Conference Information
Security 2020: USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity20
Submission Date:
2020-02-15
Notification Date:
2020-03-15
Conference Date:
2020-08-12
Location:
Boston, Massachusetts, USA
Years:
29
CCF: a   CORE: a*   QUALIS: a1   Viewed: 13887   Tracked: 81   Attend: 0

Conference Location
Advertisment
Call For Papers
Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:

    System security
        Operating systems security
        Web security
        Mobile systems security
        Distributed systems security
        Cloud computing security
    Network security
        Intrusion and anomaly detection and prevention
        Network infrastructure security
        Denial-of-service attacks and countermeasures
        Wireless security
    Security analysis
        Malware analysis
        Analysis of network and security protocols
        Attacks with novel insights, techniques, or results
        Forensics and diagnostics for security
        Automated security analysis of hardware designs and implementation
        Automated security analysis of source code and binaries
        Program analysis
    Data-driven security and measurement studies
        Measurements of fraud, malware, spam
        Measurements of human behavior and security
    Privacy-enhancing technologies and anonymity
    Usable security and privacy
    Language-based security
    Hardware security
        Secure computer architectures
        Embedded systems security
        Methods for detection of malicious or counterfeit hardware
        Side channels
    Research on surveillance and censorship
    Social issues and security
        Research on computer security law and policy
        Ethics of computer security research
        Research on security education and training
    Applications of cryptography
        Analysis of deployed cryptography and cryptographic protocols
        Cryptographic implementation analysis
        New cryptographic protocols with real-world applications

This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Refereed Papers

Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix.org.

A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX’s open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.

Go to Paper Submission Policies and Instructions page for more information.

Symposium Activities

Invited Talks, Panels, Poster Session, and BoFs

In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a poster session, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at sec20chairs@usenix.org.

Invited Talks and Panel Discussions

Invited talks and panel discussions will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to sec20it@usenix.org by Friday, February 14, 2020, 8:00 pm EST.

Poster Session

Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year’s USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.

To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form, which will be available here soon, by Tuesday, July 7, 2020, 9:00 pm EDT. Decisions will be made by Tuesday, July 14, 2020. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors’ names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.

Lightning Talks

Information about lightning talks will be available soon.

Birds-of-a-Feather Sessions (BoFs)

Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on site or in advance. To schedule a BoF, please send email to the USENIX Conference Department at bofs@usenix.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time.
Last updated by Dou Sun in 2019-04-26
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
201852410019.1%
20175228516.3%
20164637215.6%
20154266715.7%
20143506719.1%
20132774516.2%
20122224319.4%
20112043517.2%
20102023014.9%
20091762614.8%
20081702715.9%
20071872312.3%
20061792212.3%
20051482214.9%
20041842212%
20031282116.4%
20021302216.9%
2001832428.9%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cHotSecUSENIX Workshop on Hot Topics in Security2019-06-102019-06-262019-08-13
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
HealthSecUSENIX Workshop on Health Security and Privacy 2012-05-222012-08-06
b3SIESInternational Symposium on Industrial Embedded Systems2017-03-192017-04-172017-06-14
GlobalSIPIEEE Global Conference on Signal and Information Processing2018-06-292018-08-072018-11-26
EDISInternational Conference on Embedded & Distributed Systems2017-10-152017-11-152017-12-17
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
GandALFInternational Symposium on Games, Automata, Logics, and Formal Verification2019-05-312019-07-032019-09-02
CSCS'ACM Computer Science in Cars Symposium2018-07-162018-07-312018-09-13
aICADLInternational Conference on Asia Digital Libraries2015-07-26 2015-12-09
Related Journals
CCFFull NameImpact FactorPublisherISSN
Journal of Internet Security DDSecure.Net Inc.1206-4890
Infosecurity ELSEVIER1754-4548
cIET Information Security0.862IET1751-8709
bJournal of Computer Security IOS Press0926-227X
cEURASIP Journal on Information Security Springer1687-417X
bComputers & Security2.65ELSEVIER0167-4048
Materials Chemistry and Physics2.210Elsevier0254-0584
IEEE Security & Privacy1.239IEEE1540-7993
bACM Transactions of Information and System SecurityACM1094-9224
Computer Fraud & Security ELSEVIER1361-3723
Recommendation