(mobo import Concept___Events-migrated) |
Curator 75 (talk | contribs) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
|Acronym=USENIX-Security 2020 | |Acronym=USENIX-Security 2020 | ||
− | |Title= | + | |Title=Usenix Security Symposium |
+ | |Ordinal=29 | ||
+ | |In Event Series=Event Series:USENIX-Security | ||
+ | |Single Day Event=no | ||
+ | |Start Date=2020/08/12 | ||
+ | |End Date=2020/08/14 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=online | ||
+ | |Academic Field=System security | ||
+ | |Official Website=https://www.usenix.org/conference/usenixsecurity20 | ||
+ | |Hashtag=USENIX-Security 2020 | ||
|Type=Conference | |Type=Conference | ||
− | |||
− | |||
− | |||
|has program chair=Srdjan Capkun, Franziska Roesner | |has program chair=Srdjan Capkun, Franziska Roesner | ||
|pageCreator=User:Curator 89 | |pageCreator=User:Curator 89 | ||
|pageEditor=User:Curator 27 | |pageEditor=User:Curator 27 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Notification Deadline=2019/11/01 | ||
+ | |Submission Deadline=2019/12/02 | ||
+ | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=ETH Zurich | ||
+ | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=University of Washington | ||
+ | }} | ||
+ | {{Event Metric | ||
+ | |Number Of Submitted Papers=977 | ||
+ | |Number Of Accepted Papers=157 | ||
+ | }} | ||
+ | {{S Event}} | ||
Symposium Overview | Symposium Overview | ||
Line 27: | Line 45: | ||
Symposium Topics | Symposium Topics | ||
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to: | Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to: | ||
− | * | + | *System security |
− | * | + | *Operating systems security |
− | * | + | *Web security |
− | * | + | *Mobile systems security |
− | * | + | *Distributed systems security |
− | * | + | *Cloud computing security |
− | * | + | *Network security |
− | * | + | *Intrusion and anomaly detection and prevention |
− | * | + | *Network infrastructure security |
− | * | + | *Denial-of-service attacks and countermeasures |
− | * | + | *Wireless security |
− | * | + | *Security analysis |
− | * | + | *Malware analysis |
− | * | + | *Analysis of network and security protocols |
− | * | + | *Attacks with novel insights, techniques, or results |
− | * | + | *Forensics and diagnostics for security |
− | * | + | *Automated security analysis of hardware designs and implementation |
− | * | + | *Automated security analysis of source code and binaries |
− | * | + | *Program analysis |
− | * | + | *Data-driven security and measurement studies |
− | * | + | *Measurements of fraud, malware, spam |
− | * | + | *Measurements of human behavior and security |
− | * | + | *Privacy-enhancing technologies and anonymity |
− | * | + | *Usable security and privacy |
− | * | + | *Language-based security |
− | * | + | *Hardware security |
− | * | + | *Secure computer architectures |
− | * | + | *Embedded systems security |
− | * | + | *Methods for detection of malicious or counterfeit hardware |
− | * | + | *Side channels |
− | * | + | *Research on surveillance and censorship |
− | * | + | *Social issues and security |
− | * | + | *Research on computer security law and policy |
− | * | + | *Ethics of computer security research |
− | * | + | *Research on security education and training |
− | * | + | *Applications of cryptography |
− | * | + | *Analysis of deployed cryptography and cryptographic protocols |
− | * | + | *Cryptographic implementation analysis |
− | * | + | *New cryptographic protocols with real-world applications |
Latest revision as of 08:50, 8 November 2024
|
||
Notification |
|
||
Submission |
Symposium Overview
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 29th USENIX Security Symposium will be held August 12–14, 2020, in Boston, MA, USA.
Important: The USENIX Security Symposium moved to multiple submission deadlines last year and included changes to the review process and submission policies. Detailed information is available at USENIX Security Publication Model Changes.
All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 10 and 11.
Symposium Topics Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
- System security
- Operating systems security
- Web security
- Mobile systems security
- Distributed systems security
- Cloud computing security
- Network security
- Intrusion and anomaly detection and prevention
- Network infrastructure security
- Denial-of-service attacks and countermeasures
- Wireless security
- Security analysis
- Malware analysis
- Analysis of network and security protocols
- Attacks with novel insights, techniques, or results
- Forensics and diagnostics for security
- Automated security analysis of hardware designs and implementation
- Automated security analysis of source code and binaries
- Program analysis
- Data-driven security and measurement studies
- Measurements of fraud, malware, spam
- Measurements of human behavior and security
- Privacy-enhancing technologies and anonymity
- Usable security and privacy
- Language-based security
- Hardware security
- Secure computer architectures
- Embedded systems security
- Methods for detection of malicious or counterfeit hardware
- Side channels
- Research on surveillance and censorship
- Social issues and security
- Research on computer security law and policy
- Ethics of computer security research
- Research on security education and training
- Applications of cryptography
- Analysis of deployed cryptography and cryptographic protocols
- Cryptographic implementation analysis
- New cryptographic protocols with real-world applications