posted by organizer: fuwenqing || 809 views || tracked by 2 users: [display]

SNS 2025 : The 12th International Symposium on System and Network Security (SNS 2025)

FacebookTwitterLinkedInGoogle

 
When Apr 28, 2025 - Apr 30, 2025
Where Chengdu, China
Submission Deadline Apr 23, 2025
Notification Due Apr 25, 2025
Final Version Due Apr 27, 2025
 

Call For Papers



---

# Call for Papers

## **The 12th International Symposium on System and Network Security (SNS 2025)**

**Location:** Chengdu, Sichuan, China
**Date:** April 28–30, 2025

---

### About SNS

The **International Symposium on System and Network Security (SNS)** is a premier forum for researchers, practitioners, and policy-makers to present and discuss the most recent innovations, trends, results, experiences, and challenges in the field of **computer systems and network security**.

Since its inception in 2014, SNS has provided a vibrant and inclusive platform for the security community, attracting contributions from academia, industry, and government sectors. It has earned a reputation for high-quality peer review, thought-provoking keynotes, and impactful discussions that shape the future of secure systems design.

SNS 2025 invites submissions that explore theoretical foundations, practical systems, and real-world deployment of secure computer and network systems.

---

### Topics of Interest

We invite high-quality original research papers in, but not limited to, the following categories:

#### 1. Operating System and Platform Security

- Secure OS architectures and kernel security
- Secure boot and firmware integrity
- Virtualization and container security
- Trusted Execution Environments (TEEs), e.g., Intel SGX, ARM TrustZone
- Mobile OS and app sandboxing

#### 2. Network and Distributed Systems Security

- Secure communication protocols (TLS, QUIC, VPNs)
- Software-defined networking (SDN) and NFV security
- Network intrusion detection and response
- DoS/DDoS mitigation techniques
- Blockchain and decentralized systems security

#### 3. Cloud, Edge, and IoT Security

- Cloud-native application security
- Multi-tenant data isolation and access control
- Edge computing and fog layer threats
- Security of IoT operating systems and protocols (e.g., MQTT, CoAP)
- Supply-chain security in embedded and constrained devices

#### 4. System-level Threat Modeling and Attack Techniques

- Reverse engineering and binary exploitation
- Rootkits, bootkits, and firmware-level threats
- Advanced persistent threats (APTs) in system-level environments
- Memory corruption, ROP/JOP attacks, and mitigation bypasses
- Malware and botnet analysis

#### 5. Formal Methods and Program Analysis for Security

- Static and dynamic analysis of software
- Automated vulnerability detection and patch generation
- Formal verification of security-critical components
- Secure programming languages and compilers
- Symbolic execution and fuzz testing advances

#### 6. Applied Cryptography in Systems and Networks

- Secure protocols design and cryptographic engineering
- Side-channel attack mitigations at system/network level
- Privacy-preserving systems (e.g., differential privacy, homomorphic encryption)
- Usability of cryptographic interfaces in real systems

#### 7. Security of AI and AI for Security

- Attacks against machine learning systems (e.g., adversarial examples, model inversion)
- ML-based system and network anomaly detection
- Robustness and trustworthiness in AI-enabled systems
- LLM security and its system-level implications

#### 8. Measurement and Empirical Studies

- Large-scale measurement of vulnerabilities or malware
- Deployment studies of security patches, protocols, or tools
- User studies on system/network security usability
- Empirical evaluations of defense effectiveness in the wild

---

### Submission Details

- All submissions must be **original and not under concurrent review** at another venue.
- Submitted papers must be written in **English**, formatted using the **ACM double-column format**, and must not exceed **12 pages**, excluding references and appendices.
- **Double-blind review** process: author names and affiliations must be anonymized.

---

### Important Dates

- **Paper Submission Deadline:** April 23, 2025 (23:59 Beijing Time)
- **Notification of Acceptance:** April 25, 2025
- **Camera-Ready Version Due:** April 27, 2025
- **Conference Dates:** April 28–30, 2025

---

### Organizers

- Wang Qian
- Wang Shali
- Fu Wenqing


Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
CSP--EI 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
ICBDA 2026   IEEE--2026 11th International Conference on Big Data Analytics (ICBDA 2026)
ICIIT 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
ICINT--EI 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
SNS 2025   The 12th International Symposium on System and Network Security (SNS 2025)
Ei/Scopus-AI2A 2025   2025 5th International Conference on Artificial Intelligence, Automation and Algorithms (AI2A 2025)