CfP: USENIX Security Symposium 2021
CALL FOR PAPERS
USENIX Security Symposium 2021
August 11-13, 2021 | Vancouver, B.C., Canada | https://www.usenix.org/conference/usenixsecurity21
Symposium Overview
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 30th USENIX Security Symposium will be held August 11-13, 2021, in Vancouver, B.C., Canada.
Important: The USENIX Security Symposium moved to multiple submission deadlines in 2019 and included changes to the review process and submission policies. Detailed information is available at USENIX Security Publication Model Changes.
All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 9 and 10.
Submission Instructions: https://www.usenix.org/conference/usenixsecurity21/submission-policies-and-instructions
Important Dates
Summer Deadline
- Refereed paper submissions due: Thursday, June 11, 2020, 11:59 pm AoE Thursday, June 18, 2020, 11:59 pm AoE (Extended)
- Early reject notification: July 24, 2020
- Rebuttal Period: August 31-September 2, 2020
- Notification to authors: September 11, 2020
- Final paper files due: October 13, 2020
Fall Deadline
- Refereed paper submissions due: Thursday, October 15, 2020, 11:59 pm AoE
- Early reject notification: November 20, 2020
- Rebuttal Period: January 11-13, 2021
- Notification to authors: January 21, 2021
- Final paper files due: February 22, 2021
Winter Deadline
- Refereed paper submissions due: Thursday, February 4, 2021, 11:59 pm AoE
- Early reject notification: March 12, 2021
- Rebuttal Period: April 19-21, 2021
- Notification to authors: April 30, 2021
- Final paper files due: June 2, 2021
- Invited talk and panel proposals due: Thursday, February 4, 2021
- Poster proposals due: Tuesday, July 6, 2021
- Notification to poster presenters: July 13, 2021
Symposium Organizers
Program Co-Chairs
- Michael Bailey, University of Illinois at Urbana-Champaign
- Rachel Greenstadt, New York University
Program Committee
- Yousra Aafer, University of Waterloo
- Ruba Abu-Salma, University College London and Inria
- Gunes Acar, Katholieke Universiteit Leuven
- David Adrian, Censys
- Sadia Afroz, International Computer Science Institute (ICSI), University of California, Berkeley, and Avast
- Devdatta Akhawe, Figma
- Benjamin Andow, IBM T. J. Watson Research Center
- Sebastian Angel, University of Pennsylvania
- Pauline Anthonysamy, Google
- Manos Antonakakis, Georgia Institute of Technology
- Jethro G. Beekman, Fortanix
- Matthew Bernhard, University of Michigan
- Battista Biggio, University of Cagliari, Italy
- Leyla Bilge, NortonLifeLock Research Group
- Vincent Bindschaedler, University of Florida
- Tamara Bonaci, Northeastern University
- Joseph C Bonneau, New York University
- Sven Bugiel, CISPA Helmholtz Center for Information Security
- Kevin Butler, University of Florida
- Joseph Calandrino, Federal Trade Commission
- Aylin Caliskan, George Washington University
- Stefano Calzavara, Universita Ca' Foscari Venezia
- Yinzhi Cao, Johns Hopkins University
- Alvaro A. Cardenas, University of California, Santa Cruz
- Nicholas Carlini, Google
- Lorenzo Cavallaro, King's College London
- Rahul Chatterjee, University of Wisconsin--Madison
- Qi Alfred Chen, University of California, Irvine
- Marshini Chetty, University of Chicago
- Sherman S. M. Chow, The Chinese University of Hong Kong
- Omar Haider Chowdhury, The University of Iowa
- Mihai Christodorescu, Visa Research
- Erinn Clark, Google
- Shaanan Cohney, Princeton University and University of Melbourne
- Scott Coull, FireEye
- Cas Cremers, CISPA Helmholtz Center for Information Security
- Michel Cukier, University of Maryland
- George Danezis, University College London and Facebook Calibra
- Anupam Das, North Carolina State University
- Sanchari Das, Indiana University Bloomington
- Sauvik Das, Georgia Institute of Technology
- Nathan Dautenhahn, Rice University
- Lucas Davi, University of Duisburg-Essen
- Roger Dingledine, The Tor Project
- Brendan Dolan-Gavitt, New York University
- Adam Doupe, Arizona State University
- Zakir Durumeric, Stanford University
- Manuel Egele, Boston University
- Serge Egelman, International Computer Science Institute (ICSI), University of California, Berkeley, and AppCensus, Inc.
- Pardis Emami-Naeini, Carnegie Mellon University
- William Enck, North Carolina State University
- Roya Ensafi, University of Michigan
- Sascha Fahl, Leibniz University Hannover
- Giulia Fanti, Carnegie Mellon University
- Kassem Fawaz, University of Wisconsin--Madison
- Nick Feamster, University of Chicago
- Ariel J. Feldman, Google
- Wu-chang Feng, Portland State University
- Earlence Fernandes, University of Wisconsin--Madison
- David Fifield, Unaffiliated
- Simone Fischer-Hubner, Karlstad University
- Christopher Wardlaw Fletcher, University of Illinois at Urbana-Champaign
- Michael Franz, University of California, Irvine
- Matt Fredrikson, Carnegie Mellon University
- David Freeman, Facebook Inc.
- Patrick Gage Kelley, Google
- Siddarth Garg, New York University
- Christina Garman, Purdue University
- Carrie Gates, Bank of America
- Daniel Genkin, University of Michigan
- Irene Giacomelli, Protocol Labs
- Ian Goldberg, University of Waterloo
- Neil Gong, Duke University
- Daniel Gruss, Graz University of Technology
- Guofei Gu, Texas A&M University
- J. Alex Halderman, University of Michigan
- Mike Hamburg, Rambus
- Hamza Harkous, Google
- Wajih Ul Hassan, University of Illinois at Urbana-Champaign
- Xiali (Sharon) Hei, University of Louisiana at Lafayette
- Nadia Heninger, University of California, San Diego
- Ryan Henry, University of Calgary
- Alejandro Hevia, University of Chile
- Matthew Hicks, Virginia Tech
- Thorsten Holz, Ruhr-Universitat Bochum
- Nicholas Hopper, University of Minnesota
- Amir Houmansadr, University of Massachusetts Amherst
- Danny Yuxing Huang, New York University
- Sotiris Ioannidis, Technical University of Crete
- Cynthia Irvine, Naval Postgraduate School
- Suman Jana, Columbia University
- Rob Jansen, U.S. Naval Research Laboratory
- Somesh Jha, University of Wisconsin--Madison
- Anthony D Joseph, University of California, Berkeley
- Chris Kanich, University of Illinois at Chicago
- Apu Kapadia, Indiana University Bloomington
- Vasileios Kemerlis, Brown University
- Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
- Sam King, University of California, Davis
- Engin Kirda, Northeastern University
- Tadayoshi Kohno, University of Washington
- Kevin T. Kornegay, Morgan State University
- Katharina Krombholz, CISPA Helmholtz Center for Information Security
- Christopher Kruegel, University of California, Santa Barbara
- Negar Kyavash, Ecole Polytechnique Federale de Lausanne (EPFL)
- Andrea Lanzi, University of Milan
- Mathias Lecuyer, Microsoft Research
- Wenke Lee, Georgia Institute of Technology
- Anja Lehmann, Hasso-Plattner-Institute, University of Potsdam
- Corrado Leita, VMWare
- Tancrede Lepoint, Google
- Dave Levin, University of Maryland
- Frank Li, Georgia Institute of Technology
- Mingyan Liu, University of Michigan
- Wouter Lueks, Ecole Polytechnique Federale de Lausanne (EPFL)
- Mateo Maffei, Technische Universitat Wien
- Stefan Mangard, Graz University of Technology
- Ivan Martinovic, University of Oxford
- Michelle Mazurek, University of Maryland
- Stephen McCamant, University of Minnesota
- Jon McCune, Google
- Patrick McDaniel, The Pennsylvania State University
- Susan E. McGregor, Columbia University
- Andrew Miller, University of Illinois at Urbana-Champaign
- Esfandiar Mohammadi, University of Lubeck
- Fabian Monrose, The University of North Carolina at Chapel Hill
- Veelasha Moonsamy, Radboud University and Ruhr-University Bochum
- Tyler Moore, The University of Tulsa
- Takao Murakami, AIST
- Adwait Nadkarni, College of William & Mary
- Nick Nikiforakis, Stony Brook University
- Shirin Nilizadeh, The University of Texas at Arlington
- Rishab Nithyanand, The University of Iowa
- Guevara Noubir, Northeastern University
- Cristina Onete, University of Limoges/XLIM/CNRS 7252
- Yossi Oren, Ben-Gurion University of the Negev
- Rebekah Overdorf, Ecole Polytechnique Federale de Lausanne (EPFL)
- Chris Palmer, Google
- Nicholas Papernot, University of Toronto and Vector Institute
- Aleatha Parker-Wood, Unaffiliated
- Mathias Payer, Ecole Polytechnique Federale de Lausanne (EPFL)
- Paul Pearce, Georgia Institute of Technology and International Computer Science Institute (ICSI)
- Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
- Roberto Perdisci, University of Georgia
- Radia Perlman, Dell Technologies
- Zachary Peterson, California Polytechnic State University
- Jason Polakis, University of Illinois at Chicago
- Christina Popper, New York University Abu Dhabi
- Niels Provos, Stripe
- Sara Rampazzi, University of Michigan and University of Florida
- Aanjhan Ranghanathan, Northeastern University
- Bradley Reaves, North Carolina State University
- Elissa M. Redmiles, Microsoft Research
- Konrad Rieck, Technische Universitat Braunschweig
- Thomas Ristenpart, Cornell Tech
- William Robertson, Northeastern University
- Stefanie Roos, Delft University of Technology
- Ahmad-Reza Sadeghi, Technische Universitat Darmstadt
- Merve Sahin, SAP Security Research
- Brendan Saltaformaggio, Georgia Institute of Technology
- Nolen Scaife, University of Colorado Boulder
- Bruce Schneier, Harvard Kennedy School
- Kent Seamons, Brigham Young University
- Vyas Sekar, Carnegie Mellon University
- Wendy Seltzer, W3C and Massachusetts Institute of Technology
- Fatemeh Shirazi, Web3 Foundation
- Haya Shulman, Fraunhofer SIT
- Angelos Stavrou, Virginia Tech
- Deian Stefan, University of California, San Diego
- Ben Stock, CISPA Helmholtz Center for Information Security
- Gianluca Stringhini, Boston University
- Cynthia Sturton, The University of North Carolina at Chapel Hill
- Nick Sullivan, Cloudflare
- Yixin Sun, University of Virginia
- Paul Syverson, U.S. Naval Research Laboratory
- Patrick Tague, Carnegie Mellon University
- Kurt Thomas, Google
- Dave (Jing) Tian, Purdue University
- Yuan Tian, University of Virginia
- Laura Tinnel, SRI International
- Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
- Jacob Torrey, DARPA
- Florian Tramer, Stanford University
- Patrick Traynor, University of Florida
- Blase Ur, University of Chicago
- Ingrid Verbauwhede, Katholieke Universiteit Leuven
- Bimal Viswanath, Virginia Tech
- David Wagner, University of California, Berkeley
- Gang Wang, University of Illinois at Urbana-Champaign
- Byron Williams, University of Florida
- Matthew Wright, Rochester Institute of Technology
- Eric Wustrow, University of Colorado Boulder
- Dongyan Xu, Purdue University
- Wenyuan Xu, Zhejiang University
- Jason Minhui Xue, The University of Adelaide
- Yuval Yarom, The University of Adelaide and Data61
- Tuba Yavuz, University of Florida
- Daniel Zappala, Brigham Young University
- Mary Ellen Zurko, MIT Lincoln Laboratory
Steering Committee
- Matt Blaze, University of Pennsylvania
- Dan Boneh, Stanford University
- William Enck, North Carolina State University
- Kevin Fu, University of Michigan
- Casey Henderson, USENIX Association
- Nadia Heninger, University of California, San Diego
- Thorsten Holz, Ruhr-Universitat Bochum
- Jaeyeon Jung, Samsung Electronics
- Engin Kirda, Northeastern University
- Tadayoshi Kohno, University of Washington
- Thomas Ristenpart, Cornell Tech
- Patrick Traynor, University of Florida
- David Wagner, University of California, Berkeley
Symposium Topics
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
- System security
- Operating systems security
- Web security
- Mobile systems security
- Distributed systems security
- Cloud computing security
- Network security
- Intrusion and anomaly detection and prevention
- Network infrastructure security
- Denial-of-service attacks and countermeasures
- Wireless security
- Security analysis
- Malware analysis
- Analysis of network and security protocols
- Attacks with novel insights, techniques, or results
- Forensics and diagnostics for security
- Automated security analysis of hardware designs and implementation
- Automated security analysis of source code and binaries
- Machine learning in a secure systems context
- Program analysis
- Data-driven security and measurement studies
- Measurements of fraud, malware, spam
- Measurements of human behavior and security
- Privacy-enhancing technologies and anonymity
- Usable security and privacy
- Language-based security
- Hardware security
- Secure computer architectures
- Embedded systems security
- Methods for detection of malicious or counterfeit hardware
- Side channels
- Research on surveillance and censorship
- Social issues and security
- Research on computer security law and policy
- Ethics of computer security research
- Research on security education and training
- Information manipulation
- Online abuse and harassment
- Applications of cryptography
- Analysis of deployed cryptography and cryptographic protocols
- Cryptographic implementation analysis
- New cryptographic protocols with real-world applications
This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.
Refereed Papers
Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Alternative arrangements will be made if global health concerns persist. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix.org.
A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX's open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.
Go to Paper Submission Policies and Instructions page for more information.
Artifact Evaluation
The Call for Artifacts will be available soon.
Symposium Activities
Invited Talks, Panels, Poster Session, Lightning Talks, and BoFs
In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a poster session, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at sec21chairs@usenix.org.
Invited Talks and Panel Discussions
Invited talks and panel discussions will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to sec21it@usenix.org by Thursday, February 4, 2021.
Poster Session
Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year's USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.
To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form, which will be available here soon, by July 6, 2021. Decisions will be made by July 13, 2021. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors' names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.
Lightning Talks
Information about lightning talks will be available soon.
Birds-of-a-Feather Sessions (BoFs)
Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on site or in advance. To schedule a BoF, please send email to the USENIX Conference Department at bofs@usenix.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time.