中国计算机学会(CCF)推荐学术会议-A(网络与信息安全):USENIX Security 2026

USENIX Security 2026

The 35th USENIX Security Symposium will take place on August 12–14, 2026, at the Baltimore Marriott Waterfront in Baltimore, MD, USA. The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.

重要信息

CCF推荐:A(网络与信息安全)

录用率:17.6%(382/2176,2024年)

时间地点:2026年8月12日-巴尔的摩·美国

截稿时间:2026年1月29日

大会官网:https://www.usenix.org/conference/usenixsecurity26

Call for Papers

System security

Operating systems security

Distributed systems security

Cloud computing security

Network security

Intrusion and anomaly detection and prevention

Network infrastructure security

Denial-of-service attacks and countermeasures

Wireless security

Analysis of network and security protocols

Security and Privacy for Web, Mobile, and Emerging Technologies

Web

Mobile

IoT

VR/AR

Games

Software Security

Malware analysis

Forensics and diagnostics for security

Automated security analysis of source code and binaries

Program analysis

Fuzzing and vulnerability discovery

Security of ML

This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a security task. Such papers should select the topic most closely related to the task.

Privacy of ML

This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a privacy task. Such papers should select the topic most closely related to the task.

Privacy and Anonymity

Privacy metrics

Anonymity

Privacy-preserving computation

Privacy attacks

Surveillance and censorship

Human Aspects

Usable security and privacy

Security and privacy law, policy, and/or ethics

Security education and training

Understanding, measuring, quantifying, and protecting users from: information manipulation, mis/disinformation, harassment, extremism, and abuse via qualitative and quantitative methods

Hardware security

Secure computer architectures

Embedded systems security

Cyber-physical systems security

Methods for detection of malicious or counterfeit hardware

Side channels

Automated security analysis of hardware designs and implementation

Applications of cryptography

Analysis of deployed cryptography and cryptographic protocols

Cryptographic implementation analysis

New cryptographic protocols with real-world applications

Blockchains and distributed ledger security

Page Limit

In Brief:

Papers can include up to 13 pages of body text.

Papers must include "Ethical Considerations" and "Open Science" appendices. These appendices must appear immediately following the main body, before the references/appendices and may each be one page of text.

Overall length:

The initial submission can contain unlimited appendices and references.

Final camera-ready papers can contain a maximum of 20 total pages.

Bulk Submissions

Each author can submit at most seven papers per cycle to USENIX Security 2026. For authors submitting more than seven papers, the chairs will only retain the seven papers with the lowest submission numbers. This rule is enforced per author, i.e., authors may have papers rejected even if they stay under the limit in cases where a co-author violates the requirement.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值