Información de la conferencia

Security 2026: USENIX Security Symposium

Por favor Iniciar para ver el sitio web del congreso

Día de Entrega:
2026-01-29
Fecha de Notificación:
Fecha de Conferencia:
2026-08-12
Ubicación:
Baltimore, Maryland, USA
Años:
35
CCF: a   CORE: a*   QUALIS: a1   Vistas: 318746   Seguidores: 289   Asistentes: 17

Solicitud de Artículos

Security 2026 (USENIX Security Symposium) is a CCF A / CORE A* / QUALIS A1 conference held in Baltimore, Maryland, USA on 2026-08-12. The paper submission deadline is 2026-01-29.

Symposium Topics Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review at the discretion of the chairs. System security Operating systems security Distributed systems security Cloud computing security Network security Intrusion and anomaly detection and prevention Network infrastructure security Denial-of-service attacks and countermeasures Wireless security Analysis of network and security protocols Security and Privacy for Web, Mobile, and Emerging Technologies Web Mobile IoT VR/AR Games Software Security Malware analysis Forensics and diagnostics for security Automated security analysis of source code and binaries Program analysis Fuzzing and vulnerability discovery Security of ML Read this entire section to prevent desk rejection USENIX Security is a systems security venue. ML-focused contributions must be relevant to the broader systems security community This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a security task. Such papers should select the topic most closely related to the task. Privacy of ML Read this entire section to prevent desk rejection USENIX Security is a systems security venue. ML-focused contributions must be relevant to the broader systems security community This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a privacy task. Such papers should select the topic most closely related to the task. Privacy and Anonymity Privacy metrics Anonymity Privacy-preserving computation Privacy attacks Surveillance and censorship Human Aspects Usable security and privacy Security and privacy law, policy, and/or ethics Security education and training Understanding, measuring, quantifying, and protecting users from: information manipulation, mis/disinformation, harassment, extremism, and abuse via qualitative and quantitative methods Hardware security Secure computer architectures Embedded systems security Cyber-physical systems security Methods for detection of malicious or counterfeit hardware Side channels Automated security analysis of hardware designs and implementation Applications of cryptography Analysis of deployed cryptography and cryptographic protocols Cryptographic implementation analysis New cryptographic protocols with real-world applications Blockchains and distributed ledger security
Última Actualización Por Dou Sun en

Coeficiente de Aceptación

Average acceptance rate: 16.6% over 21 years (2001–2021).

AñoEnviadosAceptadosAceptados(%)
2021131624618.7%
202097715716.1%
201972911315.5%
201852410019.1%
20175228516.3%
20164637215.6%
20154266715.7%
20143506719.1%
20132774516.2%
20122224319.4%
20112043517.2%
20102023014.9%
20091762614.8%
20081702715.9%
20071872312.3%
20061792212.3%
20051482214.9%
20041842212%
20031282116.4%
20021302216.9%
2001832428.9%

Los Mejores Artículos

AñoLos Mejores Artículos
2019Users Really Do Answer Telephone Scams
2019Detecting and Characterizing Lateral Phishing at Scale
2019Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors
2019Protecting accounts from credential stuffing with password breach alerting
201950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System
2019ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
2018NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
2018Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies
2018QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
2018Fear the Reaper: Characterization and Fast Detection of Card Skimmers
2018The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
2017MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
2017Detecting Credential Spearphishing in Enterprise Settings
2017Loophole: Timing Attacks on Shared Event Loops in Chrome
2017A Longitudinal, End-to-End View of the DNSSEC Ecosystem
2017CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
2017Vale: Verifying High-Performance Cryptographic Assembly Code
2012Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider
2012Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
2010Capsicum: Practical Capabilities for UNIX
2010VEX: Vetting Browser Extensions for Security Vulnerabilities
2008Highly Predictive Blacklisting
2008Lest We Remember: Cold Boot Attacks on Encryption Keys
2007Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
2006Evaluating SFI for a CISC Architecture
2006Keyboards and Covert Channels
2005Mapping Internet Sensors with Probe Response Attacks
2005Security Analysis of a Cryptographically-Enabled RFID Device
2004Understanding Data Lifetime via Whole System Simulation
2004Fairplay—A Secure Two-Party Computation System
2003Remote Timing Attacks Are Practical
2003Establishing the Genuinity of Remote Computer Systems
2002Security in Plan 9
2002Infranet: Circumventing Web Censorship and Surveillance
2001The Dos and Don'ts of Client Authentication on the Web
2001Inferring Internet Denial-of-Service Activity

Conferencias Relacionadas

CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
ccNSPWNew Security Paradigms Workshop2026-04-302026-06-302026-09-27
cbb1SOUPSInternational Symposium On Usable Privacy and Security2026-02-122026-05-192026-08-23
aa*a1SecurityUSENIX Security Symposium2026-01-292026-08-12
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
bNSSInternational Conference on Network and System Security2023-03-032023-05-052023-08-14
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
aaa1USENIX ATCUSENIX Annual Technical Conference2025-07-07

Revistas Relacionadas

CCFNombre CompletoFactor de ImpactoEditorISSN
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
bComputers & Security5.4Elsevier0167-4048
International Journal of Information Security3.2Springer1615-5262
cJournal of Cybersecurity3.2Oxford University Press2057-2093
IEEE Security & Privacy3.0IEEE1540-7993
ACM Transactions on Privacy and Security2.8ACM2471-2566
cEURASIP Journal on Information Security2.1Springer1687-417X
Security and Privacy2.1John Wiley & Sons Ltd2475-6725
cIET Information Security1.4IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650