|
Past Conferences and Journal Special Issues
Last Modified:12/16/24
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
ICSS 2024
10th Industrial Control System Security Workshop,
Held in conjunction with the Annual Computer Security Applications Conference (ACSAC),
Waikiki, Hawaii, Dec 10, 2024.
[posted here 8/12/24]
Supervisory control and data acquisition (SCADA) and industrial control
systems (ICS) monitor and control a wide range of critical industrial and
infrastructure processes, such as water treatment, power generation and transmission,
oil and gas refining, and manufacturing. Furthermore, the Industrial Internet of
Things (IIoT) is rapidly expanding the interconnectivity of ICS environments and
introducing many new threats. These environments have been identified as a key
target of more generic threats (ransomware, e.g., CL0p), along with more recent
tailored nation-state threats targeting electric transmission and distribution
systems (e.g., COSMICENERGY).
The essential requirement for high availability in SCADA and industrial control
systems, along with the use of resource-constrained computing devices, legacy
operating systems, and proprietary software applications, limits the applicability
of traditional information security solutions. The goal of this workshop is to
explore new techniques that are more effective and efficient at improving the
security and resilience of critical control systems in the face of emerging threats.
For more information, please see
https://www.acsac.org/2024/workshops/icss/.
FPS 2024
17th International Symposium on Foundations & Practice of Security,
Montreal, Canada, December 9-11 2024.
[posted here 6/15/24]
We invite researchers and practitioners from all countries working in
security, privacy, cyber resilience, and related areas to participate in the event.
Protecting the data and the infrastructure of an increasingly interconnected
world has become vital to the normal functioning of all aspects of our daily
life. Security, privacy and cyber resilience have emerged as scientific research
fields whose multifaceted complexities deserve the attention and synergy of
various communities such as mathematics, computer science, information systems,
management, and criminology. Alongside technical defenses, this 17th
symposium will highlight innovative behavioral research enhancing privacy
and cyber resilience. The aim of FPS is to discuss and exchange theoretical and practical
ideas that address privacy, security and cyber resilience issues in interconnected
systems. It aims to provide scientific presentations and to promote scientific collaboration,
joint research programs, and student exchanges between institutions involved in this
fast-moving field.
For more information, please see
https://fps-2024.hec.ca.
UIC 2024
21th IEEE International Conference on Ubiquitous Intelligence and Computing,
Denarau Island, Fiji, December 2-7, 2024.
[posted here 3/25/24]
Ubiquitous sensors, devices, networks and information are paving the way towards
a smart world in which computational intelligence is distributed throughout the physical
environment to provide reliable and relevant services to people. This ubiquitous intelligence
will change the computing landscape because it will enable new breeds of applications and
systems to be developed and the realm of computing possibilities will be significantly extended.
By enhancing everyday objects with intelligence, many tasks and processes could be simplified,
more efficient and more enjoyable. Ubiquitous computing is to create such intelligent/smart
environments, services and applications. The conference includes the topic of Security,
Privacy, and Trust.
For more information, please see
https://www.ieee-smart-world.org/2024/uic/.
CRiSIS 2024
19th International Conference on Risks and Security of Internet and Systems,
Aix-en-Provence, France, November 26-28, 2024.
[posted here 4/15/24]
CRiSIS) in 2024 continues its tradition of addressing critical security
challenges in Internet-connected applications, networks, and systems. The indispensability
of the Internet for information exchange among diverse user groups and organizations has
led to heightened risks around security and privacy. This vulnerability is exacerbated
by the sophistication of online attacks, the proliferation of cybercrime, and the
readily available tools for attackers, who are increasingly motivated and skilled.
CRiSIS 2024 serves as an essential platform for stakeholders in computer and
network security from the industrial, academic, and governmental sectors to convene,
share insights, and showcase the latest developments in combating Internet-related
security threats, vulnerabilities, and the necessary countermeasures to address them.
For more information, please see
https://crisis2024.univ-gustave-eiffel.fr.
NSS-SocialSec 2024
Joint 18th International Conference on Network and System Security and
10th International Symposium on Security and Privacy in Social Networks and Big Data,
Abu Dhabi, UAE, November 20-22, 2024.
[posted here 5/27/24]
Founded in 2007, the aim of the NSS (International Conference on Network and
System Security) series is to provide a leading-edge forum to foster interaction between
researchers and developers with the network and system security communities, and to give
attendees an opportunity to interact with experts in academia, industry, and governments.
SocialSec 2024 is the 10th edition of the International Symposium on Security and
Privacy in Social Networks and Big Data series, which started in 2015.
For more information, please see
http://nsclab.org/nss-socialsec2024/index.html.
DASC 2024
22nd IEEE International Conference on Dependable, Autonomic and Secure Computing,
Boracay Island, Malay, Philippines, November 5-8, 2024.
[posted here 4/1/24]
As computer and communication systems, and other systems such as Cyber-Physical
Systems (CPS), Internet of Things (IoT), and Autonomous Robotic Systems, become increasingly
large and complex, their Dependability and Security play critical roles in supporting
next-generation science, engineering, and commercial applications. It remains a challenge
to design, analyze, evaluate, and improve the dependability and security of a large-scale
computing environment. Trusted and autonomic computing/autonomous systems need synergistic
research efforts covering many disciplines, from natural sciences to social sciences. It
requires scientific and technological advances in a variety of fields, as well as new
software, architectures, and communication technology that support the integration of
the constituent technologies. IEEE DASC 2024 aims to bring together computer scientists,
industrial engineers, and researchers to discuss and exchange theoretical and
implementation results, novel designs, work-in-progress, experience, case studies, and
trend-setting ideas in the areas of dependability, security, trust, and/or autonomic
computing, and autonomous systems.
For more information, please see
http://cyber-science.org/2024/dasc/.
ICTAI 2024
36th IEEE International Conference on Tools with Artificial Intelligence,
Herndon, VA, USA, October 30 - November 1, 2024.
[posted here 3/25/24]
The IEEE International Conference on Tools with Artificial Intelligence (ICTAI)
is a leading IEEE-CS annual scientific meeting for three decades. It provides a major
international forum where the creation and exchange of ideas related to artificial
intelligence are fostered among academia, industry, and government agencies. The
conference facilitates the cross-fertilization of these ideas and promotes their transfer
into practical tools, for developing intelligent systems and pursuing artificial
intelligence applications. The ICTAI encompasses all technical aspects of specifying,
developing and evaluating the theoretical underpinnings and applied mechanisms of
the AI-based components of computer tools such as algorithms, architectures and
languages. The conference includes the topic of AI in Computer Security, Data Privacy,
and Information Assurance.
For more information, please see
https://ictai.computer.org/2024/.
TPS 2024
6th IEEE International Conference on Trust, Privacy and Security in Intelligent
Systems, and Applications, Washington D.C., USA, October 28-30, 2024.
[posted here 6/17/24]
Recent advances in computing and information technologies such as IoT,
mobile Edge/Cloud computing, cyber-physical-social systems, Artificial
Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating
next generation smart and intelligent systems and applications that can have
transformative impact in our society while accelerating rapid scientific discoveries
and innovations. Such newer technologies and paradigms are getting increasingly embedded
in the computing platforms and networked information systems/infrastructures that form
the digital foundation for our personal, organizational and social processes and activities.
It is increasingly becoming critical that the trust, privacy and security issues in such
digital environments are holistically addressed to ensure the safety and well-being of
individuals as well as our society.
IEEE International Conference on Trust, Privacy and Security in Intelligent Systems,
and Applications (IEEE TPS-ISA) is an international multidisciplinary forum for
presentation of state-of-the art innovations, and discussion among academic, industrial
researchers, and practitioners on issues related to trust, privacy and security in
emerging smart and intelligent systems and applications.
For more information, please see
https://www.sis.pitt.edu/lersais/conference/tps/2024/.
ASHES 2024
8th Workshop on Attacks and Solutions in Hardware Security,
Held in conjunction with the 31st ACM CCS 2024,
Salt Lake City, UT, USA, October 14-18, 2024.
[posted here 7/15/24]
ASHES deals with any aspects of hardware security, and welcomes any contributions
in this area, including practical, implementation-related, or theoretical works. Among others,
ASHES particularly highlights emerging methods and application areas. This includes new
attack vectors, novel designs and materials, lightweight security primitives, nanotechnology,
and PUFs on the methodological side, as well as the internet of things, automotive security,
smart homes, pervasive and wearable computing on the applications side.
In order to meet the requirements of its rapidly developing area, ASHES hosts four
categories of papers: Classical full and short papers, as well as systematization of
knowledge papers (which overview, structure, and/or categorize a certain subarea),
and wild and crazy papers (whose purpose is rapid dissemination of promising,
potentially game-changing new ideas without full demonstration).
For more information, please see
https://sss2024.github.io.
ACM CCS 2024
31th ACM Conference on Computer and Communications Security,
Salt Lake City, Utah, USA, October 14-18, 2024.
[posted here 3/18/24]
The 31th ACM Conference on Computer and Communications Security (CCS)
seeks submissions presenting novel contributions related to all real-world
aspects of computer security and privacy. Theoretical papers must make a
convincing case for the relevance of their results to practice.
Authors are encouraged to write the abstract and introduction of
their paper in a way that makes the results accessible and
compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee
may be asked to review any paper.
For more information, please see
https://www.sigsac.org/ccs/CCS2024/call-for/call-for-papers.html.
HealthSec 2024
Workshop on Cybersecurity in Healthcare,
Held in conjunction with the 31st ACM Conference on Computer and Communications Security (CCS 2024),
Salt Lake City, Utah USA, October 14, 2024.
[posted here 5/6/24]
In its most basic form, healthcare is gathering data, interpreting data
into information, and transforming information into current human knowledge that can
be acted upon, with each of these stages open to unintended errors and/or malicious
subversion. These stages do not occur within a vacuum but rather within our
existing infrastructures and social system with all their current limitations,
systemic bias, and exploitable vulnerabilities. While a similar characterization
can be made about security in other applied domains, healthcare is undergoing a
dramatic transformation, arguably the next technological revolution, presenting
immediate opportunities for improvement along with corresponding challenges in security.
ur desire is to bring together diverse researchers from academia, government,
and the healthcare industry to report on latest research efforts. As this is
the inaugural workshop focusing on cybersecurity in healthcare, we aim to
encourage, jumpstart, and grow excellent interdisciplinary contributions at the
forefront of research.
For more information, please see
https://publish.illinois.edu/healthsec/.
BRAINS 2024
6th Conference on Blockchain Research & Applications for Innovative
Networks and Services, Berlin, Germany, October 8-11, 2024.
[posted here 6/10/24]
Web3, Blockchain, and Distributed Ledger Technologies (DLT) have the
potential to disrupt any domain involving coordination among autonomous resources.
This includes finance and payments (e.g., fintech), but also networks (e.g.,
power grids or telecom networks), computing (e.g., brokering of edge resources),
IoT (e.g., supply chain, V2X or industry 4.0) or service platforms (e.g., identity
management). BRAINS conference is dedicated to these advances that could make
the world of networks and services more secure while enabling new distributed
business models.
For more information, please see
https://brains.dnac.org/2024/.
MarCaS 2024
2nd IEEE LCN Special Track on Maritime Communication and Security,
Held in conjunction with the 49th Annual IEEE Conference on Local Computer
Networks (IEEE LCN 2024),
Caen, Normandy, France, October 8-10, 2024.
[posted here 2/5/24]
The LCN’s MarCaS 2024 Special Track is the continuation of
the successful MarCaS workshop from the previous year. Its scope are
innovations from research necessary for the digital transformation,
focusing on maritime information technology (IT) and operational
technology (OT) on board vessels and maritime industrial control systems,
but also on shore at ports, terminals, and other maritime infrastructures.
Maritime communication, satellite navigation, radio-based situational
awareness systems, and maritime cloud services are of particular interest
of MarCaS, combined with novel cybersecurity approaches for a safer and
more resilient MTS.
For more information, please see
https://garykessler.net/lcn_marcas/.
6GQ 2024
Workshop on Postquantum Cryptography and Quantum Communication for 6G Networks,
Held in conjunction with the 49th Annual IEEE Conference on Local Computer Networks (LCN 2024),
Caen, Normandy, France, October 8-10, 2024.
[posted here 4/15/24]
The emergence of quantum computers poses a significant threat to
current cryptographic standards. Integrating PQC and quantum communications into
6G networks is critical to ensuring these applications remain secure and resilient
to quantum attacks. The Postquantum Cryptography and Quantum Communication for 6G
Networks (6GQ) workshop invites original research and review papers that push the
boundaries of knowledge in post-quantum cryptography (PQC), quantum communication,
and their integration into 6G networks. We encourage submissions that address
theoretical developments, practical implementations, and innovative applications
in these areas.
For more information, please see
https://sites.google.com/view/6gq2024/home.
CNS 2024
12th IEEE Conference on Communications and Network Security,
Taipei, Taiwan, September 30 - October 3, 2024.
[posted here 3/11/24]
The IEEE Conference on Communications and Network Security (CNS) is
a premier forum for cybersecurity researchers, engineers, practitioners, and
policy makers to exchange ideas, techniques and tools related to all practical
and theoretical aspects of communications and network security. The conference
seeks submissions from academia, industry, and government presenting novel
research results in communications and network security.
For more information, please see
https://cns2024.ieee-cns.org/.
RAID 2024
27th International Symposium on Research in Attacks, Intrusions
and Defenses,
Padua, Italy, September 30 - October 2, 2024.
[posted here 2/12/24]
Since its inception in 1997, the International Symposium on Research in Attacks,
Intrusions, and Defenses (RAID) has established itself as a venue where leading
researchers and practitioners from academia, industry, and the government are
given the opportunity to present novel research in a unique venue to an engaged
and lively community.
The conference is known for the quality and thoroughness of the reviews of
the papers submitted, the desire to build a bridge between research carried
out in different communities, and the emphasis given on the need for sound
experimental methods and measurement to improve the state of the art in
cybersecurity.
This year we are soliciting research papers on topics covering all well-motivated
computer security problems. We care about techniques that identify new real-world
threats, techniques to prevent them, to detect them, to mitigate them or to
assess their prevalence and their consequences. Measurement papers are
encouraged, as well as papers offering public access to new tools or datasets,
or experience papers that clearly articulate important lessons learned.
Specific topics of interest to RAID include, but are not limited to:
- Computer, network, and cloud computing security
- Malware and unwanted software
- Program analysis and reverse engineering
- Mobile Security
- Web security and privacy
- Vulnerability analysis techniques
- Usable security and privacy
- Intrusion detection and prevention
- Hardware security
- Cyber physical systems security and threats against critical infrastructures
- IoT security
- Statistical and adversarial learning for computer security
- Cyber crime and underground economies
- Denial-of-Service attacks and defenses
- Security measurement studies
- Digital forensics
For more information, please see
https://raid2024.github.io/.
EuroUSEC 2024
European Symposium on Usable Security conference,
Karlstad, Sweden, September 30 - October 1, 2024.
[posted here 5/6/24]
The European Symposium on Usable Security (EuroUSEC) is a forum for
research and discussion on human factors in security and privacy. EuroUSEC solicits
previously unpublished work offering novel research contributions in any aspect of
human-centred security and privacy. EuroUSEC aims to bring together researchers,
practitioners, and students from diverse backgrounds including computer science,
engineering, psychology, the social sciences, and economics to discuss issues
related to human-computer interaction, security, and privacy.
We welcome submissions containing unpublished original work describing research,
visions, or experiences in all areas of usable security and privacy. We also
welcome the systematization of knowledge with a clear connection to usable
security and privacy. We welcome a variety of research methods, including both
qualitative and quantitative approaches. Note that All submissions must clearly
relate to human aspects of security or privacy.
For more information, please see
https://eurousec24.kau.se.
CANS 2024
International Conference on Cryptology and Network Security,
Cambridge, UK, September 24-27, 2024.
[posted here 3/18/24]
The International Conference on Cryptology and Network
Security (CANS) is a premier forum for presenting research in the
field of cryptology and network security. The conference seeks
academic, industry, and government submissions on all theoretical
and practical cryptology and network security aspects. This year
marks the 23rd iteration of the conference and will be held at
the University of Cambridge, England. Proceedings of previous
iterations of the conference were published by Springer LNCS and
we have applied to do the same this year.
For more information, please see
https://2024.cansconference.org/.
eCrime 2024
19th annual APWG eCrime symposium,
Boston, Massachusetts, USA, September 24-26, 2024.
[posted here 5/6/24]
APWG eCrime 2024 contemplates the dawn of its third decade at
the cybercrime frontier by delineating the challenges that await the interveners,
investigators, policy makers and stakeholders from private and public sectors
attempting to arrest — and reverse — the pandemic spread of cybercrime on our
public and private internetworks and the World Wide Web.
For more information, please see
https://ecrime2024.hotcrp.com.
SYSTOR 2024
17th ACM International System and Storage Conference,
Tel Aviv-Yaffo, Israel, September 23-25, 2024.
[posted here 2/5/24]
The ACM International Systems and Storage Conference (SYSTOR) is
an excellent international forum for interaction across the systems research
community. The program includes both innovative, peer-reviewed research
papers in the broad area of systems, as well as distinguished keynote
lecturers, a poster session, and social events. ACM SYSTOR is designed
to appeal to academic and industrial researchers and practitioners,
welcoming both students and seasoned professionals. SYSTOR has
traditionally welcomed academic and industrial papers in systems
including storage, cloud and distributed systems, networking, and systems
security, broadly construed. While continuing on this tradition,
this year, we are broadening the scope to also include research
on systems issues in AI and/or sustainability, including those that
involve workload optimization, data processing, lifecycle of systems,
carbon footprint transparency, and system re-designs. SYSTOR encourages
submissions that describe results from experimental system prototypes,
as well as experience papers describing practical deployments, and
valuable lessons learned from them. Topics of interest
include System Security and Trust.
For more information, please see
https://www.systor.org/2024/.
CBT 2024
8th International Workshop on Cryptocurrencies and Blockchain Technology,
Held in conjunction with ESORICS 2024,
Bydgoszcz, Poland, September 19, 2024.
[posted here 6/10/24]
Since the appearance of Bitcoin in 2009, a plethora of new
cryptocurrencies and other blockchain based systems have been deployed
with different success. While some of them are slightly different
copies of Bitcoin, other ones propose interesting improvements or new
usages of the underlying blockchain technology. However, the novelty
of such technologies is often tied with rapid developments and
proof-of-concept software, and rigorous scientific analyses of the
proposed systems are often skipped.
This workshop aims to provide a forum for researchers in this area to
carefully analyze current systems and propose new ones in order to
create a scientific background for a solid development of new
cryptocurrencies and blockchain technology systems.
For more information, please see
http://cbtworkshop.org/.
DPM 2024
18th International Workshop on Data Privacy Management,
Co-located with ESORICS 2024,
Bydgoszcz, Poland, September 19, 2024.
[posted here 5/27/24]
DPM is an annual international workshop covering research in data
privacy management. Organizations are increasingly concerned
about the privacy of information that they manage (as witnessed,
for example, by lawsuits filed against organizations for
violating the privacy of customer's data). Thus, the management
of privacy-sensitive information is very critical and important
for every organization.
For more information, please see
https://deic.uab.cat/dpm/dpm2024/.
ESORICS 2024
9th European Symposium on Research in Computer Security,
Bydgoszcz, Poland, September 16-20, 2024.
[posted here 1/8/24]
Computer security emphasizes safeguarding information in settings susceptible
to breaches or malevolent activities. The aim of ESORICS is to further the progress
of research in computer security by fostering a European community that bridges
academia and industry in this realm. Sequentially hosted across various European
nations, the symposium has solidified its position as one of Europe's most
prominent conferences on computer security. Currently, the symposium delves into
research and developmental avenues encompassing AI, machine learning,
technologies that enhance privacy, network safeguards, software and hardware
protection in practical scenarios.
For more information, please see
https://esorics2024.org.
SCN 2024
14th International Conference on Security and Cryptography for Networks,
Amalfi, Italy. September 11-13, 2024.
[posted here 1/22/24]
The Fourteenth International Conference on Security and Cryptography for
Networks (SCN 2024) aims to bring together researchers in the field of cryptography
and information security, practitioners, developers, and users to foster cooperation,
exchange techniques, tools, experiences and ideas. The conference seeks submissions
from academia, government, and industry presenting novel research on all practical
and theoretical aspects of cryptography and information security. The primary focus
is on original, high quality, unpublished research of theoretical and practical
impact, including concepts, techniques, applications and practical experiences.
Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference/workshop with proceedings.
For more information, please see
https://scn.unisa.it/scn24/index.php/call-for-papers/.
CSR 2024
IEEE International Conference on Cyber Security and Resilience,
London, UK, Hybrid Conference, September 2-4, 2024.
[posted here 2/5/24]
The technological and industrial revolution brought by complex
cyber-physical systems (CPS) comes with new threats and cyber-attacks that
exploit their inherent complexity and heterogeneity. These attacks have
a significant negative impact on the operation of various services in
critical sectors, like energy, transport, and communications, which provide
the vital functions that our societies depend upon.
The conference focuses on theoretical and practical aspects of the
security, privacy, trust, and resilience of networks, systems, and
services as well as novel ways for dealing with their vulnerabilities
and mitigating sophisticated cyber-attacks.
For more information, please see
https://www.ieee-csr.org/.
ICICS 2024
26th International Conference on Information and Communications Security,
Mytilene, Greece, August 26-28, 2024.
[posted here 1/8/24]
Authors are invited to submit original papers not previously published
nor submitted in parallel for publication to any other conference, workshop or
journal. All submitted papers must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references, for double blind reviews. The page limits
for the camera-ready papers are 20 pages, including the bibliography and
well-marked appendices. Selected accepted papers will be invited to submit
extended versions to a special issue of the International Journal of
Information Security.
For more information, please see
http://icics2024.aegean.gr/submissions/.
SciSec 2024
6th International Conference on Science of Cyber Security,
Copenhagen, Denmark, August 14-16, 2024.
[posted here 2/26/24]
SciSec2024 aims at bringing together scholars, scientists, and
industrialists from all over the world on a common platform to present their original,
unpublished high-quality research papers and share their valuable research
insights in the fields of, but not limited to Cyber Security, AI, Quantum
Technologies, Blockchain, IoT, Cloud Computing, and emerging fields.
For more information, please see
https://scisec.org/index.html.
USENIX Security 2024
33rd USENIX Security Symposium,
Philadelphia, PA, USA, August 14-16, 2024.
[posted here 1/28/23]
The USENIX Security Symposium brings together researchers, practitioners,
system administrators, system programmers, and others interested in the
latest advances in the security and privacy of computer systems and networks.
The Call for Papers will be available soon.
For more information, please see
https://www.usenix.org/conference/usenixsecurity24.
CSET 2024
17th Cyber Security Experimentation and Test Workshop,
Philadelphia, PA, USA, August 13, 2024.
[posted here 3/18/24]
For 16 years, the Workshop on Cyber Security Experimentation and
Test (CSET) has been an important and lively space for presenting research on
and discussing “meta” cybersecurity topics related to reliability, validity,
reproducibility, transferability, ethics, and scalability—in practice, in research,
and in education. Submissions are particularly encouraged to employ a scientific
approach to cybersecurity and/or demonstrably grow community resources.
For more information, please see
https://cset24.isi.edu/index.html.
SOUPS 2024
20th Symposium on Usable Privacy and Security,
Philadelphia, PA, USA, August 11-13, 2024.
[posted here 1/8/24]
The 2024 Symposium on Usable Privacy and Security (SOUPS) will bring together
an interdisciplinary group of researchers and practitioners in human computer interaction,
security, and privacy. We invite authors to submit previously unpublished papers
describing research or experience in all areas of usable privacy and security.
We welcome a variety of research methods, including both qualitative and quantitative
approaches. Papers will be judged on their scientific quality, overall quality, and
contribution to the field.
For more information, please see
https://www.usenix.org/conference/soups2024.
EDid 2024
1st International Workshop on Emerging Digital Identities,
Held in conjunction with the 19th International Conference on Availability,
Reliability and Security (ARES 2024),
Vienna, Austria, July 30 - August 2, 2024.
[posted here 3/11/24]
The identity environment has evolved into a complex ecosystem demanding
seamless interoperability, stronger security measures, and user-centric
experiences in an increasingly interconnected digital world. Addressing
these difficulties necessitates collaboration among scholars and practitioners
from diverse disciplines, establishing an interdisciplinary approach critical
for shaping the future of identity management. EDId navigates a wide variety of
security, privacy, and legal compliance issues, addressing technical issues
like security and interoperability as well as legal and regulatory considerations
like data protection and privacy.
For more information, please see
https://www.ares-conference.eu/edid.
BASS 2024
4th International Workshop on Behavioral Authentication for System Security,
Held in conjunction with the 19th International Conference on Availability,
Reliability and Security (ARES 2024),
Vienna, Austria, July 30 - August 2, 2024.
[posted here 3/18/24]
BASS aims at attracting innovative contributions from both industry and
academia related to all aspects of human, system, or software behavioral analysis
for IT security. The workshop solicits submissions on both theoretical aspects
and practical applications of behavior analysis, behavior-based identification
and authentication, profiling, and privacy and security aspects related to
recording and exploitation of behavioral features.
For more information, please see
https://www.ares-conference.eu/workshops/bass/.
ENS 2024
7th International Workshop on Emerging Network Security,
Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024),
Vienna, Austria, July 30 - August 2, 2024.
[posted here 3/25/24]
The ENS 2024 workshop aims at collecting the most relevant ongoing
research efforts in emerging network security field. It also serves as a forum for 5G &
beyond projects in order to disseminate their security-related results and boost cooperation,
also foster development of the 5G and beyond Security Community made of 5G security experts
and practitioners who pro-actively discuss and share information to collectively progress
and align on the field. Last but not least it also aims to bridge 5G & Beyond community
with other communities (e.g. AI) that are key to support full attainment of 5G & Beyond
but also 6G promises and so for those technologies to release their full potential.
For more information, please see
https://www.ares-conference.eu/ens/.
CUING 2024
8th International Workshop on Cyber Use of Information Hiding,
Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024),
Vienna, Austria, July 30 - August 2, 2024.
[posted here 3/25/24]
The increasing number of Internet users, availability of storage and network resources,
and proliferation of as-a-Service frameworks, leads to a new-wave of offensive campaigns
targeting the virtual world. With the diffusion of improved defensive methods, attackers
now utilize more and more sophisticated techniques to perform their malicious activities.
In recent years, information hiding has emerged as one of the most sophisticated and
effective mechanisms for launching attacks. Threat actors now regularly use information
hiding to elude countermeasures and prevent reversing the attack chain. More recently,
hiding techniques have been deployed to create covert channels, i.e., parasitic
communications paths nested in network traffic and digital objects, mainly to cloak
command & control communications. Unfortunately, detection and mitigation of threats
taking advantage of information hiding are hard tasks that pose many new challenges
for digital forensics analysts, academics, law enforcement agencies, and security professionals.
The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to bring
together researchers, practitioners, law enforcement representatives, and security
professionals in the area of analysis of information hiding techniques when used in
cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop
are not limited to classic digital steganography applications or the creation and
mitigation of covert communications. Therefore, CUIng also welcomes works that pertain
to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of
processes, and communication flows. To present a more complete picture of the novel
research on hiding methods and their utilization by the attackers, submissions
dealing with impersonation or mimicking are encouraged as well, especially to address
information hiding in a complete manner, for instance, to discuss ideas for fighting
misuse of privacy-enhancing technologies.
This year the CUING workshop is co-organized together with DISSIMILAR (Detection of
fake newS on SocIal MedIa pLAtfoRms) project.
For more information, please see
https://www.ares-conference.eu/cuing.
ARES 2024
19th International Conference on Availability, Reliability and Security,
Vienna, Austria, July 30 - August 2, 2024.
[posted here 2/26/24]
The 19th International Conference on Availability, Reliability and
Security (“ARES – The International Dependability Conference”) will bring
together researchers and practitioners in the area of dependability.
ARES highlights the various aspects of dependability – with special
focus on the crucial linkage between availability, reliability and security.
It aims at a full and detailed discussion of the research issues of
dependability as an integrative concept that covers amongst others availability,
safety, confidentiality, integrity, maintainability and security in the
different fields of applications. It emphasizes the interplay between
foundations and practical issues of dependability in emerging areas such as
e-government, m-government, location-based applications, ubiquitous
computing, autonomous computing, chances of grid computing etc. SRES is
devoted to the critical examination and research challenges of the
various aspects of Dependable Computing and the definition of a future
road map.
For more information, please see
http://www.ares-conference.eu/.
PETS 2024
24th Privacy Enhancing Technologies Symposium (PETS 2024)
Bristol, UK and Online, July 15-20, 2024.
[posted here 6/5/23]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 24th PETS will be a hybrid event
with a physical gathering held in Bristol, UK and a concurrent virtual event. Papers
undergo a journal-style reviewing process, and accepted papers are published in the
journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted
papers are encouraged to attend and present at the physical event, where their presentations
can be recorded for the virtual event and where they can participate directly in in-person
research, technical, and social activities. However, in-person attendance is not required
for publication in the proceedings. We will carefully monitor the COVID-19 situation, and
may change the organization of the event as necessary.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges
(APCs) or article submission charges.
For more information, please see
https://petsymposium.org/cfp24.php.
DFRWS 2024
24th Annual Digital Forensic Research Conference,
Baton Rouge, LA, USA, July 9-12, 2024.
[posted here 4/9/23]
DFRWS is a premier conference for digital forensic research. It attracts
participants from many sectors, including law enforcement (such as local state police
and federal agencies), industry (including vendors and practitioners), and academia.
The Forensic Science International: Digital Investigation Journal, Elsevier, will
publish the DFRWS proceedings as open access in a supplement issue.
For more information, please see
https://dfrws.org/conferences/dfrws-usa-2024/.
CSF 2024
37th IEEE Computer Security Foundations Symposium,
Enschede, Netherlands, July 8-12, 2024.
[posted here 6/5/23]
The Computer Security Foundations Symposium (CSF) is an annual
conference for researchers in computer security, to examine current theories
of security, the formal models that provide a context for those theories, and
techniques for verifying security. It was created in 1988 as a workshop of
the IEEE Computer Society's Technical Committee on Security and Privacy, in
response to a 1986 essay by Don Good entitled “The Foundations of Computer
Security—We Need Some.” The meeting became a “symposium” in 2007, along with
a policy for open, increased attendance. Over the past two decades, many
seminal papers and techniques have been presented first at CSF. For more
details on the history of the symposium, visit CSF's home.
The program includes papers, panels, and a poster session. Topics of interest
include access control, information flow, covert channels, cryptographic
protocols, database security, language-based security, authorization and
trust, verification techniques, integrity and availability models, and
broad discussions concerning the role of formal methods in computer security
and the nature of foundational research in this area.
For more information, please see
https://csf2024.ieee-security.org.
FCS 2024
Workshop on Foundations of Computer Security,
Co-located with CSF 2024,
Enschede, Netherlands, July 8, 2024.
[posted here 5/6/24]
FCS is a friendly, in-person 1-day workshop that brings together
researchers interested in laying the foundations of secure systems.
FCS welcomes papers on all topics related to the formal underpinnings of
security and privacy, and their applications. The workshop has no formal
proceedings: you are welcome to advertise work that appeared in other venues or
submit your work-in-progress. We are seeking submissions for full-length talks
and short talks. Submissions may conform to any 2-column format accepted by
IEEE, ACM, or USENIX conferences. FCS uses a light form of double-blind
reviewing similar to CSF.
For more information, please see
https://fcs-workshop.github.io/fcs2024/.
WTMC 2024
9th International Workshop on Traffic Measurements for Cybersecurity,
Co-located with the 9th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2024),
Vienna, Austria, July 8, 2024.
[posted here 3/25/24]
The WTMC workshop aims to bring together the research accomplishments provided
by researchers from academia and the industry. The other goal is to show the latest research
results in the field of cybersecurity and understand how traffic measurements can influence it.
We encourage prospective authors to submit related distinguished research papers on the subject
of both theoretical approaches and practical case reviews. This workshop presents some of the
most relevant ongoing research in cybersecurity seen from the traffic measurements perspective.
The workshop will be accessible to both non-experts interested in learning about this area
and experts interested in hearing about new research and approaches.
For more information, please see
https://wtmc.info/.
ASIACCS 2024
19th ACM ASIA Conference on Computer and Communications Security,
Singapore, July 1-5, 2024.
[posted here 4/9/23]
The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024)
seeks paper submissions presenting novel contributions related to all real-world aspects of
security and privacy. We seek articles presenting accessible and compelling results to
general computer security researchers. Purely theoretical (e.g., cryptography-focused,
with no security/application connections) submissions are not encouraged. The same
goes for submissions focusing primarily on blockchains or machine learning.
Like in previous years, we will also be accepting “Systemisation of Knowledge” (SoK)
papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the
submission form. They will be accepted based on the value to the community. Survey papers
without insights evaluating, systematizing and contextualizing current knowledge will be rejected.
For more information, please see
https://asiaccs2024.sutd.edu.sg/cfp/.
SaT-CPS 2024
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems,
Held in conjunction with the 14th ACM Conference on Data and Application
Security and Privacy (CODASPY 2024),
Porto, Portugal, June 21, 2024.
[posted here 2/19/24]
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS)
aims to represent a forum for researchers and practitioners from industry and
academia interested in various areas of CPS security. SaT-CPS seeks novel
submissions describing practical and theoretical solutions for cyber
security challenges in CPS. Submissions can be from different application
domains in CPS.
For more information, please see
https://sites.google.com/view/sat-cps-2024/.
CODASPY 2024
14th ACM Conference on Data and Application Security and Privacy,
Porto, Portugal, June 19-21, 2024.
[posted here 6/5/23]
The conference seeks submissions from diverse communities,
including corporate and academic researchers, open-source projects,
standardization bodies, governments, system and security administrators,
software engineers and application domain experts. Topics of interest include,
but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security
For more information, please see
http://www.codaspy.org/2024/.
SAGAI 2024
Workshop on Security Architectures for GenAI Systems,
Held in conjunction with IEEE SP 2024 Conference,
San Francisco, California, USA, May 23, 2024.
[posted here 12/25/23]
Generative AI (GenAI) is quickly advancing and fast becoming a
widely deployed technology. GenAI-based systems rely on machine-learning (ML)
models trained on large amounts of data using deep-learning techniques. As the
power and flexibility of the models advance, the architectural complexity of
GenAI-based systems is advancing too. Current architectures may combine
multiple models, using sequences of model queries to complete a task, with
external (non-ML) components leveraged to enhance the model’s operation via
database queries or API calls. These architectures may be vulnerable to a
variety of attacks that use adversarial inputs to create malicious outputs.
This workshop invites new contributions to the broader understanding of
security for GenAI systems and applications. Contributions may address
security threats and defenses for individual models, or for systems and
architectures that may employ one or more generative ML models as subcomponents.
The workshop welcomes discussion of new GenAI security concerns, as well as
new approaches to architecting GenAI-based systems for safety, security,
and privacy.
For more information, please see
https://sites.google.com/view/sagai2024/home.
SafeThings 2024
8th IEEE/ACM Workshop on the Internet of Safe Things,
Held in conjunction with IEEE SP 2024 Conference,
San Francisco, California, USA, May 23, 2024.
[posted here 12/11/23]
The 8th Workshop on the Internet of Safe Things seeks to bring together
researchers to create solutions for the development of safe cyber-physical systems.
As safety is inherently linked with the security and privacy of a system, we also
seek contributions in these areas that address safety concerns. We seek to develop
a community that systematically dissects the vulnerabilities and risks exposed by
these emerging CPSs, and creates tools, algorithms, frameworks, and systems that
help in the development of safe systems.
We seek contributions across domains - autonomous vehicles, smart homes, medical
devices, smart grid, intelligent transportation; and across disciplines - systems,
control, human-computer interaction, security, reliability, machine learning,
and verification.
The scope of our workshop includes safety topics as they relate to an individual’s
health (physical, mental), society (air pollution, toxicity, disaster events),
or the environment (species preservation, global warming, oil spills).
The workshop considers safety from a human perspective and, thus, does not include
topics such as thread safety or memory safety in its scope.
For more information, please see
https://safe-things-2024.github.io.
SP 2024
45th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 20-23, 2024.
[posted here 6/7/23]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ìSoK:î in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
For more information, please see
https://sp2024.ieee-security.org/cfpapers.html.
NSF-WSCS 2024
The NSF Workshop on Sustainable Computing for Sustainability,
Alexandria, VA, USA, April 16-17, 2024.
[posted here 10/16/23]
The workshop will follow a hybrid format with both remote and
in-person participation. Remote participation will be through a zoom webinar
that will be open to all within the limits of the zoom webinar platform.
Instructions for joining the webinar will be posted on the Workshop's
website a few weeks before it is scheduled to take place.
Because of logistical constraints, in-person attendance will be limited
to approximately 100 participants, with eligible travel costs
supported through a grant from NSF. The primary purpose of this
call for submissions is, therefore, to help us identify a
diverse and complementary set of attendees so as to ensure a
productive workshop. A report documenting the findings and
recommendations of the workshop will be made publicly available
following the successful completion of the workshop.
Towards performing such as selection, we are asking interested
individuals to submit a short (two pages or less excluding references,
single-column, single-space, 11pt fonts) statement of interest
before February 15, 2024, AoE. You can submit multiple statements of interest.
For more information, please see
https://edas.info/web/nsf-wscs24/index.html.
SPW 2024
29th International Workshop on Security Protocols,
Brno, Czechia, April 10-12, 2024.
[posted here 10/16/23]
The theme of the 2024 workshop is "Ghost in the Protocol — Security Protocols and AI".
We invite proposals for papers containing exciting, original ideas that will elicit
lively, thought-provoking in-person discussions. SPW papers should lead to conceptual
advances, not be archival papers about work that has already been completed and polished.
The workshop is by invitation only; to receive an invitation, please submit a position
paper by 8 January 2024 for our consideration. Security protocols have always been
seized with the question of whether a participant is a human or not. Given recent
developments around the generation of text, images, code, audio and video, however, we
must now consider the interplay of AI and the protocols themselves. Can machine-generated
protocols, with machine-checked proofs, do a better job than human designers? Instead of
humans producing machine-readable protocol descriptions, can machines produce
human-comprehensible descriptions?
As always, please consider this theme as inspirational rather than restrictive.
As long-time attendees already know, it is perfectly acceptable to offer a position
paper only loosely related to the theme, or on another security topic, provided the paper
is deemed likely to stimulate an interesting discussion. New authors are encouraged to
browse through past volumes of post-proceedings (search for Security Protocols Workshop
in the Springer LNCS series) to get a flavor for the variety and diversity of
topics that have been accepted in past years, as well as the lively discussion
that has accompanied them.
For more information, please see
https://www.cl.cam.ac.uk/events/spw/2024/.
FHE 2024
3rd Annual FHE.org Conference on Fully Homomorphic Encryption,
Held in conjunction with the Real World Crypto 2024,
Toronto, Canada, March 24, 2024.
[posted here 10/18/23]
First envisioned in the late seventies, the first realization for fully homomorphic
encryption only came three decades later. Fully homomorphic encryption has since
been an active research topic.
The FHE.org conference aims at being the premier forum gathering researchers,
technologists and practitioners working on the design, development, deployment, validation,
and applications of fully homomorphic encryption.
The program committee is seeking original contributions on all aspects of fully
homomorphic encryption. Submissions across a broad range of the development phases
are encouraged, from exploratory research and proof-of-concept studies to practical
applications and deployment of fully homomorphic encryption and related technologies.
Topics of interest include, but are not limited to:
- Fully homomorphic encryption and its applications
- Efficient and secure implementations of cryptographic algorithms Software for
fully homomorphic encryption
- Hardware architectures for fully homomorphic encryption
- Compilers for fully homomorphic encryption
- Physical attacks and countermeasures
- Secure applications using fully homomorphic encryption
- Security of encrypted computing and applications
- Cryptographic protocols using fully homomorphic encryption for privacy-preserving systems
- Formal modeling and formal proofs for encrypted computing
- Validation and certification of fully homomorphic encryption
For more information, please see
https://asiaccs2024.sutd.edu.sg/cfp/.
FC 2024
28th International Conference on Financial Cryptography and Data Security,
Willemstad, Curacao, March 4-8, 2024.
[posted here 8/21/23]
Financial Cryptography and Data Security is a major international
forum for research, advanced development, education, exploration, and debate
regarding information assurance, with a specific focus on commercial contexts.
The conference covers all aspects of securing transactions and systems.
Original works focusing on both fundamental and applied real-world deployments
on all aspects surrounding commerce security are solicited. Submissions
need not be exclusively concerned with cryptography. Systems security and
interdisciplinary works are particularly encouraged.
The goal of the conference is to bring security and cryptography researchers
and practitioners together with economists, bankers, implementers and
policy-makers. Intimate and colourful by tradition, the FC program features
invited talks, academic presentations, technical demonstrations and panel
discussions. In addition, several workshops will be held in conjunction
with the FC conference.
For more information, please see
https://fc24.ifca.ai/cfp.html.
NDSS 2024
Network and Distributed System Security Symposium,
San Diego, California, uSA, February 26 - March 1, 2024.
[posted here 6/5/23]
The Network and Distributed System Security Symposium (NDSS) is a top
venue that fosters information exchange among researchers and practitioners of network
and distributed system security. The NDSS 2024 workshops and symposia will take
place in San Diego, CA, from 26 February to 1 March 2024. The target audience includes
those interested in practical aspects of network and distributed system security,
with a focus on actual system design and implementation. A major goal is to
encourage and enable the Internet community to apply, deploy, and advance the
state of practical security technologies.
This call solicits technical papers. Authors are encouraged to write the abstract
and introduction of their paper in a way that makes the results accessible and
compelling to a general security researcher. All submissions will be reviewed by
the Program Committee and accepted submissions will be published by the Internet
Society in the Proceedings of NDSS 2024. The Proceedings will be made freely
accessible from the Internet Society web pages. Furthermore, permission to freely
reproduce all or parts of papers for noncommercial purposes is granted provided
that copies bear the Internet Society notice included in the first page of the
paper. The authors are therefore free to post the camera-ready versions of their
papers on their personal pages and within their institutional repositories.
Reproduction for commercial purposes is strictly prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2024/.
VehicleSec 2024
2nd ISOC Symposium on Vehicle Security and Privacy,
Co-located with NDSS 2024,
San Diego, CA, USA, February 26, 2024.
[posted here 4/9/23]
A vehicle is a machine that transports people and/or cargo in one or more
physical domains, such as on the ground (e.g., cars, bicycles, motorcycles, trucks,
buses, scooters, trains), in the air (e.g., drones, airplanes, helicopters), underwater
(e.g., ships, boats, watercraft), and in space (e.g., spacecraft). Due to their
safety- and mission-critical nature, the security and privacy of vehicles can pose
direct threats to passengers, owners, operators, as well as the environment. Recent
improvements in vehicle autonomy and connectivity (e.g., autonomous driving, drone
delivery, vehicle-to-everything (V2X) communication, intelligent transportation,
drone swarm) have only served to exacerbate security and privacy challenges and thus
require urgent attention from academia, industry, and policy-makers. To meet this
critical need, the ISOC (Internet Society) VehicleSec symposium aims at bringing
together an audience of university researchers, scientists, industry professionals,
and government representatives to contribute new theories, technologies, and systems
on any security/privacy issues related to vehicles (e.g., ground, aerial, underwater,
space), their sub-systems (e.g., in-vehicle networks, autonomy, connectivity,
human-machine interfaces), supporting infrastructures (e.g., transportation
infrastructure, charging station, ground control station), and related fundamental
technologies (e.g., sensing, control, AI/ML/DNN/LLM, real-time computing, edge
computing, location service, simulation, digital twin, multi-agent protocol/system
design, and human-machine interaction).
For more information, please see
https://www.ndss-symposium.org/ndss2024/submissions/cfp-vehiclesec/.
IFIP 11.9 DF 2023
20th Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 4-5, 2024.
[posted here 8/7/23]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is
an active international community of scientists, engineers and practitioners
dedicated to advancing the state of the art of research and practice in digital
forensics. The Twentieth Annual IFIP WG 11.9 International Conference on Digital
Forensics will provide a forum for presenting original, unpublished research results
and innovative ideas related to the extraction, analysis and preservation of all
forms of electronic evidence. Papers and panel proposals are solicited. All
submissions will be refereed by a program committee comprising members of the
Working Group. Papers and panel submissions will be selected based on their
technical merit and relevance to IFIP WG 11.9. The conference will be limited
to approximately 60 participants to facilitate interactions between researchers
and intense discussions of critical research issues. Keynote presentations,
revised papers and details of panel discussions will be published as an edited
volume – the twentieth volume in the well-known Research Advances in Digital
Forensics book series (Springer, Cham, Switzerland) during the summer of 2024.
Technical papers are solicited in all areas related to the theory and
practice of digital forensics. Areas of special interest include, but
are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Mobile and embedded device forensics
- Image and video forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics
For more information, please see
http://www.ifip119.org.
|