Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:1/4/21

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2020

TrustData 2020 11th International Workshop on Trust, Security and Privacy for Big Data, Nanjing, China, December 18-20, 2020. [posted here 6/29/20]
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention.

For more information, please see http://www.spaccs.org/trustdata2020/.

DL-CTI 2020 1st ICDM Workshop on Deep Learning for Cyber Threat Intelligence, Held in conjunction with the IEEE International Conference on Data Mining (ICDM 2020), Sorrento, Italy, November 17-20, 2020. [posted here 6/29/20]
The regularity of devastating cyber-attacks has made cybersecurity a grand societal challenge. To combat this societal issue, many organizations have aimed to develop timely, relevant, and actionable intelligence about emerging threats and key threat actors to enable effective cybersecurity decisions. This process, also referred to as Cyber Threat Intelligence (CTI) has quickly emerged as a key aspect of cybersecurity. At its core, CTI is a data-driven process that requires relies on the systematic and large-scale analysis of log files, malware binaries, events, Open Source Intelligence (OSINT), and other rapidly evolving cybersecurity data sources. While numerous traditional text mining, web mining, and data mining approaches have seen remarkable developments in the past half-decade, these approaches rely on manual feature engineering approaches. In a rapidly evolving domain, such efforts are highly reactive, labor intensive, and can result in missing critical insights. Deep learning holds significant promise in automatically analyzing large quantities of structured, unstructured, and semi-structured data identify patterns, emerging threats, and key hackers without ad-hoc feature engineering efforts. As a result, deep learning-based CTI systems are more resilient, detect threats previously missed by conventional analyses, and are dynamic to the ever-evolving threat landscape. Despite its successes, Deep Learning for CTI (DL-CTI) remains a nascent, yet promising, research area. This workshop seeks to foster a budding community of cybersecurity data scientists by recruiting high quality papers and holding discussions related to emerging applications, techniques, and methodologies related to deep learning for CTI applications.

For more information, please see https://www.dl-cti.org/.

DependSys 2020 6th IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Fiji, December 14-16, 2020. [posted here 6/8/20]
IEEE DependSys 2020 conference is the 6th event in the series of conferences which offers a timely venue for bringing together new ideas, techniques, and solutions for dependability and its issues in sensor, cloud, and big data systems and applications. As we are deep into the Information Age, huge amounts of data are generated every day from sensors, individual archives, social networks, Internet of Things, enterprises and Internet in various scales and format which will pose a major challenge to the dependability of our designed systems. As these systems often tend to become inert, fragile, and vulnerable after a period of running. Effectively improving the dependability of sensor, cloud, big data systems and applications has become increasingly critical.

This conference provides a forum for individuals, academics, practitioners, and organizations who are developing or procuring sophisticated computer systems on whose dependability of services they need to place great confidence. Future systems need to close the dependability gap in face of challenges in different circumstances. The emphasis will be on differing properties of such services, e.g., continuity, effective performance, real-time responsiveness, ability to overcome data fault, corruption, anomaly, ability to avoid catastrophic failures, prevention of deliberate privacy intrusions, reliability, availability, sustainability, adaptability, heterogeneity, security, safety, and so on.

For more information, please see http://cse.stfx.ca/~dependsys/2020/.

IoTSMS 2020 7th International Conference on Internet of Things: Systems, Management and Security, Paris, France, December 14-16, 2020. [posted here 6/22/20]
The Internet of Things (IoT) technology offers unprecedented opportunities to interconnect human beings as well as Machine-to-Machine (M2M), whereby sensors and networks allow all ëthingsí to communicate directly with each other to share vital information allowing us to have an instrumented universe where accurate data is readily available to inform optimal decision making. The IoT is about to enable a range of new capabilities and services far beyond todayís offerings. It will fundamentally change how people go about their lives. According to Gartner, the number of objects connected to the Internet is set to reach 20 billion by 2020. Cisco estimates the number will be close to 26 billion objects by 2020. Others believe the actual number will be even higher with the assumption that any object with a simple micro controller and on-off switch will be connected to the Internet in the near feature. The scale of the IoT is set to have a major economic, social and environmental impacts; the intersection of which forms the future sustainable growth.

The international conference on Internet of Things: Systems, Management and Security (IoTSMS) aims at soliciting original ideas on the broad area of IoT including challenges and opportunities, concepts and applications and future trends. The IoTSMS aims to facilitate discussions among academics and IoT practitioners and make positive contributions to the field.

For more information, please see https://emergingtechnet.org/IOTSMS2020/.

SECICT 2020 13th International Conference on Security for Information Technology and Communications, Bucharest, Romania, November 19-20, 2020. [posted here 5/11/20]
The conference venue will be the Palace of the National Military Circle, located right in the heart of Bucharest, the capital city of Romania. SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goal is connecting security and privacy researchers as well as professionals from different communities and providing a forum that allows informal exchanges necessary for the emergence of new scientific and industrial collaborations. Topics comprise all aspects of Information Security, including but not limited to the following areas: Access Control, Algorithmic Tools for Security and Cryptography, Cryptology, Application Security, Attacks and Defenses, Authentication Biometry, Censorship and Censorship-Resistance, Cloud Security, Distributed Systems Security, Embedded Systems Security, Digital Forensics, Hardware Security, Information Flow Analysis, Internet of Things (IoT) Security, Intrusion Detection, Language-Based Security, Malware, Mobile Security and Privacy, Network Security, New Exploits, Policy Enforcements, Privacy and Anonymity, Protocol Security, Reverse-Engineering and Code Obfuscation, Security Architectures, Security Aspects of Alternative Currencies, Side Channel Attacks, Surveillance and Anti-Surveillance, System Security.

For more information, please see http://www.secitc.eu/.

SenSys 2020 18th ACM Conference on Embedded Networked Sensor Systems, Yokohama, Japan, November 16-19, 2020. [posted here 2/10/20]
The 18th ACM Conference on Embedded Networked Sensor Systems (SenSys 2020) introduces a highly selective, single-track forum for research on systems issues of sensors and sensor-enabled smart systems, broadly defined. Systems of smart sensors will revolutionize a wide array of application areas by providing an unprecedented density and fidelity of instrumentation. They also present various systems challenges because of resource constraints, uncertainty, irregularity, mobility, and scale. This conference provides an ideal venue to address research challenges facing the design, development, deployment, use, and fundamental limits of these systems. Sensing systems require contributions from many fields, from wireless communication and networking, embedded systems and hardware, energy harvesting and management, distributed systems and algorithms, data management, and applications, so we welcome cross-disciplinary work.

For more information, please see http://sensys.acm.org/2020/.

ISI 2020 18th Annual IEEE International Conference on Intelligence and Security Informatics, Virtual, November 9-10, 2020. [posted here 6/29/20]
Intelligence and security informatics (ISI) is an interdisciplinary field involving academic researchers in information technology, social and behavioral sciences, computer science, law, and public policy. The field also includes industry consultants, practitioners, security managers, and chief information security officers who support physical and cybersecurity missions at the individual, organizational, national, and international levels (e.g., anticipation, interdiction, prevention, preparedness, and response to threats). Over the past 17 years, the IEEE ISI Conference has evolved from its traditional orientation towards the intelligence and security domain to a more integrated alignment of multiple domains, including technology, humans, organizations, and security. The scientific community has increasingly recognized the need to address intelligence and security threats by understanding the interrelationships between these different components, and by integrating recent advances from different domains.

For more information, please see http://www.isi-conf.org/.

WPES 2020 Workshop on Privacy in the Electronic Society, Held in conjunction with the ACM Conference on Computer and Communications Security (CCS 2020), Orlando, Florida, USA, November 9, 2020. [posted here 7/6/20]
The Information Revolution has thoroughly transformed society. One of the major implications of this technological shift has been a massive increase in the collection, sharing, and analysis of personal data. The goal of this workshop is to discuss the privacy problems that result as well as their solutions. This will be the 19th occurrence of this annual forum, which is held in conjunction with the ACM CCS conference. The workshop seeks submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems, and systematization of knowledge (SoK) submissions. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues.

For more information, please see https://wpes.tech/.

CCSW 2020 ACM Cloud Computing Security, Held in conjunction with the ACM Conference on Computer and Communications Security (CCS 2020), Orlando, Florida, USA, November 9, 2020. [posted here 7/6/20]
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and government IT infrastructure. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing. CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. The workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

For more information, please see https://ccsw.io.

CCS 2020 27th ACM Conference on Computer and Communications Security, Orlando, FL, USA, November 9-13, 2020. [posted here 1/20/20]
The 27th ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper. As in 2019, CCS will have two review cycles in 2020. For each submission, one of the following decisions will be made:
Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd.
Major Revision: Papers in this category are considered to be promising but need additional work (e.g., new experiments, proofs, or implementations). Authors will be given the opportunity to resubmit such papers, with appropriate revisions, in which case they should clearly explain in a well-marked appendix how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected.
Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle.
Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference.

For more information, please see https://www.sigsac.org/ccs/CCS2020/call-for-papers.html.

Blockchain 2020 IEEE International Conference on Blockchain, Rhode Island, Greece, November 2-6, 2020. [posted here 12/9/19]
As a promising technique to achieve decentralized consensus, blockchain has been successfully applied into digital currency, e.g., bitcoin, for serving as a public ledger for transactions. Its secure design for supporting a distributed computing system with high fault tolerance is attracting wide attention all over the world. Blockchain has a great potential to create new foundations for our socio-economic systems by efficiently establishing trust among people and machines, reducing cost, and increasing utilization of resources. On one hand, blockchain will play an important role for secure decentralization in such emerging fields as Internet of Things, Cyber Physical Systems, edge computing, social networking, crowdsourcing and next generation wireless communications, and even more other fields. On the other hand, its advance should be further evolved in terms of scalability, security, privacy, efficiency, flexibility, availability, real decentralization and high dependability.

Following the great success of IEEE Blockchain 2019, held in Atlanta, USA, IEEE Blockchain 2018, held in Halifax, Canada, the 2020 IEEE International Conference on Blockchain (Blockchain-2020) will provide a high-profile, leading-edge forum for researchers, engineers, and practitioners to present latest advances and innovations in key theories, infrastructure, schemes, and significant applications for the blockchain, as well as to identify emerging research topics and define the future.

For more information, please see http://www.blockchain-ieee.org/.

CFATI 2020 1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Networks, Held in conjunction with the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020), Madeira, Portugal, November 2-5, 2020. [posted here 6/29/20]
The main motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging networks to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest. Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from networked devices and services in emerging networks (such as the ones can be found in cyber-physical systems and Internet of things).

For more information, please see https://cfati.conceptechint.net/index.html.

SpaCCS 2020 13th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Nanjing, China, October 23 - 25, 2020. [posted here 1/20/20]
The SpaCCS 2020 conference is the 13th event in the series of conferences which are devoted to security, privacy and anonymity in computation, communication and storage. SpaCCS is now recognized as the main regular event of the world that is covering many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. As applications of computer systems and networks have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The conference will provide a forum for the world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.

For more information, please see http://www.spaccs2020.com/.

SCN 2020 12th Conference on Security and Cryptography for Networks, Amalfi, Italy, September 14 - 16, 2020. [posted here 2/10/20]
The Twelfths Conference on Security and Cryptography for Networks (SCN 2020) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cloud Computing Security
- Cryptanalysis
- Cryptocurrencies
- Cryptographic Hash Functions
- Cryptographic and Security Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Formal Security Methods
- Information-Theoretic Security
- Network, Web and Wireless Security
- Public-Key Encryption
- Physical Cryptography
- Security Architectures and Models
- Software and Systems Security

For more information, please see https://scn.unisa.it/.

IEEE S&B 2020 4th IEEE Security and Privacy on the Blockchain Workshop, Held in conjunction with EuroS&P 2020, Genova, Italy, September 7-11, 2020. [posted here 3/2/20]
Cryptocurrencies have emerged as a promising instrument for financial transaction services that provide transparency and integrity in a decentralized fashion. Their clever combination of blockchains with new incentive mechanisms facilitate publicly verifiable and peer-to-peer transactions without a trusted central party. As a result, they have caught the attention of academic researchers, mainstream media, regulators, entrepreneurs and traditional financial institutions. As a subject for academic research, the global and self-enforcing nature of blockchains raises interesting questions and challenges across several disciplines including computer science, law, economic and human-computer interaction. Our workshop focuses on a wide-range of topics ranging from the scalability of cryptocurrencies, achieving and evaluating financial privacy in public blockchains, permissioning access to blockchains to satisfy regulatory requirements, aligning honest behaviour in blockchain ecosystems and smart contracts through the application of game theory and mechanism design, and the critical analysis of various applications of blockchain to other domains.

For more information, please see https://ieeesb.org.

IWSEC 2020 15th International Workshop on Security, Fukui, Japan, September 2 - 4, 2020. [posted here 2/17/20]
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2020. Topics of interest for IWSEC 2020 include all theory and practice of cryptography, information security, and network security, as in the previous IWSEC workshops. We classify the topics of interest into two tracks as follows, but not limited to (1) Cryptography Track and (2) Cybersecurity and privacy track.

For more information, please see http://www.iwsec.org/2020/.

5G-NS 2020 Workshop on 5G Networks Security, Held in the conjunction with the ARES workshops EU Projects Symposium 2020 at 15th International Conference on Availability, Reliability and Security (ARES 2020), Dublin, Ireland, August 25 - 28, 2020. [posted here 2/3/20]
With the great success and development of 4G mobile networks it is expected that the 5th generation wireless systems (in short 5G) will be a continued effort toward rich ubiquitous communication infrastructure, promising wide range of high-quality services. It is envisioned that 5G communication will offer significantly greater data bandwidth and almost infinite capability of networking resulting in unfaltering user experiences for, among others: virtual/augmented reality, massive content streaming, telepresence, user-centric computing, crowded area services, smart personal networks, Internet of Things (IoT), smart buildings, smart cities.

The 5G communication is currently in the center of attention of industry, academia, and government worldwide. 5G drives many new requirements for different network capabilities. As 5G aims at utilizing many promising network technologies, such as Software Defined Networking (SDN), Network Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing, Cloud Computing, etc. and supporting a huge number of connected devices integrating above mentioned advanced technologies and innovating new techniques will surely bring tremendous challenges for security, privacy and trust. Therefore, secure network architectures, mechanisms, and protocols are required as the basis for 5G to address these issues and follow security-by-design approaches. Finally, since in 5G networks even more user data and network traffic will be transmitted, big data security solutions should be considered in order to address the magnitude of the data volume and ensure data security and privacy.

From this perspective, the 5G-NS 2020 workshop aims at collecting the most relevant ongoing research efforts in 5G networks security field. It also serves as a forum for 5G-PPP Phase 1 & Phase 2 projects in order to disseminate their security-related results and tighten & boost cooperation, and foster development of the 5G Security Community made of 5G security experts and practitioners who pro-actively discuss and share information to collectively progress and align on the field.

For more information, please see https://www.ares-conference.eu/workshops/5g-ns-2020/.

IWCC 2020 9th International Workshop on Cyber Crime, Held in conjunction with the 15th International Conference on Availability, Reliability and Security (ARES 2020), Dublin, Ireland, August 24-28, 2020. [posted here 1/20/20]
TodayÕs worldÕs societies are becoming more and more dependent on open networks such as the Internet Ð where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple international borders. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are often buried in large volumes of data, which are hard to inspect with the aim of detecting offences and collecting evidence. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics and to present the development of tools and techniques, which assist the investigation process of potentially illegal cyber activity. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

For more information, please see https://www.ares-conference.eu/workshops/iwcc-2020/.

CUING 2020 4th International Workshop on Criminal Use of Information Hiding, Held in conjunction with the 15th International Conference on Availability, Reliability and Security (ARES 2020), Dublin, Ireland, August 24-28, 2020. [posted here 1/20/20]
With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. This poses a lot of new challenges for digital forensics analysts, academics, law enforcement agencies (LEAs), and security professionals. The aim of the 4th International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding. However data hiding is understood here in a wider manner than in the academic world i.e. all techniques that pertain to camouflaging/masking/hiding various types of data (e.g. identities, behavior, communication, etc.) are included here. This means not only digital steganography/covert channels but also obfuscation/anti-forensics techniques and even underground networks (darknets) or activities related to behavior impersonation or mimicking. This will allow to present a more complete picture on novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies. Moreover, this year the CUING workshop is co-organized with the SIMARGL (Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware) H2020 project.

For more information, please see https://www.ares-conference.eu/workshops/cuing-2020/.

USENIX-Security 2020 29th USENIX Security Symposium, Boston, MA, USA, August 12–14, 2020. [posted here 05/20/19]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 10 and 11.

For more information, please see https://www.usenix.org/conference/usenixsecurity20/call-for-papers.

SciSec 2020 3rd International Conference on Science of Cyber Security, Shanghai, China, August 9-11, 2020. [posted here 1/20/20]
This new forum was initiated in 2018 and aims to catalyze the research collaborations between the relevant communities and disciplines that can work together to deepen our understanding of, and build a firm foundation for, the emerging Science of Cyber Security. Publications in this venue would distinguish themselves from others by taking or thinking from a holistic perspective about cyber security, rather than a building-block perspective. Each submission will be reviewed by at least 3 reviewers. The program committee plans to select and award a Best Paper. The post-conference proceedings will be published in SpringerÕs Lecture Notes in Computer Science (LNCS) series.

For more information, please see http://www.sci-cs.net.

IoTSPT-ML 2020 10th International Workshop on Security, Privacy, Trust, and Machine Learning for Internet of Things, Held in conjunction with the 29th International Conference on Computer Communications and Networks (ICCCN 2020), Honolulu, Hawaii, USA, August 6, 2020. [posted here 2/24/20]
Experts predict that there will be 3-4 billion of connected devices in use by consumers by the end of this year. Although these devices in smart TVs, microwave ovens, thermostats, etc., will probably make our lives more energy and cost efficient, they can also threaten the security of our homes. This is because the manufacturers of these devices are primarily interested in functionality and do not focus on securing the device against cyber-attacks, protecting the privacy of consumer information on the device, securing the communications from/to the device, etc. The massive scale and the variety of these devices also make it difficult for the manufacturers to design and implement manageable security and privacy solutions.

Another challenge in the IoT world is the continuous collection of data from the devices which is analyzed to make conclusions about the environment being monitored by the IoT devices. The data analyses are also crucial to maintaining the security and privacy of the data being collected from the devices. The massive scale of next-generation IoT systems makes the data collection, analyses, transport, and fusion of the results at the system level seem daunting.

This workshop aims to promote discussions of research and relevant activities in the models and design of secure, privacy-preserving, or trust architectures, data analyses and fusion platforms, protocols, algorithms, services, and applications for next generation IoT systems. We especially encourage security and privacy solutions that employ innovative machine learning techniques to tackle the issues of data volume and variety problems that are systemic in IoT platforms.

We plan to seek previously unpublished work in theoretical or experimental research, or work in-progress

For more information, please see https://sites.google.com/uw.edu/iotspt-ml-2020.

EAI SPNCE 2020 3rd EAI International Conference on Security and Privacy in New Computing Environments, Lyngby, Denmark, July 27 - 28, 2020. [posted here 2/10/20]
The existing computing models and computing environments have changed immensely due to the rapid advancements in mobile computing, big data, and cyberspace-based supporting technologies such as cloud computing, Internet-of-Things (IoT), blockchain, and other large-scale computing environments. In recent years, we have witnessed an ever-growing research interest in this field, and the key reason is its essential properties that provide security, anonymity, and data integrity without any third-party organization in control of the transactions. On the other hand, its advance should be further supported with better scalability, privacy, efficiency, flexibility, availability, and higher dependability. Traditional security techniques are faced with many challenges in these new computing environments. Thus, efforts are needed to explore the security and privacy issues of the above-mentioned new environments within the cyberspace.

For more information, please see http://spnce.org/.

DAC 2020 Design Automation Conference, Moscone Center West, San Francisco, CA, USA, July 19 - 23, 2020. [posted here 10/7/19]
For 57 years, the Design Automation Conference (DAC) has been recognized as the leading-edge conference on research and practice in tools and methodologies for the design and design automation of electronic circuits and systems. DAC offers outstanding training, education, exhibits and networking opportunities for a worldwide community of designers, researchers, tool developers and vendors. Submissions are invited for Special Sessions, Designer Track, IP and Embedded Systems Track papers and presentations, poster sessions, panels, workshops, tutorials and co-located conferences. Criteria, topics and deadlines for the major tracks are outlined briefly below. Security and Privacy sessions at DAC address an urgent need to create, analyze, evaluate, and improve the hardware, embedded systems and software base of contemporary security solutions. Secure and trustworthy software and hardware components, platforms and supply chains are vital to all domains including financial, healthcare, transportation, and energy. A revolution is underway in many industries that are "connecting the unconnected.î Such cyber-physical systems -- e.g., automobiles, smart grid, medical devices, etc. -- are taking advantage of integration of physical systems with information systems. Notwithstanding the numerous benefits, these systems are appealing targets of attacks. The scope and variety of attacks on these systems present design challenges that span embedded hardware, software, networking, and system design.

For more information, please see https://dac.com/call-for-contributions.

PETS 2020 20th Privacy Enhancing Technologies Symposium, Montreal, Canada, July 14 - 18, 2020. [posted here 07/22/19]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 20th PETS event will be organised by Concordia University and the Universite du Quebec a Montreal and held in Montreal, Canada, on a date in 2020 yet to be determined. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).

PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is published by Sciendo, part of De Gruyter, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges.

Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may receive resubmit with major revisions decisions, in which case authors are invited to revise and resubmit their article to one of the following two issues. We endeavor to assign the same reviewers to revised submissions. Each paper accepted in the PoPETs 2020 volume must be presented in person at the PETS 2020 symposium.

For more information, please see https://petsymposium.org.

WiSec 2020 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8 - 10, 2020. [posted here 2/17/20]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography. The conference welcomes both theoretical as well as systems contributions.

For more information, please see https://wisec2020.ins.jku.at/.

SECRYPT 2020 17th International Conference on Security and Cryptography, Paris, France, July 8 - 10, 2020. [posted here 12/23/19]
SECRYPT is an annual international conference covering research in information and communication security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.

For more information, please see http://www.secrypt.icete.org.

CyberSECHARD 2020 2nd IFIP NTMS Workshop on Cybersecurity on Hardware, Held in conjunction with the 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2020), Paris, France, July 6 - 8, 2020. [posted here 3/16/20]
The 2nd edition of the Workshop on “CyberSECurity on HARDware (CyberSECHARD)” seeks papers in the areas of interest, in alphabetical order, include, but are not limited to:
- Architectures and Applications
- Attacks: Implementations and Countermeasures
- Constrained and Trusted Environments
- Cryptanalysis for Hardware
- Cryptographic Primitives
- Cyberphysical and Embedded Systems
- Energy Aware Hardware Implementations
- Evaluation & Testing
- Hardware Crypto-Processors
- Hardware Obfuscation
- Internet of Things (IoT) & Cybersecurity
- Lightweight Cryptography
- Networks, Protocols and Communications: Hardware Integrations
- Pervasive & Ubiquitous Computing, Privacy
- PUFs and TRNGs for Hardware
- Reconfigurable Cybersecurity Computing
- Reconfigurable Design & Implementation
- Reverse Engineering
- Smart Cards Cybersecurity
- System-on-Chip (SoC) Design & Implementation
- Trojans on Hardware
- Trust and Anti-Counterfeiting
- Vehicular Hardware Cybersecurity

For more information, please see http://www.ntms-conf.org/ntms2020/call-for-workshops/cybersechard.

CNS 2020 8th IEEE Conference on Communications and Network Security, Avignon, France, June 29 - July 1, 2020. [posted here 11/18/19]
The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cybersecurity researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry presenting novel research results in communications and network security. Particular topics of interest include, but are not limited to:
- Anonymity and privacy technologies
- Biometric authentication and identity management
- Censorship countermeasures and privacy
- Combating cyber-crime (anti-spam, anti-phishing, anti-fraud techniques, etc.)
- Computer and network forensics
- Cyber deterrence strategies
- Data and application security
- Data protection and integrity
- Game-theoretic security technologies
- Implementation and evaluation of networked security systems
- Information-theoretic security
- Intrusion detection, prevention, and response
- Key management, public key infrastructures, certification, revocation, and authentication
- Malware detection and mitigation
- Security metrics and models
- Physical-layer and cross-layer security technologies
- Security and privacy for big data
- Security and privacy for data and network outsourcing services
- Security and privacy for mobile and wearable devices
- Security and privacy in cellular networks
- Security and privacy in cloud and edge computing
- Internet Security: Protocols, standards, measurements
- Security and privacy in crowdsourcing
- Security and privacy in cyber-physical systems
- Security and privacy in emerging wireless technologies and applications (dynamic spectrum sharing, cognitive radio networks, millimeter wave communications, MIMO systems, smart/connected vehicles, UAS, etc.)
- Security and privacy in peer-to-peer and overlay networks
- Security and privacy in WiFi, ad hoc, mesh, sensor, vehicular, body-area, disruption/delay tolerant, and social networks
- Security and privacy in smart cities, smart and connected health, IoT, and RFID systems
- Security for critical infrastructures (smart grids, transportation systems, etc.)
- Security for future Internet architectures and designs
- Security for software-defined and data center networks
- Security in machine learning
- Social, economic, and policy issues of trust, security, and privacy
- Traffic analysis
- Usable security and privacy
- Web, e-commerce, m-commerce, and e-mail security

For more information, please see https://cns2020.ieee-cns.org/.

DBSec 2020 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Regensburg, Germany, June 25-27, 2020. [posted here 12/9/19]
DBSec is an annual international conference covering research in data and applications security and privacy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, and applications security. Topics of interest include, but are not limited to:
- access control
- anonymity
- applied cryptography in data security
- authentication
- big data security
- data and system integrity
- data protection
- database security
- digital rights management
- distributed and decentralized security
- identity management
- intrusion detection
- knowledge discovery and privacy
- methodologies for data and application security
- network security
- organisational and social aspects of security
- privacy
- secure cloud computing
- secure distributed systems
- secure information integration
- security and privacy in crowdsourcing
- security and privacy in IT outsourcing
- security and privacy in the Internet of Things
- security and privacy in location-based services
- security and privacy in P2P scenarios and social networks
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security management and audit
- security metrics
- threats, vulnerabilities, and risk management
- trust and reputation systems
- trust management
- web security
- wireless and mobile security

For more information, please see https://dbsec2020.ur.de.

DASC 2020 18th IEEE International Conference on Dependable, Autonomic and Secure Computing, Calgary, Canada, June 22-26, 2020. [posted here 10/21/19]
IEEE DASC 2020 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. Topics of particular interests include the following tracks, but are not limited to:
Track 1. Dependable and Fault-tolerant Computing
Track 2. Network and System Security and Privacy
Track 3. Autonomic Computing and Autonomous Systems
Track 4. Industrial Applications and Emerging Techniques

For more information, please see http://cyber-science.org/2020/dasc/.

SecMT 2020 International Workshop on Security in Mobile Technologies, Held in conjunction with ACNS2020, Rome, Italy, June 22-25, 2020. [posted here 1/13/20]
Despite being small computing devices, smartphones offer a wide range of functionalities and services to their users, which are currently encountered to be more than one third of the world population. This range of features introduces new security and privacy threats, which expose users to serious damages. Even though research in mobile security has been active over the past 10 years, as long as the mobile technology is used, new challenges will always come up. The purpose of this workshop is to bring researchers, hardware and software developers, as well as practitioners and policy makers, to explore the latest advances in the security and privacy for mobile devices.

For more information, please see https://spritz.math.unipd.it/events/2020/ACNS_Workshop/index.html.

CLOUD S&P 2020 2nd Workshop on Cloud Security and Privacy, Held in conjunction with ACNS2020, Rome, Italy, June 22-25, 2020. [posted here 1/13/20]
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by various serious security and privacy concerns. CLOUD S&P aims to provide a platform for researchers and practitioners to present and discuss a wide-range of security and privacy issues and their solutions to ensure better protection in a cloud ecosystem. This workshop invites submissions on new attacks and solutions on various cloud-centric technologies, as well as short surveys and case studies that shed light on the security implications of clouds.

For more information, please see https://www.albany.edu/cloudsp2020/.

EuroSP 2020 5th IEEE European Symposium on Security and Privacy, Genova, Italy, June 16-18, 2020. [posted here 09/23/19]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the European sister conference of the established IEEE S&P symposium. It is a premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy. The emphasis is on building or attacking real systems, even better if actually deployed, rather than presenting purely theoretical results. Papers may present advances in the design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Papers that shed new light on past results by means of sound theory or through experimentation are also welcome. Topics of interest include:
- Access control
- Accountability
- AI-based security- or privacy-enhancing tools
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Blockchain
- Censorship and censorship-resistance
- Cloud security
- Cryptography with applied relevance to security and privacy
- Distributed systems security
- Embedded systems security
- Forensics
- Formal methods for security
- Hardware security
- Human aspects of security and privacy
- Intrusion detection
- IoT security and privacy
- Language-based security
- Malware
- Measurement relevant to security and privacy
- Metrics
- Mobile security and privacy
- Network security
- Privacy-enhancing technologies
- Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- Security of AI
- Security usability
- System security
- Web security and privacy

For more information, please see https://www.ieee-security.org/TC/EuroSP2020/.

WTMC 2020 5th International Workshop on Traffic Measurements for Cybersecurity, Held in conjunction with the IEEE Euro S&P 2020, Genova, Italy, June 15, 2020. [posted here 12/23/19]
Current communication networks are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of network users, continuous appearance of network applications, increasing amount of data transferred, and diversity of user behaviors. Understanding and measuring traffic in such networks is a difficult yet vital task for network management but recently also for cybersecurity purposes. Network traffic measuring and monitoring can, for example, enable the analysis of the spreading of malicious software and its capabilities or can help to understand the nature of various network threats including those that exploit users' behavior and other user's sensitive information. On the other hand network traffic investigation can also help to assess the effectiveness of the existing countermeasures or contribute to building new, better ones. Recently, traffic measurements have been utilized in the area of economics of cybersecurity e.g. to assess ISP "badness" or to estimate the revenue of cyber criminals.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and industry. The other goal is to show the latest research results in the field of cybersecurity and understand how traffic measurements can influence it. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. This workshop presents some of the most relevant ongoing research in cybersecurity seen from the traffic measurements perspective. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches.

For more information, please see http://wtmc.info/.

SACMAT 2020 25th ACM Symposium on Access Control Models and Technologies, Barcelona, Spain, June 10-12, 2020. [posted here 09/23/19]
The organizing committee of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT 2020) invites contributions on all aspects of access control. The symposium will provide participants the opportunity to present work at different levels of development, from early work on promising ideas to fully developed technical results as well as system demonstrations. The symposium will feature a Best Paper Award. The program will include keynote talks, research paper presentations, demos, a panel, and a poster session. Papers offering novel research contributions are solicited for submission. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. In addition to the regular research track, this year SACMAT will again host a special track: Blue Sky/Vision Track. Researchers are invited to submit papers describing promising new ideas and challenges of interest to the community as well as access control needs emerging from other fields. We are particularly looking for potentially disruptive and new ideas which can shape the research agenda for the next 10 years. We encourage submissions that present ideas that may have not been completely developed and experimentally evaluated.

For more information, please see http://www.sacmat.org/.

SBC 2020 8th International Workshop on Security in Blockchain and Cloud Computing, Taipei, Taiwan, June 1-5, 2020. [posted here 1/6/20]
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. Blockchain is another paradigm shift and drew a lot of recent attention from both academia and industry. Moreover, blockchain and cloud have many interplays. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We will encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.

For more information, please see https://conference.cs.cityu.edu.hk/asiaccsscc/.

CPSS 2020 6th ACM Cyber-Physical System Security Workshop, Held in conjunction with ACM AsiaCCS 2020, Taipei, Taiwan, June 1, 2020. [posted here 11/18/19]
Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome.

For more information, please see https://www.nics.uma.es/pub/CPSS2020/.

SADFE 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering, New York, NY, USA, May 14-15, 2020. [posted here 11/25/19]
The 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) is calling for paper, panel, poster, and tutorial submissions in the broad field of Digital Forensics from both practitioner and researcher’s perspectives. With the dynamic change and rapid expansion of the types of electronic devices, networked applications, and investigation challenges, systematic approaches for automating the process of gathering, analyzing and presenting digital evidence are in unprecedented demands. The SADFE conference aims at promoting solutions for related problems. Past speakers and attendees of SADFE have included computer scientists, social scientists, forensic practitioners, lawyers and judges. The synthesis of hard technology and science with social science and practice forms the foundation of this conference. Papers focusing on any of the system, legal, or practical aspects of digital forensics are solicited.

For more information, please see http://www.sadfe.org/conference.html.

HOST 2020 13th IEEE International Symposium on Hardware Oriented Security and Trust, San Jose, CA, USA, May 4-7, 2020. [posted here 06/10/19]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims to facilitate the rapid growth of hardware-based security research and development, and to highlight new results in the area of hardware security. HOST 2020 invites original contributions in all areas of overlap between hardware and security. This includes but is not limited to the following:
HARDWARE
- Security primitives
- Computer-aided design (CAD) tools
- Emerging and nanoscale devices
- Trojans and backdoors
- Side-channel attacks and mitigation
- Fault injection and mitigation
- (Anti-)Reverse engineering and physical attacks
- Anti-tamper
- Anti-counterfeit
ARCHITECTURE
- Trusted execution environments
- Cache-side channel attacks and mitigation
- Privacy-preserving computation
- System-on-chip (SoC)/platform security
- FPGA and reconfigurable fabric security
- Cloud computing
- Smart phones and smart devices
SYSTEM
- Internet-of-things (IoT) security
- Sensors and sensor network security
- Smart grid security
- Automotive/autonomous vehicle security
- Cyber-physical system security
- (Adversarial) Machine learning and cyber deception

For more information, please see http://www.hostsymposium.org/.

ICCWS 2020 13th European Workshop on Systems Security, Co-located with the 15th European Conference on Computer Systems, Heraklion, Crete, Greece, April 27, 2020. [posted here 1/27/20]
The 13th European Workshop on Systems Security (EuroSec) aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The objective of the workshop is to discuss novel, practical, systems-oriented work. The workshop will precede the EuroSys 2020 conference. EuroSec encourages systems security researchers to share early iterations of bleeding-edge ideas with the community, before they are further developed into full papers. Reciprocally, authors receive feedback to help steer and improve their research to its full potential. Many EuroSec papers later form the basis for full conference papers presented at one of the top venues in computer security. EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to):
- New attacks, evasion techniques, and defenses
- Operating system security
- Mobile systems security
- Malicious code analysis and detection
- Web security
- Network security
- Reverse engineering and binary analysis
- Hardware security
- Virtual machines and hypervisors
- Trusted computing and its applications
- Systems security aspects of privacy
- Identity management and anonymity
- Systems-based forensics
- Vulnerability discovery, analysis, and exploitation
- Embedded system security
- Cybercrime ecosystem and economics
- Security of critical infrastructures

For more information, please see https://www.concordia-h2020.eu/eurosec-2020/.

EdgeBlock 2020 IEEE International Symposium on Edge Computing Security and Blockchain, Co-located with IEEE INFOCOM 2020, Beijing, China, April 27, 2020. [posted here 11/11/19]
EdgeBlock 2020 is an international forum for researchers to present their latest researches and perspectives on the intersection of blockchain and edge computing (including Internet of Things ñ IoT). This is an interdisciplinary area that is of increasingly importance. For example, in our new networked society where there are a broad range of IoT devices and cyber physical systems around us, and data from these devices and systems generated at the edge of the network are been sent to some edge devices or the cloud servers for processing and storage. The utility of blockchain in a number of applications, including to secure data-in-transit and data-at-rest in IoT and cyber physical systems, has also been explored in the research community. This is not surprising due to the inherent features of blockchain, such as decentralization and immutability. Therefore, in this workshop we are interested in determining how can we leverage blockchain characteristics to establish trusted environments for IoT, social networking, cyber security and other commercial applications.

For more information, please see https://infocom2020.ieee-infocom.org/symposium-edge-computing-security-and-blockchain.

ICCWS 2020 IEEE International Conference on Cyber Warfare and Security, Islamabad, Pakistan, March 31 - April 2, 2020. [posted here 1/13/20]
Cyber Security is a rapidly growing global challenge with new sophisticated zero-day attacks costing economies billion of dollars annually. Cyber attacks may particularly affect the developed world, but developing countries are also at higher risk due to the lack of expertise and shortage of security professionals with adequate skills and experience to effectively combat the rising threats. Keeping this perspective, National Centre for Cyber Security (NCCS) Pakistan is organizing its first annual conference titled: ÒIEEE International Conference on Cyber Warfare and Security (ICCWS-2020)Ó. ICCWS-2020 aims to provide a platform to researchers around the World to share contemporary research and experiences related to emerging areas of cyber security. The conference will include high-quality and focused technical program on cyber security with keynotes and invited talks from prominent industry and academia experts. It will also feature an attractive Lab-to-Market event to showcase research, industrial exhibitions and cyber security ideas competition aimed at industry practitioners, vendors, ambitious students, and local start-up companies.

For more information, please see http://nccs.pk/activities/conference.

NDSS 2020 Network and Distributed System Security Symposium, San Diego, CA, USA, February 23-26, 2020. [posted here 06/ 3/19]
The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of computer, network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies. Technical papers and panel proposals are solicited. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2020. The Proceedings will be made freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

Paper Submission Information: New Submission Model: NDSS will have two review cycles in 2020: the first (Summer) with a submission deadline of June 14, 2019, and the second (Fall) with a submission deadline of September 13, 2019. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.

For more information, please see https://www.ndss-symposium.org/ndss2020/call-for-papers/.

IFIP11.9-DF 2020 16th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 6-8, 2020. [posted here 06/03/19]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately 100 participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume – the sixteenth volume in the well-known Research Advances in Digital Forensics book series (Springer, Cham, Switzerland) during the summer of 2020. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Embedded device forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org/.