Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:1/26/26

Upcoming Conferences and Workshops

Note: The submission date has passed.

February 2026

NDSS 2026 Network and Distributed System Security, San Diego, CA, USA, February 23-27, 2026. [posted here 4/14/25]
The Network and Distributed System Security (NDSS) Symposium is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS Symposium 2026 and co-located workshops will take place in San Diego, CA, from 23 to 27 February 2026. The target audience includes everyone interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS Symposium 2026. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first page of the paper. The authors are thus free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see https://www.ndss-symposium.org/ndss2026/submissions/call-for-papers/.

March 2026

SaTML 2026 4th IEEE Conference on Secure and Trustworthy Machine Learning, Munich, Germany, March 23-25, 2026. [posted here 7/7/25]
IEEE SaTML expands upon the theoretical and practical understandings of vulnerabilities inherent to machine learning (ML), explores the robustness of learning algorithms and systems, and aids in developing a unified, coherent scientific community aiming to establish trustworthy machine learning. Topics of interest include (but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation

For more information, please see https://satml.org/.

April 2026
May 2026

HOST 2026 19th IEEE International Symposium on Hardware Oriented Security and Trust, Washington DC, USA, May 4-7, 2026. [posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance. HOST 2026 invites original contributions in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security, AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs, post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection, side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture, blockchain, and cryptocurrency security.

For more information, please see https://host.conferences.computer.org/2026/.

SP 2026 47th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 18 - 21, 2026. [posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

Symposium Event (Important Changes): The number of papers accepted to IEEE S&P continues to grow substantially each year. Due to conference venue limitations and costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes, length determined based on the number of accepted papers) and (b) a poster presentation immediately following the talk session containing the paper. All accepted papers are required to present both a short talk and a poster.

For more information, please see https://sp2026.ieee-security.org/cfpapers.html.

June 2026

ACM ASIACCS 2026 21st ACM ASIA Conference on Computer and Communications Security, Bangalore, India, June 1-5, 2026. [posted here 10/20/25]
ACM ASIACCS seeks paper submissions presenting novel contributions related to all real-world aspects of security and privacy. We seek articles presenting accessible and compelling results to general computer security researchers. Purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same applies for submissions focusing primarily on blockchains or machine learning. As in previous years, we will also be accepting “Systemisation of Knowledge” (SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the submission form. They will be accepted based on the value to the community. Survey papers without insights evaluating, systematizing and contextualizing current knowledge will be rejected.

For more information, please see https://asiaccs2026.cse.iitkgp.ac.in/call-for-papers/.

ICBC 2026 8th IEEE International Conference on Blockchain and Cryptocurrency, Brisbane, Australia, June 1-5, 2026. [posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026), sponsored by the IEEE Communications Society, has established itself as the flagship annual conference in blockchain research, maintaining the highest standards of academic excellence. We invite original, unpublished submissions in all areas of blockchain and cryptocurrency research. In addition to established topics, ICBC 2026 welcomes emerging directions such as Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical) Internet Infrastructure.

For more information, please see https://icbc2026.ieee-icbc.org/.

CODASPY 2026 16th ACM Conference on Data and Application Security and Privacy, Frankfurt am Main, Germany, June 23 - 25, 2026. [posted here 12/22/25]
With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

CODASPY will follow the ACM Policy Against Harassment at ACM Activities. Please familiarize yourself with ACM Policy Against Harassment and guide to Reporting Unacceptable Behavior. As a published ACM author, you and your co-authors will be subject to all ACM Publications Policies, including ACM's new Publications Policy on Research Involving Human Participants and Subjects. Please make sure your submission complies with all the ACM publication policies.

For more information, please see https://www.codaspy.org/2026/.

July 2026
August 2026