| |
Calls for Papers
Last Modified:10/6/25
Upcoming Conferences and Workshops
Note: The submission date has passed.
October 2025
ACM CCS 2025
32nd ACM Conference on Computer and Communications Security,
Taipei, Taiwan, October 13-17, 2025.
[posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer security
and privacy. Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper in a way
that makes the results accessible and compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may be asked to review any paper.
Authors of each accepted paper must ensure that at least one author registers for the conference,
and that their paper is presented in-person at the conference if at all possible.
Please note that ACM CCS will strictly follow and enforce the policies and rules about
Conflicts of Interest and Peer-Review Integrity.
For more information, please see
https://www.sigsac.org/ccs/CCS2025/call-for-papers/.
WPES 2025
24th Workshop on Privacy in the Electronic Society,
Held in conjunction with ACM CCS 2025,
Taipei, Taiwan, October 13, 2025.
[posted here 7/14/25]
The need for privacy-aware policies, regulations, and techniques has been
widely recognized. This workshop discusses the problems of privacy in the global
interconnected societies and possible solutions. The 2025 Workshop, held in conjunction
with the ACM CCS conference, is the 24th in a yearly forum for papers on all the different
aspects of privacy in today's electronic society.
The workshop seeks submissions from academia, industry, and government presenting novel
research on all theoretical and practical aspects of electronic privacy, as well as experimental
studies of fielded systems. We encourage submissions from other communities such as law and
business that present these communities' perspectives on technological issues.
For more information, please see
http://jianying.space/WPES2025/.
SecDev 2025
IEEE Secure Development Conference,
Indianapolis, IN, October 14-16, 2025.
[posted here 9/24/25]
SecDev is a venue for presenting ideas, research, and experience about
how to develop secure systems. It focuses on theory, techniques, and tools to
“build security in” to existing and new computing systems, and does not focus on
simply discovering the absence of security.
The goal of SecDev is to encourage and disseminate ideas for secure system development
among academia, industry, and government. It aims to bridge the gap between
constructive security research and practice and to enable the real-world impact of
security research in the long run. Developers have valuable experiences and ideas that
can inform academic research, and researchers have concepts, studies, and even code and
tools that could benefit developers. Great SecDev contributions could come from attendees
of industrial conferences like AppSec and RSA; from attendees of academic conferences
like IEEE S&P, IEEE CSF, USENIX Security, CCS, NDSS, PLDI, ICSE, FSE, ISSTA, SOUPS,
HOST, and others; and from newcomers.
We solicit research and experience papers on a broad range of topics relating to
secure systems development. Examples of topics that are in scope include:
the development of libraries, tools, or processes to produce systems resilient
to certain attacks; formal foundations that underpin a language, tool, or testing
strategy to improve security; techniques that drastically improve the scalability
of security solutions for practical deployment; and experience, designs, or
applications showing how to apply cryptographic techniques effectively to secure systems.
SecDev also seeks hands-on and interactive tutorials on security-focused processes,
frameworks, languages, and tools. The goal is to share knowledge on the experience, art
and science of secure systems development.
NEW THIS YEAR! We welcome submissions of Systematization of Knowledge (SoK) papers
that evaluate, organize, and contextualize existing knowledge. Submissions must
include the prefix “SoK: ” in the title.
For more information, please see
https://secdev.ieee.org/2025/home/.
MarCaS 2025
3rd LCN Special Track on Maritime Communication and Security,
Held in conjunction with the 50th Annual IEEE Conference on Local Computer Networks (IEEE LCN 2025),
Sydney, Australia, October 14-16, 2025.
[posted here 3/17/25]
The MarCaS Special Track will help bring together research groups
working at the intersection of maritime applications, communications technologies,
and protocols, as well as IT and network security to share and discuss ideas, novel
solutions, challenges, and recent developments. The workshop
solicits high quality and previously unpublished work in the maritime domain
and the research field of the LCN to stimulate novel approaches for a safer
and more resilient shipping. Join us for this exciting and timely Special Track at the
Local Computer Network Conference.
For more information, please see
https://garykessler.net/lcn_marcas/.
ASHES 2025
9th Workshop on Attacks and Solutions in Hardware Security,
Held in conjunction with ACM CCS 2025,
Taipei, Taiwan, October 17, 2025.
[posted here 6/23/25]
ASHES deals with all aspects of hardware security, including both theory and
practice, and welcomes any contributions in this area. Besides traditional topics, it also
invites novel methods and emerging applications: This includes new attack vectors, novel
designs and materials, lightweight security primitives, nanotechnology, and PUFs, as
well as the internet of things, automotive security, smart homes, or pervasive and
wearable computing. The workshop will include several technical sessions and two invited
keynotes by some leading colleagues in hardware security. All accepted ASHES papers
will be published the ASHES Workshop Proceedings in the ACM Dlgital library.
To account for the special nature of hardware security as a rapidly developing discipline,
ASHES hosts four different categories of papers: Classical full papers; short papers; wild
and crazy (WaC) papers (whose purpose is rapid dissemination of promising, potentially
game-changing novel ideas); and systematization of knowledge (SoK) papers (which overview,
structure, and categorize a certain subarea).
For more information, please see
https://ashesworkshop.online/.
QSec 2025
ACM QSec: Quantum Security and Privacy Workshop,
Held in conjunction with ACM CCS 2025,
Taipei, Taiwan, October 17, 2025.
[posted here 7/7/25]
The inaugural Quantum Security and Privacy (QSec) Workshop invites contributions
at the intersection of quantum technologies and security and privacy, with a particular
focus on securing end-to-end systems and safeguarding data and code in the quantum
computing era. The workshop will explore both the evolving landscape of quantum threats
(posed by adversaries with quantum computing or sensing capabilities) and the expanding
landscape of threats to quantum technologies (posed by classical or quantum adversaries).
Participants will also present countermeasures and innovative solutions—ranging from
hybrid cryptographic schemes to protocols protecting fragile near-term quantum systems.
For more information, please see
https://acm-qsec.com/.
AICCSA 2025
22nd ACS/IEEE International Conference on Computer Systems and Applications,
Doha, Qatar, October 19-22, 2025.
[posted here 6/2/25]
The ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)
is the premier conference covering all contemporary areas in computer systems and applications.
It implements an international forum for academics, industry researchers, developers, and
practitioners to report and share groundbreaking contributions in various IT fields that range
from distributed computing to data science, security and machine learning.
For more information, please see
https://conferences.sigappfr.org/aiccsa2025/.
APF 2025
Annual Privacy Forum,
Frankfurt a.M., Germany, October 22-23, 2025.
[posted here 5/26/25]
The EU legal framework on personal data protection is key in an effort to better
control the processing of personal data while ensuring an adequate level of protection. Even the
best legislative efforts cannot keep up to speed with the pace of innovative technology and business
models that challenge the way personal data is processed and privacy is protected across the EU
and beyond; therefore, examining what is at stake and where threats thereto originate from
becomes of paramount importance. Against this background, RSAC™ Conference, ENISA, DG Connect, Goethe-University Frankfurt, and
Karlstad University jointly organize the Annual Privacy Forum (APF) 2025 in Frankfurt a.M., Germany.
In APF 2025, we invite papers presenting original work on the themes of data protection and
privacy and their repercussions on technology, business, government, law, society, policy
and law enforcement. An inter-disciplinary approach is high in demand to contribute to
bridging the gap between research, business models and policy, much like proposing new models and interpretations.
APF 2025 seeks original contributions from researchers and academia, policy makers and
implementers, data protection authorities, industry, consultants, NGOs, as well as civil
society. Full research papers need to be genuine in content and should not overlap with work
published elsewhere. Opinion papers are expected to reflect the views of the author(s).
Submissions can be up to 8000 words, excluding bibliography and well-marked appendices.
For more information, please see
https://privacyforum.eu/.
XRSecurity 2025
Workshop on Security, Privacy, and Trust in Extended Reality Systems,
Held in conjunction with ACM MobiHoc 2025,
Houston, TX, USA, October 27-30, 2025.
[posted here 6/9/25]
Extended Reality (XR) is a comprehensive term that includes Augmented
Reality (AR), Mixed Reality (MR), and Virtual Reality (VR). XR bridges physical and
digital worlds, creating interactive, immersive experiences that merge with the real
world. It offers numerous applications across education, training, manufacturing,
collaborative 3D design, art, and multiplayer gaming.
Despite these benefits, XR systems introduce unique security, privacy, and trust
challenges due to the intimate connection between users, their XR devices, and their
immediate environments. The potential attacks can involve information flooding to
induce latency and physical discomfort, injecting misleading virtual content to distract
or deceive users, subverting personal area networks to create confusion, spoofing alarms,
assessing user status through eye tracking, and accessing onboard cameras to gather
environmental information without the user's awareness. Additionally, XR apps can access
sensitive real-time inputs like eye gaze, head movement, hand gestures, and even biosignals,
and users' immediate environment. These signals, while critical for immersive experiences,
open up novel attack surfaces such as keystroke inference, emotional profiling, and
behavioral tracking. This workshop will explore the security, privacy, and trust
challenges in XR systems, along with potential solutions.
For more information, please see
https://xrsecurity.github.io/2025/.
ICICS 2025
27th International Conference on Information and Communications Security,
Nanjing, China, October 29-31, 2025.
[posted here 3/3/25]
The ICICS conference started in 1997 and aims at bringing together researchers and
practitioners from both academia and industry to discuss and exchange their experiences,
lessons learned, and insights related to information and communications security.
The conference seeks submissions presenting novel contributions related to information
and communication security.
Springer sponsors ICICS 2025 with 1000 EUR for a Best Paper Award and a Best Student Paper Award.
For more information, please see
https://www.icics2025.org/index.html.
November 2025
APWG eCrime 2025
20th APWG Symposium on Electronic Crime Research,
San Diego, CA, USA, November 4-7, 2025.
[posted here 3/17/25]
The 2025 Symposium on Electronic Crime Research (eCrime 2025) will examine
essential factors for managing the impacts of the global cybercrime plexus
to secure IT users, commercial enterprises, governments, critical infrastructure,
and operational technologies. eCrime 2025 will be the 20th annual peer-reviewed,
publishing symposium hosted by APWG.
This year, eCrime 2025 inaugurates a dimensional extension of the symposium's
purview to include research on cyber-physical crimes. From 2025 forward, eCrime
will specifically solicit research on cybercrimes involving cyber-physical systems
and operational technologies abused in the furtherance of any crime. This expands
eCrime's scope from purely cyber (digital) crimes to include those that manifest abuse
against physical spaces, such as homes, commercial enterprises, scientific or military
facilities, roadways, public spaces, critical infrastructure and devices (e.g. IoT,
electro-mechanical controllers, sensors, etc.).
With the rise of cyber attacks inflicting physical damage - as exhibited in the
Stuxnet attacks, the cyber incursions against the Ukrainian electrical grid a
decade ago and the Colonial pipeline shutdown - as well as the rapid evolution of
malware designed to manipulate SCADA and ICS process control technologies, it w
as clear eCrime's CFP scope had to be expanded once more to maintain relevance to
the contemporary cyber threatscape.
For more information, please see
https://apwg.org/events/ecrime2025.
TPS 2025
7th IEEE International Conference on Trust, Privacy and Security in Intelligent
Systems, and Applications,
Pittsburgh, PA, USA, November 11-14, 2025.
[posted here 7/21/25]
Recent advances in computing and information technologies such as
IoT, mobile Edge/Cloud computing, cyber-physical-social systems, Artificial
Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next
generation smart and intelligent systems and applications that can have transformative
impact in our society while accelerating rapid scientific discoveries and innovations.
Such newer technologies and paradigms are getting increasingly embedded in the
computing platforms and networked information systems/infrastructures that form the
digital foundation for our personal, organizational and social processes and activities.
It is increasingly becoming critical that the trust, privacy and security issues in
such digital environments are holistically addressed to ensure the safety and
well-being of individuals as well as our society. IEEE International Conference on
Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS-ISA)
is an international multidisciplinary forum for presentation of state-of-the-art
innovations, and discussion among academic, industrial researchers, and
practitioners on issues related to trust, privacy and security in emerging
smart and intelligent systems and applications.
For more information, please see
https://www.sis.pitt.edu/lersais/conference/tps/2025/.
TPHAC 2025
IEEE Workshop on Trustworthy and Privacy-Preserving Human-AI Collaboration,
Co-located with IEEE International Conference on CIC/TPS/CogMI,
Pittsburgh, PA, USA, November 11-14, 2025.
[posted here 7/21/25]
This workshop explores the evolving relationship between humans and AI
systems, with a focus on fostering trustworthy and privacy-preserving collaboration.
As AI capabilities grow and its presence in daily life expands, it is essential that
these systems align with human values to remain responsible, effective, and secure.
Although human-AI collaboration offers significant potential for enhanced decision-making
and societal benefit, it also raises critical challenges, such as privacy risks, trust
and safety concerns, and cybersecurity threats across diverse domains.
Our goal is to foster interdisciplinary dialogue and shape a roadmap for effective
and trustworthy human-AI collaboration. We invite contributions that bridge the gap
between machine intelligence and human understanding, particularly in shared
decision-making scenarios. The workshop promotes the development of adaptive, hybrid, and
emerging AI systems that respond to dynamic contexts while respecting human agency
and enhancing human capabilities. We welcome insights from user studies and the design
of collaborative frameworks that strengthen trust, transparency, privacy, and security.
We also encourage discussions addressing key questions such as: What methods and
metrics are needed to evaluate human-AI teams effectively? What factors influence
trust, performance, and responsible AI deployment?
For more information, please see
https://sites.google.com/pitt.edu/tphac/home.
CANS 2025
24th International Conference on Cryptology and Network Security,
Osaka, Japan, November 17-20, 2025.
[posted here 4/14/25]
The International Conference on Cryptology and Network Security (CANS)
is a premier forum for presenting research in the field of cryptology
and network security. The conference seeks academic, industry, and
government submissions on all theoretical and practical aspects of
cryptology and network security, and its extended domains in modern
computing systems.
For more information, please see
https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html.
FPS 2026
18th International Symposium on Foundations & Practice of Security,
Brest, France, November 25-27, 2025.
[posted here 9/15/25]
FPS invites researchers and practitioners from all countries working in security,
privacy, cyber resilience, and related areas to participate in the event. Protecting the data and
the infrastructure of an increasingly interconnected world has become vital to the normal
functioning of all aspects of our daily life. Security, privacy and cyber resilience have emerged
as scientific research fields whose multifaceted complexities deserve the attention and synergy of
various communities such as mathematics, computer science, information systems, networks, management,
and criminology. Alongside technical topics, for the 18th edition, special care will be given to
AI-based innovation, applications to transports systems and critical infrastructures. The aim of
FPS is to discuss and exchange theoretical and practical ideas that address privacy, security and
cyber resilience issues in interconnected systems. FPS aims to provide scientific presentations
and to promote scientific collaboration, joint research programs, and student exchanges between
stakeholders and participants involved in this fast-moving field.
For more information, please see
https://hub.imt-atlantique.fr/fps2025.
December 2025
ACSAC 2025
41th Annual Computer Security Applications Conference,
Honolulu, Hawaii, USA, December 8-12, 2025.
[posted here 4/14/25]
The Annual Computer Security Applications Conference (ACSAC) brings together leading researchers
and practitioners, along with a diverse group of security professionals drawn from academia, industry,
and government, gathered to present and discuss the latest cybersecurity results and topics. With peer
reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC
continues its core mission of investigating practical solutions for computer and network security technologies.
As an internationally recognized forum where researchers, practitioners, and developers meet to learn
and to exchange practical ideas and experiences in computer and network security, we invite you to
submit your work. In addition to peer-reviewed papers on novel applied research, we also welcome case
studies on real-world applications, panels featuring world experts, and workshops consisting of 1-2 day
sessions on hot cybersecurity and privacy topics.
For more information, please see
https://www.acsac.org.
HealthSec 2025
Workshop on Cybersecurity in Healthcare,
Co-located with the Annual Computer Security Applications Conference (ACSAC41),
Honolulu, HI, USA, December 9, 2025.
[posted here 6/2/25]
In its most basic form, healthcare is gathering data, interpreting data into
information, and transforming information into current human knowledge that can
be acted upon, with each of these stages open to unintended errors and/or malicious
subversion. These stages do not occur within a vacuum but rather within our existing
infrastructures and social system with all their current limitations, systemic bias,
and exploitable vulnerabilities. While a similar characterization can be made about
security in other applied domains, healthcare is undergoing a dramatic transformation,
arguably the next technological revolution, presenting immediate opportunities for
improvement along with corresponding challenges in security.
Our desire is to bring together diverse researchers from academia, government, and
the healthcare industry to report on the latest research efforts. As this is the
second workshop following a first workshop that exceeded all expectations, we want
to continue momentum toward encouraging, jumpstarting, and growing excellent
interdisciplinary contributions at the forefront of cybersecurity in healthcare
research. Papers with demonstrated results will be given priority.
For more information, please see
https://publish.illinois.edu/healthsec2025/.
ICISS 2025
21st International Conference on Information Systems Security,
Indore, India, December 16-20, 2025.
[posted here 4/14/25]
ICISS is a premier international conference on information security and privacy. The ICISS
conference provides a dynamic platform for researchers, academicians, and industry professionals worldwide
to discuss and explore advancements in cybersecurity, cryptography, system security, and hardware security.
Since its inception in 2005, the conference has fostered impactful research collaborations, addressing emerging
security challenges in computing and information systems. With keynote talks by leading experts, technical
paper presentations, hands-on workshops, and panel discussions, ICISS 2025 aims to facilitate knowledge
exchange and shape the future of digital security.
For more information, please see
https://iciss.isrdc.in.
January 2026
IFIP 119 DF 2026
22nd Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 5-6, 2026.
[posted here 6/9/25]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active
international community of scientists, engineers and practitioners dedicated to advancing
the state of the art of research and practice in digital forensics. The Twenty-Second
Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for
presenting original, unpublished research results and innovative ideas related to the
extraction, analysis and preservation of all forms of electronic evidence. Papers and
panel proposals are solicited. All submissions will be refereed by a program committee
comprising members of the Working Group. Papers and panel submissions will be selected
based on their technical merit and relevance to IFIP WG 11.9. The conference will be
limited to approximately 60 participants to facilitate interactions between researchers
and intense discussions of critical research issues. Keynote presentations, revised
papers and details of panel discussions will be published as an edited volume – the
twenty-second volume in the well-known Research Advances in Digital Forensics book
series (Springer, Cham, Switzerland) during the summer of 2026.
For more information, please see
http://www.ifip119.org/.
February 2026
NDSS 2026
Network and Distributed System Security,
San Diego, CA, USA, February 23-27, 2026.
[posted here 4/14/25]
The Network and Distributed System Security (NDSS) Symposium is a top venue that fosters
information exchange among researchers and practitioners of network and distributed system security. The NDSS
Symposium 2026 and co-located workshops will take place in San Diego, CA, from 23 to 27 February 2026. The
target audience includes everyone interested in practical aspects of network and distributed system security,
with a focus on system design and implementation. A major goal is to encourage and enable the Internet community
to apply, deploy, and advance the state of practical security technologies.
This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their
paper in a way that makes the results accessible and compelling to a general security researcher. All
submissions will be reviewed by the Program Committee and accepted submissions will be published by the
Internet Society in the Proceedings of NDSS Symposium 2026. The Proceedings will be made freely accessible
from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for
noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first
page of the paper. The authors are thus free to post the camera-ready versions of their papers on their
personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly
prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2026/submissions/call-for-papers/.
March 2026
SaTML 2026
4th IEEE Conference on Secure and Trustworthy Machine Learning,
Munich, Germany, March 23-25, 2026.
[posted here 7/7/25]
IEEE SaTML expands upon the theoretical and practical understandings of
vulnerabilities inherent to machine learning (ML), explores the robustness of learning
algorithms and systems, and aids in developing a unified, coherent scientific community
aiming to establish trustworthy machine learning. Topics of interest include
(but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation
For more information, please see
https://satml.org/.
April 2026
May 2026
|