Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:7/19/21

Upcoming Conferences and Workshops

Note: The submission date has passed.

July 2021

DBSec 2021 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Virtual, July 19 – 20, 2021. [posted here 2/22/21]
DBSec is an annual international conference covering research in data and applications security and privacy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, and applications security.

For more information, please see https://dbsec2021.ucalgary.ca.

IoTSPT-ML 2021 11th International Workshop on Security, Privacy, Trust, and Machine Learning for Internet of Things, Held in conjunction with the 30th International Conference on Computer Communications and Networks (ICCCN 2021), Athens, Greece, July 22, 2021. [posted here 1/3/21]
Internet of Things (IoT) has emerged as the next big technological revolution in computing in recent years with the potential to transform every sphere of human life. With an expanding network of interconnected Internet-enabled devices, IoT devices are used in a range of applications from connected cars, smart homes, healthcare, smart retail, to supply-chain management. The rise of this transformative technology is however deeply mired with security and privacy concerns. The large influx of connected devices in the market introduces new vulnerabilities and opens new avenues for security attacks. The massive scale and variety of these devices also make it challenging for the manufacturers to design and implement manageable security and privacy solutions resulting in devices shipped without adequate security controls in place. Traditional security, privacy and trust-based solutions are also found to be inefficient against the various constraints of the IoT environment. In the IoT ecosystem, where devices are constantly generating increased volume of big of data, machine-learning algorithms can be useful to perform intelligent processing, automated data analysis and provide meaningful interpretations and predictions to support smart and secure IoT applications. Machine learning techniques that enable the IoT devices to learn and adapt to various threats dynamically will be critical to building secure IoT systems. Use of machine learning for IoT security is especially very promising to detect any outliers to normal activity in the system. This workshop aims to promote discussions of research and relevant activities in the models and design of secure, privacy-preserving, or trust architectures, data analyses and fusion platforms, protocols, algorithms, services, and applications for next generation IoT systems. We especially encourage security and privacy solutions that employ innovative machine learning techniques to tackle the issues of data volume and variety problems that are systemic in IoT platforms.

For more information, please see https://sites.google.com/uw.edu/iotspt-ml2021.

CSR 2021 IEEE International Conference on Cyber Security and Resilience, Virtual, July 26-28, 2021. [posted here 11/23/20]
The technological and industrial revolution brought by complex Cyber-Physical Systems (CPSs) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. Systems under attack, should exhibit cyber resilience, i.e. a mixture of strategies, methods, and techniques to support complex CPS adaptive capacity during cyber-attacks. The conference focuses on theoretical and practical aspects of the security, privacy, trust, and resilience of networks, systems, and services as well as novel ways for dealing with their vulnerabilities and mitigating sophisticated cyber-attacks.

For more information, please see https://www.ieee-csr.org/.

August 2021

CSET 2021 14th Cyber Security Experimentation and Test Workshop, Virtual, August 9, 2021. [posted here 1/3/21]
For 13 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for presenting research on and discussing “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability—in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and/or demonstrably grow community resources. CSET was traditionally sponsored by USENIX. In 2020, USENIX Association decided to discontinue their support of all workshops (including CSET) due to pandemic effects on USENIX financial revenue. We are committed to continuing the CSET Workshop independently for 2021 and hope that we may rejoin USENIX in the future. We plan to hold the workshop virtually at the time when it would originally have been held—on Monday, August 9, preceding USENIX Security Symposium 2021.

For more information, please see https://cset21.isi.edu/.

USENIX Security 2021 30th USENIX Security Symposium, Vancouver, B.C., Canada, August 11–13, 2021. [posted here 7/6/20]
USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 9 and 10. Please note that the USENIX Security Symposium moved to multiple submission deadlines in 2019 and included changes to the review process and submission policies.

For more information, please see https://www.usenix.org/conference/usenixsecurity21/call-for-papers.

ENS 2021 4th International Workshop on Emerging Network Security, Held in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021), Vienna, Austria, August 17 – 20, 2021. [posted here 3/8/21]
With the great success and development of 5G & beyond systems and other emerging concepts (e.g. 6G) a continued effort toward rich ubiquitous communication infrastructure, promising wide range of high-quality services is desired. It is envisioned that communication in emerging networks will offer significantly greater data bandwidth and almost infinite capability of networking resulting in unfaltering user experiences for, among others: virtual/augmented reality, massive content streaming, telepresence, user-centric computing, crowded area services, smart personal networks, Internet of Things (IoT), smart buildings and smart cities. The communication in 5G networks and beyond is currently in the center of attention of industry, academia, and government worldwide. Emerging network concepts drive many new requirements for different network capabilities. As future networks aim at utilizing many promising network technologies, such as Software Defined Networking (SDN), Network Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing or Cloud Computing and supporting a huge number of connected devices integrating above mentioned advanced technologies and innovating new techniques will surely bring tremendous challenges for security, privacy and trust. Therefore, secure network architectures, mechanisms, and protocols are required as the basis for emerging networks to address these issues and follow security-by-design approach. Finally, since in current and future networks even more user data and network traffic will be transmitted, big data security solutions should be considered in order to address the magnitude of the data volume and ensure data security and privacy. From this perspective, the ENS 2021 workshop aims at collecting the most relevant ongoing research efforts in emerging network security field. It also serves as a forum for 5G & beyond projects in order to disseminate their security-related results and boost cooperation, also foster development of the 5G and beyond Security Community made of 5G security experts and practitioners who pro-actively discuss and share information to collectively progress and align on the field. Last but not least it also aims to bridge 5G & Beyond community with other communities (e.g. AI) that are key to support full attainment of 5G & Beyond but also 6G promises and so for those technologies to release their full potential.

For more information, please see http://www.ares-conference.eu.

CUING 2021 5th International Workshop on Criminal Use of Information Hiding, Held in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021), Vienna, Austria, August 17 – 20, 2021. [posted here 3/8/21]
With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. This poses a lot of new challenges for digital forensics analysts, academics, law enforcement agencies (LEAs), and security professionals. The aim of the Third International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding. However data hiding is understood here in a wider manner than in the academic world i.e. all techniques that pertain to camouflaging/masking/hiding various types of data (e.g. identities, behavior, communication, etc.) are included here. This means not only digital steganography/covert channels but also obfuscation/anti-forensics techniques and even underground networks (darknets) or activities related to behavior impersonation or mimicking. This will allow to present a more complete picture on novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies. Moreover, this year the CUING workshop is co-organized with the SIMARGL (Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware) H2020 project.

For more information, please see http://www.ares-conference.eu.

BASS 2021 4th International Workshop on Behavioral Authentication for System Security, Held in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021), Virtual, August 17-20, 2021. [posted here 4/5/2021]
Behavioral features are getting in the last years an increasing attention from both IT research and industrial world. Human behavioral aspects are extremely valuable pieces of information, exploited by companies to profile current or potential customers, in order to anticipate their preferences and present custom offers. Runtime behavioral analysis is being applied with increasing success for continuous and silent user authentication, and is considered an enabler for the seamless authentication paradigm in several environments and devices. Furthermore, behavioral analysis is posing itself as a valuable alternative to signature-based approaches to identify anomalies, intrusions, security attacks and system malfunctioning. These approaches are in fact known to be flexible, self-learning and able to consider multi-level and multi-domain features, related to software execution, system status, user interaction and current context. BASS aims at attracting innovative contributions from both industry and academia related to all aspects of human, system or software behavioral analysis for IT security. The workshop solicits submission on both theoretical aspects and practical applications of behavior analysis, behavior-based identification and authentication, profiling and privacy and security aspects related to recording and exploitation of behavioral features.

For more information, please see https://www.ares-conference.eu/workshops/bass-2021/.

IWCC 2021 10th International Workshop on Cyber Crime, Held in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021), Virtual, August 17-20, 2021. [posted here 4/19/21]
Today's world's societies are becoming more and more dependent on online services - where commercial activities, business transactions and government services are realized. This tendency has been especially visible during the COVID-19 epidemy. As a consequence, it has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Moreover, the frequently occurring international frauds impose the necessity to conduct the investigation of facts spanning across multiple domains and countries. Such examination is often subject to different jurisdictions and legal systems. A good illustration of the above being the Internet, which has made it easier to perpetrate traditional crimes. It has acted as an alternate avenue for the criminals to conduct their activities, and launch attacks with relative anonymity. The increased complexity of the communications and the networking infrastructure is making investigation of the crimes difficult. Traces of illegal digital activities are difficult to analyze due to large volumes of data. Nowadays, the digital crime scene functions like any other network, with dedicated administrators functioning as the first responders. This poses new challenges for law enforcement policies and forces the computer societies to utilize digital forensics to combat the increasing number of cybercrimes. Forensic professionals must be fully prepared in order to be able to provide court admissible evidence. To make these goals achievable, forensic techniques should keep pace with new technologies. The aim of this workshop is to bring together the research outcomes provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of digital forensics. We strongly encourage prospective authors to submit articles presenting both theoretical approaches and practical case reviews, including work-in-progress reports.

For more information, please see https://www.ares-conference.eu/workshops/iwcc-2021/.

September 2021

SecureComm 2021 17th EAI International Conference on Security and Privacy in Communication Networks, Canterbury, Great Britain, September 6 - 9, 2021. [posted here 3/8/21]
SecureComm 2021 is calling for high-quality research contributions in ALL areas of secure communications and networking, including those addressing interdisciplinary challenges in different application domains. Topics in less related areas will be considered only if a clear connection to secure communication/networking is demonstrated in the title or the abstract. Topics of interest include, but are not limited to the following:
- Network security and privacy (for all types of networks such as wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
- Attacks on telecommunications and networking (e.g., malware, botnets, DoS, MitM, relay attacks, side channel attacks, phishing/pharming, DNS poisoning/hijacking, address spoofing, cybersquatting)
- Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
- Physical layer security (e.g., jamming, GPS spoofing)
- Systems security with a strong secure communication and networking element (e.g., security in cloud, edge and fog computing, IoT, RFID, cyber-physical sysytems, teleconferencing)
- Network intrusion detection and prevention, firewalls, packet filters
- Web and mobile security & privacy
- Anonymous communications and other forms of privacy-enhancing or privacy-aware communications (e.g., Tor, darknet)
- Distributed ledger technologies (blockchain and cryptocurrencies)
- Internet censorship and countermeasures
- Resilience of computer networks and critical infrastructures
- Visualisation of secure communications and networking
- Cyber (both offensive and defensive) deception related to secure communications and networking (e.g., honeypots / honeytokens, cyber fraud)
- False information online including mis-, dis- and mal-information
- Moving target defence
- Information hiding (steganography, steganalysis, and digital watermarking)
- Privacy-preserving computing in secure communication and networking
- Cryptographic systems for secure communications and networking (e.g., key management, multi-party computing, broadcast encryption, sectre sharing schemes)
- Quantum key distribution and other quantum-based secure communications
- Network, internet and cloud forensics
- Cyber threat intelligence and cyber incident responses
- Cybercrime investigation and attribution
- Data leakage/loss prevention/protection (DLP)
- Secure communication and networking applications (e.g., industry 4.0, energy, smart cities, transportation, water, logistics, waste)
- Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking
- Socio-technical aspects of secure communications and networking (e.g., usability, human behaviours, legal issues, cybercrime, economics)

For more information, please see https://securecomm.eai-conferences.org/2021/.

EuroSP Workshops 2021 6th IEEE EuroS&P Symposium, Vienna, Austria, September 7-11, 2021. [posted here 12/7/20]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Following this story of success, in 2016 IEEE initiated the European Symposium on Security and Privacy (EuroS&P), which is organized every year in a European city. Pre-conference workshops will take place on Tuesday, September 7, 2021, and post-conference workshops on Saturday, September 11, 2021. A workshop associated with IEEE EuroS&P can be a half-, a full or two days (but then split in a pre- and a post-conference part) in length. Each workshop should provide a forum to address a specific topic at the forefront of security and privacy research. If proceedings are planned, the default option offered is publication through IEEE Xplore in a volume accompanying the main IEEE EuroS&P 2021 proceedings.

Workshop registration will be done together with the main conference, allowing workshop-only registrations as well. Support for accepted workshops includes rooms, coffee breaks, lunches, and at least one free registration for the workshop. Other expenses must be covered by the individual workshops.

For more information, please see https://www.ieee-security.org/TC/EuroSP2021/cfw.html.

SEED 2021 IEEE International Symposium on Secure and Private Execution Environment Design, Virtual, September 20-21, 2021. [posted here 5/3/21]
The IEEE International Symposium on Secure and Private Execution Environment Design (SEED) is a forum which brings together researchers from the computer architecture and computer security communities into one venue that focuses on the design of architectural and system primitives which provide secure and private execution environments for applications, containers, or virtual machines. SEED primarily focuses on research topics spanning across the boundaries of computer architecture, systems, and security. Papers are solicited on a range of topics, including (but not limited to):
- Architecture, operating systems, and programming models and language for supporting secure and private execution
- Novel Designs for secure and private execution environments for GPUs, accelerators, and FPGAs
- Architectural support for new security primitives
- Novel cryptographic hardware designs for secure and private execution
- Models and analysis of performance-security trade-offs in the design of a secure execution environment
- Evaluation of security vulnerabilities in post-Moore’s Law technologies, e.g. persistent memory, quantum computing
- Demonstration and mitigation of architectural side channels, covert channels and other security vulnerabilities
- Metrics for measuring architecture-related security vulnerabilities
- Compiler and code generation techniques for mitigating architecture-induced side and covert channels and other vulnerabilities

For more information, please see https://seed-symposium.org/.

October 2021

TrustData 2021 12th International Workshop on Trust, Security and Privacy for Big Data, New York, NY, USA, October 1-3, 2021. [posted here 4/26/21]
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention. The 12th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2021) aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data.

For more information, please see http://www.spaccs.org/trustdata/trustdata2021/.

ESORICS 2021 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021. [posted here 1/3/21]
We are looking for papers discussing industrial research and development, focusing on original, high quality, unpublished research and implementation experiences. The Symposium will start on October 4, 2021 with a technical program, including vetted papers, invited talks, poster and panel discussions as well as collocated workshops. Submissions are solicited in all areas relating to cybersecurity and privacy, including but not limited to:
- Access control
- Anonymity and censorship resistance
- Applied cryptography
- Artificial intelligence for security
- Audit and accountability
- Authentication and biometrics
- Blockchains and distributed ledger security
- Data and computation integrity
- Database security
- Digital content protection
- Digital forensics
- Formal methods for security and privacy
- Hardware security
- Information hiding
- Identity management
- Information flow control
- Information security governance and management
- Intrusion detection
- Language-based security
- Malware and unwanted software
- Network security
- Phishing and spam prevention
- Privacy technologies and mechanisms
- Risk analysis and management
- Secure electronic voting
- Security for artificial intelligence
- Security economics and metrics
- Security and privacy in cloud systems
- Security and privacy in crowdsourcing
- Security and privacy in 'internet of things' and cyber-physical systems
- Security and privacy in location services
- Security and privacy in mobile computing
- Security and privacy in social networks
- Security and privacy in wireless and cellular communications
- Security, privacy and resilience in critical infrastructures
- Software security
- Systems security
- Trusted computing
- Usable security and privacy
- Web security

For more information, please see https://esorics2021.athene-center.de/call-for-papers.php.

EUROUSEC 2021 European Symposium on Usable Security, Virtual, October 11-12, 2021. [posted here 4/12/21]
We are excited to welcome original work describing research, visions, or experiences in all areas of usable security and privacy. We welcome a variety of research methods, including both qualitative and quantitative approaches. We accept both longer papers on mature/completed work in a research track, as well as shorter papers on work in progress or work that has yet to begin in a vision track. This decision to accept both types of submissions, which started with EuroUSEC 2019, aims to include researchers at all stages of their career and at all stages of their projects. Topics include, but are not limited to:
- innovative security or privacy functionality and design
- accessible cyber privacy and security
- new applications of existing models or technology
- field studies of security or privacy technology
- usability evaluations of new or existing security or privacy features
- security testing of new or existing usability features
- longitudinal studies of deployed security or privacy features
- studies of administrators or developers and support for security and privacy
- psychological, sociological, and economic aspects of security and privacy
- the impact of organizational policy or procurement decisions
- methodologies for usable security and privacy research
- lessons learned from the deployment and use of usable privacy and security features
- reports of replicating previously published studies and experiments
- reports of failed usable privacy/security studies or experiments, with the focus on the lessons learned from such experience

For more information, please see https://eurousec2021.secuso.org/.

WiMob 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications, Bologna, Italy, October 11-13, 2021. [posted here 3/8/21]
The WiMob conference is an international forum for the exchange of experience and knowledge among researchers and developers concerned with wireless and mobile technology. For thirteen years, the International WiMob conference has provided unique opportunities for researchers to interact, share new results, show live demonstrations, and discuss emerging directions in - Wireless Communication, - Wireless Networking, Mobility and Nomadicity, - Ubiquitous Computing, Services and Applications, - Green and sustainable communications and network computing and - Security on Wireless and mobile Networks. WiMob 2021 is soliciting high quality technical papers addressing research challenges in the areas of wireless communications, wireless networking, mobility, nomadicity, ubiquitous computing, services and applications. Papers should present original work validated via analysis, simulation or experimentation. Practical experiences and Testbed trials also are welcome.

For more information, please see http://wimob.org/wimob2021/.

CyberSciTech 2021 6th IEEE Cyber Science and Technology Congress, Calgary, Canada, October 25-28, 2021. [posted here 6/7/21]
Cyberspace, the seamless integration of physical, social, and mental spaces, is an integral part of our society, ranging from learning and entertainment to business and cultural activities, and so on. There are, however, in addition to its technical challenges, a number of pressing issues such as safety and trust associated with the cyberspace. For example, how do we strike a balance between the need for strong cybersecurity and preserving the privacy of ordinary citizens? To address these challenges, there is a need to establish new science and research portfolios that incorporate cyber-physical, cyber-social, cyber-intelligent, and cyber-life technologies in a cohesive and efficient manner. This is the aim of the IEEE Cyber Science and Technology Congress (CyberSciTech). IEEE CyberSciTech has been successfully held in Auckland, New Zealand, in 2016, in Orlando, USA, in 2017, in Athens, Greece, in 2018, in Fukuoka, Japan, in 2019, and online due to COVID-19, hosted in Canada in 2020. In 2021, we will continue to offer IEEE CyberSciTech with the aim of providing a common platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics. In addition, this is also a platform to allow relevant stakeholders to get together, discuss and identify ongoing and emerging challenges, in order to understand and shape new cyber-enabled worlds.

For more information, please see http://cyber-science.org/2021/.

VizSec 2021 18th IEEE Symposium on Visualization for Cyber Security, Virtual, October 27, 2021. [posted here 5/3/21]
The 18th IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user assisted attacks prevention, compliance management, wireless security, secure coding, and penetration testing.

For more information, please see https://vizsec.org/vizsec2021/.

November 2021

ACM-CCS 2021 28th ACM Conference on Computer and Communications Security, Seoul, South Korea, November 14-19, 2021. [posted here 1/3/21]
The 28th ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

For more information, please see https://www.sigsac.org/ccs/CCS2021/.

ASHES 2021 5th Workshop on Attacks and Solutions in Hardware Security, Co-located with ACM CCS 2021, Seoul, South Korea, November 19, 2021. [posted here 5/31/21]
The purpose of the ASHES workshop is to foster solutions for these and any other impending issues in hardware security, and to provide the CCS-community with a rapid and dedicated forum for general secure hardware research, including both theory and practice. Among other things, ASHES is especially devoted to fostering and shaping new problems at an early stage. This is not limited to the above IoT-topics, but also includes any other acute problems in the area as well. Given its workshop format and quick reaction times, ASHES tries to constructively use the strong opportunities for guiding and shaping research during its initial phase. ASHES therefore welcomes any convincing contributions to the area, be they foundational, theoretical, or practical in nature. This is also reflected in the four tailor-made paper categories offered by ASHES, namely: SoK-papers; long and short research papers; as well as wild-and-crazy papers, which allow dissemination of promising ideas to the community at an early stage. In the four-year history of ASHES from 2017 to 2020, authors were making intense use of all three categories. We would hope to see this trend continuing this year.

For more information, please see http://wpes2021.di.unimi.it.

December 2021

HOST 2021 IEEE International Symposium on Hardware Oriented Security and Trust, Washington DC, USA, December 5-8, 2021. [posted here 12/21/20]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) – the premier event aims to facilitate the rapid growth of hardware-based security research and development and highlight new results in the area of hardware security – has opened the call for contributions. HOST 2021 invites original contributions in all areas of overlap between hardware and security.

For more information, please see http://www.hostsymposium.org/host2021/.