August 8 - 12, 2011
San Francisco, CA
Don't miss the 20th USENIX Security Symposium, August 8–12, 2011, in San Francisco, CA. USENIX Security '11 brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks.
The program begins with:
■ 4 days of training taught by industry leaders including:
■ Richard Bejtlich on TCP/IP Weapons School 3.0 (2 Day Class)
■ Rik Farrow on SELinux—Security Enhanced Linux
■ Jim DelGrosso on an Overview of Threat Modeling
■ SANS on Hacker Detection for Systems Administrators (2 Day Class)
And continues with a 3-day technical program including:
■ Keynote address, "Network Security in the Medium Term: 2061–2561 AD," by Charles Stross, Author of award-winning science fiction
■ Invited talks covering a number of timely topics
■ 35 refereed papers that present new research in a variety of subject areas, including securing smart phones, understanding the underground economy, privacy- and freedom-enhancing technologies, and more
■ Thought-provoking discussions at the evening Birds-of-a-Feather sessions
■ A poster session full of provocative opinions, interesting preliminary work, and cool ideas that will spark discussion. Poster submissions are due July 11, 2011. Find out more here.
■ USENIX Security '11 Rump Session: Building on last's year success, we will host a rump session on the evening of Wednesday, August 10, 2011. This is intended as an informal session for short and engaging presentations on recent unpublished results, work in progress, or other topics of interest to the USENIX Security attendees. To submit a rump session talk, email email@example.com by Wednesday, August 10, 2011, at 11:59 a.m. PDT.
Whether you're a researcher, a system administrator, or a policy wonk, come to the 20th USENIX Security Symposium to find out how changes in computer security are going to affect you.
The Westin St. Francis
335 Powell Street
San Francisco, CA 94102
Phone: (415) 397-7000
For more info: