Conference Information
Security 2026: USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity26
Submission Date:
2026-01-29
Notification Date:
Conference Date:
2026-08-12
Location:
Baltimore, Maryland, USA
Years:
35
CCF: a   CORE: a*   QUALIS: a1   Viewed: 253976   Tracked: 288   Attend: 16

Call For Papers
Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review at the discretion of the chairs.

    System security
        Operating systems security
        Distributed systems security
        Cloud computing security
    Network security
        Intrusion and anomaly detection and prevention
        Network infrastructure security
        Denial-of-service attacks and countermeasures
        Wireless security
        Analysis of network and security protocols
    Security and Privacy for Web, Mobile, and Emerging Technologies
        Web
        Mobile
        IoT
        VR/AR
        Games
    Software Security
        Malware analysis
        Forensics and diagnostics for security
        Automated security analysis of source code and binaries
        Program analysis
        Fuzzing and vulnerability discovery
    Security of ML
        Read this entire section to prevent desk rejection
        USENIX Security is a systems security venue. ML-focused contributions must be relevant to the broader systems security community
        This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a security task. Such papers should select the topic most closely related to the task.
    Privacy of ML
        Read this entire section to prevent desk rejection
        USENIX Security is a systems security venue. ML-focused contributions must be relevant to the broader systems security community
        This topic is not meant for papers that propose/evaluate/improve ML-based techniques for a privacy task. Such papers should select the topic most closely related to the task.
    Privacy and Anonymity
        Privacy metrics
        Anonymity
        Privacy-preserving computation
        Privacy attacks
        Surveillance and censorship
    Human Aspects
        Usable security and privacy
        Security and privacy law, policy, and/or ethics
        Security education and training
        Understanding, measuring, quantifying, and protecting users from: information manipulation, mis/disinformation, harassment, extremism, and abuse via qualitative and quantitative methods
    Hardware security
        Secure computer architectures
        Embedded systems security
        Cyber-physical systems security
        Methods for detection of malicious or counterfeit hardware
        Side channels
        Automated security analysis of hardware designs and implementation
    Applications of cryptography
        Analysis of deployed cryptography and cryptographic protocols
        Cryptographic implementation analysis
        New cryptographic protocols with real-world applications
        Blockchains and distributed ledger security
Last updated by Dou Sun in 2025-10-02
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
2021131624618.7%
202097715716.1%
201972911315.5%
201852410019.1%
20175228516.3%
20164637215.6%
20154266715.7%
20143506719.1%
20132774516.2%
20122224319.4%
20112043517.2%
20102023014.9%
20091762614.8%
20081702715.9%
20071872312.3%
20061792212.3%
20051482214.9%
20041842212%
20031282116.4%
20021302216.9%
2001832428.9%
Best Papers
YearBest Papers
2019Users Really Do Answer Telephone Scams
2019Detecting and Characterizing Lateral Phishing at Scale
2019Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors
2019Protecting accounts from credential stuffing with password breach alerting
201950 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System
2019ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
2018NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
2018Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies
2018QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
2018Fear the Reaper: Characterization and Fast Detection of Card Skimmers
2018The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
2017MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
2017Detecting Credential Spearphishing in Enterprise Settings
2017Loophole: Timing Attacks on Shared Event Loops in Chrome
2017A Longitudinal, End-to-End View of the DNSSEC Ecosystem
2017CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
2017Vale: Verifying High-Performance Cryptographic Assembly Code
2012Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider
2012Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
2010Capsicum: Practical Capabilities for UNIX
2010VEX: Vetting Browser Extensions for Security Vulnerabilities
2008Highly Predictive Blacklisting
2008Lest We Remember: Cold Boot Attacks on Encryption Keys
2007Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks
2006Evaluating SFI for a CISC Architecture
2006Keyboards and Covert Channels
2005Mapping Internet Sensors with Probe Response Attacks
2005Security Analysis of a Cryptographically-Enabled RFID Device
2004Understanding Data Lifetime via Whole System Simulation
2004Fairplay—A Secure Two-Party Computation System
2003Remote Timing Attacks Are Practical
2003Establishing the Genuinity of Remote Computer Systems
2002Security in Plan 9
2002Infranet: Circumventing Web Censorship and Surveillance
2001The Dos and Don'ts of Client Authentication on the Web
2001Inferring Internet Denial-of-Service Activity
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
bNSSInternational Conference on Network and System Security2023-03-032023-05-052023-08-14
cbb1SOUPSInternational Symposium On Usable Privacy and Security2025-02-132025-05-122025-08-10
ccNSPWNew Security Paradigms Workshop2025-04-252025-05-302025-08-24
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
aaa1USENIX ATCUSENIX Annual Technical Conference2025-07-07
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
aa*a1SecurityUSENIX Security Symposium2026-01-292026-08-12
Related Journals
CCFFull NameImpact FactorPublisherISSN
Network SecurityElsevier1353-4858
Journal of Internet SecurityDDSecure.Net Inc.1206-4890
InfosecurityElsevier1754-4548
ACM Transactions on Privacy and Security3.000ACM2471-2566
cIET Information Security1.300IET1751-8709
International Journal of Information Security2.400Springer1615-5262
bJournal of Computer SecurityIOS Press0926-227X
cEURASIP Journal on Information Security2.500Springer1687-417X
bComputers & Security5.4Elsevier0167-4048
ElectricityMDPI2673-4826