|
Calls for Papers
Last Modified:7/28/25
Upcoming Conferences and Workshops
Note: The submission date has passed.
August 2025
CSR 2025
IEEE International Conference on Cyber Security and Resilience,
Chania, Crete, Greece, August 4-6, 2025.
[posted here 3/3/25]
The IEEE International Conference on Cyber Security and Resilience (IEEE CSR)
is an annual event sponsored by the IEEE Systems, Man, and Cybernetics (SMC) Society.
The technological and industrial revolution brought by complex cyber-physical systems
(CPS) comes with new threats and cyber-attacks that exploit their inherent complexity
and heterogeneity. These attacks have a significant negative impact on the operation
of various services in critical sectors, like energy, transport, and communications,
which provide the vital functions that our societies depend upon.
The conference focuses on theoretical and practical aspects of the security,
privacy, trust, and resilience of networks, systems, and services as well as
novel ways for dealing with vulnerabilities and mitigation of sophisticated
cyber-attacks.
For more information, please see
https://www.ieee-csr.org/.
ARES 2025
20th International Conference on Availability, Reliability and Security,
Ghent, Belgium, August 10-13, 2025.
[posted here 12/23/24]
ARES highlights the various aspects of dependability – with special focus
on the crucial linkage between availability, reliability and security. ARES aims at a full
and detailed discussion of the research issues of dependability as an integrative concept
that covers amongst others availability, safety, confidentiality, integrity, maintainability
and security in the different fields of applications. ARES emphasizes the interplay between
foundations and practical issues of dependability in emerging areas such as e-government,
m-government, location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination and research
challenges of the various aspects of Dependable Computing and the definition of a future road map.
The ARES 2025 proceedings will be published in Springer Lecture Notes on Computer Science.
For more information, please see
https://2025.ares-conference.eu/.
EDId 2025
2nd International Workshop on Emerging Digital Identities,
Co-located with the 20th International Conference on Availability, Reliability
and Security (ARES 2025),
Ghent, Belgium, August 11-14, 2025.
[posted here 2/10/25]
The identity environment has evolved into a complex ecosystem demanding
seamless interoperability, stronger security measures, and user-centric experiences
in an increasingly interconnected digital world. Addressing these difficulties
necessitates collaboration among scholars and practitioners from diverse disciplines,
establishing an interdisciplinary approach critical for shaping the future of identity
management. EDId navigates various security, privacy, and legal compliance issues,
addressing technical issues like security and interoperability and legal and regulatory
considerations like data protection and privacy.
For more information, please see
https://2025.ares-conference.eu/program/edid/.
ENS 2025
8th International Workshop on Emerging Network Security,
Co-located with the 20th International Conference on Availability, Reliability
and Security (ARES 2025),
Ghent, Belgium, August 11-14, 2025.
[posted here 4/21/25]
With the great success and development of 5G & beyond systems and other
emerging concepts (e.g. 6G) a continued effort toward rich ubiquitous communication
infrastructure, promising wide range of high-quality services is desired. It is envisioned
that communication in emerging networks will offer significantly greater data bandwidth
and almost infinite capability of networking resulting in unfaltering user experiences for,
among others: virtual/augmented reality, massive content streaming, telepresence, user-centric
computing, crowded area services, smart personal networks, Internet of Things (IoT), smart
buildings and smart cities.
The communication in 5G networks and beyond is currently in the center of attention of
industry, academia, and government worldwide. Emerging network concepts drive many new
requirements for different network capabilities. As future networks aim at utilizing
many promising network technologies, such as Software Defined Networking (SDN), Network
Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing or
Cloud Computing and supporting a huge number of connected devices integrating above
mentioned advanced technologies and innovating new techniques will surely bring tremendous
challenges for security, privacy and trust. Therefore, secure network architectures,
mechanisms, and protocols are required as the basis for emerging networks to address
these issues and follow security-by-design approach. Finally, since in current and
future networks even more user data and network traffic will be transmitted, big data
security solutions should be considered in order to address the magnitude of the data
volume and ensure data security and privacy.
From this perspective, the ENS 2025 workshop aims at collecting the most relevant
ongoing research efforts in emerging network security field. It also serves as a
forum for 5G & beyond projects in order to disseminate their security-related results
and boost cooperation, also foster development of the 5G and beyond Security Community
made of 5G security experts and practitioners who pro-actively discuss and share
information to collectively progress and align on the field. Last but not least it
also aims to bridge 5G & Beyond community with other communities (e.g. AI) that are
key to support full attainment of 5G & Beyond but also 6G promises and so for those
technologies to release their full potential
For more information, please see
https://2025.ares-conference.eu/program/ens/.
CUING 2025
9th International Workshop on Cyber Use of Information Hiding,
Co-located with the 20th International Conference on Availability, Reliability
and Security (ARES 2025),
Ghent, Belgium, August 11-14, 2025.
[posted here 4/21/25]
The increasing number of Internet users, availability of storage and network
resources, and proliferation of as-a-Service frameworks, leads to a new-wave of offensive
campaigns targeting the virtual world. With the diffusion of improved defensive methods,
attackers now utilize more and more sophisticated techniques to perform their malicious
activities. In recent years, information hiding has emerged as one of the most sophisticated
and effective mechanisms for launching attacks. Threat actors now regularly use information
hiding to elude countermeasures and prevent reversing the attack chain. More recently,
hiding techniques have been deployed to create covert channels, i.e., parasitic communications
paths nested in network traffic and digital objects, mainly to cloak command & control
communications. Unfortunately, detection and mitigation of threats taking advantage of
information hiding are hard tasks that pose many new challenges for digital forensics
analysts, academics, law enforcement agencies, and security professionals.
The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to
bring together researchers, practitioners, law enforcement representatives, and security
professionals in the area of analysis of information hiding techniques when used in
cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop
are not limited to classic digital steganography applications or the creation and
mitigation of covert communications. Therefore, CUIng also welcomes works that pertain
to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of
processes, and communication flows. To present a more complete picture of the novel
research on hiding methods and their utilization by the attackers, submissions dealing
with impersonation or mimicking are encouraged as well, especially to address
information hiding in a complete manner, for instance, to discuss ideas for fighting
misuse of privacy-enhancing technologies.
For more information, please see
https://2025.ares-conference.eu/program/cuing/.
USENIX Security 2025
34th USENIX Security Symposium,
Seattle, WA, USA, August 13-15, 2025.
[posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners,
system programmers, and others interested in the latest advances in the security and
privacy of computer systems and networks. The 2025 edition of USENIX Security will
implement a new approach to presenting accepted papers and fostering interactions
at the conference. The USENIX Security '25 program co-chairs and the USENIX Security
steering committee have prepared a public RFC about the plans for this new model
and welcome thoughts from the USENIX Security community by April 22, 2024.
For more information, please see
https://www.usenix.org/conference/usenixsecurity25.
PST 2025
22nd Annual International Conference on Privacy, Security & Trust,
Fredericton, Canada, August 26-28, 2025.
[posted here 2/17/25]
The Annual International Conference on Privacy, Security & Trust (PST)
provides a premier forum for sharing advances in cybersecurity research and security
applications. PST2025 will be held in person in Fredericton, Canada, and will offer
three days of keynotes, technical presentations, posters, special sessions, and an
Industrial day with a vendor exhibition.
For more information, please see
http://pstnet.ca.
September 2025
SICSI 2025
1st International Workshop on Secure Industrial Control Systems and Industrial-IoT,
Co-located with IEEE CNS 2025,
Avignon, France, September 8-11.
[posted here 6/16/25]
Critical Infrastructure (CI) stands out as prime targets for global attackers
due to their critical role as the essential part of any nation's infrastructure. The workshop
on "Secure Industrial Control Systems and Industrial-IoT (SICSI)" invites contributions in the
realm of enhancing security and resilience in critical infrastructure, industrial control systems
(ICS), supervisory control and data acquisition (SCADA) systems and operational technology (OT).
We welcome papers exploring innovative approaches for bolstering the security and resiliency
of CI, ICS, SCADA and OT environments. Topics of interest include the application of artificial
intelligence techniques and machine learning methods to fortify CI, ICS, SCADA and OT defenses
against emerging threats, as well as the development of autonomous, self-managing security
systems tailored to the unique challenges of industrial environments. We also encourage
submissions that delve into the security and resilience of interconnected systems, spanning
from traditional ICS and SCADA to operational technology and industrial internet of
things (IIoT) ecosystems. Additionally, we seek contributions addressing autonomic security
management approaches specifically designed for ICS/SCADA infrastructures.
Participants are encouraged to submit their work on novel approaches to security tailored
specifically for the unique challenges posed by CI, ICS, SCADA and OT infrastructures. Through
this workshop, we aim to foster discussions and exchange of ideas among researchers and
practitioners aiming to advance the state-of-the-art in securing critical industrial systems.
For more information, please see
https://aliteke.github.io/sicsi2025/.
MLCS 2025
7th Workshop on Machine Learning for Cybersecurity,
Co-located with the ECML PKDD 2025 conference,
Porto, Portugal, September 15, 2025.
[posted here 6/2/25]
The workshop shall provide a forum for discussing novel trends and
achievements in machine learning and their role in the development of
secure systems. The workshop shall contribute to identifying new
application areas as well as open and future research problems related
to the application of machine learning in the cybersecurity field.
All topics related to the contribution of machine learning approaches to
the security of organisations’ systems and data are welcome.
For more information, please see
http://mlcs.lasige.di.fc.ul.pt/.
ESORICS 2025
30th European Symposium on Research in Computer Security,
Toulouse, France, September 22-26, 2025.
[posted here 12/30/24]
Computer security is concerned with the protection of information in environments
where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further
the progress of research in computer security by fostering a European community that bridges
academia and industry in this realm. Sequentially hosted across various European nations, the
symposium has solidified its position as one of Europe's most prominent conferences on computer
security. Currently, the symposium delves into research and developmental avenues encompassing
AI, machine learning, technologies that enhance privacy, network safeguards, software and
hardware protection in practical scenarios.
For more information, please see
https://www.esorics2025.org/.
DPM 2025
20th Workshop on Data Privacy Management,
Co-located with ESORICS 2025,
Toulouse, France, September 25, 2025.
[posted here 6/9/25]
DPM is an annual international workshop covering research in data
privacy management. Organizations are increasingly concerned about the
privacy of information that they manage (as witnessed, for example, by
lawsuits filed against organizations for violating the privacy of
customer's data). Thus, the management of privacy-sensitive
information is very critical and important for every organization.
This poses several challenging problems, such as how to translate the
high-level business goals into system-level privacy policies,
administration of privacy-sensitive data, privacy preserving data
integration and engineering, privacy preserving access control
mechanisms, information-oriented security, and query execution on
privacy-sensitive data for partial answers. Starting from these
observations, the aim of DPM is to discuss and exchange ideas related
to data privacy management. We invite papers from researchers and
practitioners working in privacy, security, trustworthy data systems
and related areas to submit their original papers in this workshop.
Submissions by PhD students as well as controversial ideas are
encouraged. Case studies (successful or not) are also encouraged.
For more information, please see
https://deic.uab.cat/dpm/dpm2025/.
SECAI 2025
Workshop on Security and Artificial Intelligence,
Co-located with ESORICS 2025,
Toulouse, France, September 25-26, 2025.
[posted here 6/9/25]
Join us at SECAI 2025 workshop, where we will delve into the impact of
Artificial Intelligence (AI) on cybersecurity. AI is transforming various fields,
including cybersecurity, where it has been used with great success to enhance the
security of networks, systems, and devices. However, the benefits of AI come with
new concerns such as safety and ethics, privacy and data protection, data quality, and
adversarial attacks that exploit vulnerabilities in AI systems. Moreover, the use of AI
can lead to more complex attacks, triggering an AI arms race between attackers and defenders.
To address these challenges and effectively utilize AI for cybersecurity, innovative
ideas and effective approaches need to be explored. The SECAI 2025 workshop provides
a unique forum for researchers from academia and industry to exchange and discuss new
scientific contributions, current accomplishments, and open challenges in this research area.
For more information, please see
https://sites.google.com/view/secai2025/home.
CBT 2025
9th International Workshop on Cryptocurrencies and Blockchain Technology,
Co-located with ESORICS 2025,
Toulouse, France, September 25, 2025.
[posted here 6/16/25]
Since the emergence of Bitcoin in 2009, a wide array of
cryptocurrencies and blockchain-based systems have been introduced,
achieving varying degrees of adoption and success. While some of
these projects are incremental variations of Bitcoin, others present
novel consensus mechanisms, governance models, privacy-enhancing
technologies, or explore use cases beyond digital currencies such as
decentralized finance (DeFi), non-fungible tokens (NFTs),
decentralized autonomous organizations (DAOs), and scalable Layer 2
solutions. Despite these innovations, many proposed systems are
released as rapid prototypes or proof-of-concept implementations,
often lacking rigorous scientific evaluation.
This workshop aims to serve as a dedicated forum for researchers to
critically assess existing systems, explore emerging paradigms such
as zero-knowledge proofs, cross-chain interoperability, and
sustainable consensus, and propose robust frameworks that contribute
to a sound scientific foundation for the ongoing development of
blockchain technologies and next-generation decentralized systems.
For more information, please see
http://cbtworkshop.org/.
STM 2025
21st International Workshop on Security and Trust Management,
Co-located with ESORICS 2025,
Toulouse, France, September 25-26, 2025.
[posted here 6/30/25]
STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM 2025
is the twenty-first workshop in this series and will be held in
conjunction with the 30th European Symposium On Research in Computer
Security (ESORICS 2025). The workshop seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of security and trust in ICTs.
For more information, please see
https://www.nics.uma.es/stm2025/index.html.
October 2025
ACM CCS 2025
32nd ACM Conference on Computer and Communications Security,
Taipei, Taiwan, October 13-17, 2025.
[posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer security
and privacy. Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper in a way
that makes the results accessible and compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may be asked to review any paper.
Authors of each accepted paper must ensure that at least one author registers for the conference,
and that their paper is presented in-person at the conference if at all possible.
Please note that ACM CCS will strictly follow and enforce the policies and rules about
Conflicts of Interest and Peer-Review Integrity.
For more information, please see
https://www.sigsac.org/ccs/CCS2025/call-for-papers/.
WPES 2025
24th Workshop on Privacy in the Electronic Society,
Held in conjunction with ACM CCS 2025,
Taipei, Taiwan, October 13, 2025.
[posted here 7/14/25]
The need for privacy-aware policies, regulations, and techniques has been
widely recognized. This workshop discusses the problems of privacy in the global
interconnected societies and possible solutions. The 2025 Workshop, held in conjunction
with the ACM CCS conference, is the 24th in a yearly forum for papers on all the different
aspects of privacy in today's electronic society.
The workshop seeks submissions from academia, industry, and government presenting novel
research on all theoretical and practical aspects of electronic privacy, as well as experimental
studies of fielded systems. We encourage submissions from other communities such as law and
business that present these communities' perspectives on technological issues.
For more information, please see
http://jianying.space/WPES2025/.
MarCaS 2025
3rd LCN Special Track on Maritime Communication and Security,
Held in conjunction with the 50th Annual IEEE Conference on Local Computer Networks (IEEE LCN 2025),
Sydney, Australia, October 14-16, 2025.
[posted here 3/17/25]
The MarCaS Special Track will help bring together research groups
working at the intersection of maritime applications, communications technologies,
and protocols, as well as IT and network security to share and discuss ideas, novel
solutions, challenges, and recent developments. The workshop
solicits high quality and previously unpublished work in the maritime domain
and the research field of the LCN to stimulate novel approaches for a safer
and more resilient shipping. Join us for this exciting and timely Special Track at the
Local Computer Network Conference.
For more information, please see
https://garykessler.net/lcn_marcas/.
ASHES 2025
9th Workshop on Attacks and Solutions in Hardware Security,
Held in conjunction with ACM CCS 2025,
Taipei, Taiwan, October 17, 2025.
[posted here 6/23/25]
ASHES deals with all aspects of hardware security, including both theory and
practice, and welcomes any contributions in this area. Besides traditional topics, it also
invites novel methods and emerging applications: This includes new attack vectors, novel
designs and materials, lightweight security primitives, nanotechnology, and PUFs, as
well as the internet of things, automotive security, smart homes, or pervasive and
wearable computing. The workshop will include several technical sessions and two invited
keynotes by some leading colleagues in hardware security. All accepted ASHES papers
will be published the ASHES Workshop Proceedings in the ACM Dlgital library.
To account for the special nature of hardware security as a rapidly developing discipline,
ASHES hosts four different categories of papers: Classical full papers; short papers; wild
and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially
game-changing novel ideas); and systematization of knowledge (SoK) papers (which overview,
structure, and categorize a certain subarea).
For more information, please see
https://ashesworkshop.online/.
QSec 2025
ACM QSec: Quantum Security and Privacy Workshop,
Held in conjunction with ACM CCS 2025,
Taipei, Taiwan, October 17, 2025.
[posted here 7/7/25]
The inaugural Quantum Security and Privacy (QSec) Workshop invites contributions
at the intersection of quantum technologies and security and privacy, with a particular
focus on securing end-to-end systems and safeguarding data and code in the quantum
computing era. The workshop will explore both the evolving landscape of quantum threats
(posed by adversaries with quantum computing or sensing capabilities) and the expanding
landscape of threats to quantum technologies (posed by classical or quantum adversaries).
Participants will also present countermeasures and innovative solutions—ranging from
hybrid cryptographic schemes to protocols protecting fragile near-term quantum systems.
For more information, please see
https://acm-qsec.com/.
AICCSA 2025
22nd ACS/IEEE International Conference on Computer Systems and Applications,
Doha, Qatar, October 19-22, 2025.
[posted here 6/2/25]
The ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)
is the premier conference covering all contemporary areas in computer systems and applications.
It implements an international forum for academics, industry researchers, developers, and
practitioners to report and share groundbreaking contributions in various IT fields that range
from distributed computing to data science, security and machine learning.
For more information, please see
https://conferences.sigappfr.org/aiccsa2025/.
APF 2025
Annual Privacy Forum,
Frankfurt a.M., Germany, October 22-23, 2025.
[posted here 5/26/25]
The EU legal framework on personal data protection is key in an effort to better
control the processing of personal data while ensuring an adequate level of protection. Even the
best legislative efforts cannot keep up to speed with the pace of innovative technology and business
models that challenge the way personal data is processed and privacy is protected across the EU
and beyond; therefore, examining what is at stake and where threats thereto originate from
becomes of paramount importance. Against this background, RSAC™ Conference, ENISA, DG Connect, Goethe-University Frankfurt, and
Karlstad University jointly organize the Annual Privacy Forum (APF) 2025 in Frankfurt a.M., Germany.
In APF 2025, we invite papers presenting original work on the themes of data protection and
privacy and their repercussions on technology, business, government, law, society, policy
and law enforcement. An inter-disciplinary approach is high in demand to contribute to
bridging the gap between research, business models and policy, much like proposing new models and interpretations.
APF 2025 seeks original contributions from researchers and academia, policy makers and
implementers, data protection authorities, industry, consultants, NGOs, as well as civil
society. Full research papers need to be genuine in content and should not overlap with work
published elsewhere. Opinion papers are expected to reflect the views of the author(s).
Submissions can be up to 8000 words, excluding bibliography and well-marked appendices.
For more information, please see
https://privacyforum.eu/.
ICICS 2025
27th International Conference on Information and Communications Security,
Nanjing, China, October 29-31, 2025.
[posted here 3/3/25]
The ICICS conference started in 1997 and aims at bringing together researchers and
practitioners from both academia and industry to discuss and exchange their experiences,
lessons learned, and insights related to information and communications security.
The conference seeks submissions presenting novel contributions related to information
and communication security.
Springer sponsors ICICS 2025 with 1000 EUR for a Best Paper Award and a Best Student Paper Award.
For more information, please see
https://www.icics2025.org/index.html.
November 2025
CANS 2025
24th International Conference on Cryptology and Network Security,
Osaka, Japan, November 17-20, 2025.
[posted here 4/14/25]
The International Conference on Cryptology and Network Security (CANS)
is a premier forum for presenting research in the field of cryptology
and network security. The conference seeks academic, industry, and
government submissions on all theoretical and practical aspects of
cryptology and network security, and its extended domains in modern
computing systems.
For more information, please see
https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html.
December 2025
ACSAC 2025
41th Annual Computer Security Applications Conference,
Honolulu, Hawaii, USA, December 8-12, 2025.
[posted here 4/14/25]
The Annual Computer Security Applications Conference (ACSAC) brings together leading researchers
and practitioners, along with a diverse group of security professionals drawn from academia, industry,
and government, gathered to present and discuss the latest cybersecurity results and topics. With peer
reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC
continues its core mission of investigating practical solutions for computer and network security technologies.
As an internationally recognized forum where researchers, practitioners, and developers meet to learn
and to exchange practical ideas and experiences in computer and network security, we invite you to
submit your work. In addition to peer-reviewed papers on novel applied research, we also welcome case
studies on real-world applications, panels featuring world experts, and workshops consisting of 1-2 day
sessions on hot cybersecurity and privacy topics.
For more information, please see
https://www.acsac.org.
|