| |
Calls for Papers
Last Modified:12/8/25
Upcoming Conferences and Workshops
Note: The submission date has passed.
December 2025
ACSAC 2025
41th Annual Computer Security Applications Conference,
Honolulu, Hawaii, USA, December 8-12, 2025.
[posted here 4/14/25]
The Annual Computer Security Applications Conference (ACSAC) brings together leading researchers
and practitioners, along with a diverse group of security professionals drawn from academia, industry,
and government, gathered to present and discuss the latest cybersecurity results and topics. With peer
reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC
continues its core mission of investigating practical solutions for computer and network security technologies.
As an internationally recognized forum where researchers, practitioners, and developers meet to learn
and to exchange practical ideas and experiences in computer and network security, we invite you to
submit your work. In addition to peer-reviewed papers on novel applied research, we also welcome case
studies on real-world applications, panels featuring world experts, and workshops consisting of 1-2 day
sessions on hot cybersecurity and privacy topics.
For more information, please see
https://www.acsac.org.
HealthSec 2025
Workshop on Cybersecurity in Healthcare,
Co-located with the Annual Computer Security Applications Conference (ACSAC41),
Honolulu, HI, USA, December 9, 2025.
[posted here 6/2/25]
In its most basic form, healthcare is gathering data, interpreting data into
information, and transforming information into current human knowledge that can
be acted upon, with each of these stages open to unintended errors and/or malicious
subversion. These stages do not occur within a vacuum but rather within our existing
infrastructures and social system with all their current limitations, systemic bias,
and exploitable vulnerabilities. While a similar characterization can be made about
security in other applied domains, healthcare is undergoing a dramatic transformation,
arguably the next technological revolution, presenting immediate opportunities for
improvement along with corresponding challenges in security.
Our desire is to bring together diverse researchers from academia, government, and
the healthcare industry to report on the latest research efforts. As this is the
second workshop following a first workshop that exceeded all expectations, we want
to continue momentum toward encouraging, jumpstarting, and growing excellent
interdisciplinary contributions at the forefront of cybersecurity in healthcare
research. Papers with demonstrated results will be given priority.
For more information, please see
https://publish.illinois.edu/healthsec2025/.
ICISS 2025
21st International Conference on Information Systems Security,
Indore, India, December 16-20, 2025.
[posted here 4/14/25]
ICISS is a premier international conference on information security and privacy. The ICISS
conference provides a dynamic platform for researchers, academicians, and industry professionals worldwide
to discuss and explore advancements in cybersecurity, cryptography, system security, and hardware security.
Since its inception in 2005, the conference has fostered impactful research collaborations, addressing emerging
security challenges in computing and information systems. With keynote talks by leading experts, technical
paper presentations, hands-on workshops, and panel discussions, ICISS 2025 aims to facilitate knowledge
exchange and shape the future of digital security.
For more information, please see
https://iciss.isrdc.in.
January 2026
IFIP 119 DF 2026
22nd Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 5-6, 2026.
[posted here 6/9/25]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active
international community of scientists, engineers and practitioners dedicated to advancing
the state of the art of research and practice in digital forensics. The Twenty-Second
Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for
presenting original, unpublished research results and innovative ideas related to the
extraction, analysis and preservation of all forms of electronic evidence. Papers and
panel proposals are solicited. All submissions will be refereed by a program committee
comprising members of the Working Group. Papers and panel submissions will be selected
based on their technical merit and relevance to IFIP WG 11.9. The conference will be
limited to approximately 60 participants to facilitate interactions between researchers
and intense discussions of critical research issues. Keynote presentations, revised
papers and details of panel discussions will be published as an edited volume – the
twenty-second volume in the well-known Research Advances in Digital Forensics book
series (Springer, Cham, Switzerland) during the summer of 2026.
For more information, please see
http://www.ifip119.org/.
February 2026
NDSS 2026
Network and Distributed System Security,
San Diego, CA, USA, February 23-27, 2026.
[posted here 4/14/25]
The Network and Distributed System Security (NDSS) Symposium is a top venue that fosters
information exchange among researchers and practitioners of network and distributed system security. The NDSS
Symposium 2026 and co-located workshops will take place in San Diego, CA, from 23 to 27 February 2026. The
target audience includes everyone interested in practical aspects of network and distributed system security,
with a focus on system design and implementation. A major goal is to encourage and enable the Internet community
to apply, deploy, and advance the state of practical security technologies.
This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their
paper in a way that makes the results accessible and compelling to a general security researcher. All
submissions will be reviewed by the Program Committee and accepted submissions will be published by the
Internet Society in the Proceedings of NDSS Symposium 2026. The Proceedings will be made freely accessible
from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for
noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first
page of the paper. The authors are thus free to post the camera-ready versions of their papers on their
personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly
prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2026/submissions/call-for-papers/.
March 2026
SaTML 2026
4th IEEE Conference on Secure and Trustworthy Machine Learning,
Munich, Germany, March 23-25, 2026.
[posted here 7/7/25]
IEEE SaTML expands upon the theoretical and practical understandings of
vulnerabilities inherent to machine learning (ML), explores the robustness of learning
algorithms and systems, and aids in developing a unified, coherent scientific community
aiming to establish trustworthy machine learning. Topics of interest include
(but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation
For more information, please see
https://satml.org/.
April 2026
May 2026
SP 2026
47th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 18 - 21, 2026.
[posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix “SoK:” in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Symposium Event (Important Changes): The number of papers accepted to IEEE
S&P continues to grow substantially each year. Due to conference venue limitations and
costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes,
length determined based on the number of accepted papers) and (b) a poster presentation
immediately following the talk session containing the paper. All accepted papers
are required to present both a short talk and a poster.
For more information, please see
https://sp2026.ieee-security.org/cfpapers.html.
|