Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:6/3/24

Upcoming Conferences and Workshops

Note: The submission date has passed.

June 2024

CODASPY 2024 14th ACM Conference on Data and Application Security and Privacy, Porto, Portugal, June 19-21, 2024. [posted here 6/5/23]
The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security

For more information, please see http://www.codaspy.org/2024/.

SaT-CPS 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Held in conjunction with the 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024), Porto, Portugal, June 21, 2024. [posted here 2/19/24]
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS) aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS seeks novel submissions describing practical and theoretical solutions for cyber security challenges in CPS. Submissions can be from different application domains in CPS.

For more information, please see https://sites.google.com/view/sat-cps-2024/.

July 2024

ASIACCS 2024 19th ACM ASIA Conference on Computer and Communications Security, Singapore, July 1-5, 2024. [posted here 4/9/23]
The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024) seeks paper submissions presenting novel contributions related to all real-world aspects of security and privacy. We seek articles presenting accessible and compelling results to general computer security researchers. Purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same goes for submissions focusing primarily on blockchains or machine learning.

Like in previous years, we will also be accepting “Systemisation of Knowledge” (SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the submission form. They will be accepted based on the value to the community. Survey papers without insights evaluating, systematizing and contextualizing current knowledge will be rejected.

For more information, please see https://asiaccs2024.sutd.edu.sg/cfp/.

WTMC 2024 9th International Workshop on Traffic Measurements for Cybersecurity, Co-located with the 9th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2024), Vienna, Austria, July 8, 2024. [posted here 3/25/24]
The WTMC workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of cybersecurity and understand how traffic measurements can influence it. We encourage prospective authors to submit related distinguished research papers on the subject of both theoretical approaches and practical case reviews. This workshop presents some of the most relevant ongoing research in cybersecurity seen from the traffic measurements perspective. The workshop will be accessible to both non-experts interested in learning about this area and experts interested in hearing about new research and approaches.

For more information, please see https://wtmc.info/.

FCS 2024 Workshop on Foundations of Computer Security, Co-located with CSF 2024, Enschede, Netherlands, July 8, 2024. [posted here 5/6/24]
FCS is a friendly, in-person 1-day workshop that brings together researchers interested in laying the foundations of secure systems. FCS welcomes papers on all topics related to the formal underpinnings of security and privacy, and their applications. The workshop has no formal proceedings: you are welcome to advertise work that appeared in other venues or submit your work-in-progress. We are seeking submissions for full-length talks and short talks. Submissions may conform to any 2-column format accepted by IEEE, ACM, or USENIX conferences. FCS uses a light form of double-blind reviewing similar to CSF.

For more information, please see https://fcs-workshop.github.io/fcs2024/.

CSF 2024 37th IEEE Computer Security Foundations Symposium, Enschede, Netherlands, July 8-12, 2024. [posted here 6/5/23]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSF's home.

The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see https://csf2024.ieee-security.org.

DFRWS 2024 24th Annual Digital Forensic Research Conference, Baton Rouge, LA, USA, July 9-12, 2024. [posted here 4/9/23]
DFRWS is a premier conference for digital forensic research. It attracts participants from many sectors, including law enforcement (such as local state police and federal agencies), industry (including vendors and practitioners), and academia. The Forensic Science International: Digital Investigation Journal, Elsevier, will publish the DFRWS proceedings as open access in a supplement issue.

For more information, please see https://dfrws.org/conferences/dfrws-usa-2024/.

PETS 2024 24th Privacy Enhancing Technologies Symposium (PETS 2024) Bristol, UK and Online, July 15-20, 2024. [posted here 6/5/23]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 24th PETS will be a hybrid event with a physical gathering held in Bristol, UK and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not required for publication in the proceedings. We will carefully monitor the COVID-19 situation, and may change the organization of the event as necessary. PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is self-published and does not have article processing charges (APCs) or article submission charges.

For more information, please see https://petsymposium.org/cfp24.php.

ARES 2024 19th International Conference on Availability, Reliability and Security, Vienna, Austria, July 30 - August 2, 2024. [posted here 2/26/24]
The 19th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES highlights the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. It aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. It emphasizes the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. SRES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.

For more information, please see http://www.ares-conference.eu/.

CUING 2024 8th International Workshop on Cyber Use of Information Hiding, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/25/24]
The increasing number of Internet users, availability of storage and network resources, and proliferation of as-a-Service frameworks, leads to a new-wave of offensive campaigns targeting the virtual world. With the diffusion of improved defensive methods, attackers now utilize more and more sophisticated techniques to perform their malicious activities. In recent years, information hiding has emerged as one of the most sophisticated and effective mechanisms for launching attacks. Threat actors now regularly use information hiding to elude countermeasures and prevent reversing the attack chain. More recently, hiding techniques have been deployed to create covert channels, i.e., parasitic communications paths nested in network traffic and digital objects, mainly to cloak command & control communications. Unfortunately, detection and mitigation of threats taking advantage of information hiding are hard tasks that pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding techniques when used in cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop are not limited to classic digital steganography applications or the creation and mitigation of covert communications. Therefore, CUIng also welcomes works that pertain to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of processes, and communication flows. To present a more complete picture of the novel research on hiding methods and their utilization by the attackers, submissions dealing with impersonation or mimicking are encouraged as well, especially to address information hiding in a complete manner, for instance, to discuss ideas for fighting misuse of privacy-enhancing technologies.

This year the CUING workshop is co-organized together with DISSIMILAR (Detection of fake newS on SocIal MedIa pLAtfoRms) project.

For more information, please see https://www.ares-conference.eu/cuing.

ENS 2024 7th International Workshop on Emerging Network Security, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/25/24]
The ENS 2024 workshop aims at collecting the most relevant ongoing research efforts in emerging network security field. It also serves as a forum for 5G & beyond projects in order to disseminate their security-related results and boost cooperation, also foster development of the 5G and beyond Security Community made of 5G security experts and practitioners who pro-actively discuss and share information to collectively progress and align on the field. Last but not least it also aims to bridge 5G & Beyond community with other communities (e.g. AI) that are key to support full attainment of 5G & Beyond but also 6G promises and so for those technologies to release their full potential.

For more information, please see https://www.ares-conference.eu/ens/.

BASS 2024 4th International Workshop on Behavioral Authentication for System Security, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/25/24]
BASS aims at attracting innovative contributions from both industry and academia related to all aspects of human, system, or software behavioral analysis for IT security. The workshop solicits submissions on both theoretical aspects and practical applications of behavior analysis, behavior-based identification and authentication, profiling, and privacy and security aspects related to recording and exploitation of behavioral features.

For more information, please see https://www.ares-conference.eu/bass/.

BASS 2024 4th International Workshop on Behavioral Authentication for System Security, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/18/24]
BASS aims at attracting innovative contributions from both industry and academia related to all aspects of human, system, or software behavioral analysis for IT security. The workshop solicits submissions on both theoretical aspects and practical applications of behavior analysis, behavior-based identification and authentication, profiling, and privacy and security aspects related to recording and exploitation of behavioral features.

For more information, please see https://www.ares-conference.eu/workshops/bass/.

EDid 2024 1st International Workshop on Emerging Digital Identities, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/11/24]
The identity environment has evolved into a complex ecosystem demanding seamless interoperability, stronger security measures, and user-centric experiences in an increasingly interconnected digital world. Addressing these difficulties necessitates collaboration among scholars and practitioners from diverse disciplines, establishing an interdisciplinary approach critical for shaping the future of identity management. EDId navigates a wide variety of security, privacy, and legal compliance issues, addressing technical issues like security and interoperability as well as legal and regulatory considerations like data protection and privacy.

For more information, please see https://www.ares-conference.eu/edid.

August 2024

SOUPS 2024 20th Symposium on Usable Privacy and Security, Philadelphia, PA, USA, August 11-13, 2024. [posted here 1/8/24]
The 2024 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. We invite authors to submit previously unpublished papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches. Papers will be judged on their scientific quality, overall quality, and contribution to the field.

For more information, please see https://www.usenix.org/conference/soups2024.

CSET 2024 17th Cyber Security Experimentation and Test Workshop, Philadelphia, PA, USA, August 13, 2024. [posted here 3/18/24]
For 16 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for presenting research on and discussing “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability—in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and/or demonstrably grow community resources.

For more information, please see https://cset24.isi.edu/index.html.

USENIX Security 2024 33rd USENIX Security Symposium, Philadelphia, PA, USA, August 14-16, 2024. [posted here 1/28/23]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The Call for Papers will be available soon.

For more information, please see https://www.usenix.org/conference/usenixsecurity24.

SciSec 2024 6th International Conference on Science of Cyber Security, Copenhagen, Denmark, August 14-16, 2024. [posted here 2/26/24]
SciSec2024 aims at bringing together scholars, scientists, and industrialists from all over the world on a common platform to present their original, unpublished high-quality research papers and share their valuable research insights in the fields of, but not limited to Cyber Security, AI, Quantum Technologies, Blockchain, IoT, Cloud Computing, and emerging fields.

For more information, please see https://scisec.org/index.html.

ICICS 2024 26th International Conference on Information and Communications Security, Mytilene, Greece, August 26-28, 2024. [posted here 1/8/24]
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews. The page limits for the camera-ready papers are 20 pages, including the bibliography and well-marked appendices. Selected accepted papers will be invited to submit extended versions to a special issue of the International Journal of Information Security.

For more information, please see http://icics2024.aegean.gr/submissions/.

September 2024

CSR 2024 IEEE International Conference on Cyber Security and Resilience, London, UK, Hybrid Conference, September 2-4, 2024. [posted here 2/5/24]
The technological and industrial revolution brought by complex cyber-physical systems (CPS) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. These attacks have a significant negative impact on the operation of various services in critical sectors, like energy, transport, and communications, which provide the vital functions that our societies depend upon. The conference focuses on theoretical and practical aspects of the security, privacy, trust, and resilience of networks, systems, and services as well as novel ways for dealing with their vulnerabilities and mitigating sophisticated cyber-attacks.

For more information, please see https://www.ieee-csr.org/.

SCN 2024 14th International Conference on Security and Cryptography for Networks, Amalfi, Italy. September 11-13, 2024. (Submission Due 24 April 2024) [posted here 1/22/24]
The Fourteenth International Conference on Security and Cryptography for Networks (SCN 2024) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

For more information, please see https://scn.unisa.it/scn24/index.php/call-for-papers/.

ESORICS 2024 9th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024. [posted here 1/8/24]
Computer security emphasizes safeguarding information in settings susceptible to breaches or malevolent activities. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.

For more information, please see https://esorics2024.org.

CANS 2024 International Conference on Cryptology and Network Security, Cambridge, UK, September 24-27, 2024. [posted here 3/18/24]
The International Conference on Cryptology and Network Security (CANS) is a premier forum for presenting research in the field of cryptology and network security. The conference seeks academic, industry, and government submissions on all theoretical and practical cryptology and network security aspects. This year marks the 23rd iteration of the conference and will be held at the University of Cambridge, England. Proceedings of previous iterations of the conference were published by Springer LNCS and we have applied to do the same this year.

For more information, please see https://2024.cansconference.org/.

EuroUSEC 2024 European Symposium on Usable Security conference, Karlstad, Sweden, September 30 - October 1, 2024. [posted here 5/6/24]
The European Symposium on Usable Security (EuroUSEC) is a forum for research and discussion on human factors in security and privacy. EuroUSEC solicits previously unpublished work offering novel research contributions in any aspect of human-centred security and privacy. EuroUSEC aims to bring together researchers, practitioners, and students from diverse backgrounds including computer science, engineering, psychology, the social sciences, and economics to discuss issues related to human-computer interaction, security, and privacy. We welcome submissions containing unpublished original work describing research, visions, or experiences in all areas of usable security and privacy. We also welcome the systematization of knowledge with a clear connection to usable security and privacy. We welcome a variety of research methods, including both qualitative and quantitative approaches. Note that All submissions must clearly relate to human aspects of security or privacy.

For more information, please see https://eurousec24.kau.se.

RAID 2024 27th International Symposium on Research in Attacks, Intrusions and Defenses, Padua, Italy, September 30 - October 2, 2024. [posted here 2/12/24]
Since its inception in 1997, the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community.

The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.

This year we are soliciting research papers on topics covering all well-motivated computer security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons learned.

Specific topics of interest to RAID include, but are not limited to:
- Computer, network, and cloud computing security
- Malware and unwanted software
- Program analysis and reverse engineering
- Mobile Security
- Web security and privacy
- Vulnerability analysis techniques
- Usable security and privacy
- Intrusion detection and prevention
- Hardware security
- Cyber physical systems security and threats against critical infrastructures
- IoT security
- Statistical and adversarial learning for computer security
- Cyber crime and underground economies
- Denial-of-Service attacks and defenses
- Security measurement studies
- Digital forensics

For more information, please see https://raid2024.github.io/.

October 2024

6GQ 2024 Workshop on Postquantum Cryptography and Quantum Communication for 6G Networks, Held in conjunction with the 49th Annual IEEE Conference on Local Computer Networks (LCN 2024), Caen, Normandy, France, October 8-10, 2024. [posted here 4/15/24]
The emergence of quantum computers poses a significant threat to current cryptographic standards. Integrating PQC and quantum communications into 6G networks is critical to ensuring these applications remain secure and resilient to quantum attacks. The Postquantum Cryptography and Quantum Communication for 6G Networks (6GQ) workshop invites original research and review papers that push the boundaries of knowledge in post-quantum cryptography (PQC), quantum communication, and their integration into 6G networks. We encourage submissions that address theoretical developments, practical implementations, and innovative applications in these areas.

For more information, please see https://sites.google.com/view/6gq2024/home.

MarCaS 2024 2nd IEEE LCN Special Track on Maritime Communication and Security, Held in conjunction with the 49th Annual IEEE Conference on Local Computer Networks (IEEE LCN 2024), Caen, Normandy, France, October 8-10, 2024. [posted here 2/5/24]
The LCN’s MarCaS 2024 Special Track is the continuation of the successful MarCaS workshop from the previous year. Its scope are innovations from research necessary for the digital transformation, focusing on maritime information technology (IT) and operational technology (OT) on board vessels and maritime industrial control systems, but also on shore at ports, terminals, and other maritime infrastructures. Maritime communication, satellite navigation, radio-based situational awareness systems, and maritime cloud services are of particular interest of MarCaS, combined with novel cybersecurity approaches for a safer and more resilient MTS.

For more information, please see https://garykessler.net/lcn_marcas/.

ACM CCS 2024 31th ACM Conference on Computer and Communications Security, Salt Lake City, Utah, USA, October 14-18, 2024. [posted here 3/18/24]
The 31th ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

For more information, please see https://www.sigsac.org/ccs/CCS2024/call-for/call-for-papers.html.

November 2024
December 2024