Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:3/3026

Upcoming Conferences and Workshops

Note: The submission date has passed.

April 2026

AI-SS 2026 1st International Workshop on AI Safety and Security, Co-located with the 21st European Dependable Computing Conference (EDCC 2026), Canterbury, UK, April 7, 2026. [posted here 1/5/26]
Artificial Intelligence (AI) systems are increasingly embedded in safety- and mission-critical domains such as healthcare, transportation, energy, and nuclear environments. However, the integration of AI brings new dimensions of risk, uncertainty, and adversarial vulnerability that challenge traditional safety and security assurance methods. This workshop aims to bridge the dependability and AI research communities by addressing fundamental and practical challenges in AI safety, security, and trustworthiness. It will provide a platform for researchers and practitioners to exchange ideas, discuss methodologies, and explore standards and regulatory frameworks supporting safe and secure AI adoption in critical systems. The theme of the workshop is Towards Dependable and Trustworthy Intelligent Systems and the Workshop's goals include:
- To identify key research challenges and emerging methodologies for AI safety and security
- To facilitate interdisciplinary collaboration between AI, dependability, and cyber security experts
- To promote discussion on standardisation, certification, and governance for AI dependability, safety and security
- To encourage young researcher participation through short papers and panel sessions

For more information, please see https://cyber.kent.ac.uk/events/AI-SS2026/.

May 2026

HOST 2026 19th IEEE International Symposium on Hardware Oriented Security and Trust, Washington DC, USA, May 4-7, 2026. [posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance. HOST 2026 invites original contributions in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security, AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs, post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection, side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture, blockchain, and cryptocurrency security.

For more information, please see https://host.conferences.computer.org/2026/.

SP 2026 47th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 18 - 21, 2026. [posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

Symposium Event (Important Changes): The number of papers accepted to IEEE S&P continues to grow substantially each year. Due to conference venue limitations and costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes, length determined based on the number of accepted papers) and (b) a poster presentation immediately following the talk session containing the paper. All accepted papers are required to present both a short talk and a poster.

For more information, please see https://sp2026.ieee-security.org/cfpapers.html.

June 2026

ACM ASIACCS 2026 21st ACM ASIA Conference on Computer and Communications Security, Bangalore, India, June 1-5, 2026. [posted here 10/20/25]
ACM ASIACCS seeks paper submissions presenting novel contributions related to all real-world aspects of security and privacy. We seek articles presenting accessible and compelling results to general computer security researchers. Purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same applies for submissions focusing primarily on blockchains or machine learning. As in previous years, we will also be accepting “Systemisation of Knowledge” (SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the submission form. They will be accepted based on the value to the community. Survey papers without insights evaluating, systematizing and contextualizing current knowledge will be rejected.

For more information, please see https://asiaccs2026.cse.iitkgp.ac.in/call-for-papers/.

ICBC 2026 8th IEEE International Conference on Blockchain and Cryptocurrency, Brisbane, Australia, June 1-5, 2026. [posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026), sponsored by the IEEE Communications Society, has established itself as the flagship annual conference in blockchain research, maintaining the highest standards of academic excellence. We invite original, unpublished submissions in all areas of blockchain and cryptocurrency research. In addition to established topics, ICBC 2026 welcomes emerging directions such as Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical) Internet Infrastructure.

For more information, please see https://icbc2026.ieee-icbc.org/.

AMASS 2026 Workshop on Advances in Malware Analysis and Software Security, Held in conjunction with ACM ASIACCS, Bangalore, India, June 2, 2026. [posted here 12/8/25]
The AMASS 2026 Workshop addresses one of today’s most critical cybersecurity challenges: the exponential rise of sophisticated malware and software-based threats. While malware research often appears within broader cybersecurity venues, a clear gap remains in focused discussions at the intersection of malware analysis, software engineering, and intelligent defence systems. The workshop aims to bridge that gap by establishing a dedicated forum for sharing advancements in malware detection, vulnerability discovery, and software hardening through AI-driven and data-centric approaches. Despite the rapid growth of cyber threats and research activity worldwide, there is currently no comparable cybersecurity venue dedicated to these topics. The AMASS workshop aims to:
- Create a dedicated platform for sharing research results, datasets, and tools in malware and software security.
- Encourage collaboration between academia and industry, particularly in the context of threat intelligence and malware response.
- Bridge static and dynamic analysis communities and foster reproducibility in malware research.
- Support the next generation of researchers through discussions, demos, and early-stage research presentations.

For more information, please see https://sites.google.com/view/amass2026/home.

CODASPY 2026 16th ACM Conference on Data and Application Security and Privacy, Frankfurt am Main, Germany, June 23 - 25, 2026. [posted here 12/22/25]
With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

CODASPY will follow the ACM Policy Against Harassment at ACM Activities. Please familiarize yourself with ACM Policy Against Harassment and guide to Reporting Unacceptable Behavior. As a published ACM author, you and your co-authors will be subject to all ACM Publications Policies, including ACM's new Publications Policy on Research Involving Human Participants and Subjects. Please make sure your submission complies with all the ACM publication policies.

For more information, please see https://www.codaspy.org/2026/.

IWSPA 2026 12th ACM International Workshop on Security and Privacy Analytics, Held in conjunction with the 16th ACM Conference on Data and Application Security and Privacy (CODASPY 2026), Frankfurt am Main, Germany, June 24, 2026. [posted here 3/2/26]
This is the twelfth workshop in a series of workshops on Security and Privacy Analytics. Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural language processing are being applied to challenges in security and privacy fields. However, experts from these areas have had few venues in the past where they can meet and exchange ideas so that strong collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current courses and curricula in security do not sufficiently emphasize background in these areas and students in security and privacy are not emerging with deep knowledge of these topics. Hence, we propose to continue the workshop that we started in 2015 to address the research and development efforts in which analytical techniques from machine learning, data mining, natural language processing and statistics are applied to solve security and privacy challenges (“security and privacy analytics”). Over the course of these seven years, the papers published in IWSPA proceedings have been downloaded more than 32,000 times according to ACM Digital Library and have 1,000 citations on Google Scholar. Submissions of papers related to methodology, design, techniques and new directions for security and privacy that make significant use of machine learning, data mining, statistics or natural language processing are welcome. Furthermore, submissions on educational topics and systems in the field of security analytics are also highly encouraged. Proposals for tutorials on related topics are also welcome.

For more information, please see https://sites.google.com/view/iwspa-2026/.

SaT-CPS 2026 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Held in conjunction with the 16th ACM Conference on Data and Application Security and Privacy (CODASPY 2026), Frankfurt am Main, Germany, June 25, 2026. [posted here 2/9/26]
The ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS) aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS seeks novel submissions describing practical and theoretical solutions for cybersecurity challenges in CPS. Submissions can be from different application domains in CPS.

For more information, please see https://sites.google.com/view/sat-cps2026/.

ACM WiSec 2026 19th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Saarbrucken, Germany, June 30 - July 3, 2026. [posted here 12/8/25]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.

Important update on ACMs new open access publishing model for 2026 ACM Conferences: Starting January 1, 2026, ACM will fully transition to Open Access. All ACM publications, including those from ACM-sponsored conferences, will be 100% Open Access. Authors will have two primary options for publishing Open Access articles with ACM: the ACM Open institutional model or by paying Article Processing Charges (APCs). With over 2,600 institutions already part of ACM Open, the majority of ACM-sponsored conference papers will not require APCs from authors or conferences (currently, around 76%). Authors from institutions not participating in ACM Open will need to pay an APC to publish their papers, unless they qualify for a financial waiver. To find out whether an APC applies to your article, please consult the list of participating institutions in ACM Open and review the https://www.acm.org/publications/policies/policy-on-discretionary-open-access-apc-waivers.

For more information, please see https://wisec26.events.cispa.de.

July 2026

PETS 2026 26th Privacy Enhancing Technologies Symposium, Calgary, Canada, July 20-25, 2026. [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 26th PETS is expected to be a hybrid event with a physical gathering (location TBD) and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are strongly encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not strictly required for publication in the proceedings.

PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is self-published and does not have article processing charges or article submission charges.

Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. Authors will receive a decision of accept, revise, or reject. Those receiving revise will be invited to revise their article with the guidance of a revision editor according to a well-defined set of revision criteria and will have up to four months to attempt to complete the required revisions. Authors of rejected papers must skip a full issue prior to resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into consideration during the discussion. New for 2026: The authors will be able to submit a separate, 250-word rebuttal response to each individual review (rather than a single response that addresses all reviews).

For more information, please see https://petsymposium.org/cfp26.php.

CSF 2026 39th IEEE Computer Security Foundations Symposium, Colocated with FLoC 2026, Lisbon Portugal, July 26-29, 2026. [posted here 9/24/25]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society’s Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSF’s home. The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see https://csf2026.ieee-security.org.

DFRWS-USA 2026 26th Digital Forensics Research USA Conference, Arlington, Virginia, USA, July 27 - 30, 2026. [posted here 11/17/25]
The Digital Forensics Research Conference (known as DFRWS) USA 2026 marks the 26th anniversary of one of the most influential conferences in the field of digital forensics. Since its inception, DFRWS has been a pivotal platform for advancing the science and practice of digital forensics, bringing together researchers, practitioners, and industry leaders from around the globe. Over the past quarter-century, the workshop has been instrumental in the development of cutting-edge technologies and forensic methodologies that have become essential tools in the fight against cybercrime. From pioneering techniques in digital evidence recovery and analysis to fostering innovations in mobile device forensics, memory forensics, and the emerging challenges posed by cloud computing and Internet of Things (IoT) devices, DFRWS has consistently been at the forefront of digital forensic science. The 2026 edition will celebrate these achievements while setting the stage for the future of forensic research and its vital role in securing the digital world. DFRWS welcomes new perspectives that push the envelope of what is currently possible in digital forensics.

For more information, please see https://dfrws.org/call-for-papers-is-open-for-dfrws-usa-2026/.

August 2026

CSR 2026 IEEE International Conference on Cyber Security and Resilience, Lisbon, Portugal, August 3 - 5, 2026. [posted here 1/12/26]
The IEEE International Conference on Cyber Security and Resilience (IEEE CSR) is an annual event sponsored by the IEEE Systems, Man, and Cybernetics (SMC) Society. The technological and industrial revolution brought by complex cyber-physical systems (CPS) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. These attacks have a significant negative impact on the operation of various services in critical sectors, like energy, transport, and communications, which provide the vital functions that our societies depend upon. The conference focuses on theoretical and practical aspects of the security, privacy, trust, and resilience of networks, systems, and services as well as novel ways for dealing with vulnerabilities and mitigation of sophisticated cyber-attacks.

For more information, please see https://www.ieee-csr.org/.

USENIX Security 2026 35th USENIX Security Symposium, Baltimore, MD, USA, August 12-14, 2026. [posted here 10/13/25]
The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Summary of main changes from previous editions:
- USENIX Security '26 will no longer feature major revisions; papers will at most undergo a two-week shepherding process.
- Authors may submit at most seven papers per cycle to the conference.
- Mandatory registration for all papers one week before the submission deadline, including all authors, title, tentative abstract, and topics for the paper. The list of authors cannot be changed after registration.
- Every author on a submission must use their HotCRP account to individually confirm compliance with the submission terms.
- Artifacts must be made available during the reviewing process. If they cannot be made available during review or after publication, the Open Science appendix must explain the reasoning.

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list on the call for papers page is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review at the discretion of the chairs.

For more information, please see https://www.usenix.org/conference/usenixsecurity26/call-for-papers.

September 2026

ICDF2C 2026 17th EAI International Conference on Digital Forensics & Cyber Crime, Reykjavik, Iceland, September 8 - 10, 2026. [posted here 12/15/25]
This three-day event ICDF2C is expected to attract over 100 participants, including academics, practitioners, criminologists (or law enforcement) and vendors, providing business and intellectual engagement opportunities among attendees. This conference's theme is cyber analytics and forensics in the era of emerging threats. Novel cyber threats are continuously emerging, catalyzed by the rapid deployment of Large Language Models and other AI across many domains which increases the threat surface in many sectors such as Smart Industry, Fintech and digital government. The focus of this conference is to provide a platform for discussing these emerging threats and to identify priorities for the community to target with the next generation of cyber analytics. We particularly welcome research which studies the dynamics between human factors and AI technologies and the corresponding impact upon cybersecurity and forensics. Potential workshops may include: doctoral consortium for PhD students, tutorials such as password cracking for forensics, forensic education, forensic applications of AI, responding to an incident from a police or corporate interaction perspective, including what to expect when you involve law enforcement. We encourage the authors to use the Posters and Demos venue as a way to open up discussions with the ICDF2C community about their early work in progress and develop the work for future collaborations. Representatives from industry, including established companies and startups, are warmly welcome to showcase products and services that are related to the topics of the conference.

For more information, please see https://icdf2c.eai-conferences.org/2026/.

SCN 2026 15th International Conference on Security and Cryptography for Networks, Amalfi (SA), Italy, September 14 - 16, 2026. [posted here 12/8/25]
The Fifteenth International Conference on Security and Cryptography for Networks (SCN 2026) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

For more information, please see https://scn.unisa.it/.

October 2026
November 2026
December 2026