uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)
Call For Paper (CFP) Description
Submissions are from December 1, 2024 until January 27, 2025
Notifications are sent out as early as possible - we will try to stay within 2 weeks after submission. All decisions and notifications will be concluded by February 10, 2025.
uASC solicits submissions of high-quality, original scientific papers presenting novel research on microarchitecture security (attacks and defenses). This includes explicitly, papers that provide interesting insights with security implications under limited threat models (e.g., an attack that would be interesting on a trusted-execution environment on platforms that do not have a trusted-execution environment) as well as reproduction studies that provide an independent understanding of prior attacks and defenses.
Papers will be judged on scientific rigor, insights, novelty, correctness, and clarity as well as the clear documentation of limitations. We expect all papers to provide enough details to enable reproducibility of the experimental results.
Posters
High quality posters enable discussion of recent research results, deep interactions with interested attendees, a peek into ongoing work, and presentation of new crazy ideas. uASC welcomes the submission of posters on preliminary findings, ongoing work, or recently published work. Posters will be presented in a forum where attendees can mingle and interact. Poster submissions contain an extended abstract of up to two pages in the µASC paper submission format along with a draft of the poster. If the poster refers to a published paper, it must be referenced. At the conference, we will provide posters stands. Attendees can bring their printed posters up to size A0.
Talks
High quality talks enable discussion of recent open problems from practice and theory, give a peek into ongoing work, or to discuss crazy ideas. uASC welcomes the submission of talks and invites talks to also submit an extended abstract of up to two pages, which will be included in the conference proceedings.
Submissions
Full papers are limited to 20 pages in Springer LNCS format, including bibliography and appendices. Papers that do not follow this format may be rejected without review. All talks (with and without papers) are 20 minutes.
Submission Guidelines
uASC has a double-blind reviewing process. All submissions must be appropriately anonymized. Author names and affiliations must be excluded from the paper. Furthermore, authors should avoid obvious self-references, and should cite their own previous work in third person, whenever necessary. Papers that are not properly anonymized risk being rejected without review.
Submissions must be original work and may not be under submission to another venue at the time of review. At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.
Authors are encouraged to submit code appropriately anonymized, using, e.g., https://anonymous.4open.science/.
Papers can be submitted using https://uasc25.hotcrp.com/.
Notifications are sent out as early as possible - we will try to stay within 2 weeks after submission. All decisions and notifications will be concluded by February 10, 2025.
uASC solicits submissions of high-quality, original scientific papers presenting novel research on microarchitecture security (attacks and defenses). This includes explicitly, papers that provide interesting insights with security implications under limited threat models (e.g., an attack that would be interesting on a trusted-execution environment on platforms that do not have a trusted-execution environment) as well as reproduction studies that provide an independent understanding of prior attacks and defenses.
Papers will be judged on scientific rigor, insights, novelty, correctness, and clarity as well as the clear documentation of limitations. We expect all papers to provide enough details to enable reproducibility of the experimental results.
Posters
High quality posters enable discussion of recent research results, deep interactions with interested attendees, a peek into ongoing work, and presentation of new crazy ideas. uASC welcomes the submission of posters on preliminary findings, ongoing work, or recently published work. Posters will be presented in a forum where attendees can mingle and interact. Poster submissions contain an extended abstract of up to two pages in the µASC paper submission format along with a draft of the poster. If the poster refers to a published paper, it must be referenced. At the conference, we will provide posters stands. Attendees can bring their printed posters up to size A0.
Talks
High quality talks enable discussion of recent open problems from practice and theory, give a peek into ongoing work, or to discuss crazy ideas. uASC welcomes the submission of talks and invites talks to also submit an extended abstract of up to two pages, which will be included in the conference proceedings.
Submissions
Full papers are limited to 20 pages in Springer LNCS format, including bibliography and appendices. Papers that do not follow this format may be rejected without review. All talks (with and without papers) are 20 minutes.
Submission Guidelines
uASC has a double-blind reviewing process. All submissions must be appropriately anonymized. Author names and affiliations must be excluded from the paper. Furthermore, authors should avoid obvious self-references, and should cite their own previous work in third person, whenever necessary. Papers that are not properly anonymized risk being rejected without review.
Submissions must be original work and may not be under submission to another venue at the time of review. At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.
Authors are encouraged to submit code appropriately anonymized, using, e.g., https://anonymous.4open.science/.
Papers can be submitted using https://uasc25.hotcrp.com/.
Conference Topics
Frequently Asked Questions
What is uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
uASC 2025 : 1st Microarchitecture Security Conference (uASC '25) is Join the 1st Microarchitecture Security Conference (uASC '25) on February 19, 2025, in Bochum, Germany, to explore novel research on microarchitecture security, attacks, and defenses.
How do I submit my paper to uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
Submit your paper via the official submission portal at https://uasc.cc/. Follow the submission guidelines outlined in the CFP.
How do I register for the uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
Register at https://uasc.cc/. Early registration is recommended to secure your spot and avail discounts.
What topics are accepted at uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
The topics accepted at uASC 2025 : 1st Microarchitecture Security Conference (uASC '25) include security, cryptography, systems, microarchiecture. Papers that explore innovative ideas or solutions in these areas are highly encouraged.
What are the important dates for uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
- Start Date: 19 Feb, 2025
- End Date: 19 Feb, 2025
- End Date: 19 Feb, 2025
What is the location and date of uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
uASC 2025 : 1st Microarchitecture Security Conference (uASC '25) will be held on 19 Feb, 2025 - 19 Feb, 2025 at Bochum, Germany. More details about the event location and travel arrangements can be found on the conference’s official website.
What is the location of uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
uASC 2025 : 1st Microarchitecture Security Conference (uASC '25) will be held at Bochum, Germany.
Can I submit more than one paper to uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
Yes, multiple submissions are allowed, provided they align with the conference’s themes and topics. Each submission will be reviewed independently.
What is the review process for submissions?
Papers will be reviewed by a panel of experts in the field, ensuring that only high-quality, relevant work is selected for presentation. Each paper will be evaluated on originality, significance, and clarity.
What presentation formats are available at uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
Presentations can be made in various formats including oral presentations, poster sessions, or virtual presentations. Specific details will be provided upon acceptance of your paper.
Can I make changes to my submission after I’ve submitted it?
Modifications to your submission are allowed until the submission deadline. After that, no changes can be made. Please make sure all details are correct before submitting.
What are the benefits of attending uASC 2025 : 1st Microarchitecture Security Conference (uASC '25)?
Attending uASC 2025 : 1st Microarchitecture Security Conference (uASC '25) provides an opportunity to present your research, network with peers and experts in your field, and gain feedback on your work. Additionally, it is an excellent platform for career advancement and collaboration opportunities.
What should I include in my abstract or proposal submission?
Your abstract or proposal should include a concise summary of your paper, including its purpose, methodology, and key findings. Ensure that it aligns with the conference themes.