Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:1/22/24

Upcoming Conferences and Workshops

Note: The submission date has passed.

February 2024

VehicleSec 2024 2nd ISOC Symposium on Vehicle Security and Privacy, Co-located with NDSS 2024, San Diego, CA, USA, February 26, 2024. [posted here 4/9/23]
A vehicle is a machine that transports people and/or cargo in one or more physical domains, such as on the ground (e.g., cars, bicycles, motorcycles, trucks, buses, scooters, trains), in the air (e.g., drones, airplanes, helicopters), underwater (e.g., ships, boats, watercraft), and in space (e.g., spacecraft). Due to their safety- and mission-critical nature, the security and privacy of vehicles can pose direct threats to passengers, owners, operators, as well as the environment. Recent improvements in vehicle autonomy and connectivity (e.g., autonomous driving, drone delivery, vehicle-to-everything (V2X) communication, intelligent transportation, drone swarm) have only served to exacerbate security and privacy challenges and thus require urgent attention from academia, industry, and policy-makers. To meet this critical need, the ISOC (Internet Society) VehicleSec symposium aims at bringing together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any security/privacy issues related to vehicles (e.g., ground, aerial, underwater, space), their sub-systems (e.g., in-vehicle networks, autonomy, connectivity, human-machine interfaces), supporting infrastructures (e.g., transportation infrastructure, charging station, ground control station), and related fundamental technologies (e.g., sensing, control, AI/ML/DNN/LLM, real-time computing, edge computing, location service, simulation, digital twin, multi-agent protocol/system design, and human-machine interaction).

For more information, please see https://www.ndss-symposium.org/ndss2024/submissions/cfp-vehiclesec/.

NDSS 2024 Network and Distributed System Security Symposium, San Diego, California, uSA, February 26 - March 1, 2024. [posted here 6/5/23]
The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS 2024 workshops and symposia will take place in San Diego, CA, from 26 February to 1 March 2024. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2024. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see https://www.ndss-symposium.org/ndss2024/.

March 2024

FC 2024 28th International Conference on Financial Cryptography and Data Security, Willemstad, Curacao, March 4-8, 2024. [posted here 8/21/23]
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and interdisciplinary works are particularly encouraged.

The goal of the conference is to bring security and cryptography researchers and practitioners together with economists, bankers, implementers and policy-makers. Intimate and colourful by tradition, the FC program features invited talks, academic presentations, technical demonstrations and panel discussions. In addition, several workshops will be held in conjunction with the FC conference.

For more information, please see https://fc24.ifca.ai/cfp.html.

FHE 2024 3rd Annual FHE.org Conference on Fully Homomorphic Encryption, Held in conjunction with the Real World Crypto 2024, Toronto, Canada, March 24, 2024. [posted here 10/18/23]
First envisioned in the late seventies, the first realization for fully homomorphic encryption only came three decades later. Fully homomorphic encryption has since been an active research topic. The FHE.org conference aims at being the premier forum gathering researchers, technologists and practitioners working on the design, development, deployment, validation, and applications of fully homomorphic encryption. The program committee is seeking original contributions on all aspects of fully homomorphic encryption. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of fully homomorphic encryption and related technologies. Topics of interest include, but are not limited to:
- Fully homomorphic encryption and its applications
- Efficient and secure implementations of cryptographic algorithms Software for fully homomorphic encryption
- Hardware architectures for fully homomorphic encryption
- Compilers for fully homomorphic encryption
- Physical attacks and countermeasures
- Secure applications using fully homomorphic encryption
- Security of encrypted computing and applications
- Cryptographic protocols using fully homomorphic encryption for privacy-preserving systems
- Formal modeling and formal proofs for encrypted computing
- Validation and certification of fully homomorphic encryption

For more information, please see https://asiaccs2024.sutd.edu.sg/cfp/.

April 2024

SPW 2024 29th International Workshop on Security Protocols, Brno, Czechia, April 10-12, 2024. [posted here 10/16/23]
The theme of the 2024 workshop is "Ghost in the Protocol — Security Protocols and AI". We invite proposals for papers containing exciting, original ideas that will elicit lively, thought-provoking in-person discussions. SPW papers should lead to conceptual advances, not be archival papers about work that has already been completed and polished. The workshop is by invitation only; to receive an invitation, please submit a position paper by 8 January 2024 for our consideration. Security protocols have always been seized with the question of whether a participant is a human or not. Given recent developments around the generation of text, images, code, audio and video, however, we must now consider the interplay of AI and the protocols themselves. Can machine-generated protocols, with machine-checked proofs, do a better job than human designers? Instead of humans producing machine-readable protocol descriptions, can machines produce human-comprehensible descriptions? As always, please consider this theme as inspirational rather than restrictive. As long-time attendees already know, it is perfectly acceptable to offer a position paper only loosely related to the theme, or on another security topic, provided the paper is deemed likely to stimulate an interesting discussion. New authors are encouraged to browse through past volumes of post-proceedings (search for Security Protocols Workshop in the Springer LNCS series) to get a flavor for the variety and diversity of topics that have been accepted in past years, as well as the lively discussion that has accompanied them.

For more information, please see https://www.cl.cam.ac.uk/events/spw/2024/.

May 2024

SP 2024 45th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-23, 2024. [posted here 6/7/23]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ìSoK:î in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

For more information, please see https://sp2024.ieee-security.org/cfpapers.html.

June 2024

CODASPY 2024 14th ACM Conference on Data and Application Security and Privacy, Porto, Portugal, June 19-21, 2024. [posted here 6/5/23]
The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security

For more information, please see http://www.codaspy.org/2024/.

July 2024

ASIACCS 2024 19th ACM ASIA Conference on Computer and Communications Security, Singapore, July 1-5, 2024. [posted here 4/9/23]
The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024) seeks paper submissions presenting novel contributions related to all real-world aspects of security and privacy. We seek articles presenting accessible and compelling results to general computer security researchers. Purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same goes for submissions focusing primarily on blockchains or machine learning.

Like in previous years, we will also be accepting “Systemisation of Knowledge” (SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the submission form. They will be accepted based on the value to the community. Survey papers without insights evaluating, systematizing and contextualizing current knowledge will be rejected.

For more information, please see https://asiaccs2024.sutd.edu.sg/cfp/.