How is authorship determined?
Track 1 requires AI as first author (or first two authors). Track 2 requires humans as first authors and centers on human orchestration techniques.
AI authors must be named according to the specific model used (for example, GPT-5.3, Claude Opus 4.6, or Gemini 2.5 Pro). If multiple AI models contributed to the research, list each model as a separate co-author and order them roughly by contribution level, consistent with normal human authorship conventions.
What if the AI TPC makes mistakes?
AI capabilities are advancing at an extraordinary pace. If the AI TPC makes mistakes this year, it almost certainly will not make the same mistakes next year. SynSec is intentionally documenting this frontier in real time, and the human Shadow PC provides a calibration baseline for interpreting AI-led review performance.
Will accepted papers appear in proceedings?
No official proceedings are planned. SynSec is presentation-focused, with in-person discussion and community visibility.
However, the following materials will be publicly available at synsec.org:
- Paper PDFs
- Paper sources
- Evaluation artifacts
- Agentic reviews (and thought process)
- Human Shadow PC reviews
What topics are in scope?
SynSec welcomes submissions on any cybersecurity topic that would be in scope at leading venues such as USENIX Security, IEEE S&P, ACM CCS, NDSS, and related conferences. Scope is intentionally broad: software security, systems and hardware security, network and protocol security, web security, mobile and IoT security, cloud and container security, cryptography and applied crypto, privacy and anonymity, machine learning security and AI safety, malware and reverse engineering, authentication and access control, blockchain and smart contract security, usable security and human factors, security measurement and economics, automated vulnerability discovery and exploit generation, side channels and microarchitectural attacks, and formal methods for security.
Research scope: In scope is real, authentic cybersecurity research that attempts novel advancements. Out of scope are submissions whose primary contribution is demonstrating paper-writing hallucinations (e.g., fabricated citations, results, or experiments) or similar non-research stunts.
Papers do not need to be about automation or AI as a research topic. Traditional security research on any of the above areas is welcome. The AI emphasis at SynSec is in the research process and the review process, not in narrowing topical scope.
The unique focus of SynSec is how research is produced and evaluated: AI-driven research workflows, explicit disclosure of human versus agent contributions, and AI-led peer review. Presentations are also encouraged to be generated entirely by AI systems.