31st USENIX Security Symposium - August 10-12, 2022, Boston, MA, USA Sponsored by USENIX, the Advanced Computing Systems Association

Page created by Guy Bailey
 
CONTINUE READING
31st USENIX Security Symposium - August 10-12, 2022, Boston, MA, USA Sponsored by USENIX, the Advanced Computing Systems Association
Announcement and Call for Papers                                                                 www.usenix.org/sec22/cfp

31st USENIX Security Symposium
August 10–12, 2022, Boston, MA, USA
Sponsored by USENIX, the Advanced Computing Systems Association

The USENIX Security Symposium brings together researchers,           Winter Deadline
practitioners, system administrators, system programmers,            • Refereed paper submissions due: Tuesday, February 1, 2022,
and others interested in the latest advances in the security           11:59 pm AoE
and privacy of computer systems and networks. The 31st
USENIX Security Symposium will be held August 10–12, 2022,
                                                                     • Early reject notification: March 11, 2022
in Boston, MA.                                                       • Rebuttal Period: April 18–20, 2022
Important: The USENIX Security Symposium moved to multiple
                                                                     • Notification to authors: May 2, 2022
submission deadlines in 2019 and included changes to the review      • Final paper files due: June 14, 2022
process and submission policies. Detailed information is available
at USENIX Security Publication Model Changes.                        • Invited talk and panel proposals due: Tuesday, February 1, 2022
All researchers are encouraged to submit papers covering             • Poster proposals due: Wednesday, July 6, 2022
novel and scientifically significant practical works in computer         ° Notification to poster presenters: Wednesday, July 13, 2022
security. The Symposium will span three days with a technical        Conference Organizers
program including refereed papers, invited talks, posters, panel
discussions, and Birds-of-a-Feather sessions. Co-located events      Program Co-Chairs
will precede the Symposium on August 8 and 9.                        Kevin Butler, University of Florida
                                                                     Kurt Thomas, Google
Important Dates
                                                                     Program Committee
Summer Deadline                                                      Yousra Aafer, University of Waterloo
• Refereed paper submissions due: Tuesday, June 8, 2021,             Ruba Abu-Salma, King’s College London
  11:59 pm AoE                                                       Gunes Acar, Katholieke Universiteit Leuven
• Early reject notification: July 15, 2021                           Sadia Afroz, International Computer Science Institute (ICSI), Avast
• Rebuttal Period: August 23–25, 2021                                Devdatta Akhawe, Dropbox
• Notification to authors: September 3, 2021                         Daniel Alexander Zappala, Brigham Young University
• Final paper files due: October 5, 2021                             Ardalan Amiri Sani, University of California, Irvine
                                                                     Olabode Anise, Google
Fall Deadline
                                                                     Daniele Antonioli, EPFL, EURECOM
• Refereed paper submissions due: Tuesday, October 12, 2021,         Maria Apostolaki, ETH Zurich
  11:59 pm AoE
                                                                     Elias Athanasopoulos, University of Cyprus
• Early reject notification: November 20, 2021                       Davide Balzarotti, EURECOM
• Rebuttal Period: January 10–12, 2022                               Tiffany Bao, Arizona State University
• Notification to authors: January 20, 2022                          David Barrera, Carleton Univeristy
• Final paper files due: February 22, 2022                           Adam Bates, University of Illinois at Urbana–Champaign
                                                                     Lejla Batina, Radboud University
                                                                     Lujo Bauer, Carnegie Mellon University

                                                                                                                              Rev. 09/24/21
Jethro Beekman, Fortanix                                           Aurélien Francillon, EURECOM
Antonio Bianchi, Purdue University                                 Michael Franz, University of California, Irvine
Battista Biggio, University of Cagliari                            Yanick Fratantonio, Cisco Talos
Leyla Bilge, NortonLifeLock Research Group                         David Freeman, Facebook
Vincent Bindschaedler, University of Florida                       Patrick Gage Kelley, Google
Priyam Biswas, Intel                                               Eva Galperin, Electronic Frontier Foundation
Marina Blanton, University at Buffalo                              Vinod Ganapathy, Indian Institute of Science (IISc)
Tamara Bonaci, Northeastern University                             Christina Garman, Purdue University
Joseph Bonneau, New York University                                Carrie Gates, Bank of America
Glencora Borradaile, Oregon State University                       Genevieve Gebhart, University of Washington Information School
Marcus Botacin, Federal University of Paraná                       Daniel Genkin, University of Michigan
Ioana Boureanu, University of Surrey                               Ryan Gerdes, Virginia Tech
Nathan Burow, MIT Lincoln Laboratory                               Arthur Gervais, Imperial College London
Joseph Calandrino, Federal Trade Commission                        Irene Giacomelli, Protocol Labs
Stefano Calzavara, Università Ca’ Foscari Venezia                  Yossi Gilad, The Hebrew University of Jerusalem
Yinzhi Cao, Johns Hopkins University                               Neil Gong, Duke University
Srdjan Capkun, ETH Zurich                                          Tyrone Grandison, The Data-Driven Institute
Alvaro Cardenas, University of California, Santa Cruz              Daniel Gruss, Graz University of Technology
Nicholas Carlini, Google                                           Guofei Gu, Texas A&M University
Lorenzo Cavallaro, University College London                       Le Guan, University of Georgia
Z. Berkay Celik, Purdue University                                 Shuang Hao, The University of Texas at Dallas
Sang Kil Cha, Korea Advanced Institute of Science and Technology   Wajih Ul Hassan, University of Illinois at Urbana–Champaign
(KAIST)                                                            Christophe Hauser, USC/Information Sciences Institute
Neha Chachra, Facebook                                             Xiali Hei, University of Louisiana at Lafayette
Rahul Chatterjee, University of Wisconsin—Madison                  Grant Hernandez, Qualcomm
Sze Yiu Chau, The Chinese University of Hong Kong                  Matthew Hicks, Virginia Tech
Kai Chen, Institute of Information Engineering, Chinese Academy    Ralph Holz, University of Twente
of Sciences                                                        Thorsten Holz, Ruhr University Bochum
Qi Alfred Chen, University of California, Irvine                   Nick Hopper, University of Minnesota
Yizheng Chen, Columbia University                                  Diane Hosfelt, Apple
Sherman S. M. Chow, The Chinese University of Hong Kong            Syed Rafiul Hussain, The Pennsylvania State University
Amrita Roy Chowdhury, University of Wisconsin—Madison              Luca Invernizzi, Google
Nicolas Christin, Carnegie Mellon University                       Sotiris Ioannidis, Technical University of Crete
Chitchanok Chuengsatiansup, The University of Adelaide             Cynthia Irvine, Naval Postgraduate School
Camille Cobb, Carnegie Mellon University                           Suman Jana, Columbia University
Shaanan Cohney, Princeton University and University of Melbourne   Ramya Jayaram Masti, Intel
Andrea Continella, University of Twente                            Yuseok Jeon, UNIST (Ulsan National Institute of Science and
Cas Cremers, CISPA Helmholtz Center for Information Security       Technology)
Bruno Crispo, University of Trento                                 Yier Jin, University of Florida
Weidong Cui, Microsoft Research                                    Brent Byunghoon Kang, Korea Advanced Institute of Science and
Anupam Das, North Carolina State University                        Technology (KAIST)
Pubali Datta, University of Illinois at Urbana–Champaign           Chris Kanich, University of Illinois at Chicago
Nathan Dautenhahn, Rice University                                 Apu Kapadia, Indiana University Bloomington
Alexandra Dmitrienko, University of Wuerzburg                      Alexandros Kapravelos, North Carolina State University
Adam Doupe, Arizona State University                               Vasileios Kemerlis, Brown University
Tudor Dumitras, University of Maryland                             Florian Kerschbaum, University of Waterloo
Zakir Durumeric, Stanford University                               Taesoo Kim, Georgia Institute of Technology
Manuel Egele, Boston University                                    Yongdae Kim, Korea Advanced Institute of Science and Technology
Thomas Eisenbarth, University of Lübeck                            (KAIST)
Mary Ellen Zurko, MIT Lincoln Laboratory                           Sam King, University of California, Davis and Bouncer Technologies
Mohamed Elsabagh, Kryptowire                                       Michel Kinsy, TAMU
Pardis Emami-Naeini, University of Washington                      Engin Kirda, Northeastern University
William Enck, North Carolina State University                      Katharina Kohls, Radboud University
Roya Ensafi, University of Michigan                                Tadayoshi Kohno, University of Washington
Birhanu Eshete, University of Michigan                             Kari Kostiainen, ETH Zurich
Sascha Fahl, CISPA Helmholtz Center for Information Security       Srikanth Krishnamurthy, University of California, Riverside
Kassem Fawaz, University of Wisconsin—Madison                      Katharina Krombholz, CISPA Helmholtz Center for Information
Yunsi Fei, Northeastern University                                 Security
Earlence Fernandes, University of Wisconsin—Madison                Christopher Kruegel, University of California, Santa Barbara
Domenic Forte, University of Florida                               Deepak Kumar, Stanford University
                                                                   Anil Kurmus, IBM Research Europe
Andrea Lanzi, University of Milan                                    Radia Perlman, Dell EMC
Pavel Laskov, University of Liechtenstein                            Peter Peterson, University of Minnesota
Byoungyoung Lee, Seoul National University                           Fabio Pierazzi, King’s College London
Kyu Hyung Lee, University of Georgia                                 Christina Poepper, New York University Abu Dhabi
Sangho Lee, Microsoft Research                                       Niels Provos, Stripe
Wenke Lee, Georgia Institute of Technology                           Amir Rahmati, Stony Brook University
Tancrède Lepoint, Google                                             Jeyavijayan Rajendran, Texas A&M University
Ada Lerner, Wellesley College                                        Sara Rampazzi, University of Florida
Frank Li, Georgia Institute of Technology                            Mariana Raykova, Google
Qi Li, Tsinghua University                                           Joel Reardon, University of Calgary
Tianshi Li, Carnegie Mellon University                               Bradley Reaves, North Carolina State University
David Lie, University of Toronto                                     Elissa Redmiles, Max Planck Institute for Software Systems
Zhiqiang Lin, Ohio State University                                  (MPI-SWS)
Martina Lindorfer, TU Wien                                           Michael K. Reiter, Duke University
Guyue Liu, Carnegie Mellon University                                Konrad Rieck, Technische Universität Braunschweig
Kangjie Lu, University of Minnesota                                  William Robertson, Northeastern University
Wouter Lueks, EPFL                                                   Franziska Roesner, University of Washington
Xiapu Luo, The Hong Kong Polytechnic University                      Eyal Ronen, Tel Aviv University
Matteo Maffei, TU Wien                                               Stefanie Roos, TU Delft
Stefan Mangard, Graz University of Technology                        Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Mohammad Mannan, Concordia University                                Brendan Saltaformaggio, Georgia Institute of Technology
Ivan Martinovic, Oxford University                                   Nitesh Saxena, University of Alabama at Birmingham
Michelle Mazurek, University of Maryland                             Michael Schwarz, CISPA Helmholtz Center for Information Security
Patrick McDaniel, The Pennsylvania State University                  Jörg Schwenk, Ruhr University Bochum
Shagufta Mehnaz, Dartmouth College                                   Wendy Seltzer, W3C and Massachusetts Institute of Technology
Aastha Mehta, University of British Columbia, Vancouver              Johanna Sepulveda, Airbus
Sarah Meiklejohn, University College London and Google               Mahmood Sharif, Tel Aviv University and VMware
Marcela Melara, Intel Labs                                           Imani N. Sherman, University of Florida
Nele Mentens, Leiden University and Katholieke Universiteit Leuven   Shweta Shinde, ETH Zurich
Jiang Ming, The University of Texas at Arlington                     Fatemeh Shirazi, Web3 Foundation
Ariana Mirian, University of California, San Diego                   Maliheh Shirvanian, Visa Research
Jelena Mirkovic, University of Southern California                   Yan Shoshitaishvili, Arizona State University
Daniel Moghimi, University of California, San Diego                  Haya Shulman, Fraunhofer SIT
Esfandiar Mohammadi, University of Lübeck                            Peter Snyder, Brave Browser
Mainack Mondal, Indian Institute of Technology, Kharagpur            Sooel Son, Korea Advanced Institute of Science and Technology
Soo-Jin Moon, Google                                                 (KAIST)
Veelasha Moonsamy, Ruhr University Bochum                            Chengyu Song, University of California, Riverside
Thomas Moyer, University of North Carolina                           Alessandro Sorniotti, IBM Research Europe
Marius Muench, Vrije Universiteit Amsterdam                          Michael Specter, Massachusetts Institute of Technology
Takao Murakami, AIST                                                 Drew Springall, Auburn University
Toby Murray, University of Melbourne                                 Jessica Staddon, JPMorgan Chase
Nick Nikiforakis, Stony Brook University                             Emily Stark, Google
Anita Nikolich, University of Illinois at Urbana–Champaign           Angelos Stavrou, Virginia Tech
Shirin Nilizadeh, The University of Texas at Arlington               Deian Stefan, University of California, San Diego
Adam Oest, PayPal                                                    Ben Stock, CISPA Helmholtz Center for Information Security
Hamed Okhravi, MIT Lincoln Laboratory                                Gianluca Stringhini, Boston University
Cristina Onete, University of Limoges/XLIM/CNRS 7252                 Yixin Sun, University of Virginia
Yossi Oren, Ben-Gurion University of the Negev                       Yuqiong Sun, Facebook
Rebekah Overdorf, EPFL                                               Qiang Tang, The University of Sydney
Miroslav Pajic, Duke University                                      Dave ( Jing) Tian, Purdue University
Dimitrios Papadopoulos, The Hong Kong University of Science          Yuan Tian, University of Virginia
and Technology                                                       Nils Ole Tippenhauer, CISPA Helmholtz Center for Information
Bryan Parno, Carnegie Mellon University                              Security
Mathias Payer, EPFL                                                  Shruti Tople, Microsoft Research
Paul Pearce, Georgia Institute of Technology, International Com-     Santiago Torres-Arias, Purdue University
puter Science Institute (ICSI)                                       Florian Tramèr, Stanford University
Giancarlo Pellegrino, CISPA Helmholtz Center for Information         Patrick Traynor, University of Florida
Security                                                             Carmela Troncoso, EPFL
Roberto Perdisci, University of Georgia and Georgia Institute of     Güliz Seray Tuncay, Google
Technology                                                           Selcuk Uluagac, Florida International University
Blase Ur, University of Chicago                                  • Network security
Anjo Vahldiek-Oberwagner, Intel Labs                                   ° Intrusion and anomaly detection and prevention
Michel van Eeten, Delft University of Technology                       ° Network infrastructure security
Mayank Varia, Boston University                                        ° Denial-of-service attacks and countermeasures
Ingrid Verbauwhede, Katholieke Universiteit Leuven
                                                                       ° Wireless security
Hayawardh Vijayakumar, Samsung Research America
Bimal Viswanath, Virginia Tech
                                                                 • Security   analysis
                                                                       ° Malware analysis
Daniel Votipka, Tufts University
David Wagner, University of California, Berkeley                       ° Analysis of network and security protocols
Michael Waidner, Technische Universität Darmstadt                      ° Attacks with novel insights, techniques, or results
Gang Wang, University of Illinois at Urbana–Champaign                  ° Forensics and diagnostics for security
Ting Wang, The Pennsylvania State University                           ° Automated security analysis of hardware designs and
XiaoFeng Wang, Indiana University Bloomington                            implementation
Michael Weissbacher, Square, Inc.                                      ° Automated security analysis of source code and binaries
Tara Whalen, Carleton University                                       ° Program analysis
Christian Wressnegger, Karlsruhe Institute of Technology (KIT)   • Machine    learning security and privacy
Matthew Wright, Rochester Institute of Technology                • Data-driven     security and measurement studies
Eric Wustrow, University of Colorado Boulder                           ° Measurements of fraud, malware, spam
Jason (Minhui) Xue, The University of Adelaide                         ° Measurements of human behavior and security
Daphne Yao, Virginia Tech
Yuval Yarom, The University of Adelaide and Data61
                                                                 • Privacy-enhancing     technologies and anonymity

Tuba Yavuz, University of Florida
                                                                 • Usable   security   and privacy

Yanfang (Fanny) Ye, Case Western Reserve University              • Language-based security
Heng Yin, University of California, Riverside                    • Hardware security
Qiang Zeng, University of South Carolina                               ° Secure computer architectures
Sarah Zennou, Airbus                                                   ° Embedded systems security
Fengwei Zhang, Southern University of Science and Technology           ° Methods for detection of malicious or counterfeit
(SUSTech)                                                                hardware
Xiangyu Zhang, Purdue University                                       ° Side channels
Yang Zhang, CISPA Helmholtz Center for Information Security      • Research on surveillance and censorship
Yuan Zhang, Fudan University                                     • Social issues and security
Yajin Zhou, Zhejiang University                                        ° Research on computer security law and policy
Haojin Zhu, Shanghai Jiao Tong University
                                                                       ° Ethics of computer security research
Steering Committee                                                     ° Research on security education and training
Michael Bailey, University of Illinois at Urbana–Champaign             ° Information manipulation, misinformation, and
Matt Blaze, University of Pennsylvania                                   disinformation
Dan Boneh, Stanford University                                         ° Protecting and understanding at-risk users
Srdjan Capkun, ETH Zurich                                              ° Emerging threats, harassment, extremism, and
William Enck, North Carolina State University                            online abuse
Kevin Fu, University of Michigan
                                                                 • Applications    of cryptography
Rachel Greenstadt, New York University
                                                                       ° Analysis of deployed cryptography and cryptographic
Casey Henderson, USENIX Association                                      protocols
Nadia Heninger, University of California, San Diego
                                                                       ° Cryptographic implementation analysis
Thorsten Holz, Ruhr-Universität Bochum
                                                                       ° New cryptographic protocols with real-world
Engin Kirda, Northeastern University                                     applications
Tadayoshi Kohno, University of Washington
                                                                 This topic list is not meant to be exhaustive; USENIX Security is
Thomas Ristenpart, Cornell Tech                                  interested in all aspects of computing systems security and pri-
Franziska Roesner, University of Washington                      vacy. Papers without a clear application to security or privacy of
Patrick Traynor, University of Florida                           computing systems, however, will be considered out of scope
David Wagner, University of California, Berkeley                 and may be rejected without full review.
Symposium Topics                                                 Refereed Papers
Refereed paper submissions are solicited in all areas relating   Papers that have been formally reviewed and accepted will
to systems research in security and privacy, including but not   be presented during the Symposium and published in the
limited to:                                                      Symposium Proceedings. By submitting a paper, you agree
• System security                                                that at least one of the authors will attend the conference to
          Operating systems security                             present it. Alternative arrangements will be made if global
      °
                                                                 health concerns persist. If the conference registration fee will
      °   Web security
                                                                 pose a hardship for the presenter of the accepted paper,
      °   Mobile systems security                                please contact conference@usenix.org.
      °   Distributed systems security
      °   Cloud computing security
A major mission of the USENIX Association is to provide for the       Submission Policies
creation and dissemination of new knowledge. In keeping with          Important: The USENIX Security Symposium moved to multiple
this and as part of USENIX’s open access policy, the Proceed-         submission deadlines in 2019 and included changes to the review
ings will be available online for registered attendees before the     process and submission policies. Detailed information is available
Symposium and for everyone starting on the opening day of the         at USENIX Security Publication Model Changes at www.usenix.org/
technical sessions. USENIX also allows authors to retain owner-       conference/usenixsecurity22/publication-model-change.
ship of the copyright in their works, requesting only that USENIX
be granted the right to be the first publisher of that work. See      USENIX Security ’22 submissions deadlines are as follows:
our sample consent form at www.usenix.org/sample_consent_             • Summer Deadline: Tuesday, June 8, 2021, 11:59 pm AoE
form.pdf for the complete terms of publication.
                                                                      • Fall Deadline: Tuesday, October 12, 2021, 11:59 pm AoE
Go to Paper Submission Policies and Instructions page at www.         • Winter Deadline: Tuesday, February 1, 2022, 11:59 pm AoE
usenix.org/conference/usenixsecurity22/submission-policies-           All papers that are accepted by the end of the winter submis-
and-instructions for more information.                                sion reviewing cycle (February–May 2022) will appear in the
                                                                      proceedings for USENIX Security ’22. All submissions will be
Artifact Evaluation                                                   made online via their respective web forms, linked from the
The Call for Artifacts will be available soon.                        USENIX Security ’22 Call for Papers web page: Summer Dead-
                                                                      line, Fall Deadline, Winter Deadline. Do not email submissions.
Symposium Activities                                                  Submissions should be finished, complete papers, and we
Invited Talks, Panels, Poster Session, Lightning Talks, and BoFs      may reject papers without review that have severe editorial
In addition to the refereed papers and the keynote presenta-          problems (broken references, egregious spelling or grammar
tion, the technical program will include invited talks, panel         errors, missing figures, etc.) or are submitted in violation of the
discussions, a poster session, and Birds-of-a-Feather sessions        Submission Instructions outlined below.
(BoFs). You are invited to make suggestions regarding topics
or speakers in any of these sessions via email to the contacts        All paper submissions, including Major Revisions, should be at
listed below or to the program co-chairs at sec22chairs@              most 13 typeset pages, excluding bibliography and well-marked
usenix.org.                                                           appendices. These appendices may be included to assist
                                                                      reviewers who may have questions that fall outside the stated
Invited Talks and Panel Discussions                                   contribution of the paper on which your work is to be evaluated
Invited talks and panel discussions will be held in parallel with     or to provide details that would only be of interest to a small
the refereed paper sessions. Please submit topic suggestions          minority of readers. There is no limit on the length of the bibli-
and talk and panel proposals via email to sec22it@usenix.org          ography and appendices but reviewers are not required to read
by February 1, 2022.                                                  any appendices so the paper should be self-contained without
                                                                      them. Once accepted, papers must be reformatted to fit in 18
Poster Session                                                        pages, including the bibliography and any appendices.
Would you like to share a provocative opinion, an interesting         Papers should be typeset on U.S. letter-sized pages in two-
preliminary work, or a cool idea that will spark discussion at this   column format in 10-point Times Roman type on 12-point
year’s USENIX Security Symposium? The poster session is the           leading (single-spaced), in a text block 7” x 9” deep. Authors are
perfect venue to introduce such new or ongoing work. Poster           encouraged to make use of USENIX’s LaTeX template and style
presenters will have the entirety of the evening reception to         files available at www.usenix.org/paper-templates when pre-
discuss their work, get exposure, and receive feedback from           paring your paper for submission. Failure to adhere to the page
attendees.                                                            limit and formatting requirements can be grounds for rejection.
To submit a poster, please submit a draft of your poster, in          Papers should not attempt to “squeeze space” by exploiting
PDF (maximum size 36” by 48”), or a one-page abstract via             underspecified formatting criteria (e.g., columns) or through
the poster session submission form, linked from the USENIX            manipulating other document properties (e.g., page layout,
Security ’22 Call for Papers web page, by July 6, 2022. Decisions     spacing, fonts, figures and tables, headings). Papers that, in the
will be made by July 13, 2022. Posters will not be included in the    chair’s assessment, make use of these techniques to receive an
proceedings but may be made available online if circumstances         unfair advantage, will be rejected, even if they comply with the
permit. Poster submissions must include the authors’ names,           above specifications.
affiliations, and contact information. At least one author of
each accepted poster must register for and attend the Sympo-          Please make sure your paper successfully returns from the
sium to present the poster.                                           PDF checker (visible upon PDF submission) and that document
                                                                      properties, such as font size and margins, can be verified via
Lightning Talks                                                       PDF editing tools such as Adobe Acrobat. Papers where the
Information about lightning talks will be available soon.             chairs can not verify compliance with the CFP will be rejected.

Birds-of-a-Feather Sessions (BoFs)                                    Prepublication of Papers
Birds-of-a-Feather sessions (BoFs) will be held Tuesday,              Prepublication versions of papers accepted for USENIX Secu-
Wednesday, and Thursday evenings. Birds-of-a-Feather                  rity ’22 will be published and open and accessible to everyone
sessions are informal gatherings of persons interested in a           without restrictions on the following dates:
particular topic. BoFs often feature a presentation or a demon-
stration followed by discussion, announcements, and the shar-
                                                                      • Summer Deadline: Tuesday, November 9, 2021
ing of strategies. BoFs can be scheduled on-site or in advance.       • Fall Deadline: Tuesday, April 5, 2022
To schedule a BoF, please send an email to the USENIX Confer-         • Winter Deadline: TBD (final papers will be published with the
ence Department at bofs@usenix.org with the title and a brief           full conference proceedings)
description of the BoF; the name, title, affiliation, and email
address of the facilitator; and your preference of date and time.
Embargo Requests                                                     While submitted papers must be anonymous, authors may
Authors may request an embargo for their papers by the dead-         choose to give talks about their work, post a preprint of the
line dates listed below. All embargoed papers will be released       paper online, disclose security vulnerabilities to vendors or the
on the first day of the conference, Wednesday, August 10, 2022.      public, etc. during the review process.

• Summer Deadline: Tuesday, November 2, 2021                         Facebook Internet Defense Prize
• Fall Deadline: Tuesday, March 29, 2022                             The Internet Defense Prize recognizes and rewards research
• Winter Deadline: Tuesday, July 12, 2022                            that meaningfully makes the internet more secure. Created in
                                                                     2014, the award is funded by Facebook and offered in partner-
Conflicts of Interest
                                                                     ship with USENIX to celebrate contributions to the protection
The program co-chairs require cooperation from both authors          and defense of the internet. Successful recipients of the Inter-
and program committee members to prevent submissions                 net Defense Prize will provide a working prototype that demon-
from being evaluated by reviewers who have a conflict of             strates significant contributions to the security of the internet,
interest. During the submission process, we will ask authors to      particularly in the areas of prevention and defense. This award
identify members of the program committee with whom they             is meant to recognize the direction of the research and not
share a conflict of interest. This includes: (1) anyone who shares   necessarily its progress to date. The intent of the award is to
an institutional affiliation with an author at the time of submis-   inspire researchers to focus on high-impact areas of research.
sion, (2) anyone who was the advisor or advisee of an author at
any time in the past, (3) anyone the author has collaborated or      You may submit your USENIX Security ’22 paper submission for
published within the prior two years, (4) anyone who is serv-        consideration for the Prize as part of the regular submission
ing as the sponsor or administrator of a grant that funds your       process. Find out more about the Internet Defense Prize at
research, or (5) close personal friendships. For other forms         www.internetdefenseprize.org.
of conflict, authors must contact the chairs and explain the         Human Subjects and Ethical Considerations
perceived conflict.
                                                                     Submissions that describe experiments on human subjects,
Program committee members who are conflicts of interest with         that analyze data derived from human subjects (even anony-
a paper, including program co-chairs, will be excluded from          mized data), or that otherwise may put humans at risk should:
both online and in-person evaluation and discussion of the
                                                                         1. Disclose whether the research received an approval or
paper by default.
                                                                            waiver from each of the authors’ institutional ethics review
Early Rejection Notification                                                boards (e.g., an IRB).
The review process will consist of several reviewing rounds. In          2. Discuss steps taken to ensure that participants and others
order to allow authors time to improve their work and submit                who might have been affected by an experiment were
to other venues, authors of submissions for which there is a                treated ethically and with respect.
consensus on rejection will be notified earlier.                     If the submission deals with vulnerabilities (e.g., software
                                                                     vulnerabilities in a given program or design weaknesses in a
Author Responses                                                     hardware system), the authors need to discuss in detail the
Authors of papers that have not been rejected early will have        steps they have already taken or plan to take to address these
an opportunity to respond to an initial round of reviews. We en-     vulnerabilities (e.g., by disclosing vulnerabilities to the vendors).
courage authors to focus on questions posed by reviewers and         The same applies if the submission deals with personally
significant factual corrections. Once reviews are released to        identifiable information (PII) or other kinds of sensitive data. If
authors for rebuttal, we will not process requests to withdraw       a paper raises significant ethical and legal concerns, it might be
the paper and the paper will be viewed as under submission           rejected based on these concerns.
until the end of the cycle.
                                                                     Contact the program co-chairs at sec22chairs@usenix.org if
Anonymous Submission                                                 you have any questions.
The review process will be double-blind. Papers must be              Reviews from Prior Submissions
submitted in a form suitable for anonymous review:
                                                                     Drawn from the ACM CCS 2020 CFP, IEEE S&P 2021
• The title page should not contain any author names or              For papers that were previously submitted to, and rejected
  affiliations.                                                      from, another conference, authors are required to submit a
• Authors should carefully review figures and appendices             separate document containing the prior reviews along with a
  (especially survey instruments) to ensure affiliations are not     description of how those reviews were addressed in the current
  accidentally included.                                             version of the paper. Authors are only required to include re-
• When referring to your previous work, do so in the third           views from the last time the paper was submitted. This includes
  person, as though it were written by someone else. Only            withdrawn papers (if reviews were received) as well as papers
  blind the reference itself in the (unusual) case that a third-     whose last submission was at USENIX. Reviewers will be asked
  person reference is infeasible.                                    to complete their reviews before reading the provided supple-
                                                                     mentary material to avoid being biased in formulating their own
• Authors may include links to websites that contain source          opinions; once their reviews are complete, however, reviewers
  code, tools, or other supplemental material. Neither the
  link in the paper nor the website itself should contain the        will be given the opportunity to provide additional comments
  authors’ names or affiliations.                                    based on the submission history of the paper. Authors who try
                                                                     to circumvent this rule (e.g., by changing the title of the paper
Papers that are not properly anonymized may be rejected
                                                                     without significantly changing the contents) may have their
without review.
                                                                     papers rejected without further consideration, at the discretion
                                                                     of the PC chairs.
Submission Instructions                                               Note that under the changes to the USENIX Security publication
All submissions will be made online via their respective web          model, papers that have received a decision of Major Revisions
forms. Do not email submissions. Submissions must be in PDF           from USENIX Security are still considered to be under review
format. LaTeX users can use the “pdflatex” command to convert         for the following two review cycles after notification; authors
a LaTeX document into PDF format. Please make sure your sub-          must formally withdraw their paper if they wish to submit to
mission can be opened using Adobe Reader. Please also make            another venue. See USENIX Security Publication Model Changes
sure your submission, and all embedded figures, are intelligible      at www.usenix.org/conference/usenixsecurity22/publication-
when printed in grayscale.                                            model-change for details. For submissions that received Reject
                                                                      or Reject and Resubmit decisions from USENIX Security ’21,
For resubmissions of Major Revisions, authors must submit a           resubmissions must follow the rules laid out for when they can
separate PDF that includes the verbatim Major Revision criteria,      be resubmitted (i.e., not in the next deadline for Reject and
a list of changes to the paper, and a statement of how the            Resubmit, and not in the next two deadlines for Reject).
changes address the review comments. While not required,
authors are strongly encouraged to submit as part of the PDF a        Questions? Contact your program co-chairs, sec22chairs@
“PDF ‘diff’” to assist reviewers in identifying your modifications.   usenix.org, or the USENIX office, submissionspolicy@usenix.org.
For papers that were previously submitted to, and rejected            The program committee and external reviewers are required to
from, another conference, the required document (see Reviews          treat all submissions as confidential. However, the program co-
from Prior Submissions above) should be submitted as a PDF            chairs or designated committee members may share submis-
file using the “Prior Reviews” field in the submission forms, not     sions outside the program committee to allow chairs of other
via an appendix.                                                      conferences to identify dual submissions.
All submissions will be judged on originality, relevance, cor-        Papers that do not comply with the submission requirements,
rectness, and clarity. In addition to citing relevant published       including length and anonymity, that do not comply with
work, authors should relate their submission to any other             resubmission policies, or that do not have a clear application
relevant submissions of theirs in other venues that are under         to security or privacy may be rejected without review. Papers
review at the same time as their submission to the Symposium.         accompanied by nondisclosure agreement forms will not be
These citations to simultaneously submitted papers should be          considered.
anonymized; non-anonymous versions of these citations must,           Each accepted submission may be assigned a member of the
however, be emailed to the program co-chairs at sec22chairs@          program committee to act as its shepherd through the prepa-
usenix.org. Simultaneous submission of the same work to               ration of the final paper. The assigned member will act as a
multiple venues, submission of previously published work, or          conduit for feedback from the committee to the authors.
plagiarism constitutes dishonesty or fraud. Failure to point out
and explain overlap will be grounds for rejection. USENIX, like       All papers will be available online before the symposium. If your
other scientific and technical conferences and journals, prohib-      accepted paper should not be published prior to the event,
its these practices and may take action against authors who           please notify production@usenix.org after you submit your
have committed them. See the USENIX Conference Submissions            final paper. See the Embargo Requests section for deadlines.
Policy at www.usenix.org/submissions-policy for details.              Specific questions about submissions may be sent to the
                                                                      program co-chairs at sec22chairs@usenix.org. The chairs will
                                                                      respond to individual questions about the submission process
                                                                      if contacted at least a week before the submission deadline.
You can also read