The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
The USENIX Security Symposium is a prestigious annual conference that focuses on cutting-edge research in computer security and privacy. Organized by the USENIX Association, the conference provides a platform for researchers, practitioners, and policymakers to present and discuss novel findings, methodologies, and advancements in the field. Attendees can expect a wide range of topics including network security, system security, web security, privacy-enhancing technologies, malware analysis, cryptography, and more. USENIX Security is highly regarded for its rigorous peer-review process and its commitment to fostering collaboration and innovation within the security community.
Symposium Topics
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.
- System security
- Operating systems security
- Web security
- Mobile systems security
- Distributed systems security
- Cloud computing security
- Network security
- Intrusion and anomaly detection and prevention
- Network infrastructure security
- Denial-of-service attacks and countermeasures
- Wireless security
- Security analysis
- Malware analysis
- Analysis of network and security protocols
- Attacks with novel insights, techniques, or results
- Forensics and diagnostics for security
- Automated security analysis of hardware designs and implementation
- Automated security analysis of source code and binaries
- Program analysis
- Fuzzing and Vulnerability Discovery
- Formal methods for Security
- Machine learning security and privacy
- Machine learning applications to security and privacy
- Machine learning privacy issues and methods
- Adversarial machine learning
- Data-driven security and measurement studies
- Measurements of fraud, malware, spam
- Measurements of human behavior and security
- Privacy
- Privacy metrics
- Anonymity
- Web and mobile privacy
- Privacy-preserving computation
- Privacy attacks
- Usable security and privacy
- User studies related to security and privacy
- Human-centered security and privacy design
- Language-based security
- Hardware security
- Secure computer architectures
- Embedded systems security
- Cyber-physical systems security
- Methods for detection of malicious or counterfeit hardware
- Side channels
- Research on surveillance and censorship
- Social issues and security
- Research on computer security law and policy
- Ethics of computer security research
- Research on security education and training
- Information manipulation, misinformation, and disinformation
- Protecting and understanding at-risk users
- Emerging threats, harassment, extremism, and online abuse
- Applications of cryptography
- Analysis of deployed cryptography and cryptographic protocols
- Cryptographic implementation analysis
- New cryptographic protocols with real-world applications
- Blockchains and distributed ledger security