Conference Information
WOOT 2026: USENIX Workshop on Offensive Technologies
Please Login to view website of conference
Submission Date: |
2026-03-03 |
Notification Date: |
2026-04-09 |
Conference Date: |
2026-08-10 |
Location: |
Baltimore, Maryland, USA |
Years: |
20 |
Viewed: 91296 Tracked: 3 Attend: 1
Call For Papers
Overview
The USENIX WOOT Conference on Offensive Technologies brings together both academics and practitioners in the field of offensive security research. Occurring annually since 2007, when it was first founded as the Workshop on Offensive Technologies, WOOT has become the top venue for collaboration between academia, independent hackers, and industry participants on offensive research. As offensive security has changed over the years to become a large-scale operation managed by well-capitalized actors, WOOT has consistently attracted a range of high-quality, peer-reviewed work from academia and industry on novel attacks, state-of-the-art tools, and offensive techniques.
WOOT '26 welcomes submissions from academia, independent researchers, students, hackers, and industry. Two different submission tracks are available—an academic "classic" track for those intending to submit complete formal academic papers and an "up-and-coming" track for new or non-academic researchers who may be less familiar with academic procedures and may desire assistance writing a paper or just additional feedback and reviews.
Papers that have been formally reviewed and accepted will be presented during the WOOT conference and published in the formal proceedings. Authors are also expected to plan to publish research artifacts (such as source code and data sets) wherever possible; see further details below. By submitting a paper, you agree that, if the paper is accepted, at least one of the authors will register to attend the conference at full price (i.e., not the student rate) and to present the paper; USENIX members at the Advocate level and higher may apply their membership discounts to their registrations. If an author plans to present more than one paper, one full-price registration will still be required for each paper. If the conference registration fee will pose a hardship for the presenter of an accepted paper, please contact conference@usenix.org.
Topics
Submissions should reflect the state of the art in offensive computer security technology, exposing poorly understood mechanisms, presenting novel attacks, highlighting the limitations of published attacks and defenses, or surveying the state of offensive operations at scale. WOOT '26 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer-reviewed and shepherded as appropriate.
Submission topics include, but are not limited to, practical attacks on and offensive research into:
Hardware, including embedded devices, physical attacks, cyber-physical systems, the "Internet of Things" and software-based exploitation of hardware vulnerabilities
Web security, as well as browser and general client-side security (such as runtimes, JITs, and sandboxing)
Machine Learning, LLMs, and other artificial intelligence topics with significant security implications
Operating system and hypervisor security
Application security
Network and distributed systems, including virtualization and the cloud
Wireless and applied protocol security
Mobile device security
Malware design, implementation, and analysis, including (de)obfuscation and sandboxing
Mitigations, their weaknesses, and how they can be (automatically) bypassed
Innovative approaches for software security testing, such as fuzzing for novel targets
Security of decentralized finance, smart contracts, and blockchain
Practical attacks on deployed cryptographic systems
Offensive applications of formal methods and program analysis (such as solvers and symbolic execution)
"Systemization of Knowledge" (SoK) papers that evaluate, systematize, and contextualize existing knowledge are also encouraged. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Such papers should be clearly labeled as SoK in their title.
Topic Relevance
We reserve the right to reject papers that fall outside the scope of WOOT or for which the program committee cannot secure adequate expert reviewers. Papers with no clear contributions to applied security will be considered out of scope.
The list of topics above is necessarily incomplete and imprecise. In its ongoing effort to adjust scope, the WOOT Steering Committee has identified a list of topics that are explicitly excluded. Papers whose core contributions are on the following topics are likely to be rejected for reasons of scope:
Papers with contributions primarily in another field: machine learning, AI, etc.
Machine learning and AI papers that only show problems that have been solved before without these methods, meaning that they do not advance the state of security research.
Papers with focus on theoretical cryptography but without implementation or evaluation on real systems.
Papers with focus on mathematical proof without implementation or evaluation.
Papers without any security or privacy contribution.
The USENIX WOOT Conference on Offensive Technologies brings together both academics and practitioners in the field of offensive security research. Occurring annually since 2007, when it was first founded as the Workshop on Offensive Technologies, WOOT has become the top venue for collaboration between academia, independent hackers, and industry participants on offensive research. As offensive security has changed over the years to become a large-scale operation managed by well-capitalized actors, WOOT has consistently attracted a range of high-quality, peer-reviewed work from academia and industry on novel attacks, state-of-the-art tools, and offensive techniques.
WOOT '26 welcomes submissions from academia, independent researchers, students, hackers, and industry. Two different submission tracks are available—an academic "classic" track for those intending to submit complete formal academic papers and an "up-and-coming" track for new or non-academic researchers who may be less familiar with academic procedures and may desire assistance writing a paper or just additional feedback and reviews.
Papers that have been formally reviewed and accepted will be presented during the WOOT conference and published in the formal proceedings. Authors are also expected to plan to publish research artifacts (such as source code and data sets) wherever possible; see further details below. By submitting a paper, you agree that, if the paper is accepted, at least one of the authors will register to attend the conference at full price (i.e., not the student rate) and to present the paper; USENIX members at the Advocate level and higher may apply their membership discounts to their registrations. If an author plans to present more than one paper, one full-price registration will still be required for each paper. If the conference registration fee will pose a hardship for the presenter of an accepted paper, please contact conference@usenix.org.
Topics
Submissions should reflect the state of the art in offensive computer security technology, exposing poorly understood mechanisms, presenting novel attacks, highlighting the limitations of published attacks and defenses, or surveying the state of offensive operations at scale. WOOT '26 accepts papers in both an academic security context and more applied work that informs the field about the state of security practice in offensive techniques. The goal for these submissions is to produce published works that will guide future work in the field. Submissions will be peer-reviewed and shepherded as appropriate.
Submission topics include, but are not limited to, practical attacks on and offensive research into:
Hardware, including embedded devices, physical attacks, cyber-physical systems, the "Internet of Things" and software-based exploitation of hardware vulnerabilities
Web security, as well as browser and general client-side security (such as runtimes, JITs, and sandboxing)
Machine Learning, LLMs, and other artificial intelligence topics with significant security implications
Operating system and hypervisor security
Application security
Network and distributed systems, including virtualization and the cloud
Wireless and applied protocol security
Mobile device security
Malware design, implementation, and analysis, including (de)obfuscation and sandboxing
Mitigations, their weaknesses, and how they can be (automatically) bypassed
Innovative approaches for software security testing, such as fuzzing for novel targets
Security of decentralized finance, smart contracts, and blockchain
Practical attacks on deployed cryptographic systems
Offensive applications of formal methods and program analysis (such as solvers and symbolic execution)
"Systemization of Knowledge" (SoK) papers that evaluate, systematize, and contextualize existing knowledge are also encouraged. Suitable papers include survey papers that provide useful perspectives on major research areas, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Such papers should be clearly labeled as SoK in their title.
Topic Relevance
We reserve the right to reject papers that fall outside the scope of WOOT or for which the program committee cannot secure adequate expert reviewers. Papers with no clear contributions to applied security will be considered out of scope.
The list of topics above is necessarily incomplete and imprecise. In its ongoing effort to adjust scope, the WOOT Steering Committee has identified a list of topics that are explicitly excluded. Papers whose core contributions are on the following topics are likely to be rejected for reasons of scope:
Papers with contributions primarily in another field: machine learning, AI, etc.
Machine learning and AI papers that only show problems that have been solved before without these methods, meaning that they do not advance the state of security research.
Papers with focus on theoretical cryptography but without implementation or evaluation on real systems.
Papers with focus on mathematical proof without implementation or evaluation.
Papers without any security or privacy contribution.
Last updated by Dou Sun in 2026-03-01
Best Papers
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| a | a | a1 | FAST | USENIX Conference on File and Storage Technologies | 2026-09-15 | 2026-12-08 | 2027-02-23 |
| b4 | ICSOFT | International Conference on Software Technologies | 2025-01-17 | 2025-03-17 | 2025-06-11 | ||
| b3 | ICIT | International Conference on Industrial Technology | 2024-11-30 | 2025-01-30 | 2025-03-26 | ||
| b | c | MSST | IEEE Symposium on Massive Storage Systems and Technologies | 2024-01-07 | 2024-03-11 | 2024-06-03 | |
| b2 | Ada-Europe | International Conference on Reliable Software Technologies | 2020-01-14 | 2020-03-20 | 2020-06-08 | ||
| b | EC-Web | International Conference on Electronic Commerce and Web Technologies | 2016-04-22 | 2016-05-20 | 2016-09-05 | ||
| b3 | CompSysTech | International Conference on Computer Systems and Technologies | 2015-04-14 | 2015-05-24 | 2015-06-26 | ||
| b | iTAP | International Conference on Internet Technology and Applications | 2013-06-19 | 2013-06-25 | 2013-08-14 | ||
| c | b3 | SAMT | International Conference on Semantic and Digital Media Technologies | 2010-08-30 | 2010-12-01 | ||
| a | a | a1 | USENIX ATC | USENIX Annual Technical Conference | 2025-07-07 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| ACM Transactions on Intelligent Systems and Technology | 6.6 | ACM | 2157-6904 | |
| Education and Information Technologies | 5.4 | Springer | 1360-2357 | |
| Surface and Coatings Technology | 5.4 | Elsevier | 0257-8972 | |
| IEEE Transactions on Learning Technologies | 4.9 | IEEE | 1939-1382 | |
| b | ACM Transactions on Internet Technology | 4.1 | ACM | 1533-5399 |
| Science, Technology, & Human Values | 3.3 | SAGE | 0162-2439 | |
| Semiconductor Science and Technology | 2.1 | IOP Publishing | 1361-6641 | |
| Microsystem Technologies | 1.8 | Springer | 0946-7076 | |
| b | Journal of Computer Science and Technology | 1.200 | Springer | 1000-9000 |
| Journal of Internet Technology | 0.900 | Taiwan Academic Network | 1607-9264 |