![]() |
| |||||||||||||
SNS 2025 : The 12th International Symposium on System and Network Security (SNS 2025) | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
--- # Call for Papers ## **The 12th International Symposium on System and Network Security (SNS 2025)** **Location:** Chengdu, Sichuan, China **Date:** April 28–30, 2025 --- ### About SNS The **International Symposium on System and Network Security (SNS)** is a premier forum for researchers, practitioners, and policy-makers to present and discuss the most recent innovations, trends, results, experiences, and challenges in the field of **computer systems and network security**. Since its inception in 2014, SNS has provided a vibrant and inclusive platform for the security community, attracting contributions from academia, industry, and government sectors. It has earned a reputation for high-quality peer review, thought-provoking keynotes, and impactful discussions that shape the future of secure systems design. SNS 2025 invites submissions that explore theoretical foundations, practical systems, and real-world deployment of secure computer and network systems. --- ### Topics of Interest We invite high-quality original research papers in, but not limited to, the following categories: #### 1. Operating System and Platform Security - Secure OS architectures and kernel security - Secure boot and firmware integrity - Virtualization and container security - Trusted Execution Environments (TEEs), e.g., Intel SGX, ARM TrustZone - Mobile OS and app sandboxing #### 2. Network and Distributed Systems Security - Secure communication protocols (TLS, QUIC, VPNs) - Software-defined networking (SDN) and NFV security - Network intrusion detection and response - DoS/DDoS mitigation techniques - Blockchain and decentralized systems security #### 3. Cloud, Edge, and IoT Security - Cloud-native application security - Multi-tenant data isolation and access control - Edge computing and fog layer threats - Security of IoT operating systems and protocols (e.g., MQTT, CoAP) - Supply-chain security in embedded and constrained devices #### 4. System-level Threat Modeling and Attack Techniques - Reverse engineering and binary exploitation - Rootkits, bootkits, and firmware-level threats - Advanced persistent threats (APTs) in system-level environments - Memory corruption, ROP/JOP attacks, and mitigation bypasses - Malware and botnet analysis #### 5. Formal Methods and Program Analysis for Security - Static and dynamic analysis of software - Automated vulnerability detection and patch generation - Formal verification of security-critical components - Secure programming languages and compilers - Symbolic execution and fuzz testing advances #### 6. Applied Cryptography in Systems and Networks - Secure protocols design and cryptographic engineering - Side-channel attack mitigations at system/network level - Privacy-preserving systems (e.g., differential privacy, homomorphic encryption) - Usability of cryptographic interfaces in real systems #### 7. Security of AI and AI for Security - Attacks against machine learning systems (e.g., adversarial examples, model inversion) - ML-based system and network anomaly detection - Robustness and trustworthiness in AI-enabled systems - LLM security and its system-level implications #### 8. Measurement and Empirical Studies - Large-scale measurement of vulnerabilities or malware - Deployment studies of security patches, protocols, or tools - User studies on system/network security usability - Empirical evaluations of defense effectiveness in the wild --- ### Submission Details - All submissions must be **original and not under concurrent review** at another venue. - Submitted papers must be written in **English**, formatted using the **ACM double-column format**, and must not exceed **12 pages**, excluding references and appendices. - **Double-blind review** process: author names and affiliations must be anonymized. --- ### Important Dates - **Paper Submission Deadline:** April 23, 2025 (23:59 Beijing Time) - **Notification of Acceptance:** April 25, 2025 - **Camera-Ready Version Due:** April 27, 2025 - **Conference Dates:** April 28–30, 2025 --- ### Organizers - Wang Qian - Wang Shali - Fu Wenqing |
|