Calls for Papers

IEEE Computer Society's Technical Committee on Security and Privacy


Past Conferences and Journal Special Issues

Last Modified:6/3/24

Note: Please contact by email if you have any questions..



Past Conferences and Other Announcements - 2023

SAGAI 2024 Workshop on Security Architectures for GenAI Systems, Held in conjunction with IEEE SP 2024 Conference, San Francisco, California, USA, May 23, 2024. [posted here 12/25/23]
Generative AI (GenAI) is quickly advancing and fast becoming a widely deployed technology. GenAI-based systems rely on machine-learning (ML) models trained on large amounts of data using deep-learning techniques. As the power and flexibility of the models advance, the architectural complexity of GenAI-based systems is advancing too. Current architectures may combine multiple models, using sequences of model queries to complete a task, with external (non-ML) components leveraged to enhance the model’s operation via database queries or API calls. These architectures may be vulnerable to a variety of attacks that use adversarial inputs to create malicious outputs. This workshop invites new contributions to the broader understanding of security for GenAI systems and applications. Contributions may address security threats and defenses for individual models, or for systems and architectures that may employ one or more generative ML models as subcomponents. The workshop welcomes discussion of new GenAI security concerns, as well as new approaches to architecting GenAI-based systems for safety, security, and privacy.

For more information, please see

SafeThings 2024 8th IEEE/ACM Workshop on the Internet of Safe Things, Held in conjunction with IEEE SP 2024 Conference, San Francisco, California, USA, May 23, 2024. [posted here 12/11/23]
The 8th Workshop on the Internet of Safe Things seeks to bring together researchers to create solutions for the development of safe cyber-physical systems. As safety is inherently linked with the security and privacy of a system, we also seek contributions in these areas that address safety concerns. We seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSs, and creates tools, algorithms, frameworks, and systems that help in the development of safe systems.

We seek contributions across domains - autonomous vehicles, smart homes, medical devices, smart grid, intelligent transportation; and across disciplines - systems, control, human-computer interaction, security, reliability, machine learning, and verification. The scope of our workshop includes safety topics as they relate to an individual’s health (physical, mental), society (air pollution, toxicity, disaster events), or the environment (species preservation, global warming, oil spills). The workshop considers safety from a human perspective and, thus, does not include topics such as thread safety or memory safety in its scope.

For more information, please see

SP 2024 45th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-23, 2024. [posted here 6/7/23]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ìSoK:î in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at

For more information, please see

NSF-WSCS 2024 The NSF Workshop on Sustainable Computing for Sustainability, Alexandria, VA, USA, April 16-17, 2024. [posted here 10/16/23]
The workshop will follow a hybrid format with both remote and in-person participation. Remote participation will be through a zoom webinar that will be open to all within the limits of the zoom webinar platform. Instructions for joining the webinar will be posted on the Workshop's website a few weeks before it is scheduled to take place.

Because of logistical constraints, in-person attendance will be limited to approximately 100 participants, with eligible travel costs supported through a grant from NSF. The primary purpose of this call for submissions is, therefore, to help us identify a diverse and complementary set of attendees so as to ensure a productive workshop. A report documenting the findings and recommendations of the workshop will be made publicly available following the successful completion of the workshop.

Towards performing such as selection, we are asking interested individuals to submit a short (two pages or less excluding references, single-column, single-space, 11pt fonts) statement of interest before February 15, 2024, AoE. You can submit multiple statements of interest.

For more information, please see

SPW 2024 29th International Workshop on Security Protocols, Brno, Czechia, April 10-12, 2024. [posted here 10/16/23]
The theme of the 2024 workshop is "Ghost in the Protocol — Security Protocols and AI". We invite proposals for papers containing exciting, original ideas that will elicit lively, thought-provoking in-person discussions. SPW papers should lead to conceptual advances, not be archival papers about work that has already been completed and polished. The workshop is by invitation only; to receive an invitation, please submit a position paper by 8 January 2024 for our consideration. Security protocols have always been seized with the question of whether a participant is a human or not. Given recent developments around the generation of text, images, code, audio and video, however, we must now consider the interplay of AI and the protocols themselves. Can machine-generated protocols, with machine-checked proofs, do a better job than human designers? Instead of humans producing machine-readable protocol descriptions, can machines produce human-comprehensible descriptions? As always, please consider this theme as inspirational rather than restrictive. As long-time attendees already know, it is perfectly acceptable to offer a position paper only loosely related to the theme, or on another security topic, provided the paper is deemed likely to stimulate an interesting discussion. New authors are encouraged to browse through past volumes of post-proceedings (search for Security Protocols Workshop in the Springer LNCS series) to get a flavor for the variety and diversity of topics that have been accepted in past years, as well as the lively discussion that has accompanied them.

For more information, please see

FHE 2024 3rd Annual Conference on Fully Homomorphic Encryption, Held in conjunction with the Real World Crypto 2024, Toronto, Canada, March 24, 2024. [posted here 10/18/23]
First envisioned in the late seventies, the first realization for fully homomorphic encryption only came three decades later. Fully homomorphic encryption has since been an active research topic. The conference aims at being the premier forum gathering researchers, technologists and practitioners working on the design, development, deployment, validation, and applications of fully homomorphic encryption. The program committee is seeking original contributions on all aspects of fully homomorphic encryption. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of fully homomorphic encryption and related technologies. Topics of interest include, but are not limited to:
- Fully homomorphic encryption and its applications
- Efficient and secure implementations of cryptographic algorithms Software for fully homomorphic encryption
- Hardware architectures for fully homomorphic encryption
- Compilers for fully homomorphic encryption
- Physical attacks and countermeasures
- Secure applications using fully homomorphic encryption
- Security of encrypted computing and applications
- Cryptographic protocols using fully homomorphic encryption for privacy-preserving systems
- Formal modeling and formal proofs for encrypted computing
- Validation and certification of fully homomorphic encryption

For more information, please see

FC 2024 28th International Conference on Financial Cryptography and Data Security, Willemstad, Curacao, March 4-8, 2024. [posted here 8/21/23]
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and interdisciplinary works are particularly encouraged.

The goal of the conference is to bring security and cryptography researchers and practitioners together with economists, bankers, implementers and policy-makers. Intimate and colourful by tradition, the FC program features invited talks, academic presentations, technical demonstrations and panel discussions. In addition, several workshops will be held in conjunction with the FC conference.

For more information, please see

NDSS 2024 Network and Distributed System Security Symposium, San Diego, California, uSA, February 26 - March 1, 2024. [posted here 6/5/23]
The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS 2024 workshops and symposia will take place in San Diego, CA, from 26 February to 1 March 2024. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2024. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see

VehicleSec 2024 2nd ISOC Symposium on Vehicle Security and Privacy, Co-located with NDSS 2024, San Diego, CA, USA, February 26, 2024. [posted here 4/9/23]
A vehicle is a machine that transports people and/or cargo in one or more physical domains, such as on the ground (e.g., cars, bicycles, motorcycles, trucks, buses, scooters, trains), in the air (e.g., drones, airplanes, helicopters), underwater (e.g., ships, boats, watercraft), and in space (e.g., spacecraft). Due to their safety- and mission-critical nature, the security and privacy of vehicles can pose direct threats to passengers, owners, operators, as well as the environment. Recent improvements in vehicle autonomy and connectivity (e.g., autonomous driving, drone delivery, vehicle-to-everything (V2X) communication, intelligent transportation, drone swarm) have only served to exacerbate security and privacy challenges and thus require urgent attention from academia, industry, and policy-makers. To meet this critical need, the ISOC (Internet Society) VehicleSec symposium aims at bringing together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any security/privacy issues related to vehicles (e.g., ground, aerial, underwater, space), their sub-systems (e.g., in-vehicle networks, autonomy, connectivity, human-machine interfaces), supporting infrastructures (e.g., transportation infrastructure, charging station, ground control station), and related fundamental technologies (e.g., sensing, control, AI/ML/DNN/LLM, real-time computing, edge computing, location service, simulation, digital twin, multi-agent protocol/system design, and human-machine interaction).

For more information, please see

IFIP 11.9 DF 2023 20th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 4-5, 2024. [posted here 8/7/23]
The IFIP Working Group 11.9 on Digital Forensics ( is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Twentieth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately 60 participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume – the twentieth volume in the well-known Research Advances in Digital Forensics book series (Springer, Cham, Switzerland) during the summer of 2024.

Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Mobile and embedded device forensics
- Image and video forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see