| |
Calls for Papers
Last Modified:3/3026
Upcoming Conferences and Workshops
Note: The submission date has passed.
April 2026
AI-SS 2026
1st International Workshop on AI Safety and Security,
Co-located with the 21st European Dependable Computing Conference (EDCC 2026),
Canterbury, UK, April 7, 2026.
[posted here 1/5/26]
Artificial Intelligence (AI) systems are increasingly embedded in safety-
and mission-critical domains such as healthcare, transportation, energy, and nuclear
environments. However, the integration of AI brings new dimensions of risk, uncertainty,
and adversarial vulnerability that challenge traditional safety and security assurance methods.
This workshop aims to bridge the dependability and AI research communities by addressing
fundamental and practical challenges in AI safety, security, and trustworthiness. It will
provide a platform for researchers and practitioners to exchange ideas, discuss methodologies,
and explore standards and regulatory frameworks supporting safe and secure AI adoption in critical systems.
The theme of the workshop is Towards Dependable and Trustworthy Intelligent Systems
and the Workshop's goals include:
- To identify key research challenges and emerging methodologies for AI safety and security
- To facilitate interdisciplinary collaboration between AI, dependability, and cyber security experts
- To promote discussion on standardisation, certification, and governance for AI dependability, safety and security
- To encourage young researcher participation through short papers and panel sessions
For more information, please see
https://cyber.kent.ac.uk/events/AI-SS2026/.
May 2026
HOST 2026
19th IEEE International Symposium on Hardware Oriented Security and Trust,
Washington DC, USA, May 4-7, 2026.
[posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier
symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008,
HOST has served as the globally recognized event for researchers and practitioners to advance knowledge
and technologies related to hardware security and assurance. HOST 2026 invites original contributions
in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security,
AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic
techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs,
post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection,
side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution
environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT
security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture,
blockchain, and cryptocurrency security.
For more information, please see
https://host.conferences.computer.org/2026/.
SP 2026
47th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 18 - 21, 2026.
[posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix “SoK:” in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Symposium Event (Important Changes): The number of papers accepted to IEEE
S&P continues to grow substantially each year. Due to conference venue limitations and
costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes,
length determined based on the number of accepted papers) and (b) a poster presentation
immediately following the talk session containing the paper. All accepted papers
are required to present both a short talk and a poster.
For more information, please see
https://sp2026.ieee-security.org/cfpapers.html.
June 2026
ACM ASIACCS 2026
21st ACM ASIA Conference on Computer and Communications Security,
Bangalore, India, June 1-5, 2026.
[posted here 10/20/25]
ACM ASIACCS seeks paper submissions presenting novel contributions related to
all real-world aspects of security and privacy. We seek articles presenting accessible and
compelling results to general computer security researchers. Purely theoretical (e.g.,
cryptography-focused, with no security/application connections) submissions are not
encouraged. The same applies for submissions focusing primarily on blockchains or
machine learning. As in previous years, we will also be accepting “Systemisation of Knowledge”
(SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the
submission form. They will be accepted based on the value to the community. Survey papers
without insights evaluating, systematizing and contextualizing current knowledge will be rejected.
For more information, please see
https://asiaccs2026.cse.iitkgp.ac.in/call-for-papers/.
ICBC 2026
8th IEEE International Conference on Blockchain and Cryptocurrency,
Brisbane, Australia, June 1-5, 2026.
[posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026),
sponsored by the IEEE Communications Society, has established itself as the flagship annual
conference in blockchain research, maintaining the highest standards of academic excellence.
We invite original, unpublished submissions in all areas of blockchain and cryptocurrency
research. In addition to established topics, ICBC 2026 welcomes emerging directions such as
Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical)
Internet Infrastructure.
For more information, please see
https://icbc2026.ieee-icbc.org/.
AMASS 2026
Workshop on Advances in Malware Analysis and Software Security,
Held in conjunction with ACM ASIACCS, Bangalore, India, June 2, 2026.
[posted here 12/8/25]
The AMASS 2026 Workshop addresses one of today’s most critical cybersecurity
challenges: the exponential rise of sophisticated malware and software-based threats. While
malware research often appears within broader cybersecurity venues, a clear gap remains in
focused discussions at the intersection of malware analysis, software engineering, and
intelligent defence systems. The workshop aims to bridge that gap by establishing a
dedicated forum for sharing advancements
in malware detection, vulnerability discovery, and software hardening through AI-driven
and data-centric approaches. Despite the rapid growth of cyber threats and research activity
worldwide, there is currently no comparable cybersecurity venue dedicated to these topics.
The AMASS workshop aims to:
- Create a dedicated platform for sharing research results, datasets, and tools in
malware and software security.
- Encourage collaboration between academia and industry, particularly in the context of threat
intelligence and malware response.
- Bridge static and dynamic analysis communities and foster reproducibility in malware research.
- Support the next generation of researchers through discussions, demos, and early-stage
research presentations.
For more information, please see
https://sites.google.com/view/amass2026/home.
CODASPY 2026
16th ACM Conference on Data and Application Security and Privacy,
Frankfurt am Main, Germany, June 23 - 25, 2026.
[posted here 12/22/25]
With rapid global penetration of the Internet and smart phones and the
resulting productivity and social gains, the world is becoming increasingly dependent
on its cyber infrastructure. Criminals, spies and predators of all kinds have learned
to exploit this landscape much quicker than defenders have advanced in their technologies.
Security and Privacy has become an essential concern of applications and systems throughout
their lifecycle. Security concerns have rapidly moved up the software stack as the
Internet and web have matured. The security, privacy, functionality, cost and usability
tradeoffs necessary in any practical system can only be effectively achieved at the data
and application layers. This conference provides a dedicated venue for high-quality
research in this arena, and seeks to foster a community with this focus in cyber security.
CODASPY will follow the ACM Policy Against Harassment at ACM Activities. Please familiarize yourself
with ACM Policy Against Harassment and guide to Reporting Unacceptable Behavior. As a published ACM
author, you and your co-authors will be subject to all ACM Publications Policies, including
ACM's new Publications Policy on Research Involving Human Participants and Subjects. Please
make sure your submission complies with all the ACM publication policies.
For more information, please see
https://www.codaspy.org/2026/.
IWSPA 2026
12th ACM International Workshop on Security and Privacy Analytics,
Held in conjunction with the 16th ACM Conference on Data and Application Security and
Privacy (CODASPY 2026),
Frankfurt am Main, Germany, June 24, 2026.
[posted here 3/2/26]
This is the twelfth workshop in a series of workshops on Security and Privacy
Analytics. Increasingly, sophisticated techniques from machine learning, data mining,
statistics and natural language processing are being applied to challenges in security
and privacy fields. However, experts from these areas have had few venues in the past
where they can meet and exchange ideas so that strong collaborations can emerge, and
cross-fertilization of these areas can occur. Moreover, current courses and curricula
in security do not sufficiently emphasize background in these areas and students in
security and privacy are not emerging with deep knowledge of these topics. Hence, we
propose to continue the workshop that we started in 2015 to address the research and
development efforts in which analytical techniques from machine learning, data mining,
natural language processing and statistics are applied to solve security and privacy
challenges (“security and privacy analytics”). Over the course of these seven years,
the papers published in IWSPA proceedings have been downloaded more than 32,000
times according to ACM Digital Library and have 1,000 citations on Google Scholar.
Submissions of papers related to methodology, design, techniques and new directions
for security and privacy that make significant use of machine learning, data mining,
statistics or natural language processing are welcome. Furthermore, submissions on
educational topics and systems in the field of security analytics are also highly
encouraged. Proposals for tutorials on related topics are also welcome.
For more information, please see
https://sites.google.com/view/iwspa-2026/.
SaT-CPS 2026
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems,
Held in conjunction with the 16th ACM Conference on Data and Application Security and
Privacy (CODASPY 2026),
Frankfurt am Main, Germany, June 25, 2026.
[posted here 2/9/26]
The ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS) aims
to represent a forum for researchers and practitioners from industry and academia interested in
various areas of CPS security. SaT-CPS seeks novel submissions describing practical and theoretical
solutions for cybersecurity challenges in CPS. Submissions can be from different application
domains in CPS.
For more information, please see
https://sites.google.com/view/sat-cps2026/.
ACM WiSec 2026
19th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Saarbrucken, Germany, June 30 - July 3, 2026.
[posted here 12/8/25]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of
security and privacy in wireless and mobile networks and their applications. In addition to
the traditional ACM WiSec topics of physical, link, and network layer security, we welcome
papers focusing on the increasingly diverse range of mobile or wireless applications such as
the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile
software platforms, usable security and privacy, biometrics, and cryptography.
Important update on ACMs new open access publishing model for 2026 ACM Conferences:
Starting January 1, 2026, ACM will fully transition to Open Access. All ACM publications, including
those from ACM-sponsored conferences, will be 100% Open Access. Authors will have two primary options
for publishing Open Access articles with ACM: the ACM Open institutional model or by paying Article
Processing Charges (APCs). With over 2,600 institutions already part of ACM Open, the majority
of ACM-sponsored conference papers will not require APCs from authors or conferences (currently,
around 76%). Authors from institutions not participating in ACM Open will need to pay an
APC to publish their papers, unless they qualify for a financial waiver. To find out whether
an APC applies to your article, please consult the list of participating institutions in ACM
Open and review
the https://www.acm.org/publications/policies/policy-on-discretionary-open-access-apc-waivers.
For more information, please see
https://wisec26.events.cispa.de.
July 2026
PETS 2026
26th Privacy Enhancing Technologies Symposium,
Calgary, Canada, July 20-25, 2026.
[posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 26th PETS is expected to be a
hybrid event with a physical gathering (location TBD) and a concurrent virtual event.
Papers undergo a journal-style reviewing process, and accepted papers are published
in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of
accepted papers are strongly encouraged to attend and present at the physical event,
where their presentations can be recorded for the virtual event and where they can
participate directly in in-person research, technical, and social activities.
However, in-person attendance is not strictly required for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges or
article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are
notified of the decisions about two months after submission. Authors will receive a
decision of accept, revise, or reject. Those receiving revise will be invited to
revise their article with the guidance of a revision editor according to a well-defined
set of revision criteria and will have up to four months to attempt to complete the
required revisions. Authors of rejected papers must skip a full issue prior to
resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer
concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into
consideration during the discussion. New for 2026: The authors will be able to submit a
separate, 250-word rebuttal response to each individual review (rather than a single
response that addresses all reviews).
For more information, please see
https://petsymposium.org/cfp26.php.
CSF 2026
39th IEEE Computer Security Foundations Symposium,
Colocated with FLoC 2026,
Lisbon Portugal, July 26-29, 2026.
[posted here 9/24/25]
The Computer Security Foundations Symposium (CSF) is an annual conference
for researchers in computer security, to examine current theories of security,
the formal models that provide a context for those theories, and techniques for
verifying security. It was created in 1988 as a workshop of the IEEE Computer
Society’s Technical Committee on Security and Privacy, in response to a 1986
essay by Don Good entitled “The Foundations of Computer Security—We Need Some.”
The meeting became a “symposium” in 2007, along with a policy for open, increased
attendance. Over the past two decades, many seminal papers and techniques have been
presented first at CSF. For more details on the history of the symposium, visit CSF’s home.
The program includes papers, panels, and a poster session. Topics of interest
include access control, information flow, covert channels, cryptographic protocols,
database security, language-based security, authorization and trust, verification
techniques, integrity and availability models, and broad discussions concerning the
role of formal methods in computer security and the nature of foundational
research in this area.
For more information, please see
https://csf2026.ieee-security.org.
DFRWS-USA 2026
26th Digital Forensics Research USA Conference,
Arlington, Virginia, USA, July 27 - 30, 2026.
[posted here 11/17/25]
The Digital Forensics Research Conference (known as DFRWS) USA 2026 marks
the 26th anniversary of one of the most influential conferences in the field of digital
forensics. Since its inception, DFRWS has been a pivotal platform for advancing the
science and practice of digital forensics, bringing together researchers, practitioners,
and industry leaders from around the globe. Over the past quarter-century, the workshop
has been instrumental in the development of cutting-edge technologies and forensic
methodologies that have become essential tools in the fight against cybercrime. From
pioneering techniques in digital evidence recovery and analysis to fostering
innovations in mobile device forensics, memory forensics, and the emerging
challenges posed by cloud computing and Internet of Things (IoT) devices, DFRWS
has consistently been at the forefront of digital forensic science. The 2026
edition will celebrate these achievements while setting the stage for the
future of forensic research and its vital role in securing the digital world.
DFRWS welcomes new perspectives that push the envelope of what is currently
possible in digital forensics.
For more information, please see
https://dfrws.org/call-for-papers-is-open-for-dfrws-usa-2026/.
August 2026
CSR 2026
IEEE International Conference on Cyber Security and Resilience,
Lisbon, Portugal, August 3 - 5, 2026.
[posted here 1/12/26]
The IEEE International Conference on Cyber Security and Resilience (IEEE CSR)
is an annual event sponsored by the IEEE Systems, Man, and Cybernetics (SMC) Society.
The technological and industrial revolution brought by complex cyber-physical systems
(CPS) comes with new threats and cyber-attacks that exploit their inherent complexity
and heterogeneity. These attacks have a significant negative impact on the operation of
various services in critical sectors, like energy, transport, and communications, which
provide the vital functions that our societies depend upon.
The conference focuses on theoretical and practical aspects of the security, privacy,
trust, and resilience of networks, systems, and services as well as novel ways for
dealing with vulnerabilities and mitigation of sophisticated cyber-attacks.
For more information, please see
https://www.ieee-csr.org/.
USENIX Security 2026
35th USENIX Security Symposium,
Baltimore, MD, USA, August 12-14, 2026.
[posted here 10/13/25]
The USENIX Security Symposium brings together researchers, practitioners, system programmers,
and others interested in the latest advances in the security and privacy of computer systems and
networks. Summary of main changes from previous editions:
- USENIX Security '26 will no longer feature major revisions; papers will at most undergo a
two-week shepherding process.
- Authors may submit at most seven papers per cycle to the conference.
- Mandatory registration for all papers one week before the submission deadline,
including all authors, title, tentative abstract, and topics for the paper. The list of
authors cannot be changed after registration.
- Every author on a submission must use their HotCRP account to individually confirm
compliance with the submission terms.
- Artifacts must be made available during the reviewing process. If they cannot be made
available during review or after publication, the Open Science appendix must explain the reasoning.
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy.
This topic list on the call for papers page is not meant to be exhaustive; USENIX Security is interested
in all aspects of computing systems security and privacy. Papers without a clear application to
security or privacy of computing systems, however, will be considered out of scope and may be
rejected without full review at the discretion of the chairs.
For more information, please see
https://www.usenix.org/conference/usenixsecurity26/call-for-papers.
September 2026
ICDF2C 2026
17th EAI International Conference on Digital Forensics & Cyber Crime,
Reykjavik, Iceland, September 8 - 10, 2026.
[posted here 12/15/25]
This three-day event ICDF2C is expected to attract over 100 participants, including
academics, practitioners, criminologists (or law enforcement) and vendors, providing business
and intellectual engagement opportunities among attendees.
This conference's theme is cyber analytics and forensics in the era of emerging threats.
Novel cyber threats are continuously emerging, catalyzed by the rapid deployment of Large Language
Models and other AI across many domains which increases the threat surface in many sectors
such as Smart Industry, Fintech and digital government. The focus of this conference is to
provide a platform for discussing these emerging threats and to identify priorities for the
community to target with the next generation of cyber analytics. We particularly welcome
research which studies the dynamics between human factors and AI technologies and the
corresponding impact upon cybersecurity and forensics.
Potential workshops may include: doctoral consortium for PhD students, tutorials such as
password cracking for forensics, forensic education, forensic applications of AI, responding
to an incident from a police or corporate interaction perspective, including what to expect
when you involve law enforcement.
We encourage the authors to use the Posters and Demos venue as a way to open up discussions
with the ICDF2C community about their early work in progress and develop the work for future collaborations.
Representatives from industry, including established companies and startups, are warmly welcome
to showcase products and services that are related to the topics of the conference.
For more information, please see
https://icdf2c.eai-conferences.org/2026/.
SCN 2026
15th International Conference on Security and Cryptography for Networks,
Amalfi (SA), Italy, September 14 - 16, 2026.
[posted here 12/8/25]
The Fifteenth International Conference on Security and Cryptography for
Networks (SCN 2026) aims to bring together researchers in the field of cryptography and
information security, practitioners, developers, and users to foster cooperation, exchange
techniques, tools, experiences and ideas. The conference seeks submissions from academia,
government, and industry presenting novel research on all practical and theoretical
aspects of cryptography and information security. The primary focus is on original,
high quality, unpublished research of theoretical and practical impact, including concepts,
techniques, applications and practical experiences. Submitted papers must not substantially
overlap with papers that have been published or that are simultaneously submitted to a
journal or a conference/workshop with proceedings.
For more information, please see
https://scn.unisa.it/.
October 2026
November 2026
December 2026
|