USENIX Security '12: 21st USENIX Security Symposium
Hyatt Regency Bellevue in Bellevue, WA, August 8-10, 2012
Event Website:

Join us in Bellevue, WA, August 8-10, 2012, for the 21st USENIX Security Symposium. The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks.

The Symposium will span three days, with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Workshops will precede the symposium on August 6 and 7. Co-located workshops include:

5th Workshop on Cyber Security Experimentation and Test (CSET '12)
3rd USENIX Workshop on Health Security and Privacy (HealthSec '12)

The USENIX Security Symposium brings together researchers, practitio-
ners, system administrators, system programmers, and others interested
in the latest advances in the security of computer systems and networks.
The 21st USENIX Security Symposium will be held August 8–10, 2012, in
Bellevue, WA.
All researchers are encouraged to submit papers covering novel and
scientifically significant practical works in computer security. Submissions
are due on Thursday, February 16, 2012, 11:59 p.m. PST. The Symposium
will span three days, with a technical program including refereed papers,
invited talks, posters, panel discussions, and Birds-of-a-Feather sessions.
Workshops will precede the symposium on August 6 and 7.
Symposium Topics
Refereed paper submissions are solicited in all areas relating to systems
and network security, including:
 o 	 Analysis of network and security protocols
 o 	 Applications of cryptographic techniques
 o 	 Attacks with novel insights, techniques, or results
 o 	 Authentication and authorization of users, systems, and applications
 o 	 Automated tools for source code analysis
 o 	 Botnets
 o 	 Cryptographic implementation analysis and construction
 o 	 Denial-of-service attacks and countermeasures
 o 	 Embedded systems security
 o 	 File and filesystem security
 o 	 Forensics and diagnostics for security
 o 	 Hardware security
 o 	 Human-computer interaction, security, and privacy
 o 	 Intrusion and anomaly detection and prevention
 o 	 Malicious code analysis, anti-virus, anti-spyware
 o 	 Mobile system security
 o 	 Network infrastructure security
 o 	 Operating system security
 o 	 Privacy-enhancing technologies
 o 	 Security architectures
 o 	 Security education and training
 o 	 Security for critical infrastructures
 o 	 Security in heterogeneous and large-scale environments
 o 	 Security in ubiquitous computing environments
 o 	 Security policy
 o 	 Self-protecting and self-healing systems
 o 	 Techniques for developing secure systems
 o 	 Technologies for trustworthy computing
 o 	 Wireless security
 o 	 Web security, including client-side and server-side security
The USENIX Security Symposium is primarily a systems security
conference. Papers whose contributions are primarily new cryptographic
algorithms or protocols, cryptanalysis, electronic commerce primitives,
etc., may not be appropriate for this conference.
Program committee members are limited to being authors or co-
authors of at most two paper submissions. The program chair is not
permitted to be author or co-author of any paper submissions.

Refereed Papers
Papers that have been formally reviewed and accepted will be presented
during the Symposium and published in the Symposium Proceedings. It
is expected that one of the paper authors will attend the conference and
present the work. It is the responsibility of the authors to find a suitable
replacement presenter for their work, if the need arises.
A registration discount will be available for one author per paper. If
the registration fee poses a hardship to the presenter, USENIX will offer
complimentary registration.
The Proceedings will be available online for registered attendees
before the Symposium and for everyone starting on the opening day of
the technical sessions. Attendees may choose also to receive a USB drive
pre-loaded with the Proceedings.

Invited Talks, Panels, Poster Session, Rump Session, and BoFs
In addition to the refereed papers and the keynote presentation, the
technical program will include invited talks, panel discussions, a Poster
Session, and Birds-of-a-Feather sessions (BoFs). You are invited to
make suggestions regarding topics or speakers in any of these sessions
via email to the contacts listed below or to the program chair at

Invited Talks
Invited talks will be held in parallel with the refereed paper sessions.
Please submit topic suggestions and talk proposals via email to sec12it@ by Thursday, February 16, 2012, 11:59 p.m. PST.

Panel Discussions
The technical sessions may include topical panel discussions. Please send
topic suggestions and proposals to The deadline
for panel proposals is Friday, April 6, 2012, 11:59 p.m. PDT.

Poster Session
Would you like to share a provocative opinion, interesting preliminary
work, or a cool idea that will spark discussion at this year's USENIX Se-
curity Symposium? The poster session is the perfect venue to introduce
such new or ongoing work. Poster presenters will have the entirety of
the evening reception to discuss their work, get exposure, and receive
feedback from attendees.

To submit a poster, please submit a draft of your poster, in PDF
(maximum size 36" by 48"), or a one-page abstract via the poster ses-
sion submission form, which will be available here soon, by July 2, 2012,
11:59 p.m. PDT. Decisions will be made by July 12, 2012. Posters will
not be included in the proceedings but may be made available online
if circumstances permit. Poster submissions must include the authors'
names, affiliations, and contact information. At least one author of each
accepted poster must register for and attend the Symposium to present
the poster.

Rump Session
We will host a rump session on the evening of Wednesday, August 8,
2012. This is intended as an informal session for short and engaging
presentations on recent unpublished results, work in progress, or other
topics of interest to the USENIX Security attendees. As in the past, talks
do not always need to be serious. To submit a rump session talk, email by Wednesday, August 8, 2012, at 11:59 a.m.

Birds-of-a-Feather Sessions (BoFs)
Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday, and
Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of
persons interested in a particular topic. BoFs often feature a presentation
or a demonstration followed by discussion, announcements, and the
sharing of strategies. BoFs can be scheduled on-site or in advance. To
preschedule a BoF, please send email to the USENIX Conference Depart-
ment at with the title and a brief description of the
BoF; the name, title, affiliation, and email address of the facilitator; and
your preference of date and time.

How and Where to Submit Refereed Papers
Important: Note that some past USENIX Security Symposiums have had
different anonymity policies and page limits.
Papers are due by Thursday, February 16, 2012, at 11:59 p.m. PST (firm
deadline). All submissions will be made online via a Web form on the
Call for Papers Web site, Submissions
should be finished, complete papers.

Paper submissions should at most 13 typeset pages, excluding bibli-
ography and well-marked appendices. There is no limit on the length of
the bibliography and appendices, but reviewers are not required to read
them. Once accepted, papers must be reformatted to fit in 16 pages,
including bibliography and any appendices. The submission must be for-
matted in 2 columns, using 10 point Times Roman type on 12 point lead-
ing, in a text block of 6.5" by 9", on 8.5"x11" (letter-sized) paper. If you
wish, please make use of the LaTex file and style file available at when preparing your paper for submission.
Paper submissions must be submitted in a form suitable for anony-
mous review: no author names or affiliations may appear on the title
page, and authors should avoid revealing their identity in the text. When
referring to your previous work, do so in the third person, as though
it were written by someone else. Only blind the reference itself in the
(unusual) case that a third-person reference is infeasible. Contact the
program chair at if you have any questions.
Papers that do not comply with the submission requirements, includ-
ing length and anonymity, may be rejected without review.

Submissions must be in PDF format. LaTeX users can use the "pdflatex"
command to convert a LaTeX document into PDF format. Please make sure
your submission can be opened using Adobe Reader. Please also make
sure your submission, and all embedded figures, are intelligible when
printed in grayscale.

All submissions will be judged on originality, relevance, correctness,
and clarity. In addition to citing relevant published work, authors should
relate their submission to any other relevant submissions of theirs in
other venues that are under review at the same time as their submission
to the Symposium. These citations to simultaneously submitted papers
should be anonymized; non-anonymous versions of these citations must,
however, be emailed to the program chair at

Simultaneous submission of the same work to multiple venues,
submission of previously published work, or plagiarism constitutes
dishonesty or fraud. USENIX, like other scientific and technical
conferences and journals, prohibits these practices and may take
action against authors who have committed them. See the USENIX
Conference Submissions Policy at

Questions? Contact your program chair,, or the
USENIX office,

Papers accompanied by nondisclosure agreement forms will not be
considered. Accepted submissions will be treated as confidential prior to
publication on the USENIX Security '12 Web site; rejected submissions
will be permanently treated as confidential.

Authors will be notified of acceptance by Tuesday, April 24, 2012.
The final paper due date is Tuesday, June 19, 2012 (firm deadline). Each
accepted submission may be assigned a member of the program com-
mittee to act as its shepherd through the preparation of the final paper.
The assigned member will act as a conduit for feedback from the com-
mittee to the authors.

All papers will by default be available online to registered attendees
before the symposium. If your accepted paper should not be published
prior to the event, please notify The papers
will be available online to everyone beginning on the first day of the
symposium, August 8, 2012.

Specific questions about submissions may be sent to the program
chair at

Sponsorship Opportunities
Interested in sponsoring USENIX Security '12? Contact

Program and Registration Information
Complete program and registration information will be available in May
2012 on the conference Web site. If you would like to receive the latest
USENIX conference information, please join our mailing list at

Important Dates
Paper submissions due: Thursday, February 16, 2012, 11:59 p.m. PST
	 (firm deadline)
Invited talk proposals due: Thursday, February 16, 2012, 11:59 p.m. PST
Panel proposals due: Friday, April 6, 2012, 11:59 p.m. PDT
Notification to authors: Tuesday, April 24, 2012
Final papers due: Tuesday, June 19, 2012, 11:59 p.m. PDT (firm deadline)
Poster proposals due: Monday, July 2, 2012, 11:59 p.m. PDT
Notification to poster presenters: Thursday, July 12, 2012
Rump session submissions due: Wednesday, August 8, 2012,
	 11:59 a.m. PDT

Symposium Organizers
Program Chair
Tadayoshi Kohno, University of Washington
Program Committee
Ben Adida, Mozilla
Nikita Borisov, University of Illinois at Urbana-Champaign
David Brumley, Carnegie Mellon University
Kelly Caine, Indiana University
Srdjan Capkun, ETH
Sonia Chiasson, Carleton University
Mihai Christodorescu, IBM T.J. Watson Research Center
Anupam Datta, Carnegie Mellon University
David Evans, University of Virginia
Kevin Fu, University of Massachusetts Amherst
Carrie Gates, CA Technologies
Roxana Geambasu, Columbia University
Ian Goldberg, University of Waterloo
Matthew Green, Johns Hopkins University
Urs Hengartner, University of Waterloo
Jaeyeon Jung, Microsoft Research
Sam King, University of Illinois at Urbana-Champaign
Engin Kirda, Northeastern University
Christian Kreibich, International Computer Science Institute
Kirill Levchenko, University of California, San Diego
David Lie, University of Toronto
Jonathan McCune, Carnegie Mellon University
David Molnar, Microsoft Research
Alex Moshchuk, Microsoft Research
Steven Murdoch, University of Cambridge
Cristina Nita-Rotaru, Purdue University
Niels Provos, Google
Vitaly Shmatikov, University of Texas, Austin
Diana Smetters, Google
Patrick Traynor, Georgia Institute of Technology
Giovanni Vigna, University of California, Santa Barbara
Dan Wallach, Rice University
Invited Talks Committee
David Evans, University of Virginia
David Molnar, Microsoft Research
Bruce Potter, Ponte Technologies
Margo Seltzer, Harvard School of Engineering and Applied Sciences
	 and Oracle
Poster Session Chair
Matt Bishop, University of California, Davis
Rump Session Chair
Matt Blaze, University of Pennsylvania