会議情報
Security 2026: USENIX Security Symposium
会議のウェブサイトを表示するにはログインしてください

提出日:
2026-01-29
通知日:
会議日:
2026-08-12
場所:
Baltimore, Maryland, USA
年:
35
CCF: a   CORE: a*   QUALIS: a1   閲覧: 282007   追跡: 289   出席: 17

論文募集
Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review at the discretion of the chairs.

System security
Operating systems security
Distributed systems security
Cloud computing security
Network security
Intrusion and anomaly detection and prevention
Network infrastructure security
Denial-of-service attacks and countermeasures
Wireless security
Analysis of network and security protocols
Security and Privacy for Web, Mobile, and Emerging Technologies
Web
Mobile
IoT
VR/AR
Games
Software Security
Malware analysis
Forensics and diagnostics for security
Automated security analysis of source code and binaries
Program analysis
Fuzzing and vulnerability discovery
Security of ML
Read this entire section to prevent desk rejection
USENIX Security is a systems security venue. ML-focused contributions must be relevant to the broader systems security community
This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a security task. Such papers should select the topic most closely related to the task.
Privacy of ML
Read this entire section to prevent desk rejection
USENIX Security is a systems security venue. ML-focused contributions must be relevant to the broader systems security community
This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a privacy task. Such papers should select the topic most closely related to the task.
Privacy and Anonymity
Privacy metrics
Anonymity
Privacy-preserving computation
Privacy attacks
Surveillance and censorship
Human Aspects
Usable security and privacy
Security and privacy law, policy, and/or ethics
Security education and training
Understanding, measuring, quantifying, and protecting users from: information manipulation, mis/disinformation, harassment, extremism, and abuse via qualitative and quantitative methods
Hardware security
Secure computer architectures
Embedded systems security
Cyber-physical systems security
Methods for detection of malicious or counterfeit hardware
Side channels
Automated security analysis of hardware designs and implementation
Applications of cryptography
Analysis of deployed cryptography and cryptographic protocols
Cryptographic implementation analysis
New cryptographic protocols with real-world applications
Blockchains and distributed ledger security
最終更新 Dou Sun 2025-10-02
合格率
時間提出受け入れ受け入れ(%)
2021131624618.7%
202097715716.1%
201972911315.5%
201852410019.1%
20175228516.3%
20164637215.6%
20154266715.7%
20143506719.1%
20132774516.2%
20122224319.4%
20112043517.2%
20102023014.9%
20091762614.8%
20081702715.9%
20071872312.3%
20061792212.3%
20051482214.9%
20041842212%
20031282116.4%
20021302216.9%
2001832428.9%
ベスト ペーパー
時間ベスト ペーパー
2019Users Really Do Answer Telephone Scams
2019Detecting and Characterizing Lateral Phishing at Scale
2019Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors
2019Protecting accounts from credential stuffing with password breach alerting
201950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System
2019ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
2018NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
2018Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies
2018QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
2018Fear the Reaper: Characterization and Fast Detection of Card Skimmers
2018The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
2017MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
2017Detecting Credential Spearphishing in Enterprise Settings
2017Loophole: Timing Attacks on Shared Event Loops in Chrome
2017A Longitudinal, End-to-End View of the DNSSEC Ecosystem
2017CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
2017Vale: Verifying High-Performance Cryptographic Assembly Code
2012Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider
2012Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
2010Capsicum: Practical Capabilities for UNIX
2010VEX: Vetting Browser Extensions for Security Vulnerabilities
2008Highly Predictive Blacklisting
2008Lest We Remember: Cold Boot Attacks on Encryption Keys
2007Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
2006Evaluating SFI for a CISC Architecture
2006Keyboards and Covert Channels
2005Mapping Internet Sensors with Probe Response Attacks
2005Security Analysis of a Cryptographically-Enabled RFID Device
2004Understanding Data Lifetime via Whole System Simulation
2004Fairplay—A Secure Two-Party Computation System
2003Remote Timing Attacks Are Practical
2003Establishing the Genuinity of Remote Computer Systems
2002Security in Plan 9
2002Infranet: Circumventing Web Censorship and Surveillance
2001The Dos and Don'ts of Client Authentication on the Web
2001Inferring Internet Denial-of-Service Activity
関連会議
CCFCOREQUALIS省略名完全な名前提出日通知日会議日
cbb1SOUPSInternational Symposium On Usable Privacy and Security2026-02-122026-05-192026-08-23
aa*a1SecurityUSENIX Security Symposium2026-01-292026-08-12
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
ccNSPWNew Security Paradigms Workshop2025-04-252025-05-302025-08-24
bNSSInternational Conference on Network and System Security2023-03-032023-05-052023-08-14
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
aaa1USENIX ATCUSENIX Annual Technical Conference2025-07-07
関連仕訳帳
CCF完全な名前インパクト ・ ファクター出版社ISSN
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
bComputers & Security5.4Elsevier0167-4048
International Journal of Information Security3.2Springer1615-5262
cJournal of Cybersecurity3.2Oxford University Press2057-2093
IEEE Security & Privacy3.0IEEE1540-7993
ACM Transactions on Privacy and Security2.8ACM2471-2566
cEURASIP Journal on Information Security2.1Springer1687-417X
Security and Privacy1.500John Wiley & Sons Ltd2475-6725
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650