Poster Session
Would you like to share a provocative opinion, an interesting pre-
liminary work, or a cool idea that will spark discussion at this year’s
USENIX Security Symposium? The poster session is the perfect venue
to introduce such new or ongoing work. Poster presenters will have
the entirety of the evening reception to discuss their work, get expo-
sure, and receive feedback from attendees.
To submit a poster, please submit a draft of your poster, in PDF
(maximum size 36” by 48”), or a one-page abstract via the poster
session submission form on the Call for Papers Web site, www.
usenix.org/sec17/cfp , by Thursday, July 6, 2017, 9:00 p.m. PDT. Deci-
sions will be made by Thursday, July 13, 2017. Posters will not be
included in the proceedings but may be made available online if
circumstances permit. Poster submissions must include the authors’
names, affiliations, and contact information. At least one author of
each accepted poster must register for and attend the Symposium
to present the poster.
Work-in-Progress Session
We will host a WiP session (also previously known as rump session)
on the evening of Wednesday, August 16, 2017. This is intended as
an informal session for short and engaging presentations on recent
unpublished results, work in progress, or other topics of interest to
the USENIX Security attendees. As in the past, talks do not always
need to be serious and funny talks are encouraged! To submit a WiP
12:00 pm PDT.
Doctoral Colloquium
What opportunities await security students graduating with a PhD?
On Thursday evening, students will have the opportunity to listen to
informal panels of faculty and industrial researchers providing per-
sonal perspectives on their post-PhD career search. Learn about the
academic job search, the industrial research job search, research fund
raising, dual-career challenges, life uncertainty, and other idiosyn-
crasies of the ivory tower. The event is organized by Thorsten Holz.
If you would like to speak in the Doctoral Colloquium, please email
Birds-of-a-Feather Sessions (BoFs)
Birds-of-a-Feather sessions (BoFs) will be held Tuesday, Wednesday,
and Thursday evenings. Birds-of-a-Feather sessions are informal gath-
erings of persons interested in a particular topic. BoFs often feature a
presentation or a demonstration followed by discussion, announce-
ments, and the sharing of strategies. BoFs can be scheduled on-site
or in advance. To schedule a BoF, please send email to the USENIX
description of the BoF; the name, title, affiliation, and email address of
the facilitator; and your preference of date and time.
Submission Policies
Important: Note that some past USENIX Security Symposia have had
different policies and requirements, please read the following text
carefully.
Submissions are due by Thursday, February 16, 2017, 5:00 p.m.
PST (hard deadline). All submissions will be made online via the
Web form on the Call for Papers Web site, www.usenix.org/sec17/cfp.
Submissions should be finished, complete papers, and we may reject
papers without review that have severe editorial problems (broken
references, egregious spelling or grammar errors, figures, etc.).
Paper submissions should be at most 13 typeset pages, exclud-
ing bibliography and well-marked appendices. These appendices
may be included to assist reviewers who may have questions that fall
outside the stated contribution of the paper on which your work is
to be evaluated or to provide details that would only be of inter-
est to a small minority of readers. There is no limit on the length of
the bibliography and appendices but reviewers are not required to
read any appendices so the paper should be self-contained without
them. Once accepted, papers must be reformatted to fit in 18 pages,
including bibliography and any appendices. The submission must
be formatted in 2 columns, using 10-point Times Roman type on
12-point leading, in a text block of 6.5”x9”, on 8.5”x11” (letter-sized)
paper. If you wish, please make use of USENIX’s LaTeX template and
style files, available at www.usenix.org/conferences/author-resources/
paper-templates, when preparing your paper for submission. Failure
to adhere to the page limit and formatting requirements can be
grounds for rejection.
Conflicts of Interest
The program co-chairs require cooperation from both authors and
program committee members to prevent submissions from being
evaluated by reviewers who have a conflict of interest. During the
submission process, we will ask authors to identify members of the
program committee with whom they share a conflict of interest. This
includes: (1) anyone who shares an institutional affiliation with an
author at the time of submission, (2) anyone who was the advisor or
advisee of an author at any time in the past, or (3) anyone the author
has collaborated or published with in the prior two years. For other
forms of conflict, authors must contact the chairs and explain the
perceived conflict.
Program committee members who are conflicts of interest with a
paper, including program co-chairs, will be excluded from both on-
line and in-person evaluation and discussion of the paper by default.
Early Rejection and Rebuttals
Papers will receive a first round of reviews. Papers marked as early
reject will not be considered further. The authors of papers not
rejected early will receive the ability to provide a short rebuttal that
will be considered in subsequent discussions. Authors’ rebut-
tals must
clearly and explicitly identify concrete issues with factual
statements in the initial reviews, or provide clarification to explicit
reviewer questions.
Anonymous Submission
The review process will be double blind. Papers must be submit-
ted in a form suitable for anonymous review: no author names or
affiliations may appear on the title page and authors should avoid
revealing their identity in the text. When referring to your previous
work, do so in the third person, as though it were written by some-
one else. Only blind the reference itself in the (unusual) case that
a third- person reference is infeasible. Papers that are not properly
anonymized may be rejected without review.
Facebook Internet Defense Prize
The Internet Defense Prize recognizes and rewards research that
meaningfully makes the internet more secure. Created in 2014, the
award is funded by Facebook and offered in partnership with USENIX
to celebrate contributions to the protection and defense of the inter-
net. Successful recipients of the Internet Defense Prize will provide
a working prototype that demonstrates significant contributions
to the security of the internet, particularly in the areas of preven-
tion and defense. This award is meant to recognize the direction of
the research and not necessarily its progress to date. The intent of
the award is to inspire researchers to focus on high-impact areas of
research.
You may submit your USENIX Security ’17 paper submission for
consideration for the Prize as part of the regular submission process.
More details will be available here soon. Find out more about the
Internet Defense Prize at internetdefenseprize.org.
Human Subjects and Ethical Considerations
Submissions that describe experiments on human subjects, that
analyze data derived from human subjects (even anonymized data),
or that otherwise may put humans at risk should:
1. Disclose whether the research received an approval or waiver
from each of the authors’ institutional ethics review boards (e.g.,
an IRB).