Call For Papers
We are looking for papers with high-quality, original and unpublished research contributions. The Symposium will start on September 26, 2023 with an exciting technical program, including vetted papers, invited talks, poster and panel discussions as well as collocated workshops.
Imporant Dates
This year’s symposium will have two review cycles. All submissions must be received by 11:59 p.m. anywhere-on-earth time on the day of the corresponding deadline.
First cycle |
Second cycle |
|
---|---|---|
Full paper submission: | 22 January 2023 | 28 May 2023 |
Early reject notification: | 26 March 2023 | 23 July 2023 |
Notification to authors: | 2 April 2023 | 30 July 2023 |
Camera ready due: | 20 August 2023 | 20 August 2023 |
Topics of Interest
Submissions are solicited in all areas related to computer security, including but not limited to:
Access Control | Anonymity and Censorship Resistance |
Applied Cryptography | Artificial Intelligence for Security |
Audit and Accountability | Authentication and Biometrics |
Blockchains and Distributed Ledger Security | Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response. |
Data and Computation Integrity | Database Security |
Digital Content Protection | Digital Forensics |
Formal Methods for Security and Privacy | Hardware Security |
Information Hiding | Identity Management |
Information Flow Control | Information Security Governance and Management |
Intrusion Detection | Language-based Security |
Malware and Unwanted Software | Network Security |
Phishing and Spam Prevention | Privacy Technologies and Mechanisms |
Risk Analysis and Management | Secure Electronic Voting |
Security Economics and Metrics | Security and Privacy of Systems based on Machine Learning and A.I. |
Security and Privacy in Cloud / Fog Systems | Security and Privacy in Crowdsourcing |
Security and Privacy in the IoT and Cyber-Physical Systems | Security and Privacy in Location-based Services |
Security and Privacy for Mobile / Smartphone Platforms | Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs) |
Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports) | Security and Privacy in Social Networks |
Security and Privacy in Wireless and Cellular Communications | Software Security |
Systems Security | Trustworthy Computing to Secure Networks and Systems |
Usable Security and Privacy | Web Security |
Paper submissions
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference / workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS).
How to submit your paper
TBD
Conflict of Interest
The program co-chairs require cooperation from both authors and PC members to prevent submissions from being evaluated by reviewers who have a conflict of interest (CoI). During the bidding procedure, PC members will be required to indicate potential CoIs. On the other hand, authors will be asked during the submission process to indicate any PC members with whom they share CoIs as well as the types of CoIs. That is, if they and one the authors:
- share an institutional affiliation at the time of submission;
- had at any time in the past a supervisor/PhD student relationship;
- have collaborated or published with in the prior two years;
- are in some form of financial relationship, or have been at some point during the past two years;
- are related, or have close personal friendships.
For other forms of conflict, authors must contact the chairs and explain the perceived conflict.
Program committee members who have conflicts of interest with a paper, including program co-chairs, will be excluded from discussing and reviewing the submission. Authors also need to notify the PC Chairs of any other reason or circumstance that creates a risk that professional judgement may be unduly influenced.
The chairs reserve the right to request further explanation and can remove non-mandatory conflicts at their discretion.