|
Past Conferences and Journal Special Issues
Last Modified:6/3/24
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
SAGAI 2024
Workshop on Security Architectures for GenAI Systems,
Held in conjunction with IEEE SP 2024 Conference,
San Francisco, California, USA, May 23, 2024.
[posted here 12/25/23]
Generative AI (GenAI) is quickly advancing and fast becoming a
widely deployed technology. GenAI-based systems rely on machine-learning (ML)
models trained on large amounts of data using deep-learning techniques. As the
power and flexibility of the models advance, the architectural complexity of
GenAI-based systems is advancing too. Current architectures may combine
multiple models, using sequences of model queries to complete a task, with
external (non-ML) components leveraged to enhance the model’s operation via
database queries or API calls. These architectures may be vulnerable to a
variety of attacks that use adversarial inputs to create malicious outputs.
This workshop invites new contributions to the broader understanding of
security for GenAI systems and applications. Contributions may address
security threats and defenses for individual models, or for systems and
architectures that may employ one or more generative ML models as subcomponents.
The workshop welcomes discussion of new GenAI security concerns, as well as
new approaches to architecting GenAI-based systems for safety, security,
and privacy.
For more information, please see
https://sites.google.com/view/sagai2024/home.
SafeThings 2024
8th IEEE/ACM Workshop on the Internet of Safe Things,
Held in conjunction with IEEE SP 2024 Conference,
San Francisco, California, USA, May 23, 2024.
[posted here 12/11/23]
The 8th Workshop on the Internet of Safe Things seeks to bring together
researchers to create solutions for the development of safe cyber-physical systems.
As safety is inherently linked with the security and privacy of a system, we also
seek contributions in these areas that address safety concerns. We seek to develop
a community that systematically dissects the vulnerabilities and risks exposed by
these emerging CPSs, and creates tools, algorithms, frameworks, and systems that
help in the development of safe systems.
We seek contributions across domains - autonomous vehicles, smart homes, medical
devices, smart grid, intelligent transportation; and across disciplines - systems,
control, human-computer interaction, security, reliability, machine learning,
and verification.
The scope of our workshop includes safety topics as they relate to an individual’s
health (physical, mental), society (air pollution, toxicity, disaster events),
or the environment (species preservation, global warming, oil spills).
The workshop considers safety from a human perspective and, thus, does not include
topics such as thread safety or memory safety in its scope.
For more information, please see
https://safe-things-2024.github.io.
SP 2024
45th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 20-23, 2024.
[posted here 6/7/23]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ìSoK:î in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
For more information, please see
https://sp2024.ieee-security.org/cfpapers.html.
NSF-WSCS 2024
The NSF Workshop on Sustainable Computing for Sustainability,
Alexandria, VA, USA, April 16-17, 2024.
[posted here 10/16/23]
The workshop will follow a hybrid format with both remote and
in-person participation. Remote participation will be through a zoom webinar
that will be open to all within the limits of the zoom webinar platform.
Instructions for joining the webinar will be posted on the Workshop's
website a few weeks before it is scheduled to take place.
Because of logistical constraints, in-person attendance will be limited
to approximately 100 participants, with eligible travel costs
supported through a grant from NSF. The primary purpose of this
call for submissions is, therefore, to help us identify a
diverse and complementary set of attendees so as to ensure a
productive workshop. A report documenting the findings and
recommendations of the workshop will be made publicly available
following the successful completion of the workshop.
Towards performing such as selection, we are asking interested
individuals to submit a short (two pages or less excluding references,
single-column, single-space, 11pt fonts) statement of interest
before February 15, 2024, AoE. You can submit multiple statements of interest.
For more information, please see
https://edas.info/web/nsf-wscs24/index.html.
SPW 2024
29th International Workshop on Security Protocols,
Brno, Czechia, April 10-12, 2024.
[posted here 10/16/23]
The theme of the 2024 workshop is "Ghost in the Protocol — Security Protocols and AI".
We invite proposals for papers containing exciting, original ideas that will elicit
lively, thought-provoking in-person discussions. SPW papers should lead to conceptual
advances, not be archival papers about work that has already been completed and polished.
The workshop is by invitation only; to receive an invitation, please submit a position
paper by 8 January 2024 for our consideration. Security protocols have always been
seized with the question of whether a participant is a human or not. Given recent
developments around the generation of text, images, code, audio and video, however, we
must now consider the interplay of AI and the protocols themselves. Can machine-generated
protocols, with machine-checked proofs, do a better job than human designers? Instead of
humans producing machine-readable protocol descriptions, can machines produce
human-comprehensible descriptions?
As always, please consider this theme as inspirational rather than restrictive.
As long-time attendees already know, it is perfectly acceptable to offer a position
paper only loosely related to the theme, or on another security topic, provided the paper
is deemed likely to stimulate an interesting discussion. New authors are encouraged to
browse through past volumes of post-proceedings (search for Security Protocols Workshop
in the Springer LNCS series) to get a flavor for the variety and diversity of
topics that have been accepted in past years, as well as the lively discussion
that has accompanied them.
For more information, please see
https://www.cl.cam.ac.uk/events/spw/2024/.
FHE 2024
3rd Annual FHE.org Conference on Fully Homomorphic Encryption,
Held in conjunction with the Real World Crypto 2024,
Toronto, Canada, March 24, 2024.
[posted here 10/18/23]
First envisioned in the late seventies, the first realization for fully homomorphic
encryption only came three decades later. Fully homomorphic encryption has since
been an active research topic.
The FHE.org conference aims at being the premier forum gathering researchers,
technologists and practitioners working on the design, development, deployment, validation,
and applications of fully homomorphic encryption.
The program committee is seeking original contributions on all aspects of fully
homomorphic encryption. Submissions across a broad range of the development phases
are encouraged, from exploratory research and proof-of-concept studies to practical
applications and deployment of fully homomorphic encryption and related technologies.
Topics of interest include, but are not limited to:
- Fully homomorphic encryption and its applications
- Efficient and secure implementations of cryptographic algorithms Software for
fully homomorphic encryption
- Hardware architectures for fully homomorphic encryption
- Compilers for fully homomorphic encryption
- Physical attacks and countermeasures
- Secure applications using fully homomorphic encryption
- Security of encrypted computing and applications
- Cryptographic protocols using fully homomorphic encryption for privacy-preserving systems
- Formal modeling and formal proofs for encrypted computing
- Validation and certification of fully homomorphic encryption
For more information, please see
https://asiaccs2024.sutd.edu.sg/cfp/.
FC 2024
28th International Conference on Financial Cryptography and Data Security,
Willemstad, Curacao, March 4-8, 2024.
[posted here 8/21/23]
Financial Cryptography and Data Security is a major international
forum for research, advanced development, education, exploration, and debate
regarding information assurance, with a specific focus on commercial contexts.
The conference covers all aspects of securing transactions and systems.
Original works focusing on both fundamental and applied real-world deployments
on all aspects surrounding commerce security are solicited. Submissions
need not be exclusively concerned with cryptography. Systems security and
interdisciplinary works are particularly encouraged.
The goal of the conference is to bring security and cryptography researchers
and practitioners together with economists, bankers, implementers and
policy-makers. Intimate and colourful by tradition, the FC program features
invited talks, academic presentations, technical demonstrations and panel
discussions. In addition, several workshops will be held in conjunction
with the FC conference.
For more information, please see
https://fc24.ifca.ai/cfp.html.
NDSS 2024
Network and Distributed System Security Symposium,
San Diego, California, uSA, February 26 - March 1, 2024.
[posted here 6/5/23]
The Network and Distributed System Security Symposium (NDSS) is a top
venue that fosters information exchange among researchers and practitioners of network
and distributed system security. The NDSS 2024 workshops and symposia will take
place in San Diego, CA, from 26 February to 1 March 2024. The target audience includes
those interested in practical aspects of network and distributed system security,
with a focus on actual system design and implementation. A major goal is to
encourage and enable the Internet community to apply, deploy, and advance the
state of practical security technologies.
This call solicits technical papers. Authors are encouraged to write the abstract
and introduction of their paper in a way that makes the results accessible and
compelling to a general security researcher. All submissions will be reviewed by
the Program Committee and accepted submissions will be published by the Internet
Society in the Proceedings of NDSS 2024. The Proceedings will be made freely
accessible from the Internet Society web pages. Furthermore, permission to freely
reproduce all or parts of papers for noncommercial purposes is granted provided
that copies bear the Internet Society notice included in the first page of the
paper. The authors are therefore free to post the camera-ready versions of their
papers on their personal pages and within their institutional repositories.
Reproduction for commercial purposes is strictly prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2024/.
VehicleSec 2024
2nd ISOC Symposium on Vehicle Security and Privacy,
Co-located with NDSS 2024,
San Diego, CA, USA, February 26, 2024.
[posted here 4/9/23]
A vehicle is a machine that transports people and/or cargo in one or more
physical domains, such as on the ground (e.g., cars, bicycles, motorcycles, trucks,
buses, scooters, trains), in the air (e.g., drones, airplanes, helicopters), underwater
(e.g., ships, boats, watercraft), and in space (e.g., spacecraft). Due to their
safety- and mission-critical nature, the security and privacy of vehicles can pose
direct threats to passengers, owners, operators, as well as the environment. Recent
improvements in vehicle autonomy and connectivity (e.g., autonomous driving, drone
delivery, vehicle-to-everything (V2X) communication, intelligent transportation,
drone swarm) have only served to exacerbate security and privacy challenges and thus
require urgent attention from academia, industry, and policy-makers. To meet this
critical need, the ISOC (Internet Society) VehicleSec symposium aims at bringing
together an audience of university researchers, scientists, industry professionals,
and government representatives to contribute new theories, technologies, and systems
on any security/privacy issues related to vehicles (e.g., ground, aerial, underwater,
space), their sub-systems (e.g., in-vehicle networks, autonomy, connectivity,
human-machine interfaces), supporting infrastructures (e.g., transportation
infrastructure, charging station, ground control station), and related fundamental
technologies (e.g., sensing, control, AI/ML/DNN/LLM, real-time computing, edge
computing, location service, simulation, digital twin, multi-agent protocol/system
design, and human-machine interaction).
For more information, please see
https://www.ndss-symposium.org/ndss2024/submissions/cfp-vehiclesec/.
IFIP 11.9 DF 2023
20th Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 4-5, 2024.
[posted here 8/7/23]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is
an active international community of scientists, engineers and practitioners
dedicated to advancing the state of the art of research and practice in digital
forensics. The Twentieth Annual IFIP WG 11.9 International Conference on Digital
Forensics will provide a forum for presenting original, unpublished research results
and innovative ideas related to the extraction, analysis and preservation of all
forms of electronic evidence. Papers and panel proposals are solicited. All
submissions will be refereed by a program committee comprising members of the
Working Group. Papers and panel submissions will be selected based on their
technical merit and relevance to IFIP WG 11.9. The conference will be limited
to approximately 60 participants to facilitate interactions between researchers
and intense discussions of critical research issues. Keynote presentations,
revised papers and details of panel discussions will be published as an edited
volume – the twentieth volume in the well-known Research Advances in Digital
Forensics book series (Springer, Cham, Switzerland) during the summer of 2024.
Technical papers are solicited in all areas related to the theory and
practice of digital forensics. Areas of special interest include, but
are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Mobile and embedded device forensics
- Image and video forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics
For more information, please see
http://www.ifip119.org.
|