USENIX Security 2017 : USENIX Security '17
Call For Papers
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
* System security
* Operating systems security
* Web security
* Mobile systems security
* Distributed systems security
* Cloud computing security
* Network security
* Intrusion and anomaly detection and prevention
* Network infrastructure security
* Denial-of-service attacks and countermeasures
* Wireless security
* Cryptographic implementation analysis and construction
* Applied cryptography
* Security analysis
* Malware analysis
* Analysis of network and security protocols
* Attacks with novel insights, techniques, or results
* Forensics and diagnostics for security
* Automated security analysis of hardware designs and implementation
* Automated security analysis of source code and binaries
* Program analysis
* Data-driven security and measurement studies
* Measurements of fraud, malware, spam
* Measurements of human behavior and security
* Privacy-enhancing technologies and anonymity
* Usable security and privacy
* Language-based security
* Hardware security
* Secure computer architectures
* Embedded systems security
* Methods for detection of malicious or counterfeit hardware
* Side channels
* Research on surveillance and censorship
* Social issues and security
* Research on computer security law and policy
* Ethics of computer security research
* Research on security education and training
This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. It is required that one of the paper authors attend the conference and present the work. It is the responsibility of the authors to find a suitable replacement presenter for their work, if the need arises.
A registration discount will be available for one author per paper. If the registration fee poses a hardship to the presenter, USENIX will offer complimentary registration.
A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX’s open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.
Invited Talks, Panels, Poster Session, Doctoral Colloquium, and BoFs
In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a poster session, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at email@example.com.
Invited talks will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk proposals via email to firstname.lastname@example.org by Thursday, February 16, 2017, 9:00 p.m. PST.
The technical sessions may include topical panel discussions. Please send topic suggestions and proposals to email@example.com by Thursday, February 16, 2017, 9:00 p.m. PST.
Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year’s USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.
To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form, which will be available here soon, by Thursday, July 6, 2017, 9:00 p.m. PDT. Decisions will be made by Thursday, July 13, 2017. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors’ names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.
We will host a WiP session (also previously known as rump session) on the evening of Wednesday, August 16, 2017. This is intended as an informal session for short and engaging presentations on recent unpublished results, work in progress, or other topics of interest to the USENIX Security attendees. As in the past, talks do not always need to be serious and funny talks are encouraged! To submit a WiP talk, email firstname.lastname@example.org by Wednesday, August 16, 2017, 12:00 pm PDT.
What opportunities await security students graduating with a PhD? On Thursday evening, students will have the opportunity to listen to informal panels of faculty and industrial researchers providing personal perspectives on their post-PhD career search. Learn about the academic job search, the industrial research job search, research fund raising, dual-career challenges, life uncertainty, and other idiosyncrasies of the ivory tower. The event is organized by Thorsten Holz. If you would like to speak in the Doctoral Colloquium, please email email@example.com.
Birds-of-a-Feather Sessions (BoFs)
Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on-site or in advance. To schedule a BoF, please send email to the USENIX Conference Department at firstname.lastname@example.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time.
All submissions will be made online via the Web form, which will be available soon. Submissions must be in PDF format. LaTeX users can use the "pdflatex" command to convert a LaTeX document into PDF format. Please make sure your submission can be opened using Adobe Reader. Please also make sure your submission, and all embedded figures, are intelligible when printed in grayscale.
All submissions will be judged on originality, relevance, correctness, and clarity. In addition to citing relevant published work, authors should relate their submission to any other relevant submissions of theirs in other venues that are under review at the same time as their submission to the Symposium. These citations to simultaneously submitted papers should be anonymized; non-anonymous versions of these citations must, however, be emailed to the program co-chairs at email@example.com. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. Failure to point out and explain overlap will be grounds for rejection. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program co-chairs, firstname.lastname@example.org, or the USENIX office, email@example.com.
The program committee and external reviewers are required to treat all submissions as confidential. However, the program co-chairs or designated committee members may share submissions outside the program committee to allow chairs of other conferences to identify dual submissions.
Papers that do not comply with the submission requirements, including length and anonymity, or that do not have a clear application to security or privacy may be rejected without review. Papers accompanied by nondisclosure agreement forms will not be considered.
Authors will be notified of acceptance by Friday, May 12, 2017. The final paper due date is Thursday, June 29, 2017, 9:00 p.m. PDT. Each accepted submission may be assigned a member of the program committee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the committee to the authors.
All papers will by default be available online to registered attendees before the symposium. If your accepted paper should not be published prior to the event, please notify firstname.lastname@example.org. The papers will be available online to everyone beginning on the first day of the symposium, August 16, 2017.
Specific questions about submissions may be sent to the program co-chairs at email@example.com. The chairs will respond to individual questions about the submission process if contacted at least a week before the submission deadline.