Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:6/6/22

Upcoming Conferences and Workshops

Note: The submission date has passed.

June 2022

Euro S&P 2022 7th IEEE European Symposium on Security and Privacy, Genoa, Italy, June 6 - 10, 2022. [posted here 7/19/21]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the European sibling conference of the IEEE Symposium on Security and Privacy (“Oakland”) conference. It is a premier forum for computer security and privacy research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy, as well as Systematization of Knowledge papers that systematize previous results. EuroS&P is interested in all aspects of applied computer security and privacy. We especially encourage papers that are far-reaching and risky, provided those papers show sufficient promise for creating interesting discussions and usefully questioning widely-held beliefs. This year we are expanding the scope of the symposium to include economic, ethical, legal, and social aspects and interdependencies of computer security and privacy, and especially encourage submissions that address global aspects of computer security and privacy, including issues particular to parts of the world and communities that are often neglected. We are including experts in these areas in the program committee to ensure that such papers will receive high-quality reviews from well-qualified reviewers.

For more information, please see https://www.ieee-security.org/TC/EuroSP2022/cfp.html.

EuroSP-Workshops 2022 7th IEEE European Symposium on Security and Privacy, Genoa, Italy, June 6-10, 2022. [posted here 12/6/21]
The IEEE European Symposium on Security and Privacy (Euro S&P) is the European sibling conference of the IEEE Symposium on Security and Privacy conference. It is a premier forum for computer security and privacy research, presenting the latest developments and bringing together researchers and practitioners.

Pre-conference workshops will take place on Sunday, June 5, 2022, and post-conference workshops on Saturday, June 11, 2021. A workshop associated with IEEE EuroS&P can be a half-, a full, or two days (but then split in a pre-and a post-conference part) in length. Each workshop should provide a forum to address a specific topic at the forefront of security and privacy research.

For more information, please see https://www.ieee-security.org/TC/EuroSP2022/cfw.html.

EURO CSEP 2022 1st European Workshop on Cyber Security Education and Practice, Genova, Italy, June 10, 2022. [posted here 2/7/22]
EURO CSEP 2022 aims at gathering educators from universities and professional training institutions, researchers from academia, industry, EU agencies, and security practitioners to discuss current problems and solutions, to collaborate, share knowledge and educational tools, and improve existing practices on security education. All the topics related to cybersecurity education as well as training and awareness, in any setting and with a diversity of goals, are relevant and within the scope of this workshop. In particular, the topics of interest include but are not limited to:
- Innovative teaching modalities, for example MOOCs, flipped classrooms, distance learning, security games and competitions, CTF, escape rooms, etc.; - Innovative awareness programs and cybersecurity training for high schools, professionals and non-technical audiences, for example, legal, economics, and finance professionals, etc.; - Design and implementation of tools supporting cyber security education, for example cyber ranges, etc.
For more information, please see https://sites.google.com/view/euro-csep.

SYSTOR 2022 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13 - 15, 2022. [posted here 1/31/22]
The ACM International Systems and Storage Conference (SYSTOR) is an international forum for interaction across the systems research community. The program includes innovative, peer-reviewed research papers in the broad area of systems and storage, as well as distinguished keynote lecturers, a poster session, and social events. ACM SYSTOR is designed to appeal to academic and industrial researchers and practitioners, welcoming both students and seasoned professionals. SYSTOR welcomes academic and industrial papers in systems and storage, broadly construed, including System Security and Trust. SYSTOR encourages submissions that describe results from experimental system prototypes, as well as experience papers describing practical deployments, and valuable lessons learned from them.

For more information, please see https://www.systor.org/2022.

Cloud S&P 2022 4th Workshop on Cloud Security and Privacy, Rome, Italy, June 20-23, 2022. [posted here 12/13/21]
This symposium, brings researchers and practitioners on the cloud domain to present and initiate discussion on various security and privacy attacks and their countermeasures to improve the security guarantee in a cloud ecosystem. This workshop expects submissions on new threats and countermeasures on various cloud-enabled technologies, as well as short surveys and case studies that focus on the security and privacy concerns of clouds.

Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by various serious security and privacy concerns. CLOUD S&P aims to provide a platform for researchers and practitioners to present and discuss a wide-range of security and privacy issues and their solutions to ensure better protection in a cloud ecosystem. This workshop invites submissions on new attacks and solutions on various cloud-centric technologies, as well as short surveys and case studies that shed light on the security implications of clouds. Topics of interest include, but are not limited to:
- Access Control in Clouds
- Virtual Network Security
- Privacy-Enhanced Technologies for Clouds
- Data Protection in Clouds
- Trusted Computing in Clouds
- Cloud Forensics
- Cloud Security Auditing
- Identity Management in Clouds
- Risk Analysis for Clouds
- SDN/NFV Security
- Security and Privacy of Federated Clouds and Edge Computing
- Security and Privacy of Fog Computing
- Security and Privacy of Big Data

For more information, please see https://cloudsp2022.encs.concordia.ca/.

July 2022

CAD4Sec 2022 1st CAD for Hardware Security Workshop, Co-located with ACM/IEEE DAC 2022 conference, San Francisco, CA, USA, July 10, 2022. [posted here 4/18/22]
The emerging and ever-increasing security vulnerabilities in modern and complex hardware designs, such as SoC and complex microelectronics implementations, have been studied in recent years. Aggressive time-to-market, limited knowledge of designers in terms of security, and high cost of maintaining large team, establishing security metrics, etc. have proven the need for automatic CAD solutions to aid assessment/identifying/mitigating SoC security vulnerabilities. In order to address these challenging research problems, we plan on bringing the community together, and kindly invite you as a valued member of the community to participate in it, helping to grow awareness as well as the domain of knowledge and expertise on CAD for hardware security. In this workshop, we bring together leading experts from industry, academia, and government to shed light on the need for and the recent progress on the development of automatic security CAD solutions in all levels of design abstractions. The workshop will also include demos on CAD for security tools by students and industry to detect various vulnerabilities. There will be a panel of experts in the field to discuss about the challenge and roadmap for CAD for security development. The CAD4Sec workshop will contain several technical presentations on the scope of metrics and CAD tools, including CAD for (1) power/timing side-channel vulnerability assessment, (2) fault-injection vulnerability evaluation, (3) security equivalence at different abstractions, and (4) (anti-)reverse engineering and physical assurance, and more.

For more information, please see http://cad4security.org.

SERVICES 2022 2022 IEEE World Congress on Services, Barcelona, Spain, July 10-16, 2022. [posted here 3/21/22]
SERVICES is the premier international forum for presenting and discussing the most recent and significant technical research contributions in the field of services computing. Centered around web-based services, SERVICES 2022 covers various systems and networking research pertaining to cloud, edge and IoT, as well as technologies for intelligent computing, learning, Big Data, blockchain, and digital healthcare applications, addressing critical issues such as knowledge network, high performance, security, privacy, dependability, trustworthiness, and cost-effectiveness. Particularly, the 2022 Congress will welcome papers on the aftermath and the impact of COVID-19 on services and the world infrastructure. In addition to co-located theme-topic conferences, the Congress will also include symposia supporting deep-dive discussions on emerging topics, and complement the SERVICES 2022 program with industry and application presentations and panels. Authors are invited to prepare early and submit original and unpublished papers to any of these conferences at www.easychair.org. All submitted manuscripts will be peer- reviewed by at least three reviewers. Accepted and presented papers will appear in the conference proceedings published by the IEEE Computer Society Press. SERVICES 2022 is the only premier professional event for the services computing field offered by IEEE, under the auspice of the Technical Community on Services Computing (TCSVC).

For more information, please see https://conferences.computer.org/services/2022/cfp/.

PODC 2022 41st ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25-29, 2022. [posted here 11/29/21]
The ACM Symposium on Principles of Distributed Computing is an international forum on the theory, design, analysis, implementation and application of distributed systems and networks. We solicit papers in all areas of distributed computing. Papers from all viewpoints, including theory, practice, and experimentation, are welcome. The goal of the conference is to improve understanding of the principles underlying distributed computing. Topics of interest include, but are not limited to, the following:
- biological distributed algorithms and systems
- blockchain protocols
- coding and reliable communication
- communication networks
- concurrency, synchronization, and persistence
- design and analysis of distributed algorithms
- distributed and cloud storage
- distributed and concurrent data structures
- distributed computation for large-scale data
- distributed graph algorithms
- distributed machine learning algorithms
- distributed operating systems, middleware, databases
- distributed resource management and scheduling
- fault-tolerance, reliability, self-organization, and self-stabilization
- game-theoretic approaches to distributed computing
- high-performance, cluster, cloud and grid computing
- internet applications
- languages, verification, and formal methods for distributed systems
- lower bounds and impossibility results for distributed computing
- mobile computing and autonomous agents
- multiprocessor and multi-core architectures and algorithms
- peer-to-peer systems, overlay networks, and social networks
- population protocols
- quantum and optics based distributed algorithms
- replication and consistency
- security and cryptography in distributed computing
- specifications and semantics
- system-on-chip and network-on-chip architectures
- transactional memory
- wireless, sensor, mesh, and ad hoc networks

For more information, please see https://www.podc.org.

CSR 2022 IEEE International Conference on Cyber Security and Resilience, Virtual Conference, July 27-29, 2022. [posted here 2/28/22]
The technological and industrial revolution brought by complex Cyber-Physical Systems (CPSs) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. Systems under attack, should exhibit cyber resilience, i.e. a mixture of strategies, methods, and techniques to support complex CPS adaptive capacity during cyber-attacks. The conference focuses on theoretical and practical aspects of the security, privacy, trust, and resilience of networks, systems, and services as well as novel ways for dealing with their vulnerabilities and mitigating sophisticated cyber-attacks.

For more information, please see https://www.ieee-csr.org/.

August 2022

CSET 2022 15th Cyber Security Experimentation and Test Workshop, Preceding USENIX Security Symposium 2022, Virtual, August 8, 2022. [posted here 3/28/22]
We invite you to submit your papers to the 15th Cyber Security Experimentation and Test (CSET) Workshop. For 14 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for presenting research on and discussing “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability—in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and/or demonstrably grow community resources.

For more information, please see https://cset22.isi.edu/.

USENIX-Security 2022 31st USENIX Security Symposium, Boston, MA, USA, August 10-12, 2022. [posted here 5/24/21]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:
- System security
- Network security
- Security analysis
- Machine learning security and privacy
- Data-driven security and measurement studies
- Privacy-enhancing technologies and anonymity
- Usable security and privacy
- Language-based security
- Hardware security
- Research on surveillance and censorship
- Social issues and security
- Applications of cryptography

For more information, please see https://www.usenix.org/conference/usenixsecurity22/call-for-papers.

SIGCOMM 2022 ACM SIGCOMM 2022, Amsterdam, the Netherlands, August 22-26, 2022. [posted here 11/22/21]
The ACM SIGCOMM 2022 conference seeks papers describing significant research contributions to the field of communication networks and networked systems. SIGCOMM takes a broad view of networking research, which includes (but is not limited to) the following topics:
- All types of computer networks such as mobile, wide-area, data-center, embedded, home, and enterprise networks.
- All types of wired and wireless technologies, including optics, radio, and acoustic and visible light-based communication.
- All aspects of networks and networked systems such as architecture, packet-processing hardware and software, virtualization, mobility, resource management, performance, energy consumption, topology, robustness, security, diagnosis, verification, privacy, economics, evolution, and interactions with applications.
- All types of computer network design, analysis, and experimental approaches such as theory, measurements, and machine learning-based techniques.

For more information, please see https://conferences.sigcomm.org/sigcomm/2022/.

CUING 2022 International Workshop on Criminal Use of Information Hiding, Held in conjunction with the 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria, August 23-26, 2022. [posted here 2/14/22]
With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods, cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. This poses a lot of new challenges for digital forensics analysts, academics, law enforcement agencies (LEAs), and security professionals.

The aim of the International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding. However, data hiding is understood here in a wider manner than in the academic world, i.e., all techniques that pertain to camouflaging/masking/hiding various types of data (e.g. identities, behavior, communication, etc.) are included here. This means not only digital steganography/covert channels, but also obfuscation/anti-forensics techniques and even underground networks (darknets) or activities related to behavior impersonation or mimicking. This will allow presenting a more complete picture on novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

Moreover, this year the CUING workshop is co-organized with the SIMARGL (Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware) H2020 project.

For more information, please see https://www.ares-conference.eu/workshops/cuing-2022/.

September 2022

SCN 2022 13th Conference on Security and Cryptography for Networks, Amalfi, Italy, September 12-14, 2022. [posted here 1/24/22]
The Thirteenth Conference on Security and Cryptography for Networks (SCN 2022) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

For more information, please see https://scn.unisa.it/.

SEED 2022 IEEE International Symposium on Secure and Private Execution Environment Design, Virtual, September 26-27, 2022. [posted here 4/11/22]
The IEEE International Symposium on Secure and Private Execution Environment Design (SEED) is a forum which brings together researchers from the computer architecture and computer security communities into one venue that focuses on the design of architectural and system primitives which provide secure and private execution environments for applications, containers, or virtual machines. SEED primarily focuses on research topics spanning across the boundaries of computer architecture, systems, and security. Papers are solicited on a range of topics, including (but not limited to):
- Architecture, operating systems, and programming models and language for supporting secure and private execution
- Novel Designs for secure and private execution environments for GPUs, accelerators, and FPGAs
- Architectural support for new security primitives
- Novel cryptographic hardware designs for secure and private execution
- Models and analysis of performance-security trade-offs in the design of a secure execution environment
- Evaluation of security vulnerabilities in post-Moore’s Law technologies, e.g. persistent memory, quantum computing
- Demonstration and mitigation of architectural side channels, covert channels and other security vulnerabilities
- Metrics for measuring architecture-related security vulnerabilities
- Compiler and code generation techniques for mitigating architecture-induced side and covert channels and other vulnerabilities

For more information, please see https://seed22.engr.uconn.edu.

ISC2 2022 8th IEEE International Smart Cities Conference, Paphos, Cyprus, September 26-29, 2022. [posted here 4/4/22]
IEEE ISC2 is the flagship conference sponsored by the IEEE Smart Cities Technical Community, a coalition of six IEEE technical societies and organizations. Besides contributions addressing the conference theme, authors are welcome to submit their original research results in traditional topics across broad application and functional domains, within the context of smart urban infrastructure systems. Safety and security systems are partly the topics of interests.

For more information, please see https://attend.ieee.org/isc2-2022/call-for-papers/.

October 2022

SecureComm 2022 18th EAI International Conference on Security and Privacy in Communication Networks, Kansas City, USA, October 17-19, 2022. [posted here 1/24/22]
SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 18th SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass ALL areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

For more information, please see https://securecomm.eai-conferences.org/2022/.

November 2022

ACM CCS 2022 ACM CCS 2022, Los Angeles, U.S.A, November 7-11, 2022. [posted here 1/24/22]
The 29th ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

For more information, please see https://sigsac.org/ccs/CCS2022/call-for-papers.html.

ISPEC 2022 International Conference on Information Security Practice and Experience, Taipei, Taiwan, November 23-25, 2022. [posted here 2/14/22]
The ISPEC is an annual conference that brings together researchers, scholars and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. The ISPEC 2022 conference solicits theoretical, methodological and experimental research reporting original and unpublished results on information security. For all editions, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series.

For more information, please see https://ispec2022.ndhu.edu.tw/.

December 2022