Información de la conferencia
S&P 2026: IEEE Symposium on Security and Privacy
Por favor Iniciar para ver el sitio web del congreso

Día de Entrega:
2025-11-13
Fecha de Notificación:
2026-03-19
Fecha de Conferencia:
2026-05-18
Ubicación:
San Francisco, California, USA
Años:
47
CCF: a   CORE: a*   Vistas: 271671   Seguidores: 285   Asistentes: 28

Solicitud de Artículos
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice.

Topics of interest include:

Applied cryptography
Attacks with novel insights, techniques, or results
Authentication, access control, and authorization
Blockchains and distributed ledger security
Cloud computing security
Cyber physical systems security
Distributed systems security
Economics of security and privacy
Embedded systems security
Formal methods and verification
Hardware security
Hate, Harassment, and Online Abuse
Human-centered security and privacy
Intrusion detection and prevention
Malware and unwanted software
Network security and measurement
ML - Methods for confidentiality and privacy of data in ML systems
ML - Methods for integrity and availability of ML systems
ML - Novel attacks on ML systems
ML - Verifying security and privacy properties of ML algorithms
Operating systems security
Privacy-enhancing technologies, anonymity, and censorship
Program and binary analysis
Protocol security
Security and privacy metrics
Security and privacy policies
Security architectures
Security for at-risk populations
Software supply chain security
Systems security
User studies for security and privacy
Web security and privacy
Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
Última Actualización Por Dou Sun en 2025-04-13
Coeficiente de Aceptación
AñoEnviadosAceptadosAceptados(%)
202195211512.1%
202084110412.4%
20196798412.4%
20185496311.5%
20174576013.1%
20164135513.3%
20154075513.5%
20143344413.2%
20133153812.1%
20133153812.1%
20123074013%
20113063411.1%
20102673111.6%
20092542811%
20082492811.2%
20072462911.8%
20062513212.7%
2005192178.9%
2004192199.9%
20031311914.5%
2002952122.1%
20011071917.8%
20001371813.1%
1999611524.6%
19981161916.4%
19971102018.2%
1996672029.9%
1995722027.8%
1994651929.2%
1993701724.3%
1992892123.6%
1991922830.4%
1986912527.5%
1985632539.7%
1984392564.1%
1983342367.6%
1982341955.9%
19801919100%
Los Mejores Artículos
AñoLos Mejores Artículos
2023Characterizing Everyday Misuse of Smart Home Devices
2023Practically-exploitable Cryptographic Vulnerabilities in Matrix
2023MEGA: Malleable Encryption Goes Awry
2023Weak Fiat-Shamir Attacks on Modern Proof Systems
2023Typing High-Speed Cryptography against Spectre v1
2023Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
2023It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses
2023The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web
2023WaVe: a verifiably secure WebAssembly sandboxing runtime
2023Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution
2023"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya
2023Space Odyssey: An Experimental Software Security Analysis of Satellites
2022Four Attacks and a Proof for Telegram
2022Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
2022Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices
2022Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
2021Hardware-Software Contracts for Secure Speculation
2021Compositional Security for Reentrant Applications
2020TRRespass: Exploiting the Many Sides of Target Row Refresh
2019Understanding Lifecycle Management Complexity of Datacenter Topologies
2018On Enforcing the Digital Immunity of a Large Humanitarian Organization
2018DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice
2017Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
2016A2: Analog Malicious Hardware
2015A Messy State of the Union: Taming the Composite State Machines of TLS
2015Riposte: An Anonymous Messaging System Handling Millions of Users
2014Secure Multiparty Computations on BitCoin Marcin Andry
2014Bootstrapping Privacy Compliance in Big Data Systems
2013Pinocchio: Nearly Practical Verifiable Computation
2012Dont Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks
2010SCiFI - A System for Secure Face Identification
2009Native Client: A Sandbox for Portable, Untrusted x86 Native Code
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
ccNSPWNew Security Paradigms Workshop2026-04-302026-06-302026-09-27
cb2PSTInternational Conference on Privacy, Security and Trust2026-04-102026-06-012026-08-26
cACISPAustralasian Conference on Information Security and Privacy2026-02-262026-04-162026-07-06
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
cbb1SecureCommInternational ICST Conference on Security and Privacy in Communication Networks2025-04-102025-05-102025-07-04
cb1WiSecACM Conference on Security and Privacy in Wireless and Mobile Networks2025-03-122025-04-232025-06-30
b4CODASPYACM Conference on Data and Application Security and Privacy2024-12-012025-01-242025-06-04
cbb1SECInternational Conference on ICT Systems Security and Privacy Protection2022-01-152022-03-082022-06-13
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
Telecommunications Policy6.4Elsevier0308-5961
bComputers & Security5.4Elsevier0167-4048
Safety Science5.4Elsevier0925-7535
cJournal of Cybersecurity3.2Oxford University Press2057-2093
Computer Law & Security Review3.2Elsevier0267-3649
IEEE Security & Privacy3.0IEEE1540-7993
ACM Transactions on Privacy and Security2.8ACM2471-2566
Security and Privacy1.500John Wiley & Sons Ltd2475-6725
Journal of Heuristics1.100Springer1381-1231
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650