Call For Papers
13th USENIX Security Symposium

August 9-13, 2004
San Diego, CA

Deadline extended to 1 February 2004

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security of computer systems. The 13th USENIX Security Symposium will be held August 9-13, 2004 in San Diego, CA.

If you are working on any practical aspects of security or applications of cryptography, the program committee encourages you to submit a paper. Submissions are due at 23h59 (Pacific time) February 1, 2004 (this represents an extension of one week from the original deadline of January 25). The symposium will span five days: Two days of tutorials will be followed by a two and one half day technical program, which will include refereed papers, invited talks, work-in-progress reports, panel discussions, and birds-of-a-feather sessions.

Important Dates

Submissions Due: 1 February 2004 (Note extended deadline)
Notification to Authors: 31 March 2004
Camera-Ready Papers Due: 18 May 2004


Program Chair:
Matt Blaze, University of Pennsylvania

Program Committee:
Bill Aiello, AT&T Labs - Research
Tina Bird, Stanford University
Drew Dean, SRI International
Carl Ellison, Microsoft
Eu-Jin Goh, Stanford University
Sotiris Ioannidis, University of Pennsylvania
Angelos Keromytis, Columbia University
Patrick McDaniel, AT&T Labs - Research
Adrian Perrig, Carnegie Mellon University
Niels Provos, Google
Greg Rose, Qualcomm
Sean Smith, Dartmouth College
Leendert van Doorn, IBM Research
Paul van Oorschot, Carleton University
Dave Wagner, University of California, Berkeley
Rebecca Wright, Stevens Institute of Technology

Invited Talks Co-Chairs:
Vern Paxson, ICSI
Avi Rubin, Johns Hopkins University

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems and network security, including:

Note that USENIX Security is primarily a systems security conference. Papers whose contributions are primarily in the area of new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc, may not be appropriate for this conference.

Refereed Papers and Awards

Papers that have been formally reviewed and accepted will be presented during the symposium and published in the symposium proceedings. The proceedings will be distributed to attendees and, following the conference, will be available online to USENIX members and for purchase.

One author per accepted paper is offered a $200 discount against the registration fee; USENIX will waive the fee for presenters for whom it would present a hardship.

Awards may be given at the conference for the best overall paper and for the best paper that is primarily the work of a student.

Tutorials, Invited Talks, Panels, WiPs, and BoFs

In addition to the refereed papers and the keynote presentation, the technical program will include tutorials, invited talks, panel discussions, a Work-in-Progress session (WiPs), and Birds-of-a-Feather Sessions. You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program chair at


Tutorials for both technical staff and managers will provide immediately useful, practical information on topics such as local and network security precautions, what cryptography can and cannot do, security mechanisms and policies, firewalls, and monitoring systems. If you are interested in proposing a tutorial or suggesting a topic, contact the USENIX Tutorial Coordinator, Dan Klein, by email to

Invited Talks

There will be several outstanding invited talks in parallel with the refereed papers. Please submit topic suggestions and talk proposals via email to

Panel Discussions

The technical sessions may include topical panel discussions. Please send topic suggestions and proposals to

Work-in-Progress Reports (WiPs)

The last session of the symposium will be a Works-in-Progress session. This session will consist of short presentations about work-in-progress, new results, or timely topics. Speakers should submit a one- or two-paragraph abstract to by 18h00 (local conference time) on Wednesday, 11 August, 2004. Make sure to include your name, affiliation, and the title of your talk. The accepted abstracts will be posted on the symposium Web site after the symposium. The time available will be distributed among the presenters with each speaker allocated between 5 and 10 minutes. The time limit will be strictly enforced. The schedule of presentations will be posted at the symposium.

Birds-of-a-Feather Sessions (BoFs)

There will be Birds-of-a-Feather sessions (BoFs) Tuesday, Wednesday and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on-site, but if you wish to pre-schedule a BoF, please email the conference office, They will need the title of the BoF with a brief description, the name, title, affiliation, and email address of the facilitator, your preference of date, and whether an overhead projector and screen is desired.

Paper Submission Instructions

Papers should represent novel scientific contributions in computer security with direct relevance to the engineering of secure systems and networks. Submissions should be finished, complete papers. Papers should be about 8 to a maximum of 16 typeset pages (10 point type on 12 point leading). Submissions must be received by 23h59 (Pacific time) on 1 February, 2004 (note extended deadline).

Submissions will only be accepted electronically via the symposium Web form, and must be in PDF format (e.g., processed by Adobe's Acrobat Distiller or equivalent). Note that LaTeX users can use the "dvipdf" command to convert a DVI file into PDF format. Please make sure your submission can be opened using Adobe Acrobat 4.0. For more details on the submission process, authors are encouraged to consult the detailed author guidelines at

To ensure that we can read your PDF file, authors are urged to follow the NSF "Fastlane" guidelines for document preparation (, and to pay special attention to unusual fonts.

Papers should be submitted via the web submission system at, at or before the February 1 deadline.

All submissions will be judged on originality, relevance, and correctness. The USENIX Security Symposium, like most conferences and journals, requires that papers not be submitted simultaneously to another conference or publication and that submitted papers not be previously published elsewhere, or subsequently published within 12 months of acceptance at the Symposium. (We may share information about submissions with the program chairs of other conferences considering papers during the review period.) Papers accompanied by non-disclosure agreement forms will not be considered. All submissions are treated as confidential, both as a matter of policy and in accord with the U.S. Copyright Act of 1976.

Authors will be notified of acceptance by 31 March, 2004. The camera-ready final paper due date is 18 May, 2004. Each accepted submission may be assigned a member of the program committee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the committee to the authors.

Specific questions about submissions may be sent via e-mail to the program chair at

The current version of this call for papers can be found online at