31st USENIX Security Symposium - August 10-12, 2022, Boston, MA, USA Sponsored by USENIX, the Advanced Computing Systems Association

Page created by Guy Bailey
 
CONTINUE READING
31st USENIX Security Symposium - August 10-12, 2022, Boston, MA, USA Sponsored by USENIX, the Advanced Computing Systems Association
Announcement and Call for Papers                                                                 www.usenix.org/sec22/cfp

31st USENIX Security Symposium
August 10–12, 2022, Boston, MA, USA
Sponsored by USENIX, the Advanced Computing Systems Association

The USENIX Security Symposium brings together researchers,           Winter Deadline
practitioners, system administrators, system programmers,            • Refereed paper submissions due: Tuesday, February 1, 2022,
and others interested in the latest advances in the security           11:59 pm AoE
and privacy of computer systems and networks. The 31st
USENIX Security Symposium will be held August 10–12, 2022,
                                                                     • Early reject notification: March 11, 2022
in Boston, MA.                                                       • Rebuttal Period: April 18–20, 2022
Important: The USENIX Security Symposium moved to multiple
                                                                     • Notification to authors: May 2, 2022
submission deadlines in 2019 and included changes to the review      • Final paper files due: June 14, 2022
process and submission policies. Detailed information is available
at USENIX Security Publication Model Changes.                        • Invited talk and panel proposals due: Tuesday, February 1, 2022
All researchers are encouraged to submit papers covering             • Poster proposals due: Wednesday, July 6, 2022
novel and scientifically significant practical works in computer         ° Notification to poster presenters: Wednesday, July 13, 2022
security. The Symposium will span three days with a technical        Conference Organizers
program including refereed papers, invited talks, posters, panel
discussions, and Birds-of-a-Feather sessions. Co-located events      Program Co-Chairs
will precede the Symposium on August 8 and 9.                        Kevin Butler, University of Florida
                                                                     Kurt Thomas, Google
Important Dates
                                                                     Program Committee
Summer Deadline                                                      Yousra Aafer, University of Waterloo
• Refereed paper submissions due: Tuesday, June 8, 2021,             Ruba Abu-Salma, King’s College London
  11:59 pm AoE                                                       Gunes Acar, Katholieke Universiteit Leuven
• Early reject notification: July 15, 2021                           Sadia Afroz, International Computer Science Institute (ICSI), Avast
• Rebuttal Period: August 23–25, 2021                                Devdatta Akhawe, Dropbox
• Notification to authors: September 3, 2021                         Daniel Alexander Zappala, Brigham Young University
• Final paper files due: October 5, 2021                             Ardalan Amiri Sani, University of California, Irvine
                                                                     Olabode Anise, Google
Fall Deadline
                                                                     Daniele Antonioli, EPFL, EURECOM
• Refereed paper submissions due: Tuesday, October 12, 2021,         Maria Apostolaki, ETH Zurich
  11:59 pm AoE
                                                                     Elias Athanasopoulos, University of Cyprus
• Early reject notification: November 20, 2021                       Davide Balzarotti, EURECOM
• Rebuttal Period: January 10–12, 2022                               Tiffany Bao, Arizona State University
• Notification to authors: January 20, 2022                          David Barrera, Carleton Univeristy
• Final paper files due: February 22, 2022                           Adam Bates, University of Illinois at Urbana–Champaign
                                                                     Lejla Batina, Radboud University
                                                                     Lujo Bauer, Carnegie Mellon University

                                                                                                                              Rev. 09/28/21
Jethro Beekman, Fortanix                                            Earlence Fernandes, University of Wisconsin—Madison
Antonio Bianchi, Purdue University                                  Domenic Forte, University of Florida
Battista Biggio, University of Cagliari                             Aurélien Francillon, EURECOM
Leyla Bilge, NortonLifeLock Research Group                          Michael Franz, University of California, Irvine
Vincent Bindschaedler, University of Florida                        Yanick Fratantonio, Cisco Talos
Priyam Biswas, Intel                                                David Freeman, Facebook
Marina Blanton, University at Buffalo                               Aymeric Fromherz, Inria
Erik-Oliver Blass, Airbus                                           Patrick Gage Kelley, Google
Tamara Bonaci, Northeastern University                              Eva Galperin, Electronic Frontier Foundation
Joseph Bonneau, New York University                                 Vinod Ganapathy, Indian Institute of Science (IISc)
Glencora Borradaile, Oregon State University                        Christina Garman, Purdue University
Marcus Botacin, Federal University of Paraná                        Carrie Gates, Bank of America
Ioana Boureanu, University of Surrey                                Genevieve Gebhart, University of Washington Information School
Nathan Burow, MIT Lincoln Laboratory                                Daniel Genkin, University of Michigan
Joseph Calandrino, Federal Trade Commission                         Ryan Gerdes, Virginia Tech
Stefano Calzavara, Università Ca’ Foscari Venezia                   Arthur Gervais, Imperial College London
Yinzhi Cao, Johns Hopkins University                                Irene Giacomelli, Protocol Labs
Srdjan Capkun, ETH Zurich                                           Yossi Gilad, The Hebrew University of Jerusalem
Alvaro Cardenas, University of California, Santa Cruz               Neil Gong, Duke University
Nicholas Carlini, Google                                            Tyrone Grandison, The Data-Driven Institute
Lorenzo Cavallaro, University College London                        Daniel Gruss, Graz University of Technology
Z. Berkay Celik, Purdue University                                  Guofei Gu, Texas A&M University
Sang Kil Cha, Korea Advanced Institute of Science and               Le Guan, University of Georgia
   Technology (KAIST)                                               Shuang Hao, The University of Texas at Dallas
Neha Chachra, Facebook                                              Wajih Ul Hassan, University of Illinois at Urbana–Champaign
Rahul Chatterjee, University of Wisconsin—Madison                   Christophe Hauser, USC/Information Sciences Institute
Sze Yiu Chau, The Chinese University of Hong Kong                   Xiali Hei, University of Louisiana at Lafayette
Kai Chen, Institute of Information Engineering, Chinese Academy     Grant Hernandez, Qualcomm
   of Sciences                                                      Matthew Hicks, Virginia Tech
Qi Alfred Chen, University of California, Irvine                    Ralph Holz, University of Twente
Yizheng Chen, Columbia University                                   Thorsten Holz, Ruhr University Bochum
Sherman S. M. Chow, The Chinese University of Hong Kong             Nick Hopper, University of Minnesota
Amrita Roy Chowdhury, University of Wisconsin—Madison               Diane Hosfelt, Apple
Nicolas Christin, Carnegie Mellon University                        Syed Rafiul Hussain, The Pennsylvania State University
Chitchanok Chuengsatiansup, The University of Adelaide              Luca Invernizzi, Google
Camille Cobb, Carnegie Mellon University                            Sotiris Ioannidis, Technical University of Crete
Shaanan Cohney, Princeton University and University of Melbourne    Cynthia Irvine, Naval Postgraduate School
Andrea Continella, University of Twente                             Suman Jana, Columbia University
Cas Cremers, CISPA Helmholtz Center for Information Security        Ramya Jayaram Masti, Intel
Bruno Crispo, University of Trento                                  Yuseok Jeon, UNIST (Ulsan National Institute of Science
Weidong Cui, Microsoft Research                                        and Technology)
Anupam Das, North Carolina State University                         Yier Jin, University of Florida
Pubali Datta, University of Illinois at Urbana–Champaign            Brent Byunghoon Kang, Korea Advanced Institute of Science
Nathan Dautenhahn, Rice University                                     and Technology (KAIST)
Alexandra Dmitrienko, University of Wuerzburg                       Chris Kanich, University of Illinois at Chicago
Adam Doupe, Arizona State University                                Apu Kapadia, Indiana University Bloomington
Tudor Dumitras, University of Maryland                              Alexandros Kapravelos, North Carolina State University
Zakir Durumeric, Stanford University                                Vasileios Kemerlis, Brown University
Manuel Egele, Boston University                                     Florian Kerschbaum, University of Waterloo
Thomas Eisenbarth, University of Lübeck                             Taesoo Kim, Georgia Institute of Technology
Mary Ellen Zurko, MIT Lincoln Laboratory                            Yongdae Kim, Korea Advanced Institute of Science and
Mohamed Elsabagh, Kryptowire                                           Technology (KAIST)
Pardis Emami-Naeini, University of Washington                       Sam King, University of California, Davis and Bouncer Technologies
William Enck, North Carolina State University                       Michel Kinsy, TAMU
Roya Ensafi, University of Michigan                                 Engin Kirda, Northeastern University
Birhanu Eshete, University of Michigan                              Katharina Kohls, Radboud University
Saba Eskandarian, The University of North Carolina at Chapel Hill   Tadayoshi Kohno, University of Washington
Sascha Fahl, CISPA Helmholtz Center for Information Security        Kari Kostiainen, ETH Zurich
Kassem Fawaz, University of Wisconsin—Madison                       Srikanth Krishnamurthy, University of California, Riverside
Yunsi Fei, Northeastern University                                  Joshua A Kroll, Naval Postgraduate School
Katharina Krombholz, CISPA Helmholtz Center for                      Paul Pearce, Georgia Institute of Technology, International
    Information Security                                                 Computer Science Institute (ICSI)
Christopher Kruegel, University of California, Santa Barbara         Giancarlo Pellegrino, CISPA Helmholtz Center for
Deepak Kumar, Stanford University                                        Information Security
Anil Kurmus, IBM Research Europe                                     Roberto Perdisci, University of Georgia and Georgia Institute
Andrea Lanzi, University of Milan                                        of Technology
Pavel Laskov, University of Liechtenstein                            Radia Perlman, Dell EMC
Byoungyoung Lee, Seoul National University                           Peter Peterson, University of Minnesota
Kyu Hyung Lee, University of Georgia                                 Fabio Pierazzi, King’s College London
Sangho Lee, Microsoft Research                                       Christina Poepper, New York University Abu Dhabi
Wenke Lee, Georgia Institute of Technology                           Niels Provos, Stripe
Tancrède Lepoint, Google                                             Amir Rahmati, Stony Brook University
Ada Lerner, Wellesley College                                        Jeyavijayan Rajendran, Texas A&M University
Frank Li, Georgia Institute of Technology                            Sara Rampazzi, University of Florida
Qi Li, Tsinghua University                                           Mariana Raykova, Google
Tianshi Li, Carnegie Mellon University                               Joel Reardon, University of Calgary
David Lie, University of Toronto                                     Bradley Reaves, North Carolina State University
Zhiqiang Lin, Ohio State University                                  Elissa Redmiles, Max Planck Institute for Software Systems
                                                                         (MPI-SWS)
Martina Lindorfer, TU Wien
                                                                     Michael K. Reiter, Duke University
Guyue Liu, Carnegie Mellon University
                                                                     Konrad Rieck, Technische Universität Braunschweig
Kangjie Lu, University of Minnesota
                                                                     William Robertson, Northeastern University
Wouter Lueks, EPFL
                                                                     Franziska Roesner, University of Washington
Xiapu Luo, The Hong Kong Polytechnic University
                                                                     Eyal Ronen, Tel Aviv University
Matteo Maffei, TU Wien
                                                                     Stefanie Roos, TU Delft
Stefan Mangard, Graz University of Technology
                                                                     Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Mohammad Mannan, Concordia University
                                                                     Brendan Saltaformaggio, Georgia Institute of Technology
Ivan Martinovic, Oxford University
                                                                     Nitesh Saxena, University of Alabama at Birmingham
Michelle Mazurek, University of Maryland
                                                                     Sebastian Schinzel, Münster University of Applied Sciences
Patrick McDaniel, The Pennsylvania State University
                                                                     Michael Schwarz, CISPA Helmholtz Center for Information Security
Shagufta Mehnaz, Dartmouth College
                                                                     Jörg Schwenk, Ruhr University Bochum
Aastha Mehta, University of British Columbia, Vancouver
                                                                     Wendy Seltzer, W3C and Massachusetts Institute of Technology
Sarah Meiklejohn, University College London and Google
                                                                     Johanna Sepulveda, Airbus
Marcela Melara, Intel Labs
                                                                     Mahmood Sharif, Tel Aviv University and VMware
Nele Mentens, Leiden University and Katholieke Universiteit Leuven
                                                                     Imani N. Sherman, University of Florida
Jiang Ming, The University of Texas at Arlington
                                                                     Shweta Shinde, ETH Zurich
Ariana Mirian, University of California, San Diego
                                                                     Fatemeh Shirazi, Web3 Foundation
Jelena Mirkovic, University of Southern California
                                                                     Maliheh Shirvanian, Visa Research
Daniel Moghimi, University of California, San Diego
                                                                     Yan Shoshitaishvili, Arizona State University
Esfandiar Mohammadi, University of Lübeck
                                                                     Haya Shulman, Fraunhofer SIT
Mainack Mondal, Indian Institute of Technology, Kharagpur
                                                                     Peter Snyder, Brave Browser
Soo-Jin Moon, Google
                                                                     Sooel Son, Korea Advanced Institute of Science and
Veelasha Moonsamy, Ruhr University Bochum                                Technology (KAIST)
Thomas Moyer, University of North Carolina                           Chengyu Song, University of California, Riverside
Marius Muench, Vrije Universiteit Amsterdam                          Alessandro Sorniotti, IBM Research Europe
Takao Murakami, AIST                                                 Kyle Soska, University of Illinois at Urbana–Champaign
Toby Murray, University of Melbourne                                 Michael Specter, Massachusetts Institute of Technology
Nick Nikiforakis, Stony Brook University                             Drew Springall, Auburn University
Anita Nikolich, University of Illinois at Urbana–Champaign           Jessica Staddon, JPMorgan Chase
Shirin Nilizadeh, The University of Texas at Arlington               Emily Stark, Google
Adam Oest, PayPal                                                    Angelos Stavrou, Virginia Tech
Hamed Okhravi, MIT Lincoln Laboratory                                Deian Stefan, University of California, San Diego
Melek Önen, EURECOM                                                  Ben Stock, CISPA Helmholtz Center for Information Security
Cristina Onete, University of Limoges/XLIM/CNRS 7252                 Gianluca Stringhini, Boston University
Yossi Oren, Ben-Gurion University of the Negev                       Yixin Sun, University of Virginia
Rebekah Overdorf, EPFL                                               Yuqiong Sun, Facebook
Miroslav Pajic, Duke University                                      Qiang Tang, The University of Sydney
Dimitrios Papadopoulos, The Hong Kong University of Science          Dave ( Jing) Tian, Purdue University
    and Technology
                                                                     Yuan Tian, University of Virginia
Bryan Parno, Carnegie Mellon University
                                                                     Nils Ole Tippenhauer, CISPA Helmholtz Center for
Mathias Payer, EPFL                                                      Information Security
Alin Tomescu, VMware Research                                    Symposium Topics
Shruti Tople, Microsoft Research                                 Refereed paper submissions are solicited in all areas relating
Santiago Torres-Arias, Purdue University                         to systems research in security and privacy, including but not
Florian Tramèr, Stanford University                              limited to:
Patrick Traynor, University of Florida
Carmela Troncoso, EPFL
                                                                 • System security
                                                                       ° Operating systems security
Güliz Seray Tuncay, Google
Selcuk Uluagac, Florida International University                       ° Web security
Blase Ur, University of Chicago                                        ° Mobile systems security
Anjo Vahldiek-Oberwagner, Intel Labs                                   ° Distributed systems security
Michel van Eeten, Delft University of Technology                       ° Cloud computing security
Mayank Varia, Boston University                                  • Network security
Ingrid Verbauwhede, Katholieke Universiteit Leuven                     ° Intrusion and anomaly detection and prevention
Luca Viganò, King’s College London                                     ° Network infrastructure security
Hayawardh Vijayakumar, Samsung Research America                        ° Denial-of-service attacks and countermeasures
Bimal Viswanath, Virginia Tech                                         ° Wireless security
Daniel Votipka, Tufts University
David Wagner, University of California, Berkeley
                                                                 • Security   analysis
                                                                       ° Malware     analysis
Michael Waidner, Technische Universität Darmstadt
                                                                       ° Analysis of network and security protocols
Gang Wang, University of Illinois at Urbana–Champaign
Ting Wang, The Pennsylvania State University                           ° Attacks with novel insights, techniques, or results
XiaoFeng Wang, Indiana University Bloomington                          ° Forensics and diagnostics for security
Michael Weissbacher, Square, Inc.                                      ° Automated security analysis of hardware designs and
                                                                         implementation
Tara Whalen, Carleton University
Christian Wressnegger, Karlsruhe Institute of Technology (KIT)         ° Automated security analysis of source code and binaries
Matthew Wright, Rochester Institute of Technology                      ° Program analysis
Eric Wustrow, University of Colorado Boulder                     • Machine learning security and privacy
Jason (Minhui) Xue, The University of Adelaide                   • Data-driven security and measurement studies
Daphne Yao, Virginia Tech                                              ° Measurements of fraud, malware, spam
Yuval Yarom, The University of Adelaide and Data61                     ° Measurements of human behavior and security
Tuba Yavuz, University of Florida                                • Privacy-enhancing technologies and anonymity
Yanfang (Fanny) Ye, Case Western Reserve University
Heng Yin, University of California, Riverside
                                                                 • Usable security and privacy
Qiang Zeng, University of South Carolina
                                                                 • Language-based security
Sarah Zennou, Airbus
                                                                 • Hardware security
Fengwei Zhang, Southern University of Science and                      ° Secure computer architectures
   Technology (SUSTech)                                                ° Embedded systems security
Xiangyu Zhang, Purdue University                                       ° Methods for detection of malicious or counterfeit
Yang Zhang, CISPA Helmholtz Center for Information Security              hardware
Yuan Zhang, Fudan University                                           ° Side channels
Wenting Zheng, Carnegie Mellon University                        • Research on surveillance and censorship
Yajin Zhou, Zhejiang University                                  • Social issues and security
Haojin Zhu, Shanghai Jiao Tong University                              ° Research on computer security law and policy
Steering Committee                                                     ° Ethics of computer security research
Michael Bailey, University of Illinois at Urbana–Champaign             ° Research on security education and training
Matt Blaze, University of Pennsylvania                                 ° Information manipulation, misinformation, and
Dan Boneh, Stanford University                                           disinformation
Srdjan Capkun, ETH Zurich                                              ° Protecting and understanding at-risk users
William Enck, North Carolina State University                          ° Emerging threats, harassment, extremism, and
Kevin Fu, University of Michigan                                         online abuse
Rachel Greenstadt, New York University                           • Applications    of cryptography
Casey Henderson, USENIX Association                                    ° Analysis    of deployed cryptography and cryptographic
Nadia Heninger, University of California, San Diego                      protocols
Thorsten Holz, Ruhr-Universität Bochum                                 ° Cryptographic implementation analysis
Engin Kirda, Northeastern University
                                                                       ° New cryptographic protocols with real-world
Tadayoshi Kohno, University of Washington                                applications
Thomas Ristenpart, Cornell Tech                                  This topic list is not meant to be exhaustive; USENIX Security is
Franziska Roesner, University of Washington                      interested in all aspects of computing systems security and pri-
Patrick Traynor, University of Florida                           vacy. Papers without a clear application to security or privacy of
David Wagner, University of California, Berkeley                 computing systems, however, will be considered out of scope
                                                                 and may be rejected without full review.
Refereed Papers                                                       Lightning Talks
Papers that have been formally reviewed and accepted will             Information about lightning talks will be available soon.
be presented during the Symposium and published in the
                                                                      Birds-of-a-Feather Sessions (BoFs)
Symposium Proceedings. By submitting a paper, you agree
that at least one of the authors will attend the conference to        Birds-of-a-Feather sessions (BoFs) will be held Tuesday,
present it. Alternative arrangements will be made if global           Wednesday, and Thursday evenings. Birds-of-a-Feather
health concerns persist. If the conference registration fee will      sessions are informal gatherings of persons interested in a
pose a hardship for the presenter of the accepted paper,              particular topic. BoFs often feature a presentation or a demon-
please contact conference@usenix.org.                                 stration followed by discussion, announcements, and the shar-
                                                                      ing of strategies. BoFs can be scheduled on-site or in advance.
A major mission of the USENIX Association is to provide for the       To schedule a BoF, please send an email to the USENIX Confer-
creation and dissemination of new knowledge. In keeping with          ence Department at bofs@usenix.org with the title and a brief
this and as part of USENIX’s open access policy, the Proceed-         description of the BoF; the name, title, affiliation, and email
ings will be available online for registered attendees before the     address of the facilitator; and your preference of date and time.
Symposium and for everyone starting on the opening day of the
technical sessions. USENIX also allows authors to retain owner-       Submission Policies
ship of the copyright in their works, requesting only that USENIX     Important: The USENIX Security Symposium moved to multiple
be granted the right to be the first publisher of that work. See      submission deadlines in 2019 and included changes to the review
our sample consent form at www.usenix.org/sample_consent_             process and submission policies. Detailed information is available
form.pdf for the complete terms of publication.                       at USENIX Security Publication Model Changes at www.usenix.org/
Go to Paper Submission Policies and Instructions page at www.         conference/usenixsecurity22/publication-model-change.
usenix.org/conference/usenixsecurity22/submission-policies-           USENIX Security ’22 submissions deadlines are as follows:
and-instructions for more information.
                                                                      • Summer Deadline: Tuesday, June 8, 2021, 11:59 pm AoE
Artifact Evaluation                                                   • Fall Deadline: Tuesday, October 12, 2021, 11:59 pm AoE
The Call for Artifacts will be available soon.                        • Winter Deadline: Tuesday, February 1, 2022, 11:59 pm AoE
                                                                      All papers that are accepted by the end of the winter submis-
Symposium Activities                                                  sion reviewing cycle (February–May 2022) will appear in the
Invited Talks, Panels, Poster Session, Lightning Talks, and BoFs      proceedings for USENIX Security ’22. All submissions will be
In addition to the refereed papers and the keynote presenta-          made online via their respective web forms, linked from the
tion, the technical program will include invited talks, panel         USENIX Security ’22 Call for Papers web page: Summer Dead-
discussions, a poster session, and Birds-of-a-Feather sessions        line, Fall Deadline, Winter Deadline. Do not email submissions.
(BoFs). You are invited to make suggestions regarding topics          Submissions should be finished, complete papers, and we
or speakers in any of these sessions via email to the contacts        may reject papers without review that have severe editorial
listed below or to the program co-chairs at sec22chairs@              problems (broken references, egregious spelling or grammar
usenix.org.                                                           errors, missing figures, etc.) or are submitted in violation of the
                                                                      Submission Instructions outlined below.
Invited Talks and Panel Discussions
Invited talks and panel discussions will be held in parallel with     All paper submissions, including Major Revisions, should be at
the refereed paper sessions. Please submit topic suggestions          most 13 typeset pages, excluding bibliography and well-marked
and talk and panel proposals via email to sec22it@usenix.org          appendices. These appendices may be included to assist
by February 1, 2022.                                                  reviewers who may have questions that fall outside the stated
                                                                      contribution of the paper on which your work is to be evaluated
Poster Session                                                        or to provide details that would only be of interest to a small
Would you like to share a provocative opinion, an interesting         minority of readers. There is no limit on the length of the bibli-
preliminary work, or a cool idea that will spark discussion at this   ography and appendices but reviewers are not required to read
year’s USENIX Security Symposium? The poster session is the           any appendices so the paper should be self-contained without
perfect venue to introduce such new or ongoing work. Poster           them. Once accepted, papers must be reformatted to fit in 18
presenters will have the entirety of the evening reception to         pages, including the bibliography and any appendices.
discuss their work, get exposure, and receive feedback from           Papers should be typeset on U.S. letter-sized pages in two-
attendees.                                                            column format in 10-point Times Roman type on 12-point
To submit a poster, please submit a draft of your poster, in          leading (single-spaced), in a text block 7” x 9” deep. Authors are
PDF (maximum size 36” by 48”), or a one-page abstract via             encouraged to make use of USENIX’s LaTeX template and style
the poster session submission form, linked from the USENIX            files available at www.usenix.org/paper-templates when pre-
Security ’22 Call for Papers web page, by July 6, 2022. Decisions     paring your paper for submission. Failure to adhere to the page
will be made by July 13, 2022. Posters will not be included in the    limit and formatting requirements can be grounds for rejection.
proceedings but may be made available online if circumstances         Papers should not attempt to “squeeze space” by exploiting
permit. Poster submissions must include the authors’ names,           underspecified formatting criteria (e.g., columns) or through
affiliations, and contact information. At least one author of         manipulating other document properties (e.g., page layout,
each accepted poster must register for and attend the Sympo-          spacing, fonts, figures and tables, headings). Papers that, in the
sium to present the poster.                                           chair’s assessment, make use of these techniques to receive an
                                                                      unfair advantage, will be rejected, even if they comply with the
                                                                      above specifications.
Please make sure your paper successfully returns from the            • Authors should carefully review figures and appendices
PDF checker (visible upon PDF submission) and that document            (especially survey instruments) to ensure affiliations are not
properties, such as font size and margins, can be verified via         accidentally included.
PDF editing tools such as Adobe Acrobat. Papers where the            • When referring to your previous work, do so in the third
chairs can not verify compliance with the CFP will be rejected.        person, as though it were written by someone else. Only
                                                                       blind the reference itself in the (unusual) case that a third-
Prepublication of Papers
                                                                       person reference is infeasible.
Prepublication versions of papers accepted for USENIX Secu-
rity ’22 will be published and open and accessible to everyone       • Authors may include links to websites that contain source
                                                                       code, tools, or other supplemental material. Neither the
without restrictions on the following dates:
                                                                       link in the paper nor the website itself should contain the
• Summer Deadline: Tuesday, November 9, 2021                           authors’ names or affiliations.
• Fall Deadline: Tuesday, April 5, 2022                              Papers that are not properly anonymized may be rejected
• Winter Deadline: TBD (final papers will be published with the      without review.
  full conference proceedings)                                       While submitted papers must be anonymous, authors may
Embargo Requests                                                     choose to give talks about their work, post a preprint of the
Authors may request an embargo for their papers by the dead-         paper online, disclose security vulnerabilities to vendors or the
line dates listed below. All embargoed papers will be released       public, etc. during the review process.
on the first day of the conference, Wednesday, August 10, 2022.      Facebook Internet Defense Prize
• Summer Deadline: Tuesday, November 2, 2021                         The Internet Defense Prize recognizes and rewards research
• Fall Deadline: Tuesday, March 29, 2022                             that meaningfully makes the internet more secure. Created in
• Winter Deadline: Tuesday, July 12, 2022                            2014, the award is funded by Facebook and offered in partner-
                                                                     ship with USENIX to celebrate contributions to the protection
Conflicts of Interest                                                and defense of the internet. Successful recipients of the Inter-
The program co-chairs require cooperation from both authors          net Defense Prize will provide a working prototype that demon-
and program committee members to prevent submissions                 strates significant contributions to the security of the internet,
from being evaluated by reviewers who have a conflict of             particularly in the areas of prevention and defense. This award
interest. During the submission process, we will ask authors to      is meant to recognize the direction of the research and not
identify members of the program committee with whom they             necessarily its progress to date. The intent of the award is to
share a conflict of interest. This includes: (1) anyone who shares   inspire researchers to focus on high-impact areas of research.
an institutional affiliation with an author at the time of submis-
                                                                     You may submit your USENIX Security ’22 paper submission for
sion, (2) anyone who was the advisor or advisee of an author at
                                                                     consideration for the Prize as part of the regular submission
any time in the past, (3) anyone the author has collaborated or
                                                                     process. Find out more about the Internet Defense Prize at
published within the prior two years, (4) anyone who is serv-
                                                                     www.internetdefenseprize.org.
ing as the sponsor or administrator of a grant that funds your
research, or (5) close personal friendships. For other forms         Human Subjects and Ethical Considerations
of conflict, authors must contact the chairs and explain the         Submissions that describe experiments on human subjects,
perceived conflict.                                                  that analyze data derived from human subjects (even anony-
Program committee members who are conflicts of interest with         mized data), or that otherwise may put humans at risk should:
a paper, including program co-chairs, will be excluded from              1. Disclose whether the research received an approval or
both online and in-person evaluation and discussion of the                  waiver from each of the authors’ institutional ethics review
paper by default.                                                           boards (e.g., an IRB).
Early Rejection Notification                                             2. Discuss steps taken to ensure that participants and others
The review process will consist of several reviewing rounds. In             who might have been affected by an experiment were
order to allow authors time to improve their work and submit                treated ethically and with respect.
to other venues, authors of submissions for which there is a         If the submission deals with vulnerabilities (e.g., software
consensus on rejection will be notified earlier.                     vulnerabilities in a given program or design weaknesses in a
                                                                     hardware system), the authors need to discuss in detail the
Author Responses                                                     steps they have already taken or plan to take to address these
Authors of papers that have not been rejected early will have        vulnerabilities (e.g., by disclosing vulnerabilities to the vendors).
an opportunity to respond to an initial round of reviews. We en-     The same applies if the submission deals with personally
courage authors to focus on questions posed by reviewers and         identifiable information (PII) or other kinds of sensitive data. If
significant factual corrections. Once reviews are released to        a paper raises significant ethical and legal concerns, it might be
authors for rebuttal, we will not process requests to withdraw       rejected based on these concerns.
the paper and the paper will be viewed as under submission
                                                                     Contact the program co-chairs at sec22chairs@usenix.org if
until the end of the cycle.
                                                                     you have any questions.
Anonymous Submission
The review process will be double-blind. Papers must be
submitted in a form suitable for anonymous review:
• The title page should not contain any author names or
  affiliations.
Reviews from Prior Submissions                                        Note that under the changes to the USENIX Security publication
Drawn from the ACM CCS 2020 CFP, IEEE S&P 2021                        model, papers that have received a decision of Major Revisions
For papers that were previously submitted to, and rejected            from USENIX Security are still considered to be under review
from, another conference, authors are required to submit a            for the following two review cycles after notification; authors
separate document containing the prior reviews along with a           must formally withdraw their paper if they wish to submit to
description of how those reviews were addressed in the current        another venue. See USENIX Security Publication Model Changes
version of the paper. Authors are only required to include re-        at www.usenix.org/conference/usenixsecurity22/publication-
views from the last time the paper was submitted. This includes       model-change for details. For submissions that received Reject
withdrawn papers (if reviews were received) as well as papers         or Reject and Resubmit decisions from USENIX Security ’21,
whose last submission was at USENIX. Reviewers will be asked          resubmissions must follow the rules laid out for when they can
to complete their reviews before reading the provided supple-         be resubmitted (i.e., not in the next deadline for Reject and
mentary material to avoid being biased in formulating their own       Resubmit, and not in the next two deadlines for Reject).
opinions; once their reviews are complete, however, reviewers         Questions? Contact your program co-chairs, sec22chairs@
will be given the opportunity to provide additional comments          usenix.org, or the USENIX office, submissionspolicy@usenix.org.
based on the submission history of the paper. Authors who try
                                                                      The program committee and external reviewers are required to
to circumvent this rule (e.g., by changing the title of the paper
                                                                      treat all submissions as confidential. However, the program co-
without significantly changing the contents) may have their
                                                                      chairs or designated committee members may share submis-
papers rejected without further consideration, at the discretion
                                                                      sions outside the program committee to allow chairs of other
of the PC chairs.
                                                                      conferences to identify dual submissions.
Submission Instructions                                               Papers that do not comply with the submission requirements,
All submissions will be made online via their respective web          including length and anonymity, that do not comply with
forms. Do not email submissions. Submissions must be in PDF           resubmission policies, or that do not have a clear application
format. LaTeX users can use the “pdflatex” command to convert         to security or privacy may be rejected without review. Papers
a LaTeX document into PDF format. Please make sure your sub-          accompanied by nondisclosure agreement forms will not be
mission can be opened using Adobe Reader. Please also make            considered.
sure your submission, and all embedded figures, are intelligible      Each accepted submission may be assigned a member of the
when printed in grayscale.                                            program committee to act as its shepherd through the prepa-
For resubmissions of Major Revisions, authors must submit a           ration of the final paper. The assigned member will act as a
separate PDF that includes the verbatim Major Revision criteria,      conduit for feedback from the committee to the authors.
a list of changes to the paper, and a statement of how the            All papers will be available online before the symposium. If your
changes address the review comments. While not required,              accepted paper should not be published prior to the event,
authors are strongly encouraged to submit as part of the PDF a        please notify production@usenix.org after you submit your
“PDF ‘diff’” to assist reviewers in identifying your modifications.   final paper. See the Embargo Requests section for deadlines.
For papers that were previously submitted to, and rejected
from, another conference, the required document (see Reviews          Specific questions about submissions may be sent to the
from Prior Submissions above) should be submitted as a PDF            program co-chairs at sec22chairs@usenix.org. The chairs will
file using the “Prior Reviews” field in the submission forms, not     respond to individual questions about the submission process
via an appendix.                                                      if contacted at least a week before the submission deadline.

All submissions will be judged on originality, relevance, cor-
rectness, and clarity. In addition to citing relevant published
work, authors should relate their submission to any other
relevant submissions of theirs in other venues that are under
review at the same time as their submission to the Symposium.
These citations to simultaneously submitted papers should be
anonymized; non-anonymous versions of these citations must,
however, be emailed to the program co-chairs at sec22chairs@
usenix.org. Simultaneous submission of the same work to
multiple venues, submission of previously published work, or
plagiarism constitutes dishonesty or fraud. Failure to point out
and explain overlap will be grounds for rejection. USENIX, like
other scientific and technical conferences and journals, prohib-
its these practices and may take action against authors who
have committed them. See the USENIX Conference Submissions
Policy at www.usenix.org/submissions-policy for details.
You can also read