USENIX Security '22 Call for Papers

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 31st USENIX Security Symposium will be held August 10–12, 2022, in Boston, MA.

Important: The USENIX Security Symposium moved to multiple submission deadlines in 2019 and included changes to the review process and submission policies. Detailed information is available at USENIX Security Publication Model Changes.

All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 8 and 9.

Important Dates

Summer Deadline

  • Refereed paper submissions due: Tuesday, June 8, 2021, 11:59 pm AoE
  • Early reject notification: July 15, 2021
  • Rebuttal Period: August 23–25, 2021
  • Notification to authors: September 3, 2021
  • Final paper files due: October 5, 2021

Fall Deadline

  • Refereed paper submissions due: Tuesday, October 12, 2021, 11:59 pm AoE
  • Early reject notification: November 20, 2021
  • Rebuttal Period: January 10–12, 2022
  • Notification to authors: January 20, 2022
  • Final paper files due: February 22, 2022

Winter Deadline

  • Refereed paper submissions due: Tuesday, February 1, 2022, 11:59 pm AoE
  • Early reject notification: March 11, 2022
  • Rebuttal Period: April 18–20, 2022
  • Notification to authors: May 2, 2022
  • Final paper files due: June 14, 2022

  • Invited talk and panel proposals due: Tuesday, February 1, 2022
  • Poster proposals due: Friday, July 8, 2022, 11:59 pm AoE
    • Notification to poster presenters: Wednesday, July 13, 2022

Conference Organizers

Program Co-Chairs

Kevin Butler, University of Florida
Kurt Thomas, Google

Program Committee

Yousra Aafer, University of Waterloo
Ruba Abu-Salma, King's College London
Gunes Acar, Katholieke Universiteit Leuven
Sadia Afroz, International Computer Science Institute (ICSI), Avast
Devdatta Akhawe, Dropbox
Daniel Alexander Zappala, Brigham Young University
Ardalan Amiri Sani, University of California, Irvine
Olabode Anise, Google
Daniele Antonioli, EPFL, EURECOM
Maria Apostolaki, ETH Zurich
Elias Athanasopoulos, University of Cyprus
Davide Balzarotti, EURECOM
Tiffany Bao, Arizona State University
David Barrera, Carleton Univeristy
Adam Bates, University of Illinois at Urbana–Champaign
Lejla Batina, Radboud University
Lujo Bauer, Carnegie Mellon University
Jethro Beekman, Fortanix
Antonio Bianchi, Purdue University
Battista Biggio, University of Cagliari
Leyla Bilge, NortonLifeLock Research Group
Vincent Bindschaedler, University of Florida
Priyam Biswas, Intel
Marina Blanton, University at Buffalo
Erik-Oliver Blass, Airbus
Tamara Bonaci, Northeastern University
Joseph Bonneau, New York University
Glencora Borradaile, Oregon State University
Marcus Botacin, Federal University of Paraná
Ioana Boureanu, University of Surrey
Nathan Burow, MIT Lincoln Laboratory
Joseph Calandrino, Federal Trade Commission
Stefano Calzavara, Università Ca' Foscari Venezia
Yinzhi Cao, Johns Hopkins University
Srdjan Capkun, ETH Zurich
Alvaro Cardenas, University of California, Santa Cruz
Nicholas Carlini, Google
Lorenzo Cavallaro, University College London
Z. Berkay Celik, Purdue University
Sang Kil Cha, Korea Advanced Institute of Science and Technology (KAIST)
Neha Chachra, Facebook
Rahul Chatterjee, University of Wisconsin—Madison
Sze Yiu Chau, The Chinese University of Hong Kong
Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences
Qi Alfred Chen, University of California, Irvine
Yizheng Chen, Columbia University
Sherman S. M. Chow, The Chinese University of Hong Kong
Amrita Roy Chowdhury, University of Wisconsin—Madison
Nicolas Christin, Carnegie Mellon University
Chitchanok Chuengsatiansup, The University of Adelaide
Camille Cobb, Carnegie Mellon University
Shaanan Cohney, Princeton University and University of Melbourne
Andrea Continella, University of Twente
Cas Cremers, CISPA Helmholtz Center for Information Security
Bruno Crispo, University of Trento
Weidong Cui, Microsoft Research
Anupam Das, North Carolina State University
Pubali Datta, University of Illinois at Urbana–Champaign
Nathan Dautenhahn, Rice University
Alexandra Dmitrienko, University of Wuerzburg
Adam Doupe, Arizona State University
Tudor Dumitras, University of Maryland
Zakir Durumeric, Stanford University
Manuel Egele, Boston University
Thomas Eisenbarth, University of Lübeck
Mary Ellen Zurko, MIT Lincoln Laboratory
Mohamed Elsabagh, Kryptowire
Pardis Emami-Naeini, University of Washington
William Enck, North Carolina State University
Roya Ensafi, University of Michigan
Birhanu Eshete, University of Michigan
Saba Eskandarian, The University of North Carolina at Chapel Hill
Sascha Fahl, CISPA Helmholtz Center for Information Security
Kassem Fawaz, University of Wisconsin—Madison
Yunsi Fei, Northeastern University
Earlence Fernandes, University of Wisconsin—Madison
Domenic Forte, University of Florida
Aurélien Francillon, EURECOM
Michael Franz, University of California, Irvine
Yanick Fratantonio, Cisco Talos
David Freeman, Facebook
Aymeric Fromherz, Inria
Patrick Gage Kelley, Google
Eva Galperin, Electronic Frontier Foundation
Vinod Ganapathy, Indian Institute of Science (IISc)
Christina Garman, Purdue University
Carrie Gates, Bank of America
Genevieve Gebhart, University of Washington Information School
Daniel Genkin, Georgia Institute of Technology
Ryan Gerdes, Virginia Tech
Arthur Gervais, Imperial College London
Irene Giacomelli, Protocol Labs
Yossi Gilad, The Hebrew University of Jerusalem
Neil Gong, Duke University
Tyrone Grandison, The Data-Driven Institute
Daniel Gruss, Graz University of Technology
Guofei Gu, Texas A&M University
Le Guan, University of Georgia
Shuang Hao, The University of Texas at Dallas
Wajih Ul Hassan, University of Illinois at Urbana–Champaign
Christophe Hauser, USC/Information Sciences Institute
Xiali Hei, University of Louisiana at Lafayette
Grant Hernandez, Qualcomm
Matthew Hicks, Virginia Tech
Ralph Holz, University of Twente
Thorsten Holz, Ruhr University Bochum
Nick Hopper, University of Minnesota
Diane Hosfelt, Apple
Syed Rafiul Hussain, The Pennsylvania State University
Luca Invernizzi, Google
Sotiris Ioannidis, Technical University of Crete
Cynthia Irvine, Naval Postgraduate School
Suman Jana, Columbia University
Ramya Jayaram Masti, Intel
Yuseok Jeon, UNIST (Ulsan National Institute of Science and Technology)
Yier Jin, University of Florida
Brent Byunghoon Kang, Korea Advanced Institute of Science and Technology (KAIST)
Chris Kanich, University of Illinois at Chicago
Apu Kapadia, Indiana University Bloomington
Alexandros Kapravelos, North Carolina State University
Vasileios Kemerlis, Brown University
Florian Kerschbaum, University of Waterloo
Taesoo Kim, Georgia Institute of Technology
Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
Sam King, University of California, Davis and Bouncer Technologies
Michel Kinsy, TAMU
Engin Kirda, Northeastern University
Katharina Kohls, Radboud University
Tadayoshi Kohno, University of Washington
Kari Kostiainen, ETH Zurich
Srikanth Krishnamurthy, University of California, Riverside
Joshua A Kroll, Naval Postgraduate School
Katharina Krombholz, CISPA Helmholtz Center for Information Security
Christopher Kruegel, University of California, Santa Barbara
Deepak Kumar, Stanford University
Anil Kurmus, IBM Research Europe
Andrea Lanzi, University of Milan
Pavel Laskov, University of Liechtenstein
Byoungyoung Lee, Seoul National University
Kyu Hyung Lee, University of Georgia
Sangho Lee, Microsoft Research
Wenke Lee, Georgia Institute of Technology
Tancrède Lepoint, Google
Ada Lerner, Wellesley College
Frank Li, Georgia Institute of Technology
Qi Li, Tsinghua University
Tianshi Li, Carnegie Mellon University
David Lie, University of Toronto
Zhiqiang Lin, Ohio State University
Martina Lindorfer, TU Wien
Guyue Liu, Carnegie Mellon University
Kangjie Lu, University of Minnesota
Wouter Lueks, EPFL
Xiapu Luo, The Hong Kong Polytechnic University
Matteo Maffei, TU Wien
Stefan Mangard, Graz University of Technology
Mohammad Mannan, Concordia University
Ivan Martinovic, Oxford University
Michelle Mazurek, University of Maryland
Patrick McDaniel, The Pennsylvania State University
Shagufta Mehnaz, Dartmouth College
Aastha Mehta, University of British Columbia, Vancouver
Sarah Meiklejohn, University College London and Google
Marcela Melara, Intel Labs
Nele Mentens, Leiden University and Katholieke Universiteit Leuven
Jiang Ming, The University of Texas at Arlington
Ariana Mirian, University of California, San Diego
Jelena Mirkovic, University of Southern California
Daniel Moghimi, University of California, San Diego
Esfandiar Mohammadi, University of Lübeck
Mainack Mondal, Indian Institute of Technology, Kharagpur
Soo-Jin Moon, Google
Veelasha Moonsamy, Ruhr University Bochum
Thomas Moyer, University of North Carolina
Marius Muench, Vrije Universiteit Amsterdam
Takao Murakami, AIST
Toby Murray, University of Melbourne
Nick Nikiforakis, Stony Brook University
Anita Nikolich, University of Illinois at Urbana–Champaign
Shirin Nilizadeh, The University of Texas at Arlington
Adam Oest, PayPal
Hamed Okhravi, MIT Lincoln Laboratory
Melek Önen, EURECOM
Cristina Onete, University of Limoges/XLIM/CNRS 7252
Yossi Oren, Ben-Gurion University of the Negev
Rebekah Overdorf, EPFL
Miroslav Pajic, Duke University
Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
Bryan Parno, Carnegie Mellon University
Mathias Payer, EPFL
Paul Pearce, Georgia Institute of Technology, International Computer Science Institute (ICSI)
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
Roberto Perdisci, University of Georgia and Georgia Institute of Technology
Radia Perlman, Dell EMC
Peter Peterson, University of Minnesota
Fabio Pierazzi, King's College London
Christina Poepper, New York University Abu Dhabi
Niels Provos, Stripe
Amir Rahmati, Stony Brook University
Jeyavijayan Rajendran, Texas A&M University
Sara Rampazzi, University of Florida
Mariana Raykova, Google
Joel Reardon, University of Calgary
Bradley Reaves, North Carolina State University
Elissa Redmiles, Max Planck Institute for Software Systems (MPI-SWS)
Michael K. Reiter, Duke University
Konrad Rieck, Technische Universität Braunschweig
William Robertson, Northeastern University
Franziska Roesner, University of Washington
Eyal Ronen, Tel Aviv University
Stefanie Roos, TU Delft
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Brendan Saltaformaggio, Georgia Institute of Technology
Nitesh Saxena, University of Alabama at Birmingham
Sebastian Schinzel, Münster University of Applied Sciences
Michael Schwarz, CISPA Helmholtz Center for Information Security
Jörg Schwenk, Ruhr University Bochum
Wendy Seltzer, W3C and Massachusetts Institute of Technology
Johanna Sepulveda, Airbus
Mahmood Sharif, Tel Aviv University and VMware
Imani N. Sherman, University of Florida
Shweta Shinde, ETH Zurich
Fatemeh Shirazi, Web3 Foundation
Maliheh Shirvanian, Visa Research
Yan Shoshitaishvili, Arizona State University
Haya Shulman, Fraunhofer SIT
Peter Snyder, Brave Browser
Sooel Son, Korea Advanced Institute of Science and Technology (KAIST)
Chengyu Song, University of California, Riverside
Alessandro Sorniotti, IBM Research Europe
Kyle Soska, University of Illinois at Urbana–Champaign
Michael Specter, Massachusetts Institute of Technology
Drew Springall, Auburn University
Jessica Staddon, JPMorgan Chase
Emily Stark, Google
Angelos Stavrou, Virginia Tech
Deian Stefan, University of California, San Diego
Ben Stock, CISPA Helmholtz Center for Information Security
Gianluca Stringhini, Boston University
Yixin Sun, University of Virginia
Yuqiong Sun, Facebook
Qiang Tang, The University of Sydney
Dave (Jing) Tian, Purdue University
Yuan Tian, University of Virginia
Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Alin Tomescu, VMware Research
Shruti Tople, Microsoft Research
Santiago Torres-Arias, Purdue University
Florian Tramèr, Stanford University
Patrick Traynor, University of Florida
Carmela Troncoso, EPFL
Güliz Seray Tuncay, Google
Selcuk Uluagac, Florida International University
Blase Ur, University of Chicago
Anjo Vahldiek-Oberwagner, Intel Labs
Michel van Eeten, Delft University of Technology
Mayank Varia, Boston University
Ingrid Verbauwhede, Katholieke Universiteit Leuven
Luca Viganò, King's College London
Hayawardh Vijayakumar, Samsung Research America
Bimal Viswanath, Virginia Tech
Daniel Votipka, Tufts University
David Wagner, University of California, Berkeley
Michael Waidner, Technische Universität Darmstadt
Gang Wang, University of Illinois at Urbana–Champaign
Ting Wang, The Pennsylvania State University
XiaoFeng Wang, Indiana University Bloomington
Michael Weissbacher, Block, Inc.
Tara Whalen, Carleton University
Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
Matthew Wright, Rochester Institute of Technology
Eric Wustrow, University of Colorado Boulder
Jason (Minhui) Xue, The University of Adelaide
Daphne Yao, Virginia Tech
Yuval Yarom, The University of Adelaide and Data61
Tuba Yavuz, University of Florida
Yanfang (Fanny) Ye, Case Western Reserve University
Heng Yin, University of California, Riverside
Qiang Zeng, University of South Carolina
Sarah Zennou, Airbus
Fengwei Zhang, Southern University of Science and Technology (SUSTech)
Xiangyu Zhang, Purdue University
Yang Zhang, CISPA Helmholtz Center for Information Security
Yuan Zhang, Fudan University
Wenting Zheng, Carnegie Mellon University
Yajin Zhou, Zhejiang University
Haojin Zhu, Shanghai Jiao Tong University

Poster Session Chair

Sara Rampazzi, University of Florida

Test of Time Awards Committee

Dan Boneh, Stanford University
Srdjan Capkun, ETH Zurich
Lorrie Cranor, Carnegie Mellon University
Nick Feamster, University of Chicago
Kevin Fu, University of Michigan
Fabian Monrose, The University of North Carolina at Chapel Hill
Paul Van Oorschot, Carleton University
David Wagner, University of California, Berkeley
Dan Wallach, Rice University
Wenyuan Xu, Zhejiang University

Steering Committee

Michael Bailey, University of Illinois at Urbana–Champaign
Matt Blaze, Georgetown University
Dan Boneh, Stanford University
Srdjan Capkun, ETH Zurich
William Enck, North Carolina State University
Kevin Fu, University of Michigan
Rachel Greenstadt, New York University
Casey Henderson, USENIX Association
Nadia Heninger, University of California, San Diego
Thorsten Holz, Ruhr-Universität Bochum
Engin Kirda, Northeastern University
Tadayoshi Kohno, University of Washington
Thomas Ristenpart, Cornell Tech
Franziska Roesner, University of Washington
Patrick Traynor, University of Florida
David Wagner, University of California, Berkeley

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:

  • System security
    • Operating systems security
    • Web security
    • Mobile systems security
    • Distributed systems security
    • Cloud computing security
  • Network security
    • Intrusion and anomaly detection and prevention
    • Network infrastructure security
    • Denial-of-service attacks and countermeasures
    • Wireless security
  • Security analysis
    • Malware analysis
    • Analysis of network and security protocols
    • Attacks with novel insights, techniques, or results
    • Forensics and diagnostics for security
    • Automated security analysis of hardware designs and implementation
    • Automated security analysis of source code and binaries
    • Program analysis
  • Machine learning security and privacy
  • Data-driven security and measurement studies
    • Measurements of fraud, malware, spam
    • Measurements of human behavior and security
  • Privacy-enhancing technologies and anonymity
  • Usable security and privacy
  • Language-based security
  • Hardware security
    • Secure computer architectures
    • Embedded systems security
    • Methods for detection of malicious or counterfeit hardware
    • Side channels
  • Research on surveillance and censorship
  • Social issues and security
    • Research on computer security law and policy
    • Ethics of computer security research
    • Research on security education and training
    • Information manipulation, misinformation, and disinformation
    • Protecting and understanding at-risk users
    • Emerging threats, harassment, extremism, and online abuse
  • Applications of cryptography
    • Analysis of deployed cryptography and cryptographic protocols
    • Cryptographic implementation analysis
    • New cryptographic protocols with real-world applications

This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.

Refereed Papers

Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Alternative arrangements will be made if global health concerns persist. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix.org.

A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX's open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.

Go to Paper Submission Policies and Instructions page for more information.

Artifact Evaluation

View the Call for Artifacts.

Symposium Activities

Invited Talks, Panels, Poster Session, Lightning Talks, and BoFs
In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a poster session, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at sec22chairs@usenix.org.

Invited Talks and Panel Discussions

Invited talks and panel discussions will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to sec22it@usenix.org by February 1, 2022.

Poster Session

The USENIX Security Symposium is excited to have an in-person conference after two years of virtual conferences. We are, therefore, offering an opportunity to authors of papers from the 2020 and 2021 USENIX Security Symposium to present their papers as posters this year in Boston. New poster submissions of unpublished works will be also accepted.

Important Dates
Submission Deadline: Friday, July 8, 2022, 11:59 pm AoE
Early Notification Date: Wednesday, July 13, 2022

Posters will not be included in the proceedings but may be made available online if circumstances permit. At least one author of each accepted poster must register for and attend the Symposium to present the poster.

Due to limited space, we will accept submissions on a “first come first served” basis, with priority for posters of papers published in the 2020 and 2021 Symposium.

Submission Details
There is no review process for posters of accepted papers from the 2020 and 2021 Symposium. Poster authors will need to submit a draft of the poster in PDF (maximum size 36" by 48") via the poster submission form, and after the acceptance notification, they will need to bring a printed version of the poster to the conference venue.

For new posters submissions of unpublished work, authors will need to submit a draft of the poster (maximum size 36" by 48"), or a one-page abstract in PDF via the poster submission form. We will notify authors of acceptance by July 13, 2022, and may accept additional posters after that if there is room.

Poster submissions from published and unpublished works must include the authors' names, affiliations, contact information, and link to the paper presentation (only if the poster is from a paper published in the 2020 or 2021 USENIX Security Symposium, leave the text box blank otherwise).

Poster authors of accepted papers from the 2020 and 2021 Symposium are optionally encouraged to prepare their posters using the Better Posters template by Mike Morrison. This initiative was featured by National Public Radio, and more information is also available here.

For more information, please contact the poster session chair at sec22posters@usenix.org.

Lightning Talks

Due to scheduling constraints, we will not be hosting a Lightning Talks session this year (also previously known as a Work-in-Progress/Rump session).

Birds-of-a-Feather Sessions (BoFs)

Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on-site or in advance. To schedule a BoF, please send an email to the USENIX Conference Department at bofs@usenix.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time.

Go to Paper Submission Policies and Instructions.