|
Past Conferences and Journal Special Issues
Last Modified:01/28/23
Note: Please contact
cipher-cfp@ieee-security.org by email if you have any questions..
Contents
UbiSec 2022
2nd International Conference on Ubiquitous Security,
Zhangjiajie, China, December 28-31, 2022.
[posted here 8/22/22]
The UbiSec 2022 Conference ("The Conference" for short) is the
second event in the series of conferences/symposia/workshops which are devoted
to security, privacy and anonymity in cyberspace, physical world, and social
networks. The Conference covers many dimensions including security algorithms
and architectures, privacy-aware policies, regulations and techniques, anonymous
computation and communication, encompassing fundamental theoretical approaches,
practical experimental projects, and commercial application systems for cyberspace,
physical world, and social networking systems. As applications of computer and
information technology have permeated in every aspect of our daily life, the
issues of security, privacy, and anonymity have become increasingly critical.
The Conference will provide a forum for world-class researchers to gather and
share their research achievements, emerging ideas and trends in the highly
challenging research fields.
For more information, please see
http://ubisecurity.org/2022/.
GNNet 2022
1st Graph Neural Networking Workshop,
Co-located with ACM CoNEXT 2022,
Rome, Italy, December 9, 2022.
[posted here 9/26/22]
While AI/ML is today mainstream in domains such as computer
vision and speech recognition, traditional AI/ML approaches have
produced below-par results in many networking applications. Proposed
AI/ML solutions in networking do not properly generalize, can be
unreliable and ineffective in real-network deployments, and are
in general unable to properly deal with the strong dynamics and
changes (i.e., concept drift) occurring in networking applications.
Graphs are emerging as an abstraction to represent complex data.
Computer Networks are fundamentally graphs, and many of their relevant
characteristics – such as topology and routing – are represented as
graph-structured data. Machine learning, especially deep representation
learning, on graphs is an emerging field with a wide array of
applications. Within this field, Graph Neural Networks (GNNs)
have been recently proposed to model and learn over graph-structured
data. Due to their unique ability to generalize over graph data,
GNNs are a central tool to apply AI/ML techniques to networking applications.
The goal of GNNet is to leverage graph data representations and modern
GNN technology to advance the application of AI/ML in networking. GNNet
provides the first dedicated venue to present and discuss the latest
advancements on GNNs and general AI/ML on graphs applied to networking
problems. GNNet will bring together leaders from academia and industry
to showcase recent methodological advances of GNNs and their application
to networking problems, covering a wide range of applications and
practical challenges for large-scale training and deployment.
For more information, please see
https://conext-gnnet2022.hotcrp.com/.
APWG eCrime 2022
17th Symposium on Electronic Crime Research,
Virtual, November 30 - Dec 2, 2022.
[posted here 8/29/22]
The Symposium on Electronic Crime Research (APWG eCrime) examines the economic
foundations, behavioral elements, and other keystone aspects that
animate and fuel the burgeoning global, multi-billion-dollar cybercrime plexus.
eCrime 2022 consists of a 3 day program composed of keynote presentations,
technical and practical sessions, and interactive panels. An overarching goal
of these meetings is bringing together academic researchers, industry security
practitioners, and law enforcement to discuss and exchange ideas, experiences
and lessons learnt combating cybercrime.
For more information, please see
https://apwg.org/event/ecrime2022/.
NordSec 2022
27th Nordic Conference on Secure IT Systems,
Reykjavik, Iceland, November 30 - December 2, 2022.
[posted here 7/18/22]
NordSec is an annual research conference series that has been running
since 1996. The NordSec conferences address a broad range of topics on IT security.
The events bring together security researchers from the Nordic countries, Northern
Europe, and beyond and encourage interaction between academia and industry.
For more information, please see
https://nordsec2022.ru.is.
ISPEC 2022
International Conference on Information Security Practice and Experience,
Taipei, Taiwan, November 23-25, 2022.
[posted here 2/14/22]
The ISPEC is an annual conference that brings together researchers,
scholars and practitioners to provide a confluence of new information
security technologies, including their applications and their integration
with IT systems in various vertical sectors. The ISPEC 2022 conference
solicits theoretical, methodological and experimental research reporting
original and unpublished results on information security. For all editions,
the conference proceedings were published by Springer in the Lecture
Notes in Computer Science series.
For more information, please see
https://ispec2022.ndhu.edu.tw/.
SSS 2022
24th International Symposium on Stabilization, Safety, and
Security of Distributed Systems,
Clermont-Ferrand, France, November 15-17, 2022.
[posted here 2/7/22]
SSS is an international forum for researchers and practitioners in
the design and development of distributed systems with a focus on systems
that are able to provide guarantees on their structure, performance, and/or
security in the face of an adverse operational environment. The symposium
encourages submissions of original contributions on fundamental research
and practical applications concerning topics in the three
symposium tracks:
- Track A. Self-stabilizing Systems: Theory and Practice
- Track B. Concurrent and Distributed Computing: Foundations,
Fault-tolerance, and Security
- Track C. Dynamic, Mobile, and Nature-Inspired Computing
For more information, please see
https://sss2022.limos.fr/.
ASHES 2022
6th Workshop on Attacks and Solutions in Hardware Security,
Held in conjunction with ACM CCS 2022,
Los Angeles, CA, USA, November 11, 2022.
[posted here 6/27/22]
ASHES deals with any aspects of hardware security, and welcomes
any contributions in this area, including practical, implementation-related,
or theoretical works. Among others, ASHES particularly highlights emerging
methods and application areas. This includes new attack vectors, novel
designs and materials, lightweight security primitives, nanotechnology,
and PUFs on the methodological side, as well as the internet of things,
automotive security, smart homes, pervasive and wearable computing
on the applications side. Please see our call for papers for further details.
In order to meet the requirements of its rapidly developing area, ASHES
hosts four categories of papers: Classical full and short papers,
as well as systematization of knowledge papers (which overview,
structure, and/or categorize a certain subarea), and wild and
crazy papers (whose purpose is rapid dissemination of promising,
potentially game-changing new ideas without full demonstration).
All accepted ASHES papers are invited for extended versions at a
special, annually appearing ASHES issue at Springer’s Journal
of Cryptographic Engineering (JCEN). Again, our call for papers has
all the specifics.
For more information, please see
http://ashesworkshop.org.
WPES 2022
21st Workshop on Privacy in the Electronic Society,
Held in conjunction with ACM CCS 2022,
Los Angeles, CA, USA, November 7, 2022.
[posted here 7/11/22]
The need for privacy-aware policies, regulations, and techniques has been widely
recognized. This workshop discusses the problems of privacy in the global interconnected
societies and possible solutions. The 2022 Workshop, held in conjunction with the
ACM CCS conference, is the twenty-first in a yearly forum for papers on all the
different aspects of privacy in today's electronic society.
The workshop seeks submissions from academia, industry, and government presenting
novel research on all theoretical and practical aspects of electronic privacy,
as well as experimental studies of fielded systems. We encourage submissions
from other communities such as law and business that present these communities'
perspectives on technological issues.
For more information, please see
https://arc.encs.concordia.ca/wpes22/cfp.html.
ACM CCS 2022
ACM CCS 2022, Los Angeles, CA, USA, November 7-11, 2022.
[posted here 1/24/22]
The 29th ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer
security and privacy. Theoretical papers must make a convincing case for the relevance of
their results to practice. Authors are encouraged to write the abstract and introduction of
their paper in a way that makes the results accessible and compelling to a general
computer-security researcher. In particular, authors should bear in mind that anyone on the
program committee may be asked to review any paper.
For more information, please see
https://sigsac.org/ccs/CCS2022/call-for-papers.html.
SecureComm 2022
18th EAI International Conference on Security and Privacy in Communication Networks,
Kansas City, USA, October 17-19, 2022.
[posted here 1/24/22]
SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity.
The aim of SecureComm is to bring together researchers and practitioners in academic,
industry, and government in security, networking, communication and other related communities
to explore important research directions in the field. The 18th SecureComm conference seeks
submissions of high-quality research contributions. Topics of interest encompass ALL areas
of secure communications and networking. Topics in less related areas will be considered if
a clear connection to secure communication and networking is demonstrated. Topics addressing
interdisciplinary challenges in different application domains are welcome.
For more information, please see
https://securecomm.eai-conferences.org/2022/.
ISC2 2022
8th IEEE International Smart Cities Conference,
Paphos, Cyprus, September 26-29, 2022.
[posted here 4/4/22]
IEEE ISC2 is the flagship conference sponsored by the IEEE Smart Cities Technical Community,
a coalition of six IEEE technical societies and organizations. Besides contributions addressing
the conference theme, authors are welcome to submit their original research results in
traditional topics across broad application and functional domains, within the
context of smart urban infrastructure systems.
Safety and security systems are partly the topics of interests.
For more information, please see
https://attend.ieee.org/isc2-2022/call-for-papers/.
CNS-CRW 2022
IEEE Conference on Communications and Network Security - Cyber Resilience Workshop,
Austin, TX, USA, Hybrid, September 26-28, 2022.
[posted here 7/4/22]
The workshop will focus on recent advances in areas such as machine learning
and AI for cyber resilience, zero-trust architecture, and moving target defense. It will
give the audience an overview of cyber resilience and provide a platform to discuss new
research directions. We seek submissions from cyber security experts in academia, industry,
and government labs presenting novel research results in the architecture, design principles,
and metrics for cyber-resilient systems.
Suggested topics of interest are given below, but are not limited to:
- Theoretic foundations of cyber resilience
- Formal methods for cyber resilience
- Autonomous cyber defense and intelligence
- Self-adaptive cyber resilience
- Attack-resilient architectures
- Moving target defense
- Resilient multi-agent collaboration and human interactions
- Zero-trust security and resilience
- Cyber-physical system resilience (including Industrial Control Systems,
Internet of Things, Intelligent Transportation Systems, and Smart Grids)
- Human factors in resilience
- Trust management
- Economics of cyber resilience
- Dynamic risk management
- Resilient 5G communication systems
- Critical infrastructure cyber resilience
For more information, please see
https://cns2022.ieee-cns.org/cyber-resilience-workshop.
CNS 2022
IEEE Conference on Communications and Network Security,
Austin, TX, USA, Hybrid, September 26-28, 2022.
[posted here 5/30/22]
IEEE CNS provides a premier forum for security researchers, practitioners,
policy makers, and users to exchange ideas, techniques and tools, raise awareness, and
share experience related to all practical and theoretical aspects of cybersecurity.
IEEE CNS 2022 seeks original high-quality technical papers from academia, government,
and industry. Topics of interest encompass all practical and theoretical aspects of communications
and network security, from the physical layer to the network layer to the variety of applications
reliant on a secure communication substrate.
For more information, please see
https://cns2022.ieee-cns.org.
SEED 2022
IEEE International Symposium on Secure and Private Execution Environment Design,
Virtual, September 26-27, 2022.
[posted here 4/11/22]
The IEEE International Symposium on Secure and Private Execution Environment
Design (SEED) is a forum which brings together researchers from the computer architecture
and computer security communities into one venue that focuses on the design of architectural
and system primitives which provide secure and private execution environments for
applications, containers, or virtual machines.
SEED primarily focuses on research topics spanning across the boundaries of computer
architecture, systems, and security. Papers are solicited on a range of topics,
including (but not limited to):
- Architecture, operating systems, and programming models and language for
supporting secure and private execution
- Novel Designs for secure and private execution environments for GPUs,
accelerators, and FPGAs
- Architectural support for new security primitives
- Novel cryptographic hardware designs for secure and private execution
- Models and analysis of performance-security trade-offs in the design of a
secure execution environment
- Evaluation of security vulnerabilities in post-Moore’s Law technologies,
e.g. persistent memory, quantum computing
- Demonstration and mitigation of architectural side channels, covert
channels and other security vulnerabilities
- Metrics for measuring architecture-related security vulnerabilities
- Compiler and code generation techniques for mitigating architecture-induced side
and covert channels and other vulnerabilities
For more information, please see
https://seed22.engr.uconn.edu.
SCN 2022
13th Conference on Security and Cryptography for Networks,
Amalfi, Italy, September 12-14, 2022.
[posted here 1/24/22]
The Thirteenth Conference on Security and Cryptography for Networks (SCN
2022) aims to bring together researchers in the field of cryptography
and information security, practitioners, developers, and users to foster
cooperation, exchange techniques, tools, experiences and ideas. The
conference seeks submissions from academia, government, and industry
presenting novel research on all practical and theoretical aspects of
cryptography and information security. The primary focus is on original,
high quality, unpublished research of theoretical and practical impact,
including concepts, techniques, applications and practical experiences.
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference/workshop with proceedings.
For more information, please see
https://scn.unisa.it/.
CUING 2022
International Workshop on Criminal Use of Information Hiding,
Held in conjunction with the 17th International Conference on
Availability, Reliability and Security (ARES 2022),
Vienna, Austria, August 23-26, 2022.
[posted here 2/14/22]
With the constant rise of the number of Internet users, available
bandwidth and an increasing number of services shifting into the
connected world, criminals are increasingly active in the virtual world.
With improving defensive methods, cybercriminals have to utilize more
and more sophisticated ways to perform their malicious activities. While
protecting the privacy of users, many technologies used in current
malware and network attacks have been abused in order to allow criminals
to carry out their activities undetected. This poses a lot of new
challenges for digital forensics analysts, academics, law enforcement
agencies (LEAs), and security professionals.
The aim of the International Workshop on Criminal Use of Information
Hiding (CUIng) is to bring together researchers, practitioners, law
enforcement representatives, and security professionals in the area of
analysis of information hiding. However, data hiding is understood here
in a wider manner than in the academic world, i.e., all techniques that
pertain to camouflaging/masking/hiding various types of data (e.g.
identities, behavior, communication, etc.) are included here. This means
not only digital steganography/covert channels, but also
obfuscation/anti-forensics techniques and even underground networks
(darknets) or activities related to behavior impersonation or mimicking.
This will allow presenting a more complete picture on novel research
regarding the use of data and communication hiding methods in criminal
environments and discuss ideas for fighting misuse of privacy enhancing
technologies.
Moreover, this year the CUING workshop is co-organized with the SIMARGL
(Secure Intelligent Methods for Advanced RecoGnition of malware and
stegomalware) H2020 project.
For more information, please see
https://www.ares-conference.eu/workshops/cuing-2022/.
SIGCOMM 2022
ACM SIGCOMM 2022, Amsterdam, the Netherlands, August 22-26, 2022.
[posted here 11/22/21]
The ACM SIGCOMM 2022 conference seeks papers describing significant
research contributions to the field of communication networks and networked
systems. SIGCOMM takes a broad view of networking research, which includes
(but is not limited to) the following topics:
- All types of computer networks such as mobile, wide-area, data-center, embedded,
home, and enterprise networks.
- All types of wired and wireless technologies, including optics, radio, and acoustic and visible
light-based communication.
- All aspects of networks and networked systems such as architecture, packet-processing
hardware and software, virtualization, mobility, resource management, performance,
energy consumption,
topology, robustness, security, diagnosis, verification, privacy, economics, evolution, and
interactions with applications.
- All types of computer network design, analysis, and experimental approaches such as theory,
measurements, and machine learning-based techniques.
For more information, please see
https://conferences.sigcomm.org/sigcomm/2022/.
USENIX-Security 2022
31st USENIX Security Symposium,
Boston, MA, USA, August 10-12, 2022.
[posted here 5/24/21]
The USENIX Security Symposium brings together researchers,
practitioners, system administrators, system programmers,
and others interested in the latest advances in the security
and privacy of computer systems and networks.
Refereed paper submissions are solicited in all areas relating to
systems research in security and privacy, including but not limited to:
- System security
- Network security
- Security analysis
- Machine learning security and privacy
- Data-driven security and measurement studies
- Privacy-enhancing technologies and anonymity
- Usable security and privacy
- Language-based security
- Hardware security
- Research on surveillance and censorship
- Social issues and security
- Applications of cryptography
For more information, please see
https://www.usenix.org/conference/usenixsecurity22/call-for-papers.
CSET 2022
15th Cyber Security Experimentation and Test Workshop,
Preceding USENIX Security Symposium 2022,
Virtual, August 8, 2022.
[posted here 3/28/22]
We invite you to submit your papers to the 15th Cyber Security Experimentation and
Test (CSET) Workshop. For 14 years, the Workshop on Cyber Security Experimentation and Test (CSET)
has been an important and lively space for presenting research on and discussing “meta” cybersecurity
topics related to reliability, validity, reproducibility, transferability, ethics, and
scalability—in practice, in research, and in education. Submissions are particularly
encouraged to employ a scientific approach to cybersecurity and/or demonstrably grow
community resources.
For more information, please see
https://cset22.isi.edu/.
CSR 2022
IEEE International Conference on Cyber Security and Resilience,
Virtual Conference, July 27-29, 2022.
[posted here 2/28/22]
The technological and industrial revolution brought by complex
Cyber-Physical Systems (CPSs) comes with new threats and cyber-attacks
that exploit their inherent complexity and heterogeneity. Systems
under attack, should exhibit cyber resilience, i.e. a mixture of
strategies, methods, and techniques to support complex CPS adaptive
capacity during cyber-attacks. The conference focuses on theoretical
and practical aspects of the security, privacy, trust, and
resilience of networks, systems, and services as well as novel
ways for dealing with their vulnerabilities and mitigating
sophisticated cyber-attacks.
For more information, please see
https://www.ieee-csr.org/.
PODC 2022
41st ACM Symposium on Principles of Distributed Computing,
Salerno, Italy, July 25-29, 2022.
[posted here 11/29/21]
The ACM Symposium on Principles of Distributed Computing is an international
forum on the theory, design, analysis, implementation and application of distributed
systems and networks. We solicit papers in all areas of distributed computing. Papers
from all viewpoints, including theory, practice, and experimentation, are welcome.
The goal of the conference is to improve understanding of the principles underlying
distributed computing. Topics of interest include, but are not limited to,
the following:
- biological distributed algorithms and systems
- blockchain protocols
- coding and reliable communication
- communication networks
- concurrency, synchronization, and persistence
- design and analysis of distributed algorithms
- distributed and cloud storage
- distributed and concurrent data structures
- distributed computation for large-scale data
- distributed graph algorithms
- distributed machine learning algorithms
- distributed operating systems, middleware, databases
- distributed resource management and scheduling
- fault-tolerance, reliability, self-organization, and self-stabilization
- game-theoretic approaches to distributed computing
- high-performance, cluster, cloud and grid computing
- internet applications
- languages, verification, and formal methods for distributed systems
- lower bounds and impossibility results for distributed computing
- mobile computing and autonomous agents
- multiprocessor and multi-core architectures and algorithms
- peer-to-peer systems, overlay networks, and social networks
- population protocols
- quantum and optics based distributed algorithms
- replication and consistency
- security and cryptography in distributed computing
- specifications and semantics
- system-on-chip and network-on-chip architectures
- transactional memory
- wireless, sensor, mesh, and ad hoc networks
For more information, please see
https://www.podc.org.
SERVICES 2022
2022 IEEE World Congress on Services,
Barcelona, Spain, July 10-16, 2022.
[posted here 3/21/22]
SERVICES is the premier international forum for presenting and discussing
the most recent and significant technical research contributions in the field of
services computing. Centered around web-based services, SERVICES 2022 covers
various systems and networking research pertaining to cloud, edge and IoT,
as well as technologies for intelligent computing, learning, Big Data,
blockchain, and digital healthcare applications, addressing critical issues
such as knowledge network, high performance, security, privacy, dependability,
trustworthiness, and cost-effectiveness. Particularly, the 2022 Congress
will welcome papers on the aftermath and the impact of COVID-19 on services
and the world infrastructure. In addition to co-located theme-topic
conferences, the Congress will also include symposia supporting deep-dive
discussions on emerging topics, and complement the SERVICES 2022 program
with industry and application presentations and panels. Authors are
invited to prepare early and submit original and unpublished papers
to any of these conferences at www.easychair.org. All submitted
manuscripts will be peer- reviewed by at least three reviewers.
Accepted and presented papers will appear in the conference proceedings
published by the IEEE Computer Society Press. SERVICES 2022 is the
only premier professional event for the services computing field
offered by IEEE, under the auspice of the Technical Community
on Services Computing (TCSVC).
For more information, please see
https://conferences.computer.org/services/2022/cfp/.
CAD4Sec 2022
1st CAD for Hardware Security Workshop,
Co-located with ACM/IEEE DAC 2022 conference,
San Francisco, CA, USA, July 10, 2022.
[posted here 4/18/22]
The emerging and ever-increasing security vulnerabilities in modern and
complex hardware designs, such as SoC and complex microelectronics implementations,
have been studied in recent years. Aggressive time-to-market, limited knowledge
of designers in terms of security, and high cost of maintaining large team,
establishing security metrics, etc. have proven the need for automatic CAD
solutions to aid assessment/identifying/mitigating SoC security vulnerabilities.
In order to address these challenging research problems, we plan on bringing
the community together, and kindly invite you as a valued member of the community
to participate in it, helping to grow awareness as well as the domain of
knowledge and expertise on CAD for hardware security.
In this workshop, we bring together leading experts from industry,
academia, and government to shed light on the need for and the recent
progress on the development of automatic security CAD solutions in
all levels of design abstractions.
The workshop will also include demos on CAD for security tools by
students and industry to detect various vulnerabilities. There will be
a panel of experts in the field to discuss about the challenge and
roadmap for CAD for security development. The CAD4Sec workshop will
contain several technical presentations on the scope of metrics and
CAD tools, including CAD for (1) power/timing side-channel
vulnerability assessment, (2) fault-injection vulnerability
evaluation, (3) security equivalence at different abstractions,
and (4) (anti-)reverse engineering and physical assurance, and more.
For more information, please see
http://cad4security.org.
Cloud S&P 2022
4th Workshop on Cloud Security and Privacy, Rome, Italy, June 20-23, 2022.
[posted here 12/13/21]
This symposium, brings researchers and practitioners on the cloud domain to present
and initiate discussion on various security and privacy attacks and their countermeasures
to improve the security guarantee in a cloud ecosystem. This workshop expects submissions
on new threats and countermeasures on various cloud-enabled technologies, as well as
short surveys and case studies that focus on the security and privacy concerns of clouds.
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient,
and on-demand accesses to a shared pool of configurable computing resources. However,
the widespread adoption of cloud is still being hindered by various serious security
and privacy concerns. CLOUD S&P aims to provide a platform for researchers and
practitioners to present and discuss a wide-range of security and privacy issues
and their solutions to ensure better protection in a cloud ecosystem. This workshop
invites submissions on new attacks and solutions on various cloud-centric technologies,
as well as short surveys and case studies that shed light on the security implications
of clouds. Topics of interest include, but are not limited to:
- Access Control in Clouds
- Virtual Network Security
- Privacy-Enhanced Technologies for Clouds
- Data Protection in Clouds
- Trusted Computing in Clouds
- Cloud Forensics
- Cloud Security Auditing
- Identity Management in Clouds
- Risk Analysis for Clouds
- SDN/NFV Security
- Security and Privacy of Federated Clouds and Edge Computing
- Security and Privacy of Fog Computing
- Security and Privacy of Big Data
For more information, please see
https://cloudsp2022.encs.concordia.ca/.
SYSTOR 2022
15th ACM International Systems and Storage Conference,
Haifa, Israel, June 13 - 15, 2022.
[posted here 1/31/22]
The ACM International Systems and Storage Conference (SYSTOR) is an
international forum for interaction across the systems research community.
The program includes innovative, peer-reviewed research papers in the broad
area of systems and storage, as well as distinguished keynote lecturers, a
poster session, and social events. ACM SYSTOR is designed to appeal to academic
and industrial researchers and practitioners, welcoming both students and
seasoned professionals.
SYSTOR welcomes academic and industrial papers in systems and storage,
broadly construed, including System Security and Trust. SYSTOR encourages
submissions that describe results from experimental system prototypes,
as well as experience papers describing practical deployments, and
valuable lessons learned from them.
For more information, please see
https://www.systor.org/2022.
EURO CSEP 2022
1st European Workshop on Cyber Security Education and Practice,
Genova, Italy, June 10, 2022.
[posted here 2/7/22]
EURO CSEP 2022 aims at gathering educators from universities and
professional training institutions, researchers from academia,
industry, EU agencies, and security practitioners to discuss current
problems and solutions, to collaborate, share knowledge and
educational tools, and improve existing practices on security
education.
All the topics related to cybersecurity education as well as training
and awareness, in any setting and with a diversity of goals, are
relevant and within the scope of this workshop.
In particular, the topics of interest include but are not limited to:
- Innovative teaching modalities, for example MOOCs, flipped
classrooms, distance learning, security games and competitions, CTF,
escape rooms, etc.;
- Innovative awareness programs and cybersecurity training for high
schools, professionals and non-technical audiences, for example,
legal, economics, and finance professionals, etc.;
- Design and implementation of tools supporting cyber security
education, for example cyber ranges, etc.
For more information, please see
https://sites.google.com/view/euro-csep.
EuroSP-Workshops 2022
7th IEEE European Symposium on Security and Privacy, Genoa, Italy, June 6-10, 2022.
[posted here 12/6/21]
The IEEE European Symposium on Security and Privacy (Euro S&P) is
the European sibling conference of the IEEE Symposium on Security and
Privacy conference. It is a premier forum for computer security and privacy
research, presenting the latest developments and bringing together
researchers and practitioners.
Pre-conference workshops will take place on Sunday, June 5, 2022, and
post-conference workshops on Saturday, June 11, 2021. A workshop associated with
IEEE EuroS&P can be a half-, a full, or two days (but then split in a pre-and a
post-conference part) in length. Each workshop should provide a forum to
address a specific topic at the forefront of security and privacy research.
For more information, please see
https://www.ieee-security.org/TC/EuroSP2022/cfw.html.
Euro S&P 2022
7th IEEE European Symposium on Security and Privacy,
Genoa, Italy, June 6 - 10, 2022.
[posted here 7/19/21]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the European
sibling conference of the IEEE Symposium on Security and Privacy (“Oakland”)
conference. It is a premier forum for computer security and privacy research,
presenting the latest developments and bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research contributions
in security or privacy, as well as Systematization of Knowledge papers that
systematize previous results. EuroS&P is interested in all aspects of applied
computer security and privacy. We especially encourage papers that are far-reaching
and risky, provided those papers show sufficient promise for creating interesting
discussions and usefully questioning widely-held beliefs. This year we are
expanding the scope of the symposium to include economic, ethical, legal, and
social aspects and interdependencies of computer security and privacy, and
especially encourage submissions that address global aspects of computer
security and privacy, including issues particular to parts of the world and
communities that are often neglected. We are including experts in these areas
in the program committee to ensure that such papers will receive high-quality
reviews from well-qualified reviewers.
For more information, please see
https://www.ieee-security.org/TC/EuroSP2022/cfp.html.
FHE 2022
1st Annual FHE.org Conference on Fully Homomorphic Encryption,
Held in conjunction with EUROCRYPT 2022,
Trondheim, Norway, May 29, 2022.
[posted here 12/20/21]
First envisioned in the late seventies, the first realization for
fully homomorphic encryption only came three decades later.
Fully homomorphic encryption has since been an active research
topic. The FHE.org conference aims at being the premier forum
gathering researchers, technologists and practitioners working
on the design, development, deployment, validation, and
applications of fully homomorphic encryption.
The program committee is seeking original contributions on all
aspects of fully homomorphic encryption. Submissions across a
broad range of the development phases are encouraged, from
exploratory research and proof-of-concept studies to practical
applications and deployment of fully homomorphic encryption and
related technologies.
For more information, please see
https://fhe.org/conference/fhe-org-conference-2022-call-for-presentations.
SP 2022
43rd IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 22-26, 2022.
[posted here 5/24/21]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ìSoK:î in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their treatment
of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Ethical Considerations for Vulnerability Disclosure: Where research identifies
a vulnerability (e.g., software vulnerabilities in a given program, design weaknesses
in a hardware system, or any other kind of vulnerability in deployed systems),
we expect that researchers act in a way that avoids gratuitous harm to affected users
and, where possible, affirmatively protects those users. In nearly every case,
disclosing the vulnerability to vendors of affected systems, and other stakeholders,
will help protect users. It is the committeeís sense that a disclosure window of 45 days
https://vuls.cert.org/confluence/display/Wiki/Vulnerability+Disclosure+Policy
to 90 days
https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html
ahead of publication is consistent with authorsí ethical obligations.
Longer disclosure windows (which may keep vulnerabilities from the public for extended
periods of time) should only be considered in exceptional situations, e.g., if the
affected parties have provided convincing evidence the vulnerabilities were previously
unknown and the full rollout of mitigations requires additional time. The authors are
encouraged to consult with the PC chairs in case of questions or concerns.
The version of the paper submitted for review must discuss in detail the steps the
authors have taken or plan to take to address these vulnerabilities; but, consistent
with the timelines above, the authors do not have to disclose vulnerabilities ahead
of submission. If a paper raises significant ethical and/or legal concerns, it
might be rejected based on these concerns. The PC chairs will be happy to
consult with authors about how this policy applies to their submissions.
Ethical Considerations for Human Subjects Research: Submissions that describe
experiments on human subjects, that analyze data derived from human subjects (even
anonymized data), or that otherwise may put humans at risk should:
- Disclose whether the research received an approval or waiver from each of
the authors' institutional ethics review boards (IRB) if applicable.
- Discuss steps taken to ensure that participants and others who might have
been affected by an experiment were treated ethically and with respect.
If a submission deals with any kind of personal identifiable information (PII) or
other kinds of sensitive data, the version of the paper submitted for review must
discuss in detail the steps the authors have taken to mitigate harms to the persons
identified. If a paper raises significant ethical and/or legal concerns, it
might be rejected based on these concerns. The PC chairs will be happy to
consult with authors about how this policy applies to their submissions.
For more information, please see
https://www.ieee-security.org/TC/SP2022/cfpapers.html.
ACM WiSec 2022
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
San Antonio, Texas, USA, May 16-19, 2022.
[posted here 12/6/21]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of
security and privacy in wireless and mobile networks
and their applications. In addition to the traditional ACM WiSec
topics of physical, link, and network layer security, we welcome
papers focusing on the increasingly diverse range of mobile or wireless
applications such as Internet of Things, Cyber-Physical
Systems, as well as the security and privacy of mobile software platforms,
usable security and privacy, biometrics, and cryptography.
The conference welcomes contributions that have a clear relevance to systems
and applications. Topics of interest include but are not limited to:
- Cryptographic primitives for wireless and mobile security
- Data-driven security attacks and countermeasures
- Economics of mobile security and privacy
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Mobile malware and platform security
- NFC and smart payment applications
- Next generation cellular network fraud and security
- Physical tracking security and privacy
- Resilience and dependability for mobile and wireless networks
- Reverse engineering of and tampering with mobile applications
- Security and privacy for cognitive radio and dynamic spectrum access systems
- Security and privacy for mobile applications (e.g., mobile sensing systems)
- Security and privacy for smart devices (e.g., smartphones)
- Secure localization and location privacy
- Security protocols for wireless networking
- Side-channel and fault attacks on smart devices
- Side-channel attacks on mobile and wearable systems
- Theoretical and formal approaches for wireless and mobile security
- Usable mobile security and privacy
- Vehicular networks security (e.g., drones, automotive, avionics, autonomous driving)
- Wireless network security in satellite systems
- Wireless and mobile privacy and anonymization techniques
- Wireless or mobile security for cyber-physical systems (e.g, healthcare, smart grid) and IoT systems
- Wireless network security for critical infrastructures
- Applications of Machine Learning methods for Wireless and Mobile Security
For more information, please see
https://wisec2022.cs.utsa.edu/.
PAKDD 2022
26th Pacific-Asia Conference on Knowledge Discovery and Data Mining,
Chengdu, China, May 16-19, 2022.
[posted here 8/9/21]
The Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) is one of the
longest established and leading international conferences in the areas of data mining and
knowledge discovery. It provides an international forum for researchers and industry
practitioners to share their new ideas, original research results, and practical development
experiences from all KDD related areas, including data mining, data warehousing, machine
learning, artificial intelligence, databases, statistics, knowledge engineering,
visualization, decision-making systems, and the emerging applications.
PAKDD2022 welcomes high-quality, original, and previously unpublished submissions in the theories,
technologies and applications on all aspects of knowledge discovery and data mining.
Topics of relevance for the conference include, but not limited to, the following:
- Data Science: Methods for analyzing scientific and business data, social networks,
time series; mining sequences, streams, text, web, graphs, rules, patterns, logs data,
IoT data, spatio-temporal data, biological data; recommender systems, computational
advertising, multimedia, finance, bioinformatics.
- Big Data Technologies: Large-scale systems for text and graph analysis, sampling, parallel and
distributed data mining (cloud, map-reduce, federated learning), novel algorithmic, and
statistical techniques for big data.
- Foundations: Models and algorithms, asymptotic analysis; model selection, dimensionality
reduction, relational/structured learning, matrix and tensor methods, probabilistic and
statistical methods; deep learning, meta-learning, reinforcement learning; classification,
clustering, regression, semi-supervised and unsupervised learning; personalization,
security and privacy, visualization; fairness, interpretability, and robustness.
For more information, please see
http://pakdd.net/.
CODASPY 2022
12th ACM Conference on Data and Application Security and Privacy,
Baltimore-Washington, DC area, USA, April 24-26, 2022.
[posted here 8/23/21]
The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel,
exciting research topics in data and application security and privacy, and to lay out directions
for further research and development in this area. The conference seeks submissions from
diverse communities, including corporate and academic researchers, open-source projects,
standardization bodies, governments, system and security administrators, software engineers
and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security
CODASPY 2022 will also feature a dataset and tool paper track, which will provide a
unique venue for researchers and practitioners to make available and citable their work
done to achieve datasets or tools relevant in security and privacy domain. Papers
accepted in this track have to describe the available datasets or reporting on the
design and implementation of application security and privacy tools. Dataset/tool
papers are limited to 6 pages.
For more information, please see
http://www.codaspy.org/2022/.
DFRWS EU 2022
DFRWS EU, Online and Physical (Location TBC), March 28-31, 2022.
[posted here 9/27/21]
DFRWS EU welcomes new perspectives that push the envelope of what is currently
possible in digital forensics. Potential topics (alphabetical) to be addressed by
submissions include any digital forensic related topic, for example (but not limited to):
- Anti-forensics and anti-anti-forensics
- Case studies and trend reports
- Cloud and virtualized environments
- Covert channels (e.g., TOR, VPN)
- Digital evidence sharing and exchange
- Digital evidence and the law
- Digital forensic preparedness / readiness
- Digital investigation case management
- Digital forensic tool validation
- Digital forensic triage / survey
- Event reconstruction methods and tools
- Forensics analysis and visualization of Big Data
- Implanted medical devices
- Machine learning and data mining for digital evidence extraction/query
- Malware and targeted attacks (analysis and attribution)
- Mobile and embedded device forensics
- Network and distributed system forensics
- Non-traditional forensic scenarios / contexts
- SCADA / industrial control systems
- Smart power grid forensics
- Smart building forensics
- Vehicle forensics (e.g., drones, cars)
- Virtual currency
For more information, please see
https://dfrws.org/conferences/dfrws-eu-2022/.
NDSS 2022
Network and Distributed System Security (NDSS) Symposium,
San Diego, California, USA, February 22 - March 3, 2022.
[posted here 5/24/21]
The Network and Distributed System Security Symposium (NDSS) is a top venue
that fosters information exchange among researchers and practitioners of computer,
network and distributed system security. The target audience includes those
interested in practical aspects of network and distributed system security,
with a focus on actual system design and implementation. A major goal is to
encourage and enable the Internet community to apply, deploy, and advance the
state of practical security technologies.
Technical papers and panel proposals are solicited. Authors are encouraged to
write the abstract and introduction of their paper in a way that makes the results
accessible and compelling to a general computer-security researcher. All
submissions will be reviewed by the Program Committee and accepted submissions
will be published by the Internet Society in the Proceedings of NDSS 2022. The
Proceedings will be made freely accessible from the Internet Society web pages.
Furthermore, permission to freely reproduce all or parts of papers for noncommercial
purposes is granted provided that copies bear the Internet Society notice included
in the first page of the paper. The authors are therefore free to post the
camera-ready versions of their papers on their personal pages and within their
institutional repositories. Reproduction for commercial purposes is strictly
prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2022/call-for-papers/.
IFIP 11.9 Digital Forensics 2022
18th Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 3-5, 2022.
[posted here 7/19/21]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active
international community of scientists, engineers and practitioners dedicated to
advancing the state of the art of research and practice in digital forensics. The
Eighteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will
provide a forum for presenting original, unpublished research results and
innovative ideas related to the extraction, analysis and preservation of all forms
of electronic evidence. Technical papers are solicited in all areas related to the
theory and practice of digital forensics. Areas of special interest
include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Embedded device forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics
For more information, please see
http://www.ifip119.org/Conferences/WG11-9-CFP-2022.pdf.
|