The 32nd USENIX Security Symposium will take place on August 9–11, 2023, at the Anaheim Marriott in Anaheim, CA, USA. The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
1.会议信息
会议介绍: 第32届USENIX安全研讨会将于2023年8月9日至11日在美国加利福尼亚州阿纳海姆的阿纳海姆万豪酒店举行。USENIX安全研讨会汇集了研究人员、实践者、系统管理员、系统程序员和其他对计算机系统 和网络的安全和隐私方面的最新进展感兴趣的人。
会议全称: Usenix Security Symposium
会议网址: https://www.usenix.org/conference/usenixsecurity23
会议地点: ANAHEIM, CA, USA
CCF分类: A 类
Core分类: A* 类
H5指数: 80
影响力值: 13.04
录取率: USENIX Security’22 17.2% (256/1492)
2.时间节点
What When Refereed paper submissions dueRefereed paper submissions due Tuesday, February 7, 2023, 11:59 pm AoE Early reject notification March 17, 2023 Rebuttal Period April 24–26, 2023 Notification to authors May 8, 2023 May 8, 2023 June 13, 2023
3.论文主题
System security Operating systems security Web security Mobile systems security Distributed systems security Cloud computing security Network security Intrusion and anomaly detection and prevention Network infrastructure security Denial-of-service attacks and countermeasures Wireless security Security analysis Malware analysis Analysis of network and security protocols Attacks with novel insights, techniques, or results Forensics and diagnostics for security Automated security analysis of hardware designs and implementation Automated security analysis of source code and binaries Program analysis Machine learning security and privacy Machine learning applications to security and privacy Machine learning privacy issues and methods Adversarial machine learning Data-driven security and measurement studies Measurements of fraud, malware, spam Measurements of human behavior and security Privacy Privacy metrics Anonymity Web and mobile privacy Privacy-preserving computation Privacy attacks Usable security and privacy User studies related to security and privacy Human-centered security and privacy design Language-based security Hardware security Secure computer architectures Embedded systems security Methods for detection of malicious or counterfeit hardware Side channels Research on surveillance and censorship Social issues and security Research on computer security law and policy Ethics of computer security research Research on security education and training Information manipulation, misinformation, and disinformation Protecting and understanding at-risk users Emerging threats, harassment, extremism, and online abuse Applications of cryptography Analysis of deployed cryptography and cryptographic protocols Cryptographic implementation analysis New cryptographic protocols with real-world applications