The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security of computer systems. The 13th USENIX Security Symposium will be held August 9-13, 2004 in San Diego, CA.
If you are working on any practical aspects of security or
applications of cryptography, the program committee encourages you to
submit a paper. Submissions are due at 23h59 (Pacific time) February
1, 2004 (this represents an extension of one week from the original
deadline of January 25). The symposium will span five days: Two days
of tutorials will be followed by a two and one half day technical program,
which will include refereed papers, invited talks, work-in-progress reports,
panel discussions, and birds-of-a-feather sessions.
Submissions Due: 1 February 2004 (Note extended
Notification to Authors: 31 March 2004
Camera-Ready Papers Due: 18 May 2004
Matt Blaze, University of Pennsylvania
Bill Aiello, AT&T Labs - Research
Tina Bird, Stanford University
Drew Dean, SRI International
Carl Ellison, Microsoft
Eu-Jin Goh, Stanford University
Sotiris Ioannidis, University of Pennsylvania
Angelos Keromytis, Columbia University
Patrick McDaniel, AT&T Labs - Research
Adrian Perrig, Carnegie Mellon University
Niels Provos, Google
Greg Rose, Qualcomm
Sean Smith, Dartmouth College
Leendert van Doorn, IBM Research
Paul van Oorschot, Carleton University
Dave Wagner, University of California, Berkeley
Rebecca Wright, Stevens Institute of Technology
Invited Talks Co-Chairs:
Vern Paxson, ICSI
Avi Rubin, Johns Hopkins University
Refereed paper submissions are solicited in all areas relating to systems and network security, including:
Note that USENIX Security is primarily a systems security conference.
Papers whose contributions are primarily in the area of new
cryptographic algorithms or protocols, cryptanalysis, electronic
commerce primitives, etc, may not be appropriate for this conference.
Papers that have been formally reviewed and accepted will be presented during the symposium and published in the symposium proceedings. The proceedings will be distributed to attendees and, following the conference, will be available online to USENIX members and for purchase.
One author per accepted paper is offered a $200 discount against the registration fee; USENIX will waive the fee for presenters for whom it would present a hardship.
Awards may be given at the conference for the best overall paper and
for the best paper that is primarily the work of a student.
In addition to the refereed papers and the keynote presentation, the technical program will include tutorials, invited talks, panel discussions, a Work-in-Progress session (WiPs), and Birds-of-a-Feather Sessions. You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program chair at firstname.lastname@example.org.
Tutorials for both technical staff and managers will provide
immediately useful, practical information on topics such as local
and network security precautions, what cryptography can and cannot
do, security mechanisms and policies, firewalls, and monitoring
systems. If you are interested in proposing a tutorial or suggesting
a topic, contact the USENIX Tutorial Coordinator, Dan Klein, by
There will be several outstanding invited talks in parallel with the
refereed papers. Please submit topic suggestions and talk proposals
via email to
The technical sessions may include topical panel discussions.
Please send topic suggestions and proposals to
The last session of the symposium will be a Works-in-Progress
session. This session will consist of short presentations about
work-in-progress, new results, or timely topics. Speakers should
submit a one- or two-paragraph abstract to
by 18h00 (local conference time) on Wednesday, 11 August, 2004. Make
sure to include your name, affiliation, and the title of your
talk. The accepted abstracts will be posted on the symposium Web site
after the symposium. The time available will be distributed among the
presenters with each speaker allocated between 5 and 10 minutes. The
time limit will be strictly enforced. The schedule of presentations
will be posted at the symposium.
There will be Birds-of-a-Feather sessions (BoFs) Tuesday, Wednesday
and Thursday evenings. Birds-of-a-Feather sessions are informal
gatherings of persons interested in a particular topic. BoFs often
feature a presentation or a demonstration followed by discussion,
announcements, and the sharing of strategies. BoFs can be scheduled
on-site, but if you wish to pre-schedule a BoF, please email the
They will need the title of the BoF with a brief description, the
name, title, affiliation, and email address of the facilitator, your
preference of date, and whether an overhead projector and screen is
Papers should represent novel scientific contributions in computer security with direct relevance to the engineering of secure systems and networks. Submissions should be finished, complete papers. Papers should be about 8 to a maximum of 16 typeset pages (10 point type on 12 point leading). Submissions must be received by 23h59 (Pacific time) on 1 February, 2004 (note extended deadline).
Submissions will only be accepted electronically via the symposium Web
form, and must be in PDF format (e.g., processed by Adobe's Acrobat
Distiller or equivalent). Note that LaTeX users can use the "dvipdf"
command to convert a DVI file into PDF format. Please make sure your
submission can be opened using Adobe Acrobat 4.0. For more details on
the submission process, authors are encouraged to consult the detailed
author guidelines at
To ensure that we can read your PDF file, authors are urged to follow
the NSF "Fastlane" guidelines for document preparation
(http://www.fastlane.nsf.gov/a1/pdfcreat.htm), and to pay
special attention to unusual fonts.
Papers should be submitted via the web submission system at
at or before the February 1 deadline.
All submissions will be judged on originality, relevance, and correctness. The USENIX Security Symposium, like most conferences and journals, requires that papers not be submitted simultaneously to another conference or publication and that submitted papers not be previously published elsewhere, or subsequently published within 12 months of acceptance at the Symposium. (We may share information about submissions with the program chairs of other conferences considering papers during the review period.) Papers accompanied by non-disclosure agreement forms will not be considered. All submissions are treated as confidential, both as a matter of policy and in accord with the U.S. Copyright Act of 1976.
Authors will be notified of acceptance by 31 March, 2004. The camera-ready final paper due date is 18 May, 2004. Each accepted submission may be assigned a member of the program committee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the committee to the authors.
Specific questions about submissions may be sent via e-mail to
the program chair at
The current version of this call for papers can be found online at