posted by organizer: dgruss || 1393 views || tracked by 2 users: [display]

uASC 2026 : 2nd Microarchitecture Security Conference (uASC '26)

FacebookTwitterLinkedInGoogle

Link: https://uasc.cc/cfp.html
 
When Feb 3, 2026 - Feb 3, 2026
Where Leuven, Belgium
Submission Deadline Jul 15, 2025
Notification Due Sep 1, 2025
Final Version Due Sep 15, 2025
Categories    microarchiecture   security   systems   cryptography
 

Call For Papers

The annual uASC conference serves as a premier forum for advancing our understanding of the security of microarchitectures. Each year, uASC brings together international experts from academia and industry, to present and discuss novel research in this area. The conference proceedings of uASC are published by Ruhr University Bochum in an issue of the Proceedings of the Microarchitecture Security Conference. With a Gold Open Access status, all papers published in the proceedings are immediately and freely available at the start of the conference.
uASC is looking for top-quality papers

Despite its young age, uASC aims to be a first-choice conference for microarchitecture security research (i.e., following the terminology for A-level topic conferences). uASC solicits submissions of high-quality, original scientific papers presenting novel research on microarchitecture security (attacks and defenses).
Topics of interest include, but are not limited to:

Attacks and defenses on various commodity hardware components
Exploration of (unconventional) threat models in microarchitecture security
Hardware security analysis techniques
Microarchitecture security on outdated patch levels, unlikely configurations, and misconfigurations
Operating system and hypervisor side channels
Reverse-engineering of microarchitectures for security
Secure hardware development practices
Security of hardware-software interfaces
Systematic insights on the reproducibility of microarchitectural attacks
Systematic insights on the reproducibility of security and performance claims of microarchitectural defenses
Systematization of knowledge in microarchitecture security
Trusted execution environments

uASC has two submission categories: Full Paper submissions, which undergo thorough academic review, and Talk/Poster submissions, which are accompanied by an optional two-page abstract. uASC welcomes high-quality contributions from both academia and industry, including work-in-progress reports.

All papers are judged on scientific rigor, insights, novelty, correctness, and clarity as well as the clear documentation of limitations. We expect all papers to provide enough details to enable reproducibility of the experimental results and all submissions are invited to submit research artifacts to receive an artifact available badge. uASC has a double-blind reviewing process for papers. All accepted papers are part of the proceedings.

Cycle 1 (Papers only)
In the first cycle we only accept regular paper submissions.

Cycle 1 Submission Deadline: July 15, 2025
Cycle 1 Notification to Authors: September 1, 2025
Cycle 1 Shepherding and Camera-ready Deadline: September 15, 2025

Cycle 2 (Papers, Posters, Talks)
In the second cycle we accept regular paper submissions but also posters and talks.

Cycle 2 Submission Deadline: November 4, 2025
Cycle 2 Notification to Authors: December 15, 2025
Cycle 2 Shepherding and Camera-ready Deadline: January 8, 2026

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
IEEE-MLCIPR 2025   2025 2nd International Conference on Machine Learning, Computational Intelligence and Pattern Recognition-EI/Scopus
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
AI Security & Privacy 2025   First International Workshop on Artificial Intelligence Security and Privacy
IJFCST 2025   International Journal on Foundations of Computer Science & Technology
CBMS 2025 - ST Security and Privacy 2025   CBMS 2025 - Special Track: Security and Privacy in Health Systems: Addressing Technology, Society, and Law
uASC 2025   1st Microarchitecture Security Conference (uASC '25)