posted by organizer: fuwenqing || 155 views || tracked by 2 users: [display]

SNS 2025 : The 12th International Symposium on System and Network Security (SNS 2025)

FacebookTwitterLinkedInGoogle

 
When Apr 28, 2025 - Apr 30, 2025
Where Chengdu, China
Submission Deadline Apr 23, 2025
Notification Due Apr 25, 2025
Final Version Due Apr 27, 2025
 

Call For Papers



---

# Call for Papers

## **The 12th International Symposium on System and Network Security (SNS 2025)**

**Location:** Chengdu, Sichuan, China
**Date:** April 28–30, 2025

---

### About SNS

The **International Symposium on System and Network Security (SNS)** is a premier forum for researchers, practitioners, and policy-makers to present and discuss the most recent innovations, trends, results, experiences, and challenges in the field of **computer systems and network security**.

Since its inception in 2014, SNS has provided a vibrant and inclusive platform for the security community, attracting contributions from academia, industry, and government sectors. It has earned a reputation for high-quality peer review, thought-provoking keynotes, and impactful discussions that shape the future of secure systems design.

SNS 2025 invites submissions that explore theoretical foundations, practical systems, and real-world deployment of secure computer and network systems.

---

### Topics of Interest

We invite high-quality original research papers in, but not limited to, the following categories:

#### 1. Operating System and Platform Security

- Secure OS architectures and kernel security
- Secure boot and firmware integrity
- Virtualization and container security
- Trusted Execution Environments (TEEs), e.g., Intel SGX, ARM TrustZone
- Mobile OS and app sandboxing

#### 2. Network and Distributed Systems Security

- Secure communication protocols (TLS, QUIC, VPNs)
- Software-defined networking (SDN) and NFV security
- Network intrusion detection and response
- DoS/DDoS mitigation techniques
- Blockchain and decentralized systems security

#### 3. Cloud, Edge, and IoT Security

- Cloud-native application security
- Multi-tenant data isolation and access control
- Edge computing and fog layer threats
- Security of IoT operating systems and protocols (e.g., MQTT, CoAP)
- Supply-chain security in embedded and constrained devices

#### 4. System-level Threat Modeling and Attack Techniques

- Reverse engineering and binary exploitation
- Rootkits, bootkits, and firmware-level threats
- Advanced persistent threats (APTs) in system-level environments
- Memory corruption, ROP/JOP attacks, and mitigation bypasses
- Malware and botnet analysis

#### 5. Formal Methods and Program Analysis for Security

- Static and dynamic analysis of software
- Automated vulnerability detection and patch generation
- Formal verification of security-critical components
- Secure programming languages and compilers
- Symbolic execution and fuzz testing advances

#### 6. Applied Cryptography in Systems and Networks

- Secure protocols design and cryptographic engineering
- Side-channel attack mitigations at system/network level
- Privacy-preserving systems (e.g., differential privacy, homomorphic encryption)
- Usability of cryptographic interfaces in real systems

#### 7. Security of AI and AI for Security

- Attacks against machine learning systems (e.g., adversarial examples, model inversion)
- ML-based system and network anomaly detection
- Robustness and trustworthiness in AI-enabled systems
- LLM security and its system-level implications

#### 8. Measurement and Empirical Studies

- Large-scale measurement of vulnerabilities or malware
- Deployment studies of security patches, protocols, or tools
- User studies on system/network security usability
- Empirical evaluations of defense effectiveness in the wild

---

### Submission Details

- All submissions must be **original and not under concurrent review** at another venue.
- Submitted papers must be written in **English**, formatted using the **ACM double-column format**, and must not exceed **12 pages**, excluding references and appendices.
- **Double-blind review** process: author names and affiliations must be anonymized.

---

### Important Dates

- **Paper Submission Deadline:** April 23, 2025 (23:59 Beijing Time)
- **Notification of Acceptance:** April 25, 2025
- **Camera-Ready Version Due:** April 27, 2025
- **Conference Dates:** April 28–30, 2025

---

### Organizers

- Wang Qian
- Wang Shali
- Fu Wenqing


Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ICSSS 2025   2025 The International Conference on System Safety and Security (ICSSS 2025)
Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
ICINT--EI 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ICDMIS 2025   International Conference on Data Mining and Information Security
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
SSIP--EI 2025   2025 8th International Conference on Sensors, Signal and Image Processing (SSIP 2025)