Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
- System security
- Operating systems security
- Web security
- Mobile systems security
- Distributed systems security
- Cloud computing security
- Network security
- Intrusion and anomaly detection and prevention
- Network infrastructure security
- Denial-of-service attacks and countermeasures
- Wireless security
- Cryptographic implementation analysis and construction
- Applied cryptography
- Security analysis
- Malware analysis
- Analysis of network and security protocols
- Attacks with novel insights, techniques, or results
- Forensics and diagnostics for security
- Automated security analysis of hardware designs and implementation
- Automated security analysis of source code and binaries
- Program analysis
- Data-driven security and measurement studies
- Measurements of fraud, malware, spam
- Measurements of human behavior and security
- Privacy-enhancing technologies and anonymity
- Usable security and privacy
- Language-based security
- Hardware security
- Secure computer architectures
- Embedded systems security
- Methods for detection of malicious or counterfeit hardware
- Side channels
- Research on surveillance and censorship
- Social issues and security
- Research on computer security law and policy
- Ethics of computer security research
- Research on security education and training
This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.