USENIX Security '24 Call for Papers

The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 33rd USENIX Security Symposium will be held August 14–16, 2024, in Philadelphia, PA, USA.

Important: In 2023, USENIX Security introduced substantial changes to the review process, aimed to provide a more consistent path towards acceptance and reduce the number of times papers reenter the reviewing process. Detailed information is available at USENIX Security Publication Model Changes.

All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security.

Important Dates

Summer Deadline

  • Paper submissions due: Tuesday, June 6, 2023, 11:59 pm AoE
  • Early reject notification: Thursday, July 13, 2023
  • Rebuttal Period: August 21–23, 2023
  • Notification to authors: Friday, September 1, 2023
  • Final paper files due: Tuesday, October 10, 2023

Fall Deadline

  • Paper submissions due: Tuesday, October 17, 2023, 11:59 pm AoE
  • Early reject notification: Monday, November 27, 2023
  • Rebuttal Period: January 22–24, 2024
  • Notification to authors: Thursday, February 1, 2024
  • Final paper files due: Tuesday, March 5, 2024

Winter Deadline

  • Paper submissions due: Thursday, February 8, 2024, 11:59 pm AoE
  • Early reject notification: Monday, March 18, 2024
  • Rebuttal Period: April 24–26, 2024
  • Notification to authors: Wednesday, May 8, 2024
  • Final paper files due: Thursday, June 13, 2024

  • Invited talk and panel proposals due: Thursday, February 8, 2024
  • Poster proposals due: Tuesday, July 9, 2024
    • Notification to poster presenters: Tuesday, July 16, 2024

Symposium Organizers

Program Co-Chairs

Davide Balzarotti, Eurecom
Wenyuan Xu, Zhejiang University

Program Vice Co-Chairs

Tiffany Bao, Arizona State University
Alexandra Dmitrienko, University of Wuerzburg
Qi Li, Tsinghua University
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
Chen Yan, Zhejiang University
Yupeng Zhang, University of Illinois at Urbana–Champaign and Texas A&M University

Program Committee

Yousra Aafer, University of Waterloo
Aysajan Abidin, imec-COSIC KU Leuven
Ruba Abu-Salma, King's College London
Abbas Acar, Florida International University
Adil Ahmad, Arizona State University
Cristina Alcaraz, University of Malaga
Magnus Almgren, Chalmers University of Technology
Mário S. Alvim, Universidade Federal de Minas Gerais
Abdelrahaman Aly, Technology Innovation Institute (TII)
Mahmoud Ammar, Huawei Research
Elena Andreeva, Vienna University of Technology
Manos Antonakakis, Georgia Tech
Daniele Antonioli, EURECOM
Simone Aonzo, EURECOM
Diego F. Aranha, Aarhus University
Frederico Araujo, IBM Research
Ahmad Atamli, NVIDIA
Giuseppe Ateniese, George Mason University
Elias Athanasopoulos, University of Cyprus
Erman Ayday, Case Western Reserve University
Guangdong Bai, The University of Queensland
Luca Baldesi, University of California, Irvine
Musard Balliu, KTH Royal Institute of Technology
Sébastien Bardin, CEA LIST, Université Paris-Saclay
Lejla Batina, Radboud University
Lujo Bauer, Carnegie Mellon University
Sebastian Berndt, University of Lübeck
Konstantin (Kosta) Beznosov, University of British Columbia
Giuseppe Bianchi, University of Roma Tor Vergata
Battista Biggio, University of Cagliari
Tamara Bonaci, Northeastern University
Joseph Bonneau, New York University
Marcus Botacin, Texas A&M University
Sven Bugiel, CISPA Helmholtz Center for Information Security
Nathan Burow, MIT Lincoln Laboratory
Juan Caballero, IMDEA Software Institute
Patricia Arias Cabarcos, Paderborn University
Stefano Calzavara, Università Ca' Foscari Venezia
Yinzhi Cao, Johns Hopkins University
Srdjan Capkun, ETH Zurich
Alvaro A. Cardenas, University of California, Santa Cruz
Nicholas Carlini, Google
Lorenzo Cavallaro, University College London
Z. Berkay Celik, Purdue University
Sang Kil Cha, Korea Advanced Institute of Science and Technology (KAIST)
Varun Chandrasekaran, University of Illinois at Urbana–Champaign and Microsoft Research
Rahul Chatterjee, University of Wisconsin—Madison
Sze Yiu Chau, The Chinese University of Hong Kong
Alfred Chen, University of California, Irvine
Guoxing Chen, Shanghai Jiao Tong University
Hao Chen, University of California, Davis
Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences
Long Chen, Institute of Software Chinese Academy of Sciences
Sanchuan Chen, Auburn University
Yanjiao Chen, Zhejiang University
Yizheng Chen, University of Maryland
Yushi Cheng, Tsinghua University
Giovanni Cherubin, Microsoft
Euijin Choo, University of Alberta
Sherman S. M. Chow, The Chinese University of Hong Kong
Nicolas Christin, Carnegie Mellon University
Mihai Christodorescu, Google
Shaanan Cohney, University of Melbourne
Mauro Conti, University of Padova
Andrea Continella, University of Twente
Manuel Costa, Azure Research, Microsoft
Daniele Cono D'Elia, Sapienza University of Rome
Savino Dambra, Norton Research Group
Lucas Davi, University of Duisburg-Essen
Lorenzo De Carli, University of Calgary
Fabio De Gaspari, Sapienza University of Rome
Luca Demetrio, Università degli Studi di Genova
Ambra Demontis, University of Cagliari
Ghada Dessouky, Google
Changyu Dong, Guangzhou University
Adam Doupé, Arizona State University
Minxin Du, The Chinese University of Hong Kong
Tudor Dumitras, University of Maryland, College Park
Zakir Durumeric, Stanford University
Laura Edelson, New York University
Chang Ee-Chien, National University of Singapore
Manuel Egele, Boston University
Thomas Eisenbarth, University of Lübeck
Thorsten Eisenhofer, Technische Universität Berlin
Mohamed Elsabagh, Quokka
Pardis Emami-Naeini, Duke University
William Enck, North Carolina State University
Birhanu Eshete, University of Michigan, Dearborn
Sascha Fahl, CISPA Helmholtz Center for Information Security
Habiba Farrukh, University of California, Irvine
Aurore Fass, CISPA Helmholtz Center for Information Security
Bo Feng, Zhejiang University
Hossein Fereidooni, KOBIL GmbH
Tobias Fiebig, Max Planck Institute for Software Systems (MPI-SWS)
Bryan Ford, EPFL
Alisa Frik, International Computer Science Institute (ICSI)
Aymeric Fromherz, Inria
Kevin Fu, Northeastern University
Xinwen Fu, University of Massachusetts Lowell
Kelsey Fulton, Colorado School of Mines
Carlos Gañán, ICANN
Tal Garfinkel, University of California, San Deigo
Carrie Gates, Bank of America
Gennie Gebhart, Electronic Frontier Foundation and University of Washington
Zahra Ghodsi, Purdue University
Esha Ghosh, Microsoft Research
Yossi Gilad, The Hebrew University of Jerusalem
Devashish Gosain, Birla Institute of Technology and Science and Max Planck Institute for Informatics
Andre Gregio, Federal University of Parana (UFPR)
Ilya Grishchenko, University of California, Santa Barbara
Daniel Gruss, Graz University of Technology
Guofei Gu, Texas A&M University
Marco Guarnieri, IMDEA Software Institute
Wenbo Guo, Purdue University
Ariel Hamlin, Northeastern University
Jun Han, Yonsei University
Weili Han, Fudan University
Shuang Hao, The University of Texas at Dallas
Hamza Harkous, Google
Behnaz Hassanshahi, Oracle Labs
Nguyen Phong Hoang, University of Chicago
Thorsten Holz, CISPA Helmholtz Center for Information Security
Houman Homayoun, University of California, Davis
Nicholas Hopper, University of Minnesota
Tao Hou, University of North Texas
Yuncong Hu, Shanghai Jiao Tong University
Danny Yuxing Huang, New York University
Jun Ho Huh, Samsung Research
Syed Rafiul Hussain, The Pennsylvania State University
Alice Hutchings, University of Cambridge
Luca Invernizzi, Google
Cynthia Irvine, Naval Postgraduate School
Fabian Ising, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE
Dennis Jackson, Mozilla
Charlie Jacomme, Inria Paris
Joseph Jaeger, Georgia Institute of Technology
Sashidhar Jakkamsetti, Bosch Research
Rob Jansen, U.S. Naval Research Laboratory
Kangkook Jee, The University Texas at Dallas
Rikke Bjerg Jensen, Royal Holloway, University of London
Yuseok Jeon, UNIST (Ulsan National Institute of Science and Technology)
Shouling Ji, Zhejiang University
Xiaoyu Ji, Zhejiang University
Xiangkun Jia, Institute of Software Chinese Academy of Sciences
Aaron Johnson, U.S. Naval Research Laboratory
Gabriel Kaptchuk, Boston University
Yigitcan Kaya, University of California, Santa Barbara
Marcel Keller, CSIRO's Data61
Vasileios Kemerlis, Brown University
Dmitry Khovratovich, Ethereum Foundation
Kyungtae Kim, Dartmouth College
Taegyu Kim, The Pennsylvania State University
Taesoo Kim, Georgia Institute of Technology and Samsung Research
Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
David Kohlbrenner, University of Washington
Sebastian Köhler, University of Oxford
Tadayoshi Kohno, University of Washington
Kari Kostiainen, ETH Zurich
Platon Kotzias, Norton Research Group
Steve Kremer, Inria
Katharina Krombholz, CISPA Helmholtz Center for Information Security
Christopher Kruegel, University of California, Santa Barbara
Kavita Kumari, Technical University of Darmstadt
Andrew Kwong, The University of North Carolina at Chapel Hill
Giovanni Lagorio, University of Genoa
Andrea Lanzi, University of Milan
Pierre Laperdrix, CNRS
Riccardo Lazzeretti, Sapienza University of Rome
Kevin Leach, Vanderbilt University
Tancrède Lepoint, Amazon Web Services
Frank Li, Georgia Institute of Technology
Ming Li, University of Arizona
Song Li, Zhejiang University
Kaitai Liang, Delft University of Technology
Christopher Liebchen, Google
Yun Lin, Shanghai Jiao Tong University
Zhiqiang Lin, The Ohio State University
Zhen Ling, Southeast University
Ting Liu, Xi'an Jiaotong University
Yao Liu, University of South Florida
Zhuotao Liu, Tsinghua University
Yan Long, University of Michigan
Wouter Lueks, CISPA Helmholtz Center for Information Security
Lannan Lisa Luo, George Mason University
Mulong Luo, Cornell University
Xiapu Luo, The Hong Kong Polytechnic University
Siqi Ma, The University of New South Wales
Aravind Machiry, Purdue University
Matteo Maffei, Technische Universität Wien
Christian Mainka, Ruhr University Bochum
Nathan Malkin, University of Maryland
Stefan Mangard, Graz University of Technology
Michail Maniatakos, New York University Abu Dhabi
Antonio Marcedone, Zoom Video Communications, Inc.
Ivan Martinovic, University of Oxford
Sahar Mazloom, JPMorgan Chase
Jon McCune, Google
Allison McDonald, Boston University
Derrick McKee, MIT Lincoln Laboratory
Catherine Meadows, U.S. Naval Research Laboratory
Shagufta Mehnaz, The Pennsylvania State University
Sarah Meiklejohn, Google and University College London
Marcela Melara, Intel Labs
Yan Meng, Shanghai Jiao Tong University
Markus Miettinen, Technische Universität Darmstadt
Jiang Ming, Tulane University
Vladislav Mladenov, Ruhr University Bochum
Esfandiar Mohammadi, University of Lübeck
Mainack Mondal, Indian Institute of Technology, Kharagpur
Hyungon Moon, UNIST (Ulsan National Institute of Science and Technology)
Veelasha Moonsamy, Ruhr University Bochum
Marius Muench, University of Birmingham
Takao Murakami, ISM
Moses Namara, Meta
Shravan Ravi Narayan, The University of Texas at Austin
Ivan De Oliveira Nunes, Rochester Institute of Technology
Adam Oest, Paypal
Hamed Okhravi, MIT Lincoln Laboratory
Gabriele Oligeri, Hamad Bin Khalifa University
Cristina Onete, Université de Limoges, XLIM, and CNRS 7252
Simon Oya, The University of British Columbia
Ercan Ozturk, Meta
Fabio Pagani, Binarly
Panos Papadimitratos, KTH Royal Institute of Technology
Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
Thomas Pasquier, University of British Columbia
Andrew Paverd, Microsoft
Mathias Payer, EPFL
Paul Pearce, Georgia Institute of Technology
Sai Teja Peddinti, Google
Amreesh Phokeer, Internet Society
Pablo Picazo-Sanchez, Halmstad University
Stjepan Picek, Radboud University
Fabio Pierazzi, King's College London
Maura Pintor, University of Cagliari
Georgios Portokalidis, Stevens Institute of Technology
Niels Provos, Lacework
Chenxiong Qian, The University of Hong Kong
Han Qiu, Tsinghua University
Gang Qu, University of Maryland
JV Rajendran, Texas A&M University
Kopo Marvin Ramokapane, University of Bristol
Sara Rampazzi, University of Florida
Aanjhan Ranganathan, Northeastern University
Kasper Rasmussen, University of Oxford
Mariana Raykova, Google
Elissa Redmiles, Max Planck Institute for Software Systems (MPI-SWS)
Oscar Reparaz, Block, Inc.
Tamara Rezk, Inria
Konrad Rieck, Technische Universität Berlin
Florentin Rochet, UNamur
Franziska Roesner, University of Washington
Eyal Ronen, Tel Aviv University
Stefanie Roos, RPTU Kaiserslautern-Landau
Christian Rossow, CISPA Helmholtz Center for Information Security
Kevin Alejandro Roundy, Gen Digital
Scott Ruoti, University of Tennessee, Knoxville
Andrei Sabelfeld, Chalmers University of Technology
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Sayandeep Saha, Université catholique de Louvain
Merve Sahin, SAP Security Research
Kazue Sako, Waseda University
Jun Sakuma, Tokyo Institute of Technology
Soheil Salehi, University of Arizona
Iskander Sanchez-Rola, Norton Research Group
Nuno Santos, INESC-ID and Instituto Superior Técnico, University of Lisbon
Sebastian Schinzel, Münster University of Applied Sciences, Fraunhofer SIT, and ATHENE
Michael Schwarz, CISPA Helmholtz Center for Information Security
Wendy Seltzer, Tucows
Johanna Sepúlveda, Airbus Defence and Space
Bingyu Shen, Meta Platforms, Inc.
Chao Shen, Xi'an Jiaotong University
Emily Shen, MIT Lincoln Laboratory
Shweta Shinde, ETH Zurich
Maliheh Shirvanian, Netflix
Ali Shokri, Virginia Tech
Haya Shulman, Goethe-Universität Frankfurt, Fraunhofer SIT, and ATHENE
Manya Sleeper, Google
Peter Snyder, Brave Software
Dokyung Song, Yonsei University
Yongsoo Song, Seoul National University
Alessandro Sorniotti, IBM Research Europe
Dario Stabili, Alma Mater Studiorum - Università di Bologna
Ben Stock, CISPA Helmholtz Center for Information Security
Gianluca Stringhini, Boston University
Martin Strohmeier, armasuisse Science and Technology, Cyber-Defence Campus
Guillermo Suarez-Tangil, IMDEA Networks Institute
Takeshi Sugawara, The University of Electro-Communications
Kun Sun, George Mason University
Wei Sun, University of California, San Diego
Yi Sun, Beijing University of Posts and Telecommunications
Zhibo Sun, Drexel University
Qiang Tang, The University of Sydney
Juan Tapiador, UC3M
Teryl Taylor, IBM Research
Yuan Tian, University of California, Los Angeles
Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Rahmadi Trimananda, Comcast
Chia-Che Tsai, Texas A&M University
Güliz Seray Tuncay, Google
Selcuk Uluagac, Florida International University
Blase Ur, University of Chicago
Anjo Vahldiek-Oberwagner, Intel Labs
Jo Van Bulck, imec-DistriNet, KU Leuven
Michel van Eeten, Delft University of Technology
Mayank Varia, Boston University
Venkat Venkatakrishnan, University of Illinois Chicago
Luca Viganò, King's College London
Giovanni Vigna, University of California, Santa Barbara
Daniel Votipka, Tufts University
Alexios Voulimeneas, Delft University of Technology
David Wagner, University of California, Berkeley
Cong Wang, City University of Hong Kong
Fish Wang, Arizona State University
Gang Wang, University of Illinois at Urbana–Champaign
Qian Wang, Wuhan University
Shuai Wang, The Hong Kong University of Science and Technology
Ting Wang, The Pennsylvania State University
Xiangyu Wang, Xidian University
Xiao Wang, Northwestern University
Zhibo Wang, Zhejiang University
Edgar Weippl, University of Vienna, SBA Research
Josephine Wolff, Tufts University
Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
Nan Wu, CSIRO's Data61
Yang Xiang, Swinburne University of Technology
Liang Xiao, Xiamen University
Chenren Xu, Peking University
Fengyuan Xu, Nanjing University
Jason (Minhui) Xue, CSIRO's Data61
Carter Yagemann, The Ohio State University
Guangliang Yang, Fudan University
Yuval Yarom, Ruhr University Bochum
Attila A Yavuz, University of South Florida
Chia-Mu Yu, National Yang Ming Chiao Tung University
Yu Yu, Shanghai Jiao Tong University
Xingliang Yuan, Monash University
Xu Yuan, University of Louisiana at Lafayette
Savvas Zannettou, Delft University of Technology
Daniel Zappala, Brigham Young University
Sarah Zennou, Airbus
Bingsheng Zhang, Zhejiang University
Fan Zhang, Yale University
Fengwei Zhang, Southern University of Science and Technology (SUSTech)
Kehuan Zhang, The Chinese University of Hong Kong
Mu Zhang, University Of Utah
Ning Zhang, Washington University
Xiaokuan Zhang, George Mason University
Youqian Zhang, The Hong Kong Polytechnic University
Yuan Zhang, Fudan University
Yue Zhang, The Ohio State University
Zhikun Zhang, Stanford University and CISPA Helmholtz Center for Information Security
Qingchuan Zhao, City University of Hong Kong
Ziming Zhao, University at Buffalo
Hao Zhou, The Hong Kong Polytechnic University
Haojin Zhu, Shanghai Jiao Tong University
Saman Zonouz, Georgia Tech
Mary Ellen Zurko, MIT Lincoln Laboratory

Steering Committee

Michael Bailey, Georgia Institute of Technology
Kevin Butler, University of Florida
Joe Calandrino, Federal Trade Commission
Srdjan Capkun, ETH Zurich
William Enck, North Carolina State University
Rachel Greenstadt, New York University
Casey Henderson-Ross, USENIX Association
Nadia Heninger, University of California, San Diego
Thorsten Holz, Ruhr-Universität Bochum
Tadayoshi Kohno, University of Washington
Franziska Roesner, University of Washington
Kurt Thomas, Google
Patrick Traynor, University of Florida
Carmela Troncoso, EPFL

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.

  • System security
    • Operating systems security
    • Web security
    • Mobile systems security
    • Distributed systems security
    • Cloud computing security
  • Network security
    • Intrusion and anomaly detection and prevention
    • Network infrastructure security
    • Denial-of-service attacks and countermeasures
  • Wireless security
  • Security analysis
    • Malware analysis
    • Analysis of network and security protocols
    • Attacks with novel insights, techniques, or results
    • Forensics and diagnostics for security
    • Automated security analysis of hardware designs and implementation
    • Automated security analysis of source code and binaries
    • Program analysis
    • Fuzzing and Vulnerability Discovery
    • Formal methods for Security
  • Machine learning security and privacy
    • Machine learning applications to security and privacy
    • Machine learning privacy issues and methods
    • Adversarial machine learning
  • Data-driven security and measurement studies
    • Measurements of fraud, malware, spam
    • Measurements of human behavior and security
  • Privacy
    • Privacy metrics
    • Anonymity
    • Web and mobile privacy
    • Privacy-preserving computation
    • Privacy attacks
  • Usable security and privacy
    • User studies related to security and privacy
    • Human-centered security and privacy design
  • Language-based security
  • Hardware security
    • Secure computer architectures
    • Embedded systems security
    • Cyber-physical systems security
    • Methods for detection of malicious or counterfeit hardware
    • Side channels
  • Research on surveillance and censorship
  • Social issues and security
    • Research on computer security law and policy
    • Ethics of computer security research
    • Research on security education and training
    • Information manipulation, misinformation, and disinformation
    • Protecting and understanding at-risk users
    • Emerging threats, harassment, extremism, and online abuse
  • Applications of cryptography
    • Analysis of deployed cryptography and cryptographic protocols
    • Cryptographic implementation analysis
    • New cryptographic protocols with real-world applications
    • Blockchains and distributed ledger security

Systematization of Knowledge

Starting this year, USENIX Security solicits the submission of Systematization of Knowledge (SoK) papers, which have been very valuable to help our community to clarify and put into context complex research problems.

It is important to stress that SoK papers go beyond simply summarizing previous research (like in a survey) but also include a thorough examination and analysis of existing approaches, identify gaps and limitations, and offer insights or new perspectives on a given, major research area.

While both SoK and survey papers may involve summarizing existing research, the key difference is that a SoK paper provides a more structured and insightful overview, which might also involve new experiments to replicate and compare previous solutions. Please refer to the IEEE Symposium on Security and Privacy for recent SoK papers at https://oaklandsok.github.io/.

We encourage the authors to distinguish SoK submissions by adding the "SoK:" prefix to the title.

 

Refereed Papers

Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Alternative arrangements will be made if global health concerns persist. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix.org.

A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX's open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.

Go to Paper Submission Policies and Instructions page for more information.

Artifact Evaluation

All authors of accepted USENIX Security '24 papers (including shepherd approved, but not major revisions) are encouraged to submit artifacts for Artifact Evaluation (AE). Artifacts can be submitted in the same cycle as the accepted paper or in any of the following cycles for 2024. Each submitted artifact will be reviewed by the Artifact Evaluation Committee (AEC).

View the Call for Artifacts.

Symposium Activities

Invited Talks and Panel Discussions

Invited talks and panel discussions may be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to sec24it@usenix.org by Thursday, February 8, 2024.

Poster Session

Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year's USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work. Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.

To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form, which will be available here soon, by Tuesday, July 9, 2024. Decisions will be made by Tuesday, July 16, 2024. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors' names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.

Go to Paper Submission Policies and Instructions.