| |||||||||||||||
USENIX Security 2016 : 25th USENIX Security Symposium | |||||||||||||||
Link: https://www.usenix.org/conference/usenixsecurity16 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Symposium Topics
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to: System security Operating systems security Web security Mobile systems security Distributed systems security Cloud computing security Network security Intrusion and anomaly detection and prevention Network infrastructure security Denial-of-service attacks and countermeasures Wireless security Cryptographic implementation analysis and construction Applied cryptography Security analysis Malware analysis Analysis of network and security protocols Attacks with novel insights, techniques, or results Forensics and diagnostics for security Automated security analysis of hardware designs and implementation Automated security analysis of source code and binaries Program analysis Security measurement studies Measurements of fraud, malware, spam Measurements of human behavior and security Privacy-enhancing technologies and anonymity Usable security and privacy Language-based security Hardware security Secure computer architectures Embedded systems security Methods for detection of malicious or counterfeit hardware Side channels Research on surveillance and censorship Social issues and security Research on computer security law and policy Ethics of computer security research Research on security education and training This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review. Given the rapidly expanding and maturing security and privacy community, we hope to increase the acceptance rate of papers that are more "far-reaching" and "risky," as long as those papers also show sufficient promise for creating interesting discussions and questioning widely-held beliefs. |
|