Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:10/6/25

Upcoming Conferences and Workshops

Note: The submission date has passed.

October 2025

ACM CCS 2025 32nd ACM Conference on Computer and Communications Security, Taipei, Taiwan, October 13-17, 2025. [posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper. Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference if at all possible. Please note that ACM CCS will strictly follow and enforce the policies and rules about Conflicts of Interest and Peer-Review Integrity.

For more information, please see https://www.sigsac.org/ccs/CCS2025/call-for-papers/.

WPES 2025 24th Workshop on Privacy in the Electronic Society, Held in conjunction with ACM CCS 2025, Taipei, Taiwan, October 13, 2025. [posted here 7/14/25]
The need for privacy-aware policies, regulations, and techniques has been widely recognized. This workshop discusses the problems of privacy in the global interconnected societies and possible solutions. The 2025 Workshop, held in conjunction with the ACM CCS conference, is the 24th in a yearly forum for papers on all the different aspects of privacy in today's electronic society. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues.

For more information, please see http://jianying.space/WPES2025/.

SecDev 2025 IEEE Secure Development Conference, Indianapolis, IN, October 14-16, 2025. [posted here 9/24/25]
SecDev​ ​is​ ​a​ ​venue​ ​for​ ​presenting​ ​ideas,​ ​research,​ ​and​ ​experience​ ​about​ ​ how​ ​to​ ​develop​ ​secure systems. It focuses on theory,​ ​techniques,​ ​and​ ​tools​ ​to ​ “build​ ​security​ ​in” to​ ​existing​ ​and​ ​new​ ​computing​ ​systems, and does not focus on simply discovering​ ​the​ ​absence​ ​of​ ​security.​ The​ ​goal of SecDev​ ​is​ ​to encourage​ ​and​ ​disseminate​ ​ideas​ ​for​ ​secure​ ​system​ ​development​ ​ among​ ​academia,​ ​industry, and​ ​government.​ ​It​ ​aims​ ​to bridge ​the​ ​gap​ ​between​ ​ constructive​ ​security​ ​research​ ​and​ ​practice and​ to ​enable​ ​the real-world​ ​impact​ ​of security research in​ ​the​ ​long​ ​run. ​Developers​ ​have​ ​valuable​ ​experiences​ ​and​ ​ideas​ ​that​ ​ can​ ​inform​ ​academic research,​ ​and​ ​researchers​ ​have​ ​concepts,​ ​studies,​ ​and​ ​even​ ​code​ ​and​ ​ tools​ ​that​ ​could​ ​benefit developers.​ ​Great​ ​SecDev​ ​contributions​ ​could​ ​come​ ​from​ ​attendees​ ​ of​ ​industrial​ ​conferences like​ ​AppSec and​ ​RSA;​ ​from​ ​attendees​ ​of​ ​academic​ ​conferences​ ​ like IEEE​ ​S&P,​ ​IEEE​ ​CSF,​ ​USENIX​ ​Security, CCS, ​​NDSS, PLDI,​ ICSE, ​FSE,​ ​ISSTA,​ ​SOUPS, HOST,​ ​and​ ​others;​ ​and​ ​from newcomers.

We solicit research and experience papers on a broad range of topics relating to secure systems development. Examples​ ​of​ ​topics​ ​that​ ​are​ ​in​ ​scope​ ​include:​ ​​ the development of libraries,​ ​tools,​ ​or​ ​processes​ to ​produce​ ​systems​ ​resilient​ ​ to​ ​certain​ ​attacks;​ ​formal foundations that underpin​ ​a​ ​language,​ ​tool,​ ​or​ ​testing​ ​ strategy​ to ​improve​ ​security;​ ​techniques that​ ​drastically​ ​improve​ ​the​ ​scalability​ ​ of​ ​security​ ​solutions​ ​for​ ​practical​ ​deployment;​ ​and experience,​ ​designs,​ ​or​ ​ applications​ ​showing​ ​how​ ​to​ ​apply​ ​cryptographic​ ​techniques​ ​effectively to​ ​secure​ ​systems. SecDev also ​seeks hands-on​ ​and​ ​interactive tutorials​ ​on​ security-focused​ ​processes,​ ​ frameworks,​ ​languages,​ ​and​ ​tools.​ ​The​ ​goal​ ​is​ ​to​ ​share​ ​knowledge​ ​on​ ​the experience,​ ​art​ ​ and​ ​science​ ​of​ ​secure​ ​systems development.​

NEW THIS YEAR! We welcome submissions of Systematization of Knowledge (SoK) papers that evaluate, organize, and contextualize existing knowledge. Submissions must include the prefix “SoK: ” in the title.

For more information, please see https://secdev.ieee.org/2025/home/.

MarCaS 2025 3rd LCN Special Track on Maritime Communication and Security, Held in conjunction with the 50th Annual IEEE Conference on Local Computer Networks (IEEE LCN 2025), Sydney, Australia, October 14-16, 2025. [posted here 3/17/25]
The MarCaS Special Track will help bring together research groups working at the intersection of maritime applications, communications technologies, and protocols, as well as IT and network security to share and discuss ideas, novel solutions, challenges, and recent developments. The workshop solicits high quality and previously unpublished work in the maritime domain and the research field of the LCN to stimulate novel approaches for a safer and more resilient shipping. Join us for this exciting and timely Special Track at the Local Computer Network Conference.

For more information, please see https://garykessler.net/lcn_marcas/.

ASHES 2025 9th Workshop on Attacks and Solutions in Hardware Security, Held in conjunction with ACM CCS 2025, Taipei, Taiwan, October 17, 2025. [posted here 6/23/25]
ASHES deals with all aspects of hardware security, including both theory and practice, and welcomes any contributions in this area. Besides traditional topics, it also invites novel methods and emerging applications: This includes new attack vectors, novel designs and materials, lightweight security primitives, nanotechnology, and PUFs, as well as the internet of things, automotive security, smart homes, or pervasive and wearable computing. The workshop will include several technical sessions and two invited keynotes by some leading colleagues in hardware security. All accepted ASHES papers will be published the ASHES Workshop Proceedings in the ACM Dlgital library. To account for the special nature of hardware security as a rapidly developing discipline, ASHES hosts four different categories of papers: Classical full papers; short papers; wild and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially game-changing novel ideas); and systematization of knowledge (SoK) papers (which overview, structure, and categorize a certain subarea).

For more information, please see https://ashesworkshop.online/.

QSec 2025 ACM QSec: Quantum Security and Privacy Workshop, Held in conjunction with ACM CCS 2025, Taipei, Taiwan, October 17, 2025. [posted here 7/7/25]
The inaugural Quantum Security and Privacy (QSec) Workshop invites contributions at the intersection of quantum technologies and security and privacy, with a particular focus on securing end-to-end systems and safeguarding data and code in the quantum computing era. The workshop will explore both the evolving landscape of quantum threats (posed by adversaries with quantum computing or sensing capabilities) and the expanding landscape of threats to quantum technologies (posed by classical or quantum adversaries). Participants will also present countermeasures and innovative solutions—ranging from hybrid cryptographic schemes to protocols protecting fragile near-term quantum systems.

For more information, please see https://acm-qsec.com/.

AICCSA 2025 22nd ACS/IEEE International Conference on Computer Systems and Applications, Doha, Qatar, October 19-22, 2025. [posted here 6/2/25]
The ACS/IEEE International Conference on Computer Systems and Applications (AICCSA) is the premier conference covering all contemporary areas in computer systems and applications. It implements an international forum for academics, industry researchers, developers, and practitioners to report and share groundbreaking contributions in various IT fields that range from distributed computing to data science, security and machine learning.

For more information, please see https://conferences.sigappfr.org/aiccsa2025/.

APF 2025 Annual Privacy Forum, Frankfurt a.M., Germany, October 22-23, 2025. [posted here 5/26/25]
The EU legal framework on personal data protection is key in an effort to better control the processing of personal data while ensuring an adequate level of protection. Even the best legislative efforts cannot keep up to speed with the pace of innovative technology and business models that challenge the way personal data is processed and privacy is protected across the EU and beyond; therefore, examining what is at stake and where threats thereto originate from becomes of paramount importance. Against this background, RSAC™ Conference, ENISA, DG Connect, Goethe-University Frankfurt, and Karlstad University jointly organize the Annual Privacy Forum (APF) 2025 in Frankfurt a.M., Germany. In APF 2025, we invite papers presenting original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement. An inter-disciplinary approach is high in demand to contribute to bridging the gap between research, business models and policy, much like proposing new models and interpretations. APF 2025 seeks original contributions from researchers and academia, policy makers and implementers, data protection authorities, industry, consultants, NGOs, as well as civil society. Full research papers need to be genuine in content and should not overlap with work published elsewhere. Opinion papers are expected to reflect the views of the author(s). Submissions can be up to 8000 words, excluding bibliography and well-marked appendices.

For more information, please see https://privacyforum.eu/.

XRSecurity 2025 Workshop on Security, Privacy, and Trust in Extended Reality Systems, Held in conjunction with ACM MobiHoc 2025, Houston, TX, USA, October 27-30, 2025. [posted here 6/9/25]
Extended Reality (XR) is a comprehensive term that includes Augmented Reality (AR), Mixed Reality (MR), and Virtual Reality (VR). XR bridges physical and digital worlds, creating interactive, immersive experiences that merge with the real world. It offers numerous applications across education, training, manufacturing, collaborative 3D design, art, and multiplayer gaming. Despite these benefits, XR systems introduce unique security, privacy, and trust challenges due to the intimate connection between users, their XR devices, and their immediate environments. The potential attacks can involve information flooding to induce latency and physical discomfort, injecting misleading virtual content to distract or deceive users, subverting personal area networks to create confusion, spoofing alarms, assessing user status through eye tracking, and accessing onboard cameras to gather environmental information without the user's awareness. Additionally, XR apps can access sensitive real-time inputs like eye gaze, head movement, hand gestures, and even biosignals, and users' immediate environment. These signals, while critical for immersive experiences, open up novel attack surfaces such as keystroke inference, emotional profiling, and behavioral tracking. This workshop will explore the security, privacy, and trust challenges in XR systems, along with potential solutions.

For more information, please see https://xrsecurity.github.io/2025/.

ICICS 2025 27th International Conference on Information and Communications Security, Nanjing, China, October 29-31, 2025. [posted here 3/3/25]
The ICICS conference started in 1997 and aims at bringing together researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to information and communications security. The conference seeks submissions presenting novel contributions related to information and communication security. Springer sponsors ICICS 2025 with 1000 EUR for a Best Paper Award and a Best Student Paper Award.

For more information, please see https://www.icics2025.org/index.html.

November 2025

APWG eCrime 2025 20th APWG Symposium on Electronic Crime Research, San Diego, CA, USA, November 4-7, 2025. [posted here 3/17/25]
The 2025 Symposium on Electronic Crime Research (eCrime 2025) will examine essential factors for managing the impacts of the global cybercrime plexus to secure IT users, commercial enterprises, governments, critical infrastructure, and operational technologies. eCrime 2025 will be the 20th annual peer-reviewed, publishing symposium hosted by APWG. This year, eCrime 2025 inaugurates a dimensional extension of the symposium's purview to include research on cyber-physical crimes. From 2025 forward, eCrime will specifically solicit research on cybercrimes involving cyber-physical systems and operational technologies abused in the furtherance of any crime. This expands eCrime's scope from purely cyber (digital) crimes to include those that manifest abuse against physical spaces, such as homes, commercial enterprises, scientific or military facilities, roadways, public spaces, critical infrastructure and devices (e.g. IoT, electro-mechanical controllers, sensors, etc.). With the rise of cyber attacks inflicting physical damage - as exhibited in the Stuxnet attacks, the cyber incursions against the Ukrainian electrical grid a decade ago and the Colonial pipeline shutdown - as well as the rapid evolution of malware designed to manipulate SCADA and ICS process control technologies, it w as clear eCrime's CFP scope had to be expanded once more to maintain relevance to the contemporary cyber threatscape.

For more information, please see https://apwg.org/events/ecrime2025.

TPS 2025 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, Pittsburgh, PA, USA, November 11-14, 2025. [posted here 7/21/25]
Recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber-physical-social systems, Artificial Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Such newer technologies and paradigms are getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities. It is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society. IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS-ISA) is an international multidisciplinary forum for presentation of state-of-the-art innovations, and discussion among academic, industrial researchers, and practitioners on issues related to trust, privacy and security in emerging smart and intelligent systems and applications.

For more information, please see https://www.sis.pitt.edu/lersais/conference/tps/2025/.

TPHAC 2025 IEEE Workshop on Trustworthy and Privacy-Preserving Human-AI Collaboration, Co-located with IEEE International Conference on CIC/TPS/CogMI, Pittsburgh, PA, USA, November 11-14, 2025. [posted here 7/21/25]
This workshop explores the evolving relationship between humans and AI systems, with a focus on fostering trustworthy and privacy-preserving collaboration. As AI capabilities grow and its presence in daily life expands, it is essential that these systems align with human values to remain responsible, effective, and secure. Although human-AI collaboration offers significant potential for enhanced decision-making and societal benefit, it also raises critical challenges, such as privacy risks, trust and safety concerns, and cybersecurity threats across diverse domains. Our goal is to foster interdisciplinary dialogue and shape a roadmap for effective and trustworthy human-AI collaboration. We invite contributions that bridge the gap between machine intelligence and human understanding, particularly in shared decision-making scenarios. The workshop promotes the development of adaptive, hybrid, and emerging AI systems that respond to dynamic contexts while respecting human agency and enhancing human capabilities. We welcome insights from user studies and the design of collaborative frameworks that strengthen trust, transparency, privacy, and security. We also encourage discussions addressing key questions such as: What methods and metrics are needed to evaluate human-AI teams effectively? What factors influence trust, performance, and responsible AI deployment?

For more information, please see https://sites.google.com/pitt.edu/tphac/home.

CANS 2025 24th International Conference on Cryptology and Network Security, Osaka, Japan, November 17-20, 2025. [posted here 4/14/25]
The International Conference on Cryptology and Network Security (CANS) is a premier forum for presenting research in the field of cryptology and network security. The conference seeks academic, industry, and government submissions on all theoretical and practical aspects of cryptology and network security, and its extended domains in modern computing systems.

For more information, please see https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html.

FPS 2026 18th International Symposium on Foundations & Practice of Security, Brest, France, November 25-27, 2025. [posted here 9/15/25]
FPS invites researchers and practitioners from all countries working in security, privacy, cyber resilience, and related areas to participate in the event. Protecting the data and the infrastructure of an increasingly interconnected world has become vital to the normal functioning of all aspects of our daily life. Security, privacy and cyber resilience have emerged as scientific research fields whose multifaceted complexities deserve the attention and synergy of various communities such as mathematics, computer science, information systems, networks, management, and criminology. Alongside technical topics, for the 18th edition, special care will be given to AI-based innovation, applications to transports systems and critical infrastructures. The aim of FPS is to discuss and exchange theoretical and practical ideas that address privacy, security and cyber resilience issues in interconnected systems. FPS aims to provide scientific presentations and to promote scientific collaboration, joint research programs, and student exchanges between stakeholders and participants involved in this fast-moving field.

For more information, please see https://hub.imt-atlantique.fr/fps2025.

December 2025

ACSAC 2025 41th Annual Computer Security Applications Conference, Honolulu, Hawaii, USA, December 8-12, 2025. [posted here 4/14/25]
The Annual Computer Security Applications Conference (ACSAC) brings together leading researchers and practitioners, along with a diverse group of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest cybersecurity results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technologies. As an internationally recognized forum where researchers, practitioners, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we invite you to submit your work. In addition to peer-reviewed papers on novel applied research, we also welcome case studies on real-world applications, panels featuring world experts, and workshops consisting of 1-2 day sessions on hot cybersecurity and privacy topics.

For more information, please see https://www.acsac.org.

HealthSec 2025 Workshop on Cybersecurity in Healthcare, Co-located with the Annual Computer Security Applications Conference (ACSAC41), Honolulu, HI, USA, December 9, 2025. [posted here 6/2/25]
In its most basic form, healthcare is gathering data, interpreting data into information, and transforming information into current human knowledge that can be acted upon, with each of these stages open to unintended errors and/or malicious subversion. These stages do not occur within a vacuum but rather within our existing infrastructures and social system with all their current limitations, systemic bias, and exploitable vulnerabilities. While a similar characterization can be made about security in other applied domains, healthcare is undergoing a dramatic transformation, arguably the next technological revolution, presenting immediate opportunities for improvement along with corresponding challenges in security.

Our desire is to bring together diverse researchers from academia, government, and the healthcare industry to report on the latest research efforts. As this is the second workshop following a first workshop that exceeded all expectations, we want to continue momentum toward encouraging, jumpstarting, and growing excellent interdisciplinary contributions at the forefront of cybersecurity in healthcare research. Papers with demonstrated results will be given priority.

For more information, please see https://publish.illinois.edu/healthsec2025/.

ICISS 2025 21st International Conference on Information Systems Security, Indore, India, December 16-20, 2025. [posted here 4/14/25]
ICISS is a premier international conference on information security and privacy. The ICISS conference provides a dynamic platform for researchers, academicians, and industry professionals worldwide to discuss and explore advancements in cybersecurity, cryptography, system security, and hardware security. Since its inception in 2005, the conference has fostered impactful research collaborations, addressing emerging security challenges in computing and information systems. With keynote talks by leading experts, technical paper presentations, hands-on workshops, and panel discussions, ICISS 2025 aims to facilitate knowledge exchange and shape the future of digital security.

For more information, please see https://iciss.isrdc.in.

January 2026

IFIP 119 DF 2026 22nd Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 5-6, 2026. [posted here 6/9/25]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Twenty-Second Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately 60 participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume – the twenty-second volume in the well-known Research Advances in Digital Forensics book series (Springer, Cham, Switzerland) during the summer of 2026.

For more information, please see http://www.ifip119.org/.

February 2026

NDSS 2026 Network and Distributed System Security, San Diego, CA, USA, February 23-27, 2026. [posted here 4/14/25]
The Network and Distributed System Security (NDSS) Symposium is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS Symposium 2026 and co-located workshops will take place in San Diego, CA, from 23 to 27 February 2026. The target audience includes everyone interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS Symposium 2026. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first page of the paper. The authors are thus free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see https://www.ndss-symposium.org/ndss2026/submissions/call-for-papers/.

March 2026

SaTML 2026 4th IEEE Conference on Secure and Trustworthy Machine Learning, Munich, Germany, March 23-25, 2026. [posted here 7/7/25]
IEEE SaTML expands upon the theoretical and practical understandings of vulnerabilities inherent to machine learning (ML), explores the robustness of learning algorithms and systems, and aids in developing a unified, coherent scientific community aiming to establish trustworthy machine learning. Topics of interest include (but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation

For more information, please see https://satml.org/.

April 2026
May 2026