Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:01/28/23

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2022

UbiSec 2022 2nd International Conference on Ubiquitous Security, Zhangjiajie, China, December 28-31, 2022. [posted here 8/22/22]
The UbiSec 2022 Conference ("The Conference" for short) is the second event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.

For more information, please see http://ubisecurity.org/2022/.

GNNet 2022 1st Graph Neural Networking Workshop, Co-located with ACM CoNEXT 2022, Rome, Italy, December 9, 2022. [posted here 9/26/22]
While AI/ML is today mainstream in domains such as computer vision and speech recognition, traditional AI/ML approaches have produced below-par results in many networking applications. Proposed AI/ML solutions in networking do not properly generalize, can be unreliable and ineffective in real-network deployments, and are in general unable to properly deal with the strong dynamics and changes (i.e., concept drift) occurring in networking applications.

Graphs are emerging as an abstraction to represent complex data. Computer Networks are fundamentally graphs, and many of their relevant characteristics – such as topology and routing – are represented as graph-structured data. Machine learning, especially deep representation learning, on graphs is an emerging field with a wide array of applications. Within this field, Graph Neural Networks (GNNs) have been recently proposed to model and learn over graph-structured data. Due to their unique ability to generalize over graph data, GNNs are a central tool to apply AI/ML techniques to networking applications.

The goal of GNNet is to leverage graph data representations and modern GNN technology to advance the application of AI/ML in networking. GNNet provides the first dedicated venue to present and discuss the latest advancements on GNNs and general AI/ML on graphs applied to networking problems. GNNet will bring together leaders from academia and industry to showcase recent methodological advances of GNNs and their application to networking problems, covering a wide range of applications and practical challenges for large-scale training and deployment.

For more information, please see https://conext-gnnet2022.hotcrp.com/.

APWG eCrime 2022 17th Symposium on Electronic Crime Research, Virtual, November 30 - Dec 2, 2022. [posted here 8/29/22]
The Symposium on Electronic Crime Research (APWG eCrime) examines the economic foundations, behavioral elements, and other keystone aspects that animate and fuel the burgeoning global, multi-billion-dollar cybercrime plexus. eCrime 2022 consists of a 3 day program composed of keynote presentations, technical and practical sessions, and interactive panels. An overarching goal of these meetings is bringing together academic researchers, industry security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt combating cybercrime.

For more information, please see https://apwg.org/event/ecrime2022/.

NordSec 2022 27th Nordic Conference on Secure IT Systems, Reykjavik, Iceland, November 30 - December 2, 2022. [posted here 7/18/22]
NordSec is an annual research conference series that has been running since 1996. The NordSec conferences address a broad range of topics on IT security. The events bring together security researchers from the Nordic countries, Northern Europe, and beyond and encourage interaction between academia and industry.

For more information, please see https://nordsec2022.ru.is.

ISPEC 2022 International Conference on Information Security Practice and Experience, Taipei, Taiwan, November 23-25, 2022. [posted here 2/14/22]
The ISPEC is an annual conference that brings together researchers, scholars and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. The ISPEC 2022 conference solicits theoretical, methodological and experimental research reporting original and unpublished results on information security. For all editions, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series.

For more information, please see https://ispec2022.ndhu.edu.tw/.

SSS 2022 24th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Clermont-Ferrand, France, November 15-17, 2022. [posted here 2/7/22]
SSS is an international forum for researchers and practitioners in the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment. The symposium encourages submissions of original contributions on fundamental research and practical applications concerning topics in the three symposium tracks:
- Track A. Self-stabilizing Systems: Theory and Practice
- Track B. Concurrent and Distributed Computing: Foundations, Fault-tolerance, and Security
- Track C. Dynamic, Mobile, and Nature-Inspired Computing

For more information, please see https://sss2022.limos.fr/.

ASHES 2022 6th Workshop on Attacks and Solutions in Hardware Security, Held in conjunction with ACM CCS 2022, Los Angeles, CA, USA, November 11, 2022. [posted here 6/27/22]
ASHES deals with any aspects of hardware security, and welcomes any contributions in this area, including practical, implementation-related, or theoretical works. Among others, ASHES particularly highlights emerging methods and application areas. This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs on the methodological side, as well as the internet of things, automotive security, smart homes, pervasive and wearable computing on the applications side. Please see our call for papers for further details. In order to meet the requirements of its rapidly developing area, ASHES hosts four categories of papers: Classical full and short papers, as well as systematization of knowledge papers (which overview, structure, and/or categorize a certain subarea), and wild and crazy papers (whose purpose is rapid dissemination of promising, potentially game-changing new ideas without full demonstration). All accepted ASHES papers are invited for extended versions at a special, annually appearing ASHES issue at Springer’s Journal of Cryptographic Engineering (JCEN). Again, our call for papers has all the specifics.

For more information, please see http://ashesworkshop.org.

WPES 2022 21st Workshop on Privacy in the Electronic Society, Held in conjunction with ACM CCS 2022, Los Angeles, CA, USA, November 7, 2022. [posted here 7/11/22]
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2022 Workshop, held in conjunction with the ACM CCS conference, is the twenty-first in a yearly forum for papers on all the different aspects of privacy in today's electronic society. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues.

For more information, please see https://arc.encs.concordia.ca/wpes22/cfp.html.

ACM CCS 2022 ACM CCS 2022, Los Angeles, CA, USA, November 7-11, 2022. [posted here 1/24/22]
The 29th ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

For more information, please see https://sigsac.org/ccs/CCS2022/call-for-papers.html.

SecureComm 2022 18th EAI International Conference on Security and Privacy in Communication Networks, Kansas City, USA, October 17-19, 2022. [posted here 1/24/22]
SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 18th SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass ALL areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

For more information, please see https://securecomm.eai-conferences.org/2022/.

ISC2 2022 8th IEEE International Smart Cities Conference, Paphos, Cyprus, September 26-29, 2022. [posted here 4/4/22]
IEEE ISC2 is the flagship conference sponsored by the IEEE Smart Cities Technical Community, a coalition of six IEEE technical societies and organizations. Besides contributions addressing the conference theme, authors are welcome to submit their original research results in traditional topics across broad application and functional domains, within the context of smart urban infrastructure systems. Safety and security systems are partly the topics of interests.

For more information, please see https://attend.ieee.org/isc2-2022/call-for-papers/.

CNS-CRW 2022 IEEE Conference on Communications and Network Security - Cyber Resilience Workshop, Austin, TX, USA, Hybrid, September 26-28, 2022. [posted here 7/4/22]
The workshop will focus on recent advances in areas such as machine learning and AI for cyber resilience, zero-trust architecture, and moving target defense. It will give the audience an overview of cyber resilience and provide a platform to discuss new research directions. We seek submissions from cyber security experts in academia, industry, and government labs presenting novel research results in the architecture, design principles, and metrics for cyber-resilient systems. Suggested topics of interest are given below, but are not limited to:
- Theoretic foundations of cyber resilience
- Formal methods for cyber resilience
- Autonomous cyber defense and intelligence
- Self-adaptive cyber resilience
- Attack-resilient architectures
- Moving target defense
- Resilient multi-agent collaboration and human interactions
- Zero-trust security and resilience
- Cyber-physical system resilience (including Industrial Control Systems, Internet of Things, Intelligent Transportation Systems, and Smart Grids)
- Human factors in resilience
- Trust management
- Economics of cyber resilience
- Dynamic risk management
- Resilient 5G communication systems
- Critical infrastructure cyber resilience

For more information, please see https://cns2022.ieee-cns.org/cyber-resilience-workshop.

CNS 2022 IEEE Conference on Communications and Network Security, Austin, TX, USA, Hybrid, September 26-28, 2022. [posted here 5/30/22]
IEEE CNS provides a premier forum for security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of cybersecurity. IEEE CNS 2022 seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, from the physical layer to the network layer to the variety of applications reliant on a secure communication substrate.

For more information, please see https://cns2022.ieee-cns.org.

SEED 2022 IEEE International Symposium on Secure and Private Execution Environment Design, Virtual, September 26-27, 2022. [posted here 4/11/22]
The IEEE International Symposium on Secure and Private Execution Environment Design (SEED) is a forum which brings together researchers from the computer architecture and computer security communities into one venue that focuses on the design of architectural and system primitives which provide secure and private execution environments for applications, containers, or virtual machines. SEED primarily focuses on research topics spanning across the boundaries of computer architecture, systems, and security. Papers are solicited on a range of topics, including (but not limited to):
- Architecture, operating systems, and programming models and language for supporting secure and private execution
- Novel Designs for secure and private execution environments for GPUs, accelerators, and FPGAs
- Architectural support for new security primitives
- Novel cryptographic hardware designs for secure and private execution
- Models and analysis of performance-security trade-offs in the design of a secure execution environment
- Evaluation of security vulnerabilities in post-Moore’s Law technologies, e.g. persistent memory, quantum computing
- Demonstration and mitigation of architectural side channels, covert channels and other security vulnerabilities
- Metrics for measuring architecture-related security vulnerabilities
- Compiler and code generation techniques for mitigating architecture-induced side and covert channels and other vulnerabilities

For more information, please see https://seed22.engr.uconn.edu.

SCN 2022 13th Conference on Security and Cryptography for Networks, Amalfi, Italy, September 12-14, 2022. [posted here 1/24/22]
The Thirteenth Conference on Security and Cryptography for Networks (SCN 2022) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

For more information, please see https://scn.unisa.it/.

CUING 2022 International Workshop on Criminal Use of Information Hiding, Held in conjunction with the 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria, August 23-26, 2022. [posted here 2/14/22]
With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods, cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. This poses a lot of new challenges for digital forensics analysts, academics, law enforcement agencies (LEAs), and security professionals.

The aim of the International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding. However, data hiding is understood here in a wider manner than in the academic world, i.e., all techniques that pertain to camouflaging/masking/hiding various types of data (e.g. identities, behavior, communication, etc.) are included here. This means not only digital steganography/covert channels, but also obfuscation/anti-forensics techniques and even underground networks (darknets) or activities related to behavior impersonation or mimicking. This will allow presenting a more complete picture on novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

Moreover, this year the CUING workshop is co-organized with the SIMARGL (Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware) H2020 project.

For more information, please see https://www.ares-conference.eu/workshops/cuing-2022/.

SIGCOMM 2022 ACM SIGCOMM 2022, Amsterdam, the Netherlands, August 22-26, 2022. [posted here 11/22/21]
The ACM SIGCOMM 2022 conference seeks papers describing significant research contributions to the field of communication networks and networked systems. SIGCOMM takes a broad view of networking research, which includes (but is not limited to) the following topics:
- All types of computer networks such as mobile, wide-area, data-center, embedded, home, and enterprise networks.
- All types of wired and wireless technologies, including optics, radio, and acoustic and visible light-based communication.
- All aspects of networks and networked systems such as architecture, packet-processing hardware and software, virtualization, mobility, resource management, performance, energy consumption, topology, robustness, security, diagnosis, verification, privacy, economics, evolution, and interactions with applications.
- All types of computer network design, analysis, and experimental approaches such as theory, measurements, and machine learning-based techniques.

For more information, please see https://conferences.sigcomm.org/sigcomm/2022/.

USENIX-Security 2022 31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022. [posted here 5/24/21]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
- System security
- Network security
- Security analysis
- Machine learning security and privacy
- Data-driven security and measurement studies
- Privacy-enhancing technologies and anonymity
- Usable security and privacy
- Language-based security
- Hardware security
- Research on surveillance and censorship
- Social issues and security
- Applications of cryptography

For more information, please see https://www.usenix.org/conference/usenixsecurity22/call-for-papers.

CSET 2022 15th Cyber Security Experimentation and Test Workshop, Preceding USENIX Security Symposium 2022, Virtual, August 8, 2022. [posted here 3/28/22]
We invite you to submit your papers to the 15th Cyber Security Experimentation and Test (CSET) Workshop. For 14 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for presenting research on and discussing “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability—in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and/or demonstrably grow community resources.

For more information, please see https://cset22.isi.edu/.

CSR 2022 IEEE International Conference on Cyber Security and Resilience, Virtual Conference, July 27-29, 2022. [posted here 2/28/22]
The technological and industrial revolution brought by complex Cyber-Physical Systems (CPSs) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. Systems under attack, should exhibit cyber resilience, i.e. a mixture of strategies, methods, and techniques to support complex CPS adaptive capacity during cyber-attacks. The conference focuses on theoretical and practical aspects of the security, privacy, trust, and resilience of networks, systems, and services as well as novel ways for dealing with their vulnerabilities and mitigating sophisticated cyber-attacks.

For more information, please see https://www.ieee-csr.org/.

PODC 2022 41st ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25-29, 2022. [posted here 11/29/21]
The ACM Symposium on Principles of Distributed Computing is an international forum on the theory, design, analysis, implementation and application of distributed systems and networks. We solicit papers in all areas of distributed computing. Papers from all viewpoints, including theory, practice, and experimentation, are welcome. The goal of the conference is to improve understanding of the principles underlying distributed computing. Topics of interest include, but are not limited to, the following:
- biological distributed algorithms and systems
- blockchain protocols
- coding and reliable communication
- communication networks
- concurrency, synchronization, and persistence
- design and analysis of distributed algorithms
- distributed and cloud storage
- distributed and concurrent data structures
- distributed computation for large-scale data
- distributed graph algorithms
- distributed machine learning algorithms
- distributed operating systems, middleware, databases
- distributed resource management and scheduling
- fault-tolerance, reliability, self-organization, and self-stabilization
- game-theoretic approaches to distributed computing
- high-performance, cluster, cloud and grid computing
- internet applications
- languages, verification, and formal methods for distributed systems
- lower bounds and impossibility results for distributed computing
- mobile computing and autonomous agents
- multiprocessor and multi-core architectures and algorithms
- peer-to-peer systems, overlay networks, and social networks
- population protocols
- quantum and optics based distributed algorithms
- replication and consistency
- security and cryptography in distributed computing
- specifications and semantics
- system-on-chip and network-on-chip architectures
- transactional memory
- wireless, sensor, mesh, and ad hoc networks

For more information, please see https://www.podc.org.

SERVICES 2022 2022 IEEE World Congress on Services, Barcelona, Spain, July 10-16, 2022. [posted here 3/21/22]
SERVICES is the premier international forum for presenting and discussing the most recent and significant technical research contributions in the field of services computing. Centered around web-based services, SERVICES 2022 covers various systems and networking research pertaining to cloud, edge and IoT, as well as technologies for intelligent computing, learning, Big Data, blockchain, and digital healthcare applications, addressing critical issues such as knowledge network, high performance, security, privacy, dependability, trustworthiness, and cost-effectiveness. Particularly, the 2022 Congress will welcome papers on the aftermath and the impact of COVID-19 on services and the world infrastructure. In addition to co-located theme-topic conferences, the Congress will also include symposia supporting deep-dive discussions on emerging topics, and complement the SERVICES 2022 program with industry and application presentations and panels. Authors are invited to prepare early and submit original and unpublished papers to any of these conferences at www.easychair.org. All submitted manuscripts will be peer- reviewed by at least three reviewers. Accepted and presented papers will appear in the conference proceedings published by the IEEE Computer Society Press. SERVICES 2022 is the only premier professional event for the services computing field offered by IEEE, under the auspice of the Technical Community on Services Computing (TCSVC).

For more information, please see https://conferences.computer.org/services/2022/cfp/.

CAD4Sec 2022 1st CAD for Hardware Security Workshop, Co-located with ACM/IEEE DAC 2022 conference, San Francisco, CA, USA, July 10, 2022. [posted here 4/18/22]
The emerging and ever-increasing security vulnerabilities in modern and complex hardware designs, such as SoC and complex microelectronics implementations, have been studied in recent years. Aggressive time-to-market, limited knowledge of designers in terms of security, and high cost of maintaining large team, establishing security metrics, etc. have proven the need for automatic CAD solutions to aid assessment/identifying/mitigating SoC security vulnerabilities.

In order to address these challenging research problems, we plan on bringing the community together, and kindly invite you as a valued member of the community to participate in it, helping to grow awareness as well as the domain of knowledge and expertise on CAD for hardware security.

In this workshop, we bring together leading experts from industry, academia, and government to shed light on the need for and the recent progress on the development of automatic security CAD solutions in all levels of design abstractions.

The workshop will also include demos on CAD for security tools by students and industry to detect various vulnerabilities. There will be a panel of experts in the field to discuss about the challenge and roadmap for CAD for security development. The CAD4Sec workshop will contain several technical presentations on the scope of metrics and CAD tools, including CAD for (1) power/timing side-channel vulnerability assessment, (2) fault-injection vulnerability evaluation, (3) security equivalence at different abstractions, and (4) (anti-)reverse engineering and physical assurance, and more.

For more information, please see http://cad4security.org.

Cloud S&P 2022 4th Workshop on Cloud Security and Privacy, Rome, Italy, June 20-23, 2022. [posted here 12/13/21]
This symposium, brings researchers and practitioners on the cloud domain to present and initiate discussion on various security and privacy attacks and their countermeasures to improve the security guarantee in a cloud ecosystem. This workshop expects submissions on new threats and countermeasures on various cloud-enabled technologies, as well as short surveys and case studies that focus on the security and privacy concerns of clouds.

Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by various serious security and privacy concerns. CLOUD S&P aims to provide a platform for researchers and practitioners to present and discuss a wide-range of security and privacy issues and their solutions to ensure better protection in a cloud ecosystem. This workshop invites submissions on new attacks and solutions on various cloud-centric technologies, as well as short surveys and case studies that shed light on the security implications of clouds. Topics of interest include, but are not limited to:
- Access Control in Clouds
- Virtual Network Security
- Privacy-Enhanced Technologies for Clouds
- Data Protection in Clouds
- Trusted Computing in Clouds
- Cloud Forensics
- Cloud Security Auditing
- Identity Management in Clouds
- Risk Analysis for Clouds
- SDN/NFV Security
- Security and Privacy of Federated Clouds and Edge Computing
- Security and Privacy of Fog Computing
- Security and Privacy of Big Data

For more information, please see https://cloudsp2022.encs.concordia.ca/.

SYSTOR 2022 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13 - 15, 2022. [posted here 1/31/22]
The ACM International Systems and Storage Conference (SYSTOR) is an international forum for interaction across the systems research community. The program includes innovative, peer-reviewed research papers in the broad area of systems and storage, as well as distinguished keynote lecturers, a poster session, and social events. ACM SYSTOR is designed to appeal to academic and industrial researchers and practitioners, welcoming both students and seasoned professionals. SYSTOR welcomes academic and industrial papers in systems and storage, broadly construed, including System Security and Trust. SYSTOR encourages submissions that describe results from experimental system prototypes, as well as experience papers describing practical deployments, and valuable lessons learned from them.

For more information, please see https://www.systor.org/2022.

EURO CSEP 2022 1st European Workshop on Cyber Security Education and Practice, Genova, Italy, June 10, 2022. [posted here 2/7/22]
EURO CSEP 2022 aims at gathering educators from universities and professional training institutions, researchers from academia, industry, EU agencies, and security practitioners to discuss current problems and solutions, to collaborate, share knowledge and educational tools, and improve existing practices on security education. All the topics related to cybersecurity education as well as training and awareness, in any setting and with a diversity of goals, are relevant and within the scope of this workshop. In particular, the topics of interest include but are not limited to:
- Innovative teaching modalities, for example MOOCs, flipped classrooms, distance learning, security games and competitions, CTF, escape rooms, etc.; - Innovative awareness programs and cybersecurity training for high schools, professionals and non-technical audiences, for example, legal, economics, and finance professionals, etc.; - Design and implementation of tools supporting cyber security education, for example cyber ranges, etc.
For more information, please see https://sites.google.com/view/euro-csep.

EuroSP-Workshops 2022 7th IEEE European Symposium on Security and Privacy, Genoa, Italy, June 6-10, 2022. [posted here 12/6/21]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the European sibling conference of the IEEE Symposium on Security and Privacy conference. It is a premier forum for computer security and privacy research, presenting the latest developments and bringing together researchers and practitioners.

Pre-conference workshops will take place on Sunday, June 5, 2022, and post-conference workshops on Saturday, June 11, 2021. A workshop associated with IEEE EuroS&P can be a half-, a full, or two days (but then split in a pre-and a post-conference part) in length. Each workshop should provide a forum to address a specific topic at the forefront of security and privacy research.

For more information, please see https://www.ieee-security.org/TC/EuroSP2022/cfw.html.

Euro S&P 2022 7th IEEE European Symposium on Security and Privacy, Genoa, Italy, June 6 - 10, 2022. [posted here 7/19/21]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the European sibling conference of the IEEE Symposium on Security and Privacy (“Oakland”) conference. It is a premier forum for computer security and privacy research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy, as well as Systematization of Knowledge papers that systematize previous results. EuroS&P is interested in all aspects of applied computer security and privacy. We especially encourage papers that are far-reaching and risky, provided those papers show sufficient promise for creating interesting discussions and usefully questioning widely-held beliefs. This year we are expanding the scope of the symposium to include economic, ethical, legal, and social aspects and interdependencies of computer security and privacy, and especially encourage submissions that address global aspects of computer security and privacy, including issues particular to parts of the world and communities that are often neglected. We are including experts in these areas in the program committee to ensure that such papers will receive high-quality reviews from well-qualified reviewers.

For more information, please see https://www.ieee-security.org/TC/EuroSP2022/cfp.html.

FHE 2022 1st Annual FHE.org Conference on Fully Homomorphic Encryption, Held in conjunction with EUROCRYPT 2022, Trondheim, Norway, May 29, 2022. [posted here 12/20/21]
First envisioned in the late seventies, the first realization for fully homomorphic encryption only came three decades later. Fully homomorphic encryption has since been an active research topic. The FHE.org conference aims at being the premier forum gathering researchers, technologists and practitioners working on the design, development, deployment, validation, and applications of fully homomorphic encryption.
The program committee is seeking original contributions on all aspects of fully homomorphic encryption. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of fully homomorphic encryption and related technologies.

For more information, please see https://fhe.org/conference/fhe-org-conference-2022-call-for-presentations.

SP 2022 43rd IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 22-26, 2022. [posted here 5/24/21]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ìSoK:î in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/. Ethical Considerations for Vulnerability Disclosure: Where research identifies a vulnerability (e.g., software vulnerabilities in a given program, design weaknesses in a hardware system, or any other kind of vulnerability in deployed systems), we expect that researchers act in a way that avoids gratuitous harm to affected users and, where possible, affirmatively protects those users. In nearly every case, disclosing the vulnerability to vendors of affected systems, and other stakeholders, will help protect users. It is the committeeís sense that a disclosure window of 45 days https://vuls.cert.org/confluence/display/Wiki/Vulnerability+Disclosure+Policy to 90 days https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html ahead of publication is consistent with authorsí ethical obligations.

Longer disclosure windows (which may keep vulnerabilities from the public for extended periods of time) should only be considered in exceptional situations, e.g., if the affected parties have provided convincing evidence the vulnerabilities were previously unknown and the full rollout of mitigations requires additional time. The authors are encouraged to consult with the PC chairs in case of questions or concerns.

The version of the paper submitted for review must discuss in detail the steps the authors have taken or plan to take to address these vulnerabilities; but, consistent with the timelines above, the authors do not have to disclose vulnerabilities ahead of submission. If a paper raises significant ethical and/or legal concerns, it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions. Ethical Considerations for Human Subjects Research: Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:
- Disclose whether the research received an approval or waiver from each of the authors' institutional ethics review boards (IRB) if applicable.
- Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.

If a submission deals with any kind of personal identifiable information (PII) or other kinds of sensitive data, the version of the paper submitted for review must discuss in detail the steps the authors have taken to mitigate harms to the persons identified. If a paper raises significant ethical and/or legal concerns, it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions.

For more information, please see https://www.ieee-security.org/TC/SP2022/cfpapers.html.

ACM WiSec 2022 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, Texas, USA, May 16-19, 2022. [posted here 12/6/21]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography. The conference welcomes contributions that have a clear relevance to systems and applications. Topics of interest include but are not limited to:
- Cryptographic primitives for wireless and mobile security
- Data-driven security attacks and countermeasures
- Economics of mobile security and privacy
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Mobile malware and platform security
- NFC and smart payment applications
- Next generation cellular network fraud and security
- Physical tracking security and privacy
- Resilience and dependability for mobile and wireless networks
- Reverse engineering of and tampering with mobile applications
- Security and privacy for cognitive radio and dynamic spectrum access systems
- Security and privacy for mobile applications (e.g., mobile sensing systems)
- Security and privacy for smart devices (e.g., smartphones)
- Secure localization and location privacy
- Security protocols for wireless networking
- Side-channel and fault attacks on smart devices
- Side-channel attacks on mobile and wearable systems
- Theoretical and formal approaches for wireless and mobile security
- Usable mobile security and privacy
- Vehicular networks security (e.g., drones, automotive, avionics, autonomous driving)
- Wireless network security in satellite systems
- Wireless and mobile privacy and anonymization techniques
- Wireless or mobile security for cyber-physical systems (e.g, healthcare, smart grid) and IoT systems
- Wireless network security for critical infrastructures
- Applications of Machine Learning methods for Wireless and Mobile Security

For more information, please see https://wisec2022.cs.utsa.edu/.

PAKDD 2022 26th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Chengdu, China, May 16-19, 2022. [posted here 8/9/21]
The Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) is one of the longest established and leading international conferences in the areas of data mining and knowledge discovery. It provides an international forum for researchers and industry practitioners to share their new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, visualization, decision-making systems, and the emerging applications. PAKDD2022 welcomes high-quality, original, and previously unpublished submissions in the theories, technologies and applications on all aspects of knowledge discovery and data mining. Topics of relevance for the conference include, but not limited to, the following:
- Data Science: Methods for analyzing scientific and business data, social networks, time series; mining sequences, streams, text, web, graphs, rules, patterns, logs data, IoT data, spatio-temporal data, biological data; recommender systems, computational advertising, multimedia, finance, bioinformatics.
- Big Data Technologies: Large-scale systems for text and graph analysis, sampling, parallel and distributed data mining (cloud, map-reduce, federated learning), novel algorithmic, and statistical techniques for big data.
- Foundations: Models and algorithms, asymptotic analysis; model selection, dimensionality reduction, relational/structured learning, matrix and tensor methods, probabilistic and statistical methods; deep learning, meta-learning, reinforcement learning; classification, clustering, regression, semi-supervised and unsupervised learning; personalization, security and privacy, visualization; fairness, interpretability, and robustness.

For more information, please see http://pakdd.net/.

CODASPY 2022 12th ACM Conference on Data and Application Security and Privacy, Baltimore-Washington, DC area, USA, April 24-26, 2022. [posted here 8/23/21]
The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security
CODASPY 2022 will also feature a dataset and tool paper track, which will provide a unique venue for researchers and practitioners to make available and citable their work done to achieve datasets or tools relevant in security and privacy domain. Papers accepted in this track have to describe the available datasets or reporting on the design and implementation of application security and privacy tools. Dataset/tool papers are limited to 6 pages.

For more information, please see http://www.codaspy.org/2022/.

DFRWS EU 2022 DFRWS EU, Online and Physical (Location TBC), March 28-31, 2022. [posted here 9/27/21]
DFRWS EU welcomes new perspectives that push the envelope of what is currently possible in digital forensics. Potential topics (alphabetical) to be addressed by submissions include any digital forensic related topic, for example (but not limited to):
- Anti-forensics and anti-anti-forensics
- Case studies and trend reports
- Cloud and virtualized environments
- Covert channels (e.g., TOR, VPN)
- Digital evidence sharing and exchange
- Digital evidence and the law
- Digital forensic preparedness / readiness
- Digital investigation case management
- Digital forensic tool validation
- Digital forensic triage / survey
- Event reconstruction methods and tools
- Forensics analysis and visualization of Big Data
- Implanted medical devices
- Machine learning and data mining for digital evidence extraction/query
- Malware and targeted attacks (analysis and attribution)
- Mobile and embedded device forensics
- Network and distributed system forensics
- Non-traditional forensic scenarios / contexts
- SCADA / industrial control systems
- Smart power grid forensics
- Smart building forensics
- Vehicle forensics (e.g., drones, cars)
- Virtual currency

For more information, please see https://dfrws.org/conferences/dfrws-eu-2022/.

NDSS 2022 Network and Distributed System Security (NDSS) Symposium, San Diego, California, USA, February 22 - March 3, 2022. [posted here 5/24/21]
The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of computer, network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

Technical papers and panel proposals are solicited. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2022. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see https://www.ndss-symposium.org/ndss2022/call-for-papers/.

IFIP 11.9 Digital Forensics 2022 18th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 3-5, 2022. [posted here 7/19/21]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Eighteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Embedded device forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org/Conferences/WG11-9-CFP-2022.pdf.