|
Calls for Papers
Last Modified:3/24/25
Upcoming Conferences and Workshops
Note: The submission date has passed.
March 2025
April 2025
DFDS 2025
1st Digital Forensics Doctoral Symposium,
Held in conjunction with Digital Forensics Research Conference Europe (DFRWS EU 2025),
Brno, Czech Republic, April 1, 2025.
[posted here 7/22/24]
We are excited to announce the inaugural Digital Forensics Doctoral Symposium
(DFDS), organised by DFRWS EU. This symposium provides a unique platform for doctoral
students to share their (early-stage) research, engage in discussions with peers, and
build connections within the digital forensics community.
By co-locating DFDS with DFRWS EU, participants also gain the opportunity to attend
the main conference, interact with leading experts in the field, and benefit from a rich
exchange of ideas. We invite doctoral students to join us for this enriching experience.
For more information, please see
https://www.dfrws.org/conferences/dfds2025/.
DFRWS EU 2025
Digital Forensics Research Conference Europe,
Hybrid, Brno, Czech Republic, April 1-4, 2025.
[posted here 7/22/24]
DFRWS EU is open to fresh insights that challenge the current boundaries of digital forensics.
The submissions can cover a broad range of topics related to digital forensics. This year,
we are organising the inaugural Digital Forensic Doctoral Symposium, which will be held
on 1st April 2025. Furthermore, the Women in Forensic Computing Workshop (WIFC) is co-locating
with DFRWS and will be held on Monday 31th March 2025. A separate WIFC registration
is required.
For more information, please see
https://dfrws.org/conferences/dfrws-eu-2025/.
SaTML 2025
3rd IEEE Conference on Secure and Trustworthy Machine Learning,
Copenhagen, Denmark, April 9-11, 2025.
[posted here 7/29/24]
IEEE SaTML expands upon the theoretical and practical understandings of
vulnerabilities inherent to machine learning (ML), explore the robustness of learning algorithms
and systems, and aid in developing a unified, coherent scientific community which aims to establish
trustworthy machine learning. Topics of interest include (but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation
For more information, please see
https://satml.org/participate-cfp/.
May 2025
HOST 2025
18th IEEE International Symposium on Hardware Oriented Security and Trust,
San Jose, CA, USA, May 5-8, 2025.
[posted here 8/12/24]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the
premier symposium that facilitates the rapid growth of hardware-based security research and
development. Since 2008, HOST has served as the globally recognized event for researchers and
practitioners to advance knowledge and technologies related to hardware security and assurance.
- Computer-aided Design (CAD) for Hardware Security Verification
- Hardware Security Primitives
- Hardware Attack and Defense
- Architecture Security
- System security
- Emerging Security and Privacy Threats and Solutions
For more information, please see
http://www.hostsymposium.org/call-for-paper.php.
SP 2025
46th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 12-15, 2025.
[posted here 6/3/24]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix “SoK:” in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
For more information, please see
https://www.sp2025.ieee-security.org/cfpapers.html.
IFIP TC-11 SEC 2025
40th IFIP TC-11 International Information Security and Privacy Conference,
Maribor, Slovenia, May 21-23, 2025.
[posted here 11/18/24]
The IFIP SEC conference is the flagship event of the International Federation for
Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information
Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and
government presenting novel research on all theoretical and practical aspects of security
and privacy protection in ICT Systems. Practitioners and industry representatives are encouraged
to submit papers. We welcome contributions within, but not limited to, the following areas:
- Access control and authentication
- Applied cryptography
- Audit and risk analysis
- Big data security and privacy
- Cloud security and privacy
- Critical infrastructure protection
- Cyber-physical systems security
- Data and applications security
- Digital forensics
- Human aspects of security and privacy
- Identity management
- Industry networks security
- Information security education
- Information security management
- Information technology misuse and the law
- IoT security
- Managing information security functions
- Mobile security
- Multilateral security
- Network & distributed systems security
- Pervasive systems security
- Privacy protection and Privacy-by-design
- Privacy-enhancing technologies
- Quantum computations and post-quantum cryptography
- Side-channel attacks
- Surveillance and counter-surveillance
- Trust management
For more information, please see
http://sec2025.um.si/.
WNDSS 2025
International Workshop on Network and Distributed Systems Security,
Co-located with the 40th International Information Security and Privacy
Conference (IFIP SEC 2025),
Maribor, Slovenia, May 23, 2025.
[posted here 1/13/25]
The workshop is organized by IFIP Working Group 11.4 “Network &
Distributed Systems Security”. The aim of the workshop is to provide a
forum for discussion among researchers, practitioners, regulators,
students, and any other interested parties. The scope of the workshop
covers the security of computer networks and of distributed systems.
Beyond technical papers and papers presenting the results of completed
research, also work-in-progress papers, position papers, survey
papers, and papers discussing non-technical aspects are of interest.
The best student paper will receive an award.
For more information, please see
https://ifiptc11.org/wg114-events/wg114-workshop/.
June 2025
IWSPA 2025
11th ACM International Workshop on Security and Privacy Analytics,
Co-located with ACM CODASPY 2025,
Pittsburgh, Pennsylvania, June 6, 2025.
[posted here 1/13/25]
The goal of this workshop is to bring leaders in security and privacy
fields together from across the globe.
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural
language processing are being applied to challenges in security and privacy fields. However,
experts from these areas have no medium where they can meet and exchange ideas so that strong
collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current
courses and curricula in security do not sufficiently emphasize background in these areas and
students in security and privacy are not emerging with deep knowledge of these topics.
Hence, we propose a workshop that will address the research and development efforts in which
analytical techniques from machine learning, data mining, natural language processing and
statistics are applied to solve security and privacy challenges (“security analytics”).
Submissions of papers related to methodology, design, techniques and new directions for
security and privacy that make significant use of machine learning, data mining, statistics
or natural language processing are welcome. Furthermore, submissions on educational topics
and systems in the field of security analytics are also highly encouraged.
For more information, please see
https://sites.google.com/view/iwspa-2025.
CSF 2025
38th IEEE Computer Security Foundations Symposium,
Santa Cruz, CA, USA, June 16-20, 2025.
[posted here 10/1/24]
The Computer Security Foundations Symposium (CSF) is an annual conference for
researchers in computer security, to examine current theories of security, the formal models that
provide a context for those theories, and techniques for verifying security. It was created in 1988
as a workshop of the IEEE Computer Society’s Technical Committee on Security and Privacy, in response
to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting
became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two
decades, many seminal papers and techniques have been presented first at CSF. For more details on the
history of the symposium, visit CSF’s home.
The program includes papers, panels, and a poster session. Topics of interest include access control,
information flow, covert channels, cryptographic protocols, database security, language-based security,
authorization and trust, verification techniques, integrity and availability models, and broad discussions
concerning the role of formal methods in computer security and the nature of foundational research
in this area.
For more information, please see
https://csf2025.ieee-security.org.
WEIS 2025
24th Annual Workshop on the Economics of Information Security,
Tokyo, Japan, June 23-25, 2025.
[posted here 1/13/25]
The workshop accepts papers covering both theoretical and empirical
studies of the interrelationship between information security (broadly
construed, particularly to include privacy, cybercriminality and
cyber-warfare) and economics (including financial incentives,
behavioural economics, cyberinsurance). Market failures,
market-induced technical failures, and cost analyses of investment in
cybersecurity versus falling victim to cybercrime, have all been
covered in past workshops. We encourage participation by submission of paper and attendance by
economists, computer scientists, legal scholars, business researchers
(from academia and elsewhere), and security and privacy researchers
from academia and industry to submit research on relevant topics.
For more information, please see
http://kmlabcw.iis.u-tokyo.ac.jp/weis/2025/index.html.
WTMC 2025
10th International Workshop on Traffic Measurements for Cybersecurity,
Co-located with the 10th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2025),
Venice, Italy, June 30, 2025.
[posted here 1/20/25]
Current communication networks are increasingly becoming pervasive, complex,
and ever-evolving due to factors like enormous growth in the number of network users,
continuous appearance of network applications, increasing amount of data transferred, and
diversity of user behavior. Understanding and measuring traffic in such networks is a
challenging yet vital task for network management but recently also for cybersecurity
purposes. Network traffic measurement and monitoring can, for example, enable the analysis
of the spreading of malicious software and its capabilities or can help to understand the
nature of various network threats, including those that exploit user's behavior and other
user's sensitive information. On the other hand, network traffic investigation can also
help to assess the effectiveness of the existing countermeasures or contribute to building
new, better ones. Traffic measurements have been utilized in the area of economics of
cybersecurity e.g., to assess ISP “badness” or to estimate the revenue of cybercriminals.
Recent research has focused on measurements of fake news and the interplay between
misinformation and user engagement in news postings using different online platforms.
Additionally, recent studies have explored measurements of generative AI's role in cybersecurity,
highlighting its dual potential to bypass security measures in cyberattacks and strengthen
defense mechanisms against evolving threats.
The WTMC workshop aims to bring together the research accomplishments provided by researchers
from academia and the industry. The other goal is to show the latest research results in the
field of cybersecurity and understand how traffic measurements can influence it. We encourage
prospective authors to submit related distinguished research papers on the subject of both
theoretical approaches and practical case reviews. This workshop presents some of the most
relevant ongoing research in cybersecurity seen from the traffic measurements perspective.
For more information, please see
https://wtmc.info/index.html.
IEEE EuroS&P 2025
10th IEEE European Symposium on Security and Privacy,
Venice, Italy, June 30 - July 4, 2025.
[posted here 11/1/24]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting
developments in computer security and electronic privacy, and for bringing together researchers and practitioners
in the field. Following this story of success, IEEE initiated the European Symposium on Security and Privacy (EuroS&P),
which is organized every year in a European city. The IEEE European Symposium on Security and Privacy (Euro S&P)
is the younger, more adventurous, and tastier sibling conference of the IEEE Symposium on Security and Privacy
("Oakland" or "NorCal S&P") conference. It is a premier forum for computer security and privacy research,
presenting the latest developments and bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research contributions in security or
privacy, as well as Systematization of Knowledge papers that systematize previous results. EuroS&P
is interested in all aspects of applied computer security and privacy. We especially encourage papers
that are far-reaching and risky, provided those papers show sufficient promise for creating interesting
discussions and usefully questioning widely-held beliefs. Papers without a clear connection to security
or privacy will be considered out of scope and may be rejected without full review.
For more information, please see
https://eurosp2025.ieee-security.org.
July 2025
PETS 2025
25th Privacy Enhancing Technologies Symposium,
Washington, DC and Online, July 14-19, 2025.
[posted here 7/22/24]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts
from around the world to present and discuss recent advances and new perspectives on research in
privacy technologies. The 25th PETS will be a hybrid event with a physical gathering held in
Washington, DC, USA and a concurrent virtual event. Papers undergo a journal-style reviewing process,
and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).
Authors of accepted papers are encouraged to attend and present at the physical event, where their
presentations can be recorded for the virtual event and where they can participate directly in
in-person research, technical, and social activities. However, in-person attendance is not required
for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality
reviewing and publication while also supporting the successful PETS community event. PoPETs is
self-published and does not have article processing charges or article submission charges.
For more information, please see
https://petsymposium.org/cfp25.php.
DFRWS-USA 2025
25th Annual Digital Forensics Research Conference,
Chicago, Illinois, USA, July 22-25, 2025.
[posted here 11/4/24]
DFRWS conferences feature thought provoking Keynote Speakers, hands-on workshops, cutting edge
research papers, presentations, panel discussions, demonstrations and poster sessions accompanied by a
full schedule of social events including a Welcome Reception, the DFRWS Digital Forensics Rodeo and an
expedition. All presentations take place in-person but virtual registrations will be available for
those who are not able to attend the conference in person but wish to participate in this historic event.
FULL RESEARCH PAPERS undergo double-blinded peer review, and the proceedings are published by
Elsevier as a special issue of the Journal of Forensic Science International: Digital Investigation.
We ask to submit articles according to the submission instructions.
Systematization of Knowledge (SoK) Papers: As this marks the 25th occurrence of the conference, a substantial
body of knowledge has been published through this platform over the years. Therefore, starting from this year,
we solicit Systematization of Knowledge (SoK) papers that systematize, contextualize and evaluate existing
knowledge of digital forensics. A suitable SoK paper needs to provide unique insights, such as a new
viewpoint, a comprehensive taxonomy, and new evidence in supporting or challenging long-held beliefs.
A survey paper without such insights is not appropriate and may be rejected without full review.
A SoK paper submission needs to have the prefix “SoK: ” in the title, and select the checkbox in
the submission form. Accepted SoK papers will be presented at the conference and included
in the proceedings.
For more information, please see
https://dfrws.org/conferences/dfrws-usa-2025/.
August 2025
ARES 2025
20th International Conference on Availability, Reliability and Security,
Ghent, Belgium, August 10-13, 2025.
[posted here 12/23/24]
ARES highlights the various aspects of dependability – with special focus
on the crucial linkage between availability, reliability and security. ARES aims at a full
and detailed discussion of the research issues of dependability as an integrative concept
that covers amongst others availability, safety, confidentiality, integrity, maintainability
and security in the different fields of applications. ARES emphasizes the interplay between
foundations and practical issues of dependability in emerging areas such as e-government,
m-government, location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination and research
challenges of the various aspects of Dependable Computing and the definition of a future road map.
The ARES 2025 proceedings will be published in Springer Lecture Notes on Computer Science.
For more information, please see
https://2025.ares-conference.eu/.
USENIX Security 2025
34th USENIX Security Symposium,
Seattle, WA, USA, August 13-15, 2025.
[posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners,
system programmers, and others interested in the latest advances in the security and
privacy of computer systems and networks. The 2025 edition of USENIX Security will
implement a new approach to presenting accepted papers and fostering interactions
at the conference. The USENIX Security '25 program co-chairs and the USENIX Security
steering committee have prepared a public RFC about the plans for this new model
and welcome thoughts from the USENIX Security community by April 22, 2024.
For more information, please see
https://www.usenix.org/conference/usenixsecurity25.
September 2025
October 2025
|