. If your accepted paper should not be published prior to the event, please notify The papers will be available online to everyone beginning on the day of the workshop, August 10, 2010.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program chair,, or the USENIX office,

Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX HotSec '10 Web site; rejected submissions will be permanently treated as confidential.

? Need help?

Last changed: 29 March 2010 ch
HotSec '10 Home