posted by organizer: dgruss || 54 views || tracked by 1 users: [display]

uASC 2026 : 2nd Microarchitecture Security Conference (uASC '26)

FacebookTwitterLinkedInGoogle

Link: https://uasc.cc/cfp.html
 
When Feb 3, 2026 - Feb 3, 2026
Where Leuven, Belgium
Submission Deadline Jul 15, 2025
Notification Due Sep 1, 2025
Final Version Due Sep 15, 2025
Categories    microarchiecture   security   systems   cryptography
 

Call For Papers

The annual uASC conference serves as a premier forum for advancing our understanding of the security of microarchitectures. Each year, uASC brings together international experts from academia and industry, to present and discuss novel research in this area. The conference proceedings of uASC are published by Ruhr University Bochum in an issue of the Proceedings of the Microarchitecture Security Conference. With a Gold Open Access status, all papers published in the proceedings are immediately and freely available at the start of the conference.
uASC is looking for top-quality papers

Despite its young age, uASC aims to be a first-choice conference for microarchitecture security research (i.e., following the terminology for A-level topic conferences). uASC solicits submissions of high-quality, original scientific papers presenting novel research on microarchitecture security (attacks and defenses).
Topics of interest include, but are not limited to:

Attacks and defenses on various commodity hardware components
Exploration of (unconventional) threat models in microarchitecture security
Hardware security analysis techniques
Microarchitecture security on outdated patch levels, unlikely configurations, and misconfigurations
Operating system and hypervisor side channels
Reverse-engineering of microarchitectures for security
Secure hardware development practices
Security of hardware-software interfaces
Systematic insights on the reproducibility of microarchitectural attacks
Systematic insights on the reproducibility of security and performance claims of microarchitectural defenses
Systematization of knowledge in microarchitecture security
Trusted execution environments

uASC has two submission categories: Full Paper submissions, which undergo thorough academic review, and Talk/Poster submissions, which are accompanied by an optional two-page abstract. uASC welcomes high-quality contributions from both academia and industry, including work-in-progress reports.

All papers are judged on scientific rigor, insights, novelty, correctness, and clarity as well as the clear documentation of limitations. We expect all papers to provide enough details to enable reproducibility of the experimental results and all submissions are invited to submit research artifacts to receive an artifact available badge. uASC has a double-blind reviewing process for papers. All accepted papers are part of the proceedings.

Cycle 1 (Papers only)
In the first cycle we only accept regular paper submissions.

Cycle 1 Submission Deadline: July 15, 2025
Cycle 1 Notification to Authors: September 1, 2025
Cycle 1 Shepherding and Camera-ready Deadline: September 15, 2025

Cycle 2 (Papers, Posters, Talks)
In the second cycle we accept regular paper submissions but also posters and talks.

Cycle 2 Submission Deadline: November 4, 2025
Cycle 2 Notification to Authors: December 15, 2025
Cycle 2 Shepherding and Camera-ready Deadline: January 8, 2026

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
uASC 2025   1st Microarchitecture Security Conference (uASC '25)
CRBL 2025   5th International Conference on Cryptography and Blockchain
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IJDPS 2025   International Journal of Distributed and Parallel systems
MLAIJ 2025   Machine Learning and Applications: An International Journal
MICRO 2025   The IEEE/ACM International Symposium on Microarchitecture
CIOS 2025   3rd International Conference on Cloud, IoT and Security
IISWC 2025   IEEE International Symposium on Workload Characterization
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies