| |
Calls for Papers
Last Modified:1/26/26
Upcoming Conferences and Workshops
Note: The submission date has passed.
February 2026
NDSS 2026
Network and Distributed System Security,
San Diego, CA, USA, February 23-27, 2026.
[posted here 4/14/25]
The Network and Distributed System Security (NDSS) Symposium is a top venue that fosters
information exchange among researchers and practitioners of network and distributed system security. The NDSS
Symposium 2026 and co-located workshops will take place in San Diego, CA, from 23 to 27 February 2026. The
target audience includes everyone interested in practical aspects of network and distributed system security,
with a focus on system design and implementation. A major goal is to encourage and enable the Internet community
to apply, deploy, and advance the state of practical security technologies.
This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their
paper in a way that makes the results accessible and compelling to a general security researcher. All
submissions will be reviewed by the Program Committee and accepted submissions will be published by the
Internet Society in the Proceedings of NDSS Symposium 2026. The Proceedings will be made freely accessible
from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for
noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first
page of the paper. The authors are thus free to post the camera-ready versions of their papers on their
personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly
prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2026/submissions/call-for-papers/.
March 2026
SaTML 2026
4th IEEE Conference on Secure and Trustworthy Machine Learning,
Munich, Germany, March 23-25, 2026.
[posted here 7/7/25]
IEEE SaTML expands upon the theoretical and practical understandings of
vulnerabilities inherent to machine learning (ML), explores the robustness of learning
algorithms and systems, and aids in developing a unified, coherent scientific community
aiming to establish trustworthy machine learning. Topics of interest include
(but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation
For more information, please see
https://satml.org/.
April 2026
May 2026
HOST 2026
19th IEEE International Symposium on Hardware Oriented Security and Trust,
Washington DC, USA, May 4-7, 2026.
[posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier
symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008,
HOST has served as the globally recognized event for researchers and practitioners to advance knowledge
and technologies related to hardware security and assurance. HOST 2026 invites original contributions
in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security,
AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic
techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs,
post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection,
side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution
environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT
security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture,
blockchain, and cryptocurrency security.
For more information, please see
https://host.conferences.computer.org/2026/.
SP 2026
47th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 18 - 21, 2026.
[posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix “SoK:” in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Symposium Event (Important Changes): The number of papers accepted to IEEE
S&P continues to grow substantially each year. Due to conference venue limitations and
costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes,
length determined based on the number of accepted papers) and (b) a poster presentation
immediately following the talk session containing the paper. All accepted papers
are required to present both a short talk and a poster.
For more information, please see
https://sp2026.ieee-security.org/cfpapers.html.
June 2026
ACM ASIACCS 2026
21st ACM ASIA Conference on Computer and Communications Security,
Bangalore, India, June 1-5, 2026.
[posted here 10/20/25]
ACM ASIACCS seeks paper submissions presenting novel contributions related to
all real-world aspects of security and privacy. We seek articles presenting accessible and
compelling results to general computer security researchers. Purely theoretical (e.g.,
cryptography-focused, with no security/application connections) submissions are not
encouraged. The same applies for submissions focusing primarily on blockchains or
machine learning. As in previous years, we will also be accepting “Systemisation of Knowledge”
(SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the
submission form. They will be accepted based on the value to the community. Survey papers
without insights evaluating, systematizing and contextualizing current knowledge will be rejected.
For more information, please see
https://asiaccs2026.cse.iitkgp.ac.in/call-for-papers/.
ICBC 2026
8th IEEE International Conference on Blockchain and Cryptocurrency,
Brisbane, Australia, June 1-5, 2026.
[posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026),
sponsored by the IEEE Communications Society, has established itself as the flagship annual
conference in blockchain research, maintaining the highest standards of academic excellence.
We invite original, unpublished submissions in all areas of blockchain and cryptocurrency
research. In addition to established topics, ICBC 2026 welcomes emerging directions such as
Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical)
Internet Infrastructure.
For more information, please see
https://icbc2026.ieee-icbc.org/.
CODASPY 2026
16th ACM Conference on Data and Application Security and Privacy,
Frankfurt am Main, Germany, June 23 - 25, 2026.
[posted here 12/22/25]
With rapid global penetration of the Internet and smart phones and the
resulting productivity and social gains, the world is becoming increasingly dependent
on its cyber infrastructure. Criminals, spies and predators of all kinds have learned
to exploit this landscape much quicker than defenders have advanced in their technologies.
Security and Privacy has become an essential concern of applications and systems throughout
their lifecycle. Security concerns have rapidly moved up the software stack as the
Internet and web have matured. The security, privacy, functionality, cost and usability
tradeoffs necessary in any practical system can only be effectively achieved at the data
and application layers. This conference provides a dedicated venue for high-quality
research in this arena, and seeks to foster a community with this focus in cyber security.
CODASPY will follow the ACM Policy Against Harassment at ACM Activities. Please familiarize yourself
with ACM Policy Against Harassment and guide to Reporting Unacceptable Behavior. As a published ACM
author, you and your co-authors will be subject to all ACM Publications Policies, including
ACM's new Publications Policy on Research Involving Human Participants and Subjects. Please
make sure your submission complies with all the ACM publication policies.
For more information, please see
https://www.codaspy.org/2026/.
July 2026
August 2026
|