| |||||||||||||||
USENIX Security 2014 : 23rd USENIX Security Symposium | |||||||||||||||
Link: https://www.usenix.org/conference/usenixsecurity14 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Symposium Overview
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 23rd USENIX Security Symposium will be held August 20-22, 2014, in San Diego, CA. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. Submissions are due on February 27, 2014. The Symposium will span three days, with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Workshops will precede the Symposium on August 18 and 19. Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to: Cloud computing security Cryptographic implementation analysis and construction, applied cryptography Distributed systems security Forensics and diagnostics for security Hardware security Embedded systems security Methods for detection of malicious or counterfeit hardware Randomness Secure computer architectures Side channels Human-computer interaction, security, and privacy Intrusion and anomaly detection and prevention Malware Detection, mitigation Malicious code analysis, anti-virus, anti-spyware Mobile system security Network security Botnets Denial-of-service attacks and countermeasures Network infrastructure security Operating system security Privacy-enhancing technologies, anonymity Programming language security Public good Research on computer security law and policy Research on security education and training Research on social values, surveillance, and censorship Security analysis Analysis of network and security protocols Attacks with novel insights, techniques, or results Security applications Security in critical infrastructures Security in electronic voting Security in health care and medicine Security in ubiquitous computing, sensors, actuators Security economics, electronic commerce Security measurement studies Large-scale measurement of fraud, malware, spam Large-scale measurement of human behavior and security Security tools Automated security analysis of hardware designs and implementation Automated security analysis of source code and binaries, program analysis Novel tools to improve the trustworthiness of computer systems Storage security Database security and privacy File systems Web security Wireless security This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review. The program chair is not permitted to be author or co-author of any paper submissions. |
|