USENIX Security '23 Call for Papers

USENIX Security '23 is SOLD OUT.

Please do not plan to walk into the venue and register on site.
The event has reached maximum physical capacity, and we will not be able to accommodate any additional registrations.

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 32nd USENIX Security Symposium will be held August 9–11, 2023, in Anaheim, CA.

Important: In 2023, we are introducing substantial changes to the review process, aimed to provide a more consistent path towards acceptance and reduce the number of times papers reenter the reviewing process. Detailed information is available at USENIX Security Publication Model Changes.

All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security.

Important Dates

Summer Deadline

  • Refereed paper submissions due: Tuesday, June 7, 2022, 11:59 pm AoE
  • Early reject notification: July 14, 2022
  • Rebuttal Period: August 22–24, 2022
  • Notification to authors: September 2, 2022
  • Final paper files due: October 4, 2022

Fall Deadline

  • Refereed paper submissions due: Tuesday, October 11, 2022, 11:59 pm AoE
  • Early reject notification: November 18, 2022
  • Rebuttal Period: January 17–19, 2023
  • Notification to authors: January 27, 2023
  • Final paper files due: February 28, 2023

Winter Deadline

  • Refereed paper submissions due: Tuesday, February 7, 2023, 11:59 pm AoE
  • Early reject notification: March 17, 2023
  • Rebuttal Period: April 24–26, 2023
  • Notification to authors: May 8, 2023
  • Final paper files due: June 13, 2023

  • Invited talk and panel proposals due: Tuesday, January 31, 2023
  • Poster proposals due: Thursday, July 6, 2023
    • Notification to poster presenters: Thursday, July 13, 2023
  • Lightning Talks submissions due: Wednesday, July 26, 2023, 11:59 pm AoE

Symposium Organizers

Program Co-Chairs

Joe Calandrino, Federal Trade Commission
Carmela Troncoso, EPFL

Program Vice Co-Chairs

Adam J. Aviv, The George Washington University
David Barrera, Carleton University
Nataliia Bielova, CNIL and Inria
Christina Garman, Purdue University
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security

Program Committee

Yousra Aafer, University of Waterloo
Karim M. Abdellatif, Ledger France
Aysajan Abidin, imec-COSIC Katholieke Universiteit Leuven
Kendra Albert, Harvard Law School
Martin Albrecht, Royal Holloway, University of London
Mário S. Alvim, Universidade Federal de Minas Gerais
Abdelrahaman Aly, CRC, Technology Innovation Institute (TII), and imec-COSIC Katholieke Universiteit Leuven
Ross Anderson, Cambridge University and Edinburgh University
Daniele Antonioli, EURECOM
Giovanni Apruzzese, University of Liechtenstein
Frederico Araujo, IBM T. J. Watson Research Center
Giuseppe Ateniese, George Mason University
Erman Ayday, Case Western Reserve University
Davide Balzarotti, EURECOM
Sébastien Bardin, CEA LIST, Université Paris Saclay
Adam Bates, University of Illinois at Urbana–Champaign
Lujo Bauer, Carnegie Mellon University
Matthew Bernhard, VotingWorks
Battista Biggio, University of Cagliari
Leyla Bilge, Norton Research Group
Marina Blanton, University at Buffalo
Joseph Bonneau, New York University
Marcus Felipe Botacin, Federal University of Paraná
Ioana Boureanu, Surrey Centre for Cybersecurity, University of Surrey
Cristian Antonio Bravo-Lillo, Fintual
Sven Bugiel, CISPA Helmholtz Center for Information Security
Nathan Burow, MIT Lincoln Laboratory
Juan Caballero, IMDEA Software Institute
Stefano Calzavara, Università Ca' Foscari Venezia
Yinzhi Cao, Johns Hopkins University
Srdjan Čapkun, ETH Zurich
Álvaro A. Cárdenas, University of California, Santa Cruz
Nicholas Carlini, Google
Lorenzo Cavallaro, University College London
Berkay Celik, Purdue University
Sang Kil Cha, Korea Advanced Institute of Science and Technology (KAIST)
Varun Chandrasekaran, University of Wisconsin—Madison
Rahul Chatterjee, University of Wisconsin—Madison
Sze Yiu Chau, The Chinese University of Hong Kong
Guoxing Chen, Shanghai Jiao Tong University
Qi Alfred Chen, University of California, Irvine
Yizheng Chen, University of California, Berkeley
Giovanni Cherubin, Microsoft Research
Amrita Roy Chowdhury, University of California, San Diego
Nicolas Christin, Carnegie Mellon University
Mihai Christodorescu, Google
Camille Cobb, University of Illinois at Urbana–Champaign
Shaanan Cohney, University of Melbourne
Andrea Continella, University of Twente
Daniele Cono D'Elia, Sapienza University of Rome
Pubali Datta, University of Illinois at Urbana–Champaign
Nathan Dautenhahn, Rice University
Ambra Demontis, University of Cagliari
Ghada Dessouky, Google
Alexandra Dmitrienko, University of Würzburg
Orr Dunkelman, University of Haifa, Israel
Zakir Durumeric, Stanford University
Adam Dziedzic, University of Toronto and Vector Institute
Laura Edelson, New York University
Manuel Egele, Boston University
Mohamed Elsabagh, Kryptowire
Pardis Emami-Naeini, University of Washington
William Enck, North Carolina State University
Birhanu Eshete, University of Michigan, Dearborn
Giulia Fanti, Carnegie Mellon University
Habiba Farrukh, Purdue University
Kassem Fawaz, University of Wisconsin—Madison
Earlence Fernandes, University of Wisconsin—Madison
Domenic Forte, University of Florida
Imane Fouad, Inria and Université de Lille
Yanick Fratantonio, Google
Alisa Frik, International Computer Science Institute (ICSI)
Aymeric Fromherz, Inria
Kelsey Fulton, University of Maryland
Carlos Gañán, ICANN
Simson L. Garfinkel, National Institute of Standards and Technology (NIST) and Schmidt Futures
Carrie Gates, Bank of America
Gennie Gebhart, The Electronic Frontier Foundation
Zahra Ghodsi, Purdue University
Yossi Gilad, The Hebrew University of Jerusalem
Oana Goga, CNRS
André Grégio, Federal University of Paraná
Kathrin Grosse,
Daniel Gruss, Graz University of Technology
Marco Guarnieri, IMDEA Software Institute
Julie Haney, National Institute of Standards and Technology (NIST)
Shuang Hao, The University of Texas at Dallas
Hamza Harkous, Google
Behnaz Hassanshahi, Oracle Labs Australia
Julia Hesse, IBM Research - Zurich
Grant Ho, University of California, San Diego
Thorsten Holz, CISPA Helmholtz Center for Information Security
Sanghyun Hong, Oregon State University
Yuan Hong, Illinois Institute of Technology
Nicholas Hopper, University of Minnesota
Danny Yuxing Huang, New York University
Zhen Huang, DePaul University
Jun Ho Huh, Samsung Research
Alice Hutchings, University of Cambridge
Umar Iqbal, University of Washington
Cynthia Irvine, Naval Postgraduate School
Dennis Jackson, Mozilla
Rob Jansen, U.S. Naval Research Laboratory
Bargav Jayaraman, University of Virginia
Rikke Bjerg Jensen, Royal Holloway, University of London
Yuseok Jeon, Ulsan National Institute of Science and Technology (UNIST)
Aaron Johnson, U.S. Naval Research Laboratory
Dali Kaafar, Macquarie University
Gautam Kamath, University of Waterloo
Gabriel Kaptchuk, Boston University
Marcel Keller, CSIRO's Data61
Vasileios Kemerlis, Brown University
Florian Kerschbaum, University of Waterloo
Dmitry Khovratovich, Ethereum Foundation
Taegyu Kim, The Pennsylvania State University
Taesoo Kim, Georgia Institute of Technology and Samsung Research
Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
Sam King, University of California, Davis and Stripe
Lea Kissner, Lacework
Katharina Kohls, Radboud University
Tadayoshi Kohno, University of Washington
Boris Köpf, Microsoft Research
Kari Kostiainen, ETH Zurich
Platon Kotzias, Norton Research Group
Steve Kremer, Inria Nancy
Srikanth Krishnamurthy, University of California, Riverside
Joshua A. Kroll, Naval Postgraduate School
Katharina Krombholz, CISPA Helmholtz Center for Information Security
Pierre Laperdrix, CNRS
Kevin Leach, Vanderbilt University
Tancrède Lepoint, Amazon Web Services
Bo Li, University of Illinois at Urbana–Champaign
Ming Li, University of Arizona
Qi Li, Tsinghua University
David Lie, University of Toronto
Janne Lindqvist, Aalto University
Wouter Lueks, EPFL
Lannan Lisa Luo, University of South Carolina
Xiapu Luo, The Hong Kong Polytechnic University
Matteo Maffei, TU Wien
Nathan Malkin, University of Maryland
Stefan Mangard, Graz University of Technology
Michail Maniatakos, New York University Abu Dhabi
Athina Markopoulou, University of California, Irvine
Abigail Marsh, Macalester College
Ramya Jayaram Masti, Qualcomm
Arunesh Mathur, Competition and Markets Authority
Jonathan Mayer, Princeton University
René Mayrhofer, Johannes Kepler University Linz
Jon McCune, Google
Patrick McDaniel, University of Wisconsin—Madison
Allison McDonald, Boston University
Susan McGregor, Columbia University, Data Science Institute
Catherine Meadows, Naval Research Laboratory
Shagufta Mehnaz, Dartmouth College
Aastha Mehta, University of British Columbia, Vancouver
Sarah Meiklejohn, Google and University College London
Marcela Melara, Intel Labs
Nele Mentens, Leiden University and KU Leuven
Ariana Mirian, University of California, San Diego
Jelena Mirkovic, USC Information Sciences Institute
Omid Mirzaei, Elastic
Esfandiar Mohammadi, University of Luebeck
Mainack Mondal, Indian Institute of Technology, Kharagpur
Veelasha Moonsamy, Ruhr University Bochum
Pedro Moreno-Sanchez, IMDEA Software Institute
Marius Muench, Vrije Universiteit Amsterdam
Imani Munyaka, University of California, San Diego
Toby Murray, University of Melbourne
Adwait Nadkarni, College of William & Mary
Moses Namara, Clemson University
Shravan Ravi Narayan, University of California, San Diego
Shirin Nilizadeh, University of Texas at Arlington
Adam Oest, PayPal, Inc.
Oleksii Oleksenko, Microsoft Research
Jeremiah Onaolapo, University of Vermont
Cristina Onete, University of Limoges, XLIM, and CNRS
Rebekah Overdorf, University of Lausanne (UNIL)
Simon Oya, University of Waterloo
Miroslav Pajic, Duke University
Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
Dario Pasquini, EPFL
Andrew Paverd, Microsoft
Roberto Perdisci, University of Georgia and Georgia Institute of Technology
Amreesh Phokeer, Internet Society
Fabio Pierazzi, King's College London
Niels Provos, Stripe
Apostolos Pyrgelis, EPFL
Sazzadur Rahaman, University of Arizona
Amir Rahmati, Stony Brook University
Sara Rampazzi, University of Florida
Aanjhan Ranganathan, Northeastern University
Mariana Raykova, Google
Joel Reardon, University of Calgary
Bradley Reaves, North Carolina State University
Raphael Reischuk, Zuehlke and digitalswitzerland
Oscar Reparaz, CashApp (at Square)
Irwin Reyes, Two Six Technologies
Konrad Rieck, TU Braunschweig
Luc Rocher, University of Oxford
Florentin Rochet, University of Namur
Franziska Roesner, University of Washington
Eyal Ronen, Tel Aviv University
Stefanie Roos, TU Delft
Christian Rossow, CISPA Helmholtz Center for Information Security
Kevin Alejandro Roundy, Norton Research Group
Scott Ruoti, The University of Tennessee
Sherman S. M. Chow, The Chinese University of Hong Kong
Andrei Sabelfeld, Chalmers University of Technology
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Merve Sahin, SAP Security Research
Kazue Sako, Waseda University
Iskander Sanchez-Rola, Norton Research Group
Nuno Santos, INESC-ID / Instituto Superior Técnico, University of Lisbon
Igor Santos-Grueiro, Mondragon Unibertsitatea
Sarah Scheffler, Princeton University
Sebastian Schinzel, Münster University of Applied Sciences
Thomas Schneider, Technische Universität Darmstadt
Lea Schönherr, CISPA Helmholtz Center for Information Security
Michael Schwarz, CISPA Helmholtz Center for Information Security
Wendy Seltzer, W3C/Massachusetts Institute of Technology
Johanna Sepúlveda, Airbus Defence and Space
Hovav Shacham, The University of Texas at Austin
Mahmood Sharif, Tel Aviv University
Shweta Shinde, ETH Zurich
Anastasia Shuba, DuckDuckGo
Haya Shulman, ATHENE & Goethe-Universität Frankfurt & Fraunhofer SIT
Ilia Shumailov, University of Cambridge & Vector Institute
Manya Sleeper, Google
Peter Snyder, Brave Software
Sooel Son, Korea Advanced Institute of Science and Technology (KAIST)
Alessandro Sorniotti, IBM Research - Zurich
Michael Specter, Google
Emily Stark, Google
Deian Stefan, University of California, San Diego
Elizabeth Stobert, Carleton University
Ben Stock, CISPA Helmholtz Center for Information Security
Gianluca Stringhini, Boston University
Martin Strohmeier, Cyber-Defence Campus, armasuisse Science + Technology
Guillermo Suarez-Tangil, IMDEA Networks Institute
Juan Tapiador, UC3M
Vanessa Teague, Australian National University and Thinking Cybersecurity Pty Ltd
Stefano Tessaro, University of Washington
Yuan Tian, University of Virginia
Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Santiago Torres-Arias, Purdue University
Vincent Toubiana, CNIL
Benjamin E. Ujcich, Georgetown University
Blase Ur, University of Chicago
Anjo Vahldiek-Oberwagner, Intel Labs
Narseo Vallina-Rodriguez, IMDEA Networks/AppCensus
Thyla van der Merwe, Google
Michel van Eeten, Delft University of Technology
Mayank Varia, Boston University
Nikos Vasilakis, Brown University and Massachusetts Institute of Technology
Ingrid Verbauwhede, imec-COSIC Katholieke Universiteit Leuven
Luca Viganò, King's College London
Hayawardh Vijayakumar, Samsung Research America
Daniel Votipka, Tufts University
Satyanarayana Vusirikala, Dfinity Foundation
David Wagner, University of California, Berkeley
Cong Wang, City University of Hong Kong
Gang Wang, University of Illinois at Urbana–Champaign
Liang Wang, Princeton University
Shuai Wang, Hong Kong University of Science and Technology
Xiao Wang, Northwestern University
Rick Wash, Michigan State University
Christian Weinert, Royal Holloway, University of London
Tara Whalen, Cloudflare
Philipp Winter, Brave Software
Josephine Wolff, Tufts University
Christian Wressnegger, Karlsruhe Institute of Technology (KIT), KASTEL Security Research Labs
Matthew Wright, Rochester Institute of Technology
Jason (Minhui) Xue, CSIRO's Data61
Jie Yang, Florida State University
Yuval Yarom, The University of Adelaide
Savvas Zannettou, TU Delft
Daniel Zappala, Brigham Young University
Fengwei Zhang, Southern University of Science and Technology (SUSTech)
Yanchao Zhang, Arizona State University
Yuan Zhang, Fudan University
Yupeng Zhang, Texas A&M University
Haojin Zhu, Shanghai Jiao Tong University
Yixin Zou, University of Michigan and Max Planck Institute for Security and Privacy
Mary Ellen Zurko, MIT Lincoln Laboratory

Lightning Talks Chair

Imani Munyaka, University of California, San Diego

Poster Session Co-Chairs

Earlence Fernandes, University of Wisconsin—Madison
Rikke Bjerg Jensen, Royal Holloway, University of London

Test of Time Awards Committee

Dan Boneh, Stanford University
Srdjan Capkun, ETH Zurich
Lorrie Cranor, Carnegie Mellon University
Nick Feamster, University of Chicago
Kevin Fu, Northeastern University
Fabian Monrose, The University of North Carolina at Chapel Hill
David Wagner, University of California, Berkeley
Dan Wallach, Rice University
Wenyuan Xu, Zhejiang University

Steering Committee

Michael Bailey, University of Illinois at Urbana–Champaign
Matt Blaze, Georgetown University
Dan Boneh, Stanford University
Kevin Butler, University of Florida
Srdjan Capkun, ETH Zurich
William Enck, North Carolina State University
Kevin Fu, Northeastern University
Rachel Greenstadt, New York University
Casey Henderson, USENIX Association
Nadia Heninger, University of California, San Diego
Thorsten Holz, Ruhr-Universität Bochum
Engin Kirda, Northeastern University
Tadayoshi Kohno, University of Washington
Thomas Ristenpart, Cornell Tech
Franziska Roesner, University of Washington
Kurt Thomas, Google
Patrick Traynor, University of Florida
David Wagner, University of California, Berkeley

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.

  • System security
    • Operating systems security
    • Web security
    • Mobile systems security
    • Distributed systems security
    • Cloud computing security
  • Network security
    • Intrusion and anomaly detection and prevention
    • Network infrastructure security
    • Denial-of-service attacks and countermeasures
  • Wireless security
  • Security analysis
    • Malware analysis
    • Analysis of network and security protocols
    • Attacks with novel insights, techniques, or results
    • Forensics and diagnostics for security
    • Automated security analysis of hardware designs and implementation
    • Automated security analysis of source code and binaries
    • Program analysis
  • Machine learning security and privacy
    • Machine learning applications to security and privacy
    • Machine learning privacy issues and methods
    • Adversarial machine learning
  • Data-driven security and measurement studies
    • Measurements of fraud, malware, spam
    • Measurements of human behavior and security
  • Privacy
    • Privacy metrics
    • Anonymity
    • Web and mobile privacy
    • Privacy-preserving computation
    • Privacy attacks
  • Usable security and privacy
    • User studies related to security and privacy
    • Human-centered security and privacy design
  • Language-based security
  • Hardware security
    • Secure computer architectures
    • Embedded systems security
    • Methods for detection of malicious or counterfeit hardware
    • Side channels
  • Research on surveillance and censorship
  • Social issues and security
    • Research on computer security law and policy
    • Ethics of computer security research
    • Research on security education and training
    • Information manipulation, misinformation, and disinformation
    • Protecting and understanding at-risk users
    • Emerging threats, harassment, extremism, and online abuse
  • Applications of cryptography
    • Analysis of deployed cryptography and cryptographic protocols
    • Cryptographic implementation analysis
    • New cryptographic protocols with real-world applications

 

Refereed Papers

Papers that have been formally reviewed and accepted will be presented during the Symposium and published in the Symposium Proceedings. By submitting a paper, you agree that at least one of the authors will attend the conference to present it. Alternative arrangements will be made if global health concerns persist. If the conference registration fee will pose a hardship for the presenter of the accepted paper, please contact conference@usenix.org.

A major mission of the USENIX Association is to provide for the creation and dissemination of new knowledge. In keeping with this and as part of USENIX's open access policy, the Proceedings will be available online for registered attendees before the Symposium and for everyone starting on the opening day of the technical sessions. USENIX also allows authors to retain ownership of the copyright in their works, requesting only that USENIX be granted the right to be the first publisher of that work. See our sample consent form for the complete terms of publication.

Go to Paper Submission Policies and Instructions page for more information.

Artifact Evaluation

View the Call for Artifacts.

Symposium Activities

Invited Talks, Panels, Poster Session, Lightning Talks, and BoFs
In addition to the refereed papers and the keynote presentation, the technical program will include invited talks, panel discussions, a poster session, lightning talks, and Birds-of-a-Feather sessions (BoFs). You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program co-chairs at sec23chairs@usenix.org.

Invited Talks and Panel Discussions

Invited talks and panel discussions will be held in parallel with the refereed paper sessions. Please submit topic suggestions and talk and panel proposals via email to sec23it@usenix.org by January 31, 2023.

Poster Session

Would you like to share a provocative opinion, an interesting preliminary work, or a cool idea that will spark discussion at this year's USENIX Security Symposium? The poster session is the perfect venue to introduce such new or ongoing work (note that this year all poster submissions should present unpublished work). Poster presenters will have the entirety of the evening reception to discuss their work, get exposure, and receive feedback from attendees.

To submit a poster, please submit a draft of your poster, in PDF (maximum size 36" by 48"), or a one-page abstract via the poster session submission form by July 6, 2023. Decisions will be made by July 13, 2023. Posters will not be included in the proceedings but may be made available online if circumstances permit. Poster submissions must include the authors' names, affiliations, and contact information. At least one author of each accepted poster must register for and attend the Symposium to present the poster.

Lightning Talks

We will host a Lightning Talks session (also previously known as Work-in-Progress/Rump session) on the evening of Wednesday, August 9, 2023. This is intended as an informal session of short and engaging presentations on recent unpublished results, work in progress, or other topics of interest to USENIX Security attendees. As in the past, talks do not always need to be serious and funny talks are encouraged! For full consideration, submit your lightning talk via the lightning talk submission form, through Wednesday, July 26, 2023, 11:59 pm AoE. You can continue submitting talks via the submission form until Monday, August 7, 2023, 12:00 pm PDT. However, due to time, there is no guarantee of full consideration after the initial deadline.

Birds-of-a-Feather Sessions (BoFs)

Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on-site or in advance. To schedule a BoF, please send an email to the USENIX Conference Department at bofs@usenix.org with the title and a brief description of the BoF; the name, title, affiliation, and email address of the facilitator; and your preference of date and time.

Go to Paper Submission Policies and Instructions.