Call for Papers

The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.

SSCC’23 Main track
  • Adversarial Learning
  • AI-Driven Cyber Security Analytics
  • Anti-Forensics Techniques
  • Application Security
  • Authentication and Access Control Systems
  • Critical Infrastructure Protection
  • Cyber Vulnerability Prioritization and Remediation
  • Cyber Warfare Trends and Approaches
  • Denial-of-Service Attacks and Countermeasures
  • Differential Privacy
  • Digital Forensics
  • Digital Rights Management
  • Distributed and Pervasive Systems Security
  • Embedded Systems Security
  • Enterprise Systems Security
  • Executable Content and Content Filtering
  • File and Files System Security
  • Fraud Management
  • Game Theoretical Cybersecurity Models
  • Hardware Security
  • Human-Computer Interaction and Security
  • Identity Management
  • Intellectual Property Protection
  • Interpretable and Robust Autonomous Cyber-Systems
  • Key Distribution and Management
  • Mobile System Security
  • Multimedia and Document Security
  • Network Infrastructure Security
  • Operating Systems and Database Security
  • Peer-to-Peer Security
  • Red Team Evaluation of Cyber Défense Systems
  • Secure Communications and Information Flow
  • Secure Sensor Networks
  • Security in e-services
  • Security of Web-Based Applications
  • Surveillance Systems
  • Accountability
  • Analysis of Network and Security Protocols
  • Anonymity
  • Authorship Analysis
  • Biometrics Standards and Standardization
  • Border Security
  • Business Continuity & Disaster Recovery Planning
  • Crowd Management
  • Deep Learning/Deep RL for Cybersecurity
  • Economics of Security
  • Emergency Response and Management
  • Encryption and Cryptography
  • Forecasting Terrorism
  • Incident Handling and Penetration Testing
  • Information Hiding
  • Intrusion and Anomaly Detection and Prevention
  • Investigation of Insider Attacks
  • Language-Based Security
  • Laws and Regulations/Legal Issues
  • Malware Forensics and Anti-Malware Techniques
  • New Threats and Non-Traditional Approaches
  • Protocol Security
  • Representation Learning for Cybersecurity
  • Robust Statistics
  • Secure Software Development
  • Security Architectures
  • Security Education and Training
  • Security Metrics
  • Security of Deep Learning Systems
  • Security Policies and Trust Management
  • Self-Protecting and Self-Healing Systems
  • Social Engineering
  • Social Network Analysis
  • Template Protection and Liveliness Detection
  • Theories, Methods, and Tools in Managing Security
  • Threats, Vulnerabilities, and Risk Management

Special Session 1: Cloud Security
  • 5G/6G Network Security
  • Access Control in Clouds
  • Binary Analysis of Software for Remote Attestation and Cloud Protection
  • Business and Security Risk Models and Clouds
  • Cloud Forensics
  • Cloud Security Auditing
  • Cloud-Aware Web Service Security Paradigms and Mechanisms
  • Container Security
  • Cryptographic Protocols for Cloud Security
  • Data Protection in Clouds
  • Foundations of Cloud-Centric Threat Models
  • Machine Learning for Cloud Protection
  • Network Security Mechanisms for Cloud Contexts
  • Privacy-Enhanced Technologies for Clouds
  • Remote Attestation Mechanisms in Clouds
  • Risk Analysis for Clouds
  • Sandboxing and VM-Based Enforcements
  • Scalability of Security in Global-Size Clouds
  • SDN/NFV Security
  • Secure Cloud Resource Virtualization Mechanisms
  • Secure Computation Outsourcing
  • Secure Data Management Outsourcing (E.G., Database as A Service)
  • Secure Identity Management Mechanisms
  • Security and Privacy of Big Data
  • Security and Privacy of Federated Clouds and Edge Computing
  • Security and Privacy of Fog Computing
  • Security of Microservices
  • Side-Channel Attacks
  • Trust and Policy Management in Clouds
  • Virtual Network Security
  • Cloud-Centric Regulatory Compliance Issues and Mechanisms
  • Security for Emerging Cloud Programming Models

Special Session 2: Internet of Things Security and Privacy
  • Adaptive Security in IoT
  • Attack Strategies for IoT
  • Authentication and Access Control in IoT
  • Cyber Attacks Detection and Prevention
  • Cyber-Physical Systems Security
  • Data Analysis and Visualization for IoT
  • Ethics and Legal Considerations in IoT
  • Identification and Biometrics in IoT
  • Identity Management in IoT
  • Intrusion and Malware Detection
  • Liability and Policy Enforcement in IoT
  • Methods for IoT Security Analysis and Audit
  • Privacy and Anonymization Techniques in IoT
  • Reliable Interactions with Network Services
  • Scalability and Robustness for Internet of Things
  • Secure Cloud of Things
  • Secure Mobile Applications
  • Secure Mobility Management
  • Secure Operating Systems
  • Security Architectures
  • Security in Wireless Sensor Networks
  • Security of Big Data in IoT
  • Security, Privacy, and Trust in IoT
  • System and Data Integrity
  • Threat Models in IoT
  • Trust Management Architectures
  • Trustworthiness in IoT

Special Session 3: Big Data Security and Privacy
  • Access Control of Big Data
  • Anonymous Communication in Big Data
  • Application Level Security and Privacy in Big Data
  • Attacks and Counter Measures in Big Data
  • Big Data Forensics
  • Big Data Privacy Policies and Standards
  • Biometric Security and Forensics in Big Data
  • Cryptography and Big Data
  • Data Protection, Integrity Standards, and Policies
  • Encrypted Information Retrieval in Big Data
  • Identity Management and Key Management in Big Data
  • Managing User Access for Big Data
  • Network Security, Privacy in Big Data
  • Physical Layer Security in Big Data
  • Reliability and Availability in Big Data
  • Scalability and Auditing For Big Data
  • Secure Cross-Layer Design in Big Data
  • Secure Quantum Communications
  • Security and Legislative Impacts on Big Data
  • Storage and System Security for Big Data
  • Threat and Vulnerability Analysis in Big Data
  • Trust in Big Data
  • Visualizing Large Scale Security Data

 

Special Session 4 Blockchain Security and Privacy
  • Anonymity, Deanonymization, and Privacy in Blockchain Systems
  • Compact Ring Signatures
  • Cyber-Infrastructures for Blockchain Systems
  • Defenses and Countermeasures
  • Digital Preservation of Blockchain Records
  • Economic, Monetary, Legal, Ethical, and Societal Aspects
  • Formal Verification of Smart Contracts
  • Fraud Detection and Financial Crime Prevention
  • Compact Range Proofs
  • Blockchain Cryptographic Primitives
  • Incentive Mechanisms for Blockchains
  • New Threat Models and Attacks
  • Platforms for Decentralized Consensus
  • Privacy-Preserving Signature Aggregation
  • Provenance and Trust in Blockchain Systems
  • Regulation and Law Enforcement
  • Scalability Issues and Solutions
  • Trust Models and Trust Management in Blockchain Systems