|
Last Modified:12/16/24
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
December 2024
IFIP TC-11 SEC 2025
40th IFIP TC-11 International Information Security and Privacy Conference,
Maribor, Slovenia, May 21-23, 2025.
(Submission Due 20 December 2024) [posted here 11/18/24]
The IFIP SEC conference is the flagship event of the International Federation for
Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information
Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and
government presenting novel research on all theoretical and practical aspects of security
and privacy protection in ICT Systems. Practitioners and industry representatives are encouraged
to submit papers. We welcome contributions within, but not limited to, the following areas:
- Access control and authentication
- Applied cryptography
- Audit and risk analysis
- Big data security and privacy
- Cloud security and privacy
- Critical infrastructure protection
- Cyber-physical systems security
- Data and applications security
- Digital forensics
- Human aspects of security and privacy
- Identity management
- Industry networks security
- Information security education
- Information security management
- Information technology misuse and the law
- IoT security
- Managing information security functions
- Mobile security
- Multilateral security
- Network & distributed systems security
- Pervasive systems security
- Privacy protection and Privacy-by-design
- Privacy-enhancing technologies
- Quantum computations and post-quantum cryptography
- Side-channel attacks
- Surveillance and counter-surveillance
- Trust management
For more information, please see
http://sec2025.um.si/.
January 2025
MADWeb 2025
Workshop on Measurements, Attacks, and Defenses for the Web,
Co-located with NDSS Symposium 2025,
San Diego, California, USA, February 28, 2025.
(Submission Due 9 January 2025) [posted here 11/18/24]
The web connects billions of devices, running a plethora of clients, and serves billions
of users every day. To cope with such a widespread adoption, the web constantly changes. This is
evident by some browsers that have a release cycle of just six weeks. Unfortunately, these rapid
changes are not always designed with a security mindset, resulting in new attack vectors not observed before.
The MADWeb workshop aims to attract researchers who work on the intersection of browser evolution
and web security. Our goal is to create and sustain a specialized venue for discussing any aspects
of web security and privacy, such as the rapid changes to browsers from a security perspective,
the security implications of current web technologies, how we can protect users now, and make
browsers in the future more secure without hindering the evolution of the web.
Since MADWeb merged with the SecWeb workshop, in 2025 we welcome ideas on extending the web with
novel security mechanisms, better access interfaces (browsers), and disciplined programming
abstractions to support secure web application development natively. Moreover, we invite
contributions that propose provocative thoughts on re-envisioning (part of) the current web
platform with security built-in by design.
For more information, please see
https://www.ndss-symposium.org/ndss2025/submissions/cfp-madweb/.
ACM CCS 2025
32nd ACM Conference on Computer and Communications Security,
Taipei, Taiwan, October 13-17, 2025.
(Submission Due 9 January 2025 and 14 April 2025) [posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer security
and privacy. Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper in a way
that makes the results accessible and compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may be asked to review any paper.
Authors of each accepted paper must ensure that at least one author registers for the conference,
and that their paper is presented in-person at the conference if at all possible.
Please note that ACM CCS will strictly follow and enforce the policies and rules about
Conflicts of Interest and Peer-Review Integrity.
For more information, please see
https://www.sigsac.org/ccs/CCS2025/call-for-papers/.
FutureG 2025
Workshop on Security and Privacy of Next-Generation Networks,
Co-located with NDSS Symposium 2025,
San Diego, California, USA, February 24, 2025.
(Submission Due 10 January 2025) [posted here 11/18/24]
The FutureG Workshop on Security and Privacy of Next-Generation Networks,
co-located with NDSS Symposium 2025 in San Diego, California, aims to unite researchers, industry
professionals, and government representatives to tackle these emerging security and privacy issues in
next-generation networks, including 5G, 6G, and beyond. The workshop will feature paper presentations
and an interactive panel discussion to foster collaboration and the exchange of innovative ideas.
For more information, please see
https://www.ndss-symposium.org/ndss2025/submissions/cfp-futureg/.
IMPACT 2025
Workshop on Innovation in Metadata Privacy-Analysis and Construction Techniques,
Co-located with NDSS Symposium 2025,
San Diego, California, USA, February 28, 2025.
(Submission Due 10 January 2025) [posted here 11/18/24]
IMPACT seeks submissions related to all aspects of metadata privacy. We encourage researchers
to submit short papers on ongoing or planned work that can be read by participants in advance of the event.
The workshop will schedule 20 minute slots for presentations, broken into a 15-minute talk followed
by a 5-minute Q&A period.
For more information, please see
https://www.ndss-symposium.org/ndss2025/submissions/cfp-impact/.
BAR 2025
Binary Analysis Research Workshop,
Co-located with NDSS Symposium 2025,
San Diego, California, USA, February 28, 2025.
(Submission Due 15 January 2025) [posted here 11/18/24]
The Binary Analysis Research Workshop (BAR) aims to create a space for the binary analysis
research community to interact, foster collaboration, and present their cutting-edge works Ñ with
half of the workshop dedicated to traditional paper sessions and the other half to a roundtable
discussion among binary analysis researchers, developers, and practitioners. To this end, we
welcome submissions on all aspects of binary analysis, including: security, reverse engineering,
visualization, AI and ML, theory, human factors, gamification, tool development, and
transition-to-practice.
For more information, please see
https://www.ndss-symposium.org/ndss2025/submissions/cfp-bar/.
SELLMOD 2025
Workshop on the Safety and Explainability of Large Models Optimization and Deployment,
Co-located with NDSS Symposium 2025,
San Diego, California, USA, February 28, 2025.
(Submission Due 15 January 2025) [posted here 11/18/24]
The widespread application of artificial intelligence technologies across various
fields has become a critical driving force for modern societal development, especially for deep
neural networks and large language models. However, these models with a large number of parameters
pose challenges to be deployed in the devices with limited resources, especially for the
distributed edge devices. In recent years, researchers have proposed various optimization
techniques, such as model distillation, pruning, and compression and so on, aiming to reduce
computational resource consumption while retaining the system performance. However, the optimization
process raises safety concerns. Model compression and simplification may introduce novel
vulnerabilities, making the models more susceptible to attacks. While optimizing models reduce
computational resource consumption, they also challenge the decision-making process, complicating
the interpretation of model behaviours. Thus, ensuring the safety, robustness, and explainability
of large models while improving computational efficiency and resource utilization is our main goal.
To address these challenges, our goal is to gather researchers and experts from the areas of but
not limited to model optimization, safety, and explainability at this NDSS Symposium Workshop.
We aim to find innovative solutions that balance performance optimization, safety assurance, and
explainability through interdisciplinary exchange and collaboration. We hope this workshop will
become an important platform promoting the continuous research and development of AI technologies,
further advancing research in model optimization concerning safety and explainability.
For more information, please see
https://www.ndss-symposium.org/ndss2025/submissions/cfp-sellmod/.
DFRWS-USA 2025
25th Annual Digital Forensics Research Conference,
Chicago, Illinois, USA, July 22-25, 2025.
(Submission Due 20 January 2025) [posted here 11/4/24]
DFRWS conferences feature thought provoking Keynote Speakers, hands-on workshops, cutting edge
research papers, presentations, panel discussions, demonstrations and poster sessions accompanied by a
full schedule of social events including a Welcome Reception, the DFRWS Digital Forensics Rodeo and an
expedition. All presentations take place in-person but virtual registrations will be available for
those who are not able to attend the conference in person but wish to participate in this historic event.
FULL RESEARCH PAPERS undergo double-blinded peer review, and the proceedings are published by
Elsevier as a special issue of the Journal of Forensic Science International: Digital Investigation.
We ask to submit articles according to the submission instructions.
Systematization of Knowledge (SoK) Papers: As this marks the 25th occurrence of the conference, a substantial
body of knowledge has been published through this platform over the years. Therefore, starting from this year,
we solicit Systematization of Knowledge (SoK) papers that systematize, contextualize and evaluate existing
knowledge of digital forensics. A suitable SoK paper needs to provide unique insights, such as a new
viewpoint, a comprehensive taxonomy, and new evidence in supporting or challenging long-held beliefs.
A survey paper without such insights is not appropriate and may be rejected without full review.
A SoK paper submission needs to have the prefix ÒSoK: Ó in the title, and select the checkbox in
the submission form. Accepted SoK papers will be presented at the conference and included
in the proceedings.
For more information, please see
https://dfrws.org/conferences/dfrws-usa-2025/.
USENIX Security 2025
34th USENIX Security Symposium,
Seattle, WA, USA, August 13-15, 2025.
(Submission Due 4 September 2024 and 22 January 2025) [posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners,
system programmers, and others interested in the latest advances in the security and
privacy of computer systems and networks. The 2025 edition of USENIX Security will
implement a new approach to presenting accepted papers and fostering interactions
at the conference. The USENIX Security '25 program co-chairs and the USENIX Security
steering committee have prepared a public RFC about the plans for this new model
and welcome thoughts from the USENIX Security community by April 22, 2024.
For more information, please see
https://www.usenix.org/conference/usenixsecurity25.
February 2025
CSF 2025
38th IEEE Computer Security Foundations Symposium,
Santa Cruz, CA, USA, June 16-20, 2025.
(Submission Due 28 May 2024, 1 October 2024, and 4 February 2025) [posted here 10/1/24]
The Computer Security Foundations Symposium (CSF) is an annual conference for
researchers in computer security, to examine current theories of security, the formal models that
provide a context for those theories, and techniques for verifying security. It was created in 1988
as a workshop of the IEEE Computer SocietyÕs Technical Committee on Security and Privacy, in response
to a 1986 essay by Don Good entitled ÒThe Foundations of Computer SecurityÑWe Need Some.Ó The meeting
became a ÒsymposiumÓ in 2007, along with a policy for open, increased attendance. Over the past two
decades, many seminal papers and techniques have been presented first at CSF. For more details on the
history of the symposium, visit CSFÕs home.
The program includes papers, panels, and a poster session. Topics of interest include access control,
information flow, covert channels, cryptographic protocols, database security, language-based security,
authorization and trust, verification techniques, integrity and availability models, and broad discussions
concerning the role of formal methods in computer security and the nature of foundational research
in this area.
For more information, please see
https://csf2025.ieee-security.org.
PETS 2025
25th Privacy Enhancing Technologies Symposium,
Washington, DC and Online, July 14-19, 2025.
(Submission Due 31 May 2024, 31 August 2024, 30 November 2024, and 28 February 2025) [posted here 7/22/24]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts
from around the world to present and discuss recent advances and new perspectives on research in
privacy technologies. The 25th PETS will be a hybrid event with a physical gathering held in
Washington, DC, USA and a concurrent virtual event. Papers undergo a journal-style reviewing process,
and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).
Authors of accepted papers are encouraged to attend and present at the physical event, where their
presentations can be recorded for the virtual event and where they can participate directly in
in-person research, technical, and social activities. However, in-person attendance is not required
for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality
reviewing and publication while also supporting the successful PETS community event. PoPETs is
self-published and does not have article processing charges or article submission charges.
For more information, please see
https://petsymposium.org/cfp25.php.
March 2025
ACM WiSec 2025
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Arlington, Virginia, USA, June 30 - July 3, 2025.
(Submission Due 26 November 2024 and 12 March 2025) [posted here 10/14/24]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security
and privacy in wireless and mobile networks and their applications. In addition to the traditional
ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the
increasingly diverse range of mobile or wireless applications such as the Internet of Things,
Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable
security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the second list below:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization,
key management (agreement or distribution)
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software
vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion,
jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols,
cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA),
wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment
applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
- Wireless physical layer technologies: transmission, reception, modulation, localization,
remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices,
wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT,
Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites),
and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications,
sonic, underwater communications, legacy telecommunications, É
For more information, please see
https://wisec2025.gmu.edu.
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|