CSF 2025 – 38th IEEE Computer Security Foundations Symposium
June 16-20, 2025 - Santa Cruz, CA, USA
https://eurosp2025.ieee-security.org/

CSF 2025 continues to have rolling deadlines. Starting from CSF 2020,
CSF has started to invite submissions three times a year: Spring,
Fall, and Winter. Dates and detailed submission instructions appear
later in this document.

Call for Papers

The Computer Security Foundations Symposium (CSF) is an annual
conference for researchers in computer security. CSF seeks papers on
foundational aspects of computer security, such as formal security
models, relationships between security properties and defenses,
principled techniques and tools for design and rigorous analysis of
security mechanisms, as well as their application to practice. While
CSF welcomes submissions beyond the topics listed below, the main
focus of CSF is foundational security and privacy. Papers lacking
foundational aspects risk desk rejection without further evaluation of
their merits; contact the PC chairs when in doubt.

CSF was created in 1988 as a workshop of the IEEE Computer Society’s
Technical Committee on Security and Privacy, in response to a 1986
essay by Don Good entitled "The Foundations of Computer Security - We
Need Some." The meeting became a "symposium" in 2007, along with a
policy for open, increased attendance. Over the past two decades, many
seminal papers and techniques have been presented first at CSF. For
more details on the history of the symposium, visit CSF’s home.

Proceedings will be published by the IEEE Computer Society Press and
will be available at the symposium. Some small number of papers will
be selected by the Program Committee as "Distinguished Papers".

Topics

New results in security and privacy are welcome. We also encourage
challenge/vision papers, which may describe open questions and raise
fundamental concerns about security and privacy. Possible topics for
all papers include, but are not limited to:

    access control
    accountability
    anonymity
    attack models
    authentication
    blockchains and smart contracts
    cloud security
    cryptography
    data provenance
    data and system integrity
    database security
    decidability and complexity
    decision theory
    distributed systems security
    electronic voting
    embedded systems security
    forensics
    formal methods and verification
    hardware-based security
    information flow control
    intrusion detection
    language-based security
    mobile security
    network security
    privacy
    security and privacy aspects of machine learning
    security and privacy for the Internet of Things
    security architecture
    security metrics
    security policies
    security protocols
    software security
    socio-technical security
    trust management
    usable security
    web security

SoK papers: Systematization of Knowledge Papers

CSF 2025 solicits systematization of knowledge (SoK) papers in
foundational security and privacy research. These papers systematize,
re-formulate, or evaluate existing work in one established and
significant research topic. Such papers must provide new
insights. Survey papers without new insights are not
appropriate. Papers trying to identify robust foundations of research
areas still lacking them are particularly welcome. Submissions will be
distinguished by the prefix "SoK:" in the title and a checkbox on the
submission form.

Ethics

We expect authors to carefully consider and address the potential
harms associated with carrying out the research, as well as the
potential negative consequences that could stem from publishing their
work. Failure to do so will result in summary rejection of a
submission regardless of its quality and scientific value.

Although causing controlled harm is sometimes a consequence of
legitimate scientific research in computer security and privacy,
authors are expected to document how they have addressed and mitigated
the risks. This includes, but is not limited to, considering the
impact of their research on deployed systems, understanding the costs
and risks their research imposes on others, safely and appropriately
collecting data, and following responsible disclosure. If the
submitted research has the potential to cause harm, the paper should
include a clear statement about why the benefit of the research
outweighs the harms, and how the authors have taken measures and
followed best practices to ensure safety and minimize the harms caused
by their research.

If the submitted research has potential to cause harm, and authors
have access to an Institutional Review Board (IRB), we expect that
this IRB is consulted and its approval and recommendations are
documented in the paper. We note however that IRBs are not expected to
understand computer security research well or to know about best
practices and community norms in our field, so IRB approval does not
absolve researchers from considering ethical aspects of their work. In
particular, IRB approval is not sufficient to guarantee that the PC
will not have additional concerns with respect to harms associated
with the research.

We encourage the authors to consult with existing documentation, e.g.,
Common Pitfalls in Writing about Security and Privacy Human Subjects
Experiments, and How to Avoid Them or the Menlo Report and existing
Safety consultation entities, e.g., the Tor Safety Research
Board. These can help in thinking about potential harms, and in
designing the safest experiments and disclosure processes.

Important Dates AoE (UTC-12h)
Spring cycle paper submission   	May 28, 2024
Spring cycle author notification   	July 30, 2024
Fall cycle paper submission   		October 1, 2024
Fall cycle author notification   	December 3, 2024
Winter cycle paper submission   	February 4, 2025
Winter cycle author notification   	April 8, 2025
CSF Symposium   	Dates TBD

Paper Submission Instructions

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with published proceedings.

Papers must be submitted using the two-column IEEE Proceedings style
available for various document preparation systems at the IEEE
Conference Publishing Services page. All papers should be at most 12
pages long, not counting bibliography and well-marked
appendices. Anonymized supplementary material such as proof scripts
can be uploaded as a tar ball on the submission site. Committee
members are not required to read appendices, and so the paper must be
intelligible without them.

Papers failing to adhere to any of the instructions above will be
rejected without consideration of their merits.

At least one coauthor of each accepted paper is required to attend CSF
to present the paper. In the event of difficulty in obtaining visas
for travel, exceptions can be made and will be discussed on a
case-by-case basis.

CSF 2025 will employ double-blind reviewing. Submitted papers must (a)
omit any reference to the authors’ names or the names of their
institutions, and (b) reference the authors’ own related work in the
third person (e.g., not "We build on our previous work ..." but rather
"We build on the work of ..."). Nothing should be done in the name of
anonymity that weakens the submission or makes the job of reviewing
the paper more difficult (e.g., important background references should
not be omitted or anonymized). Please see our frequently asked
questions (FAQ) that address many common concerns. When in doubt,
contact the program chairs.

Decisions

The outcome of the review process can be one of the following three:
accept, reject, major revision. In some occasions, accepted papers are
shepherded for minor modifications.

Major revisions

Papers with "major revision" decision must be re-submitted within the
following two cycles, accompanied by a writeup explaining how the
revision meets reviewers’ revision requirements. These papers will be
reviewed by the same reviewers as those for the initial
submission. They may use 16 pages in the usual IEEE template, but the
16 pages should contain everything, in particular bibliography and
appendix (if any). In other words, revisions should be prepared as if
they were camera-ready papers; although they should still be
anonymized. For additional material authors may point to technical
reports or supply additional material when submitting the paper. Such
material should also be anonymized. Reviewers are, however, not
obliged to read this material.

Authors should submit their revision as a new paper (rather than
updating the previous submission) and mark it as "major revision". For
major revision papers the submission system will ask authors to
provide additional information in a textbox, such as the cycle and the
submission number of the previous submission.

The possible decisions for such resubmitted revised papers are the
following: accept (possibly with shepherding) or reject, i.e., a major
revision decision is excluded.

Like all papers, major revision papers can be withdrawn from the
conference at any time.

Major revision papers not re-submitted within the following two cycles
will be considered new submissions, reviewed by serving PC members. A
writeup explaining how the revision meets previous reviewers’ revision
requirements is optional. The layout of these papers has to follow the
guidelines for regular submissions, in particular, for these papers
the limit of 12 pages applies.

Resubmissions of rejected papers

Rejected papers can be re-submitted at any time. If a rejected paper
is re-submitted within 11 months of the last deadline they were
submitted to (e.g., rejected submissions to Sep 2022 is resubmitted to
May 2023 deadline), reviews and a writeup explaining how the current
submission addresses concerns in the reviews must be submitted as
supplementary material. The paper will be desk-rejected by the PC
chairs if previous reviews or the explanation is missing. We may use a
different set of reviewers for re-submissions. All resubmissions of
rejected papers can optionally submit reviews from previous
submissions and a writeup explaining how the current submission
addresses concerns in the reviews as supplementary material. In any
case, previously rejected papers should follow the paper submission
instructions of regular submissions. In particular, the same page
limit and format applies and submissions should be anonymized.

Contact: Owen Arden