USENIX Security 2026
The 35th USENIX Security Symposium will take place on August 12–14, 2026, at the Baltimore Marriott Waterfront in Baltimore, MD, USA. The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
重要信息
CCF推荐:A(网络与信息安全)
录用率:17.6%(382/2176,2024年)
时间地点:2026年8月12日-巴尔的摩·美国
截稿时间:2026年1月29日
大会官网:https://www.usenix.org/conference/usenixsecurity26
Call for Papers
System security
Operating systems security
Distributed systems security
Cloud computing security
Network security
Intrusion and anomaly detection and prevention
Network infrastructure security
Denial-of-service attacks and countermeasures
Wireless security
Analysis of network and security protocols
Security and Privacy for Web, Mobile, and Emerging Technologies
Web
Mobile
IoT
VR/AR
Games
Software Security
Malware analysis
Forensics and diagnostics for security
Automated security analysis of source code and binaries
Program analysis
Fuzzing and vulnerability discovery
Security of ML
This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a security task. Such papers should select the topic most closely related to the task.
Privacy of ML
This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a privacy task. Such papers should select the topic most closely related to the task.
Privacy and Anonymity
Privacy metrics
Anonymity
Privacy-preserving computation
Privacy attacks
Surveillance and censorship
Human Aspects
Usable security and privacy
Security and privacy law, policy, and/or ethics
Security education and training
Understanding, measuring, quantifying, and protecting users from: information manipulation, mis/disinformation, harassment, extremism, and abuse via qualitative and quantitative methods
Hardware security
Secure computer architectures
Embedded systems security
Cyber-physical systems security
Methods for detection of malicious or counterfeit hardware
Side channels
Automated security analysis of hardware designs and implementation
Applications of cryptography
Analysis of deployed cryptography and cryptographic protocols
Cryptographic implementation analysis
New cryptographic protocols with real-world applications
Blockchains and distributed ledger security
Page Limit
In Brief:
Papers can include up to 13 pages of body text.
Papers must include "Ethical Considerations" and "Open Science" appendices. These appendices must appear immediately following the main body, before the references/appendices and may each be one page of text.
Overall length:
The initial submission can contain unlimited appendices and references.
Final camera-ready papers can contain a maximum of 20 total pages.
Bulk Submissions
Each author can submit at most seven papers per cycle to USENIX Security 2026. For authors submitting more than seven papers, the chairs will only retain the seven papers with the lowest submission numbers. This rule is enforced per author, i.e., authors may have papers rejected even if they stay under the limit in cases where a co-author violates the requirement.
2万+

被折叠的 条评论
为什么被折叠?



