Conference Information
S&P 2026: IEEE Symposium on Security and Privacy
https://www.ieee-security.org/TC/SP2026/
Submission Date:
2025-11-13
Notification Date:
2026-03-19
Conference Date:
2026-05-18
Location:
San Francisco, California, USA
Years:
47
CCF: a   CORE: a*   Viewed: 234570   Tracked: 283   Attend: 28

Call For Papers
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice.

Topics of interest include:

    Applied cryptography
    Attacks with novel insights, techniques, or results
    Authentication, access control, and authorization
    Blockchains and distributed ledger security
    Cloud computing security
    Cyber physical systems security
    Distributed systems security
    Economics of security and privacy
    Embedded systems security
    Formal methods and verification
    Hardware security
    Hate, Harassment, and Online Abuse
    Human-centered security and privacy
    Intrusion detection and prevention
    Malware and unwanted software
    Network security and measurement
    ML - Methods for confidentiality and privacy of data in ML systems
    ML - Methods for integrity and availability of ML systems
    ML - Novel attacks on ML systems
    ML - Verifying security and privacy properties of ML algorithms
    Operating systems security
    Privacy-enhancing technologies, anonymity, and censorship
    Program and binary analysis
    Protocol security
    Security and privacy metrics
    Security and privacy policies
    Security architectures
    Security for at-risk populations
    Software supply chain security
    Systems security
    User studies for security and privacy
    Web security and privacy
    Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
Last updated by Dou Sun in 2025-04-13
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
202195211512.1%
202084110412.4%
20196798412.4%
20185496311.5%
20174576013.1%
20164135513.3%
20154075513.5%
20143344413.2%
20133153812.1%
20133153812.1%
20123074013%
20113063411.1%
20102673111.6%
20092542811%
20082492811.2%
20072462911.8%
20062513212.7%
2005192178.9%
2004192199.9%
20031311914.5%
2002952122.1%
20011071917.8%
20001371813.1%
1999611524.6%
19981161916.4%
19971102018.2%
1996672029.9%
1995722027.8%
1994651929.2%
1993701724.3%
1992892123.6%
1991922830.4%
1986912527.5%
1985632539.7%
1984392564.1%
1983342367.6%
1982341955.9%
19801919100%
Best Papers
YearBest Papers
2023Characterizing Everyday Misuse of Smart Home Devices
2023Practically-exploitable Cryptographic Vulnerabilities in Matrix
2023MEGA: Malleable Encryption Goes Awry
2023Weak Fiat-Shamir Attacks on Modern Proof Systems
2023Typing High-Speed Cryptography against Spectre v1
2023Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
2023It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses
2023The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web
2023WaVe: a verifiably secure WebAssembly sandboxing runtime
2023Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution
2023"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya
2023Space Odyssey: An Experimental Software Security Analysis of Satellites
2022Four Attacks and a Proof for Telegram
2022Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
2022Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices
2022Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
2021Hardware-Software Contracts for Secure Speculation
2021Compositional Security for Reentrant Applications
2020TRRespass: Exploiting the Many Sides of Target Row Refresh
2019Understanding Lifecycle Management Complexity of Datacenter Topologies
2018On Enforcing the Digital Immunity of a Large Humanitarian Organization
2018DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice
2017Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
2016A2: Analog Malicious Hardware
2015A Messy State of the Union: Taming the Composite State Machines of TLS
2015Riposte: An Anonymous Messaging System Handling Millions of Users
2014Secure Multiparty Computations on BitCoin Marcin Andry
2014Bootstrapping Privacy Compliance in Big Data Systems
2013Pinocchio: Nearly Practical Verifiable Computation
2012Dont Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks
2010SCiFI - A System for Secure Face Identification
2009Native Client: A Sandbox for Portable, Untrusted x86 Native Code
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cb1WiSecACM Conference on Security and Privacy in Wireless and Mobile Networks2025-03-122025-04-232025-06-30
cb2PSTInternational Conference on Privacy, Security and Trust2025-04-042025-06-012025-08-26
cbb1SecureCommInternational ICST Conference on Security and Privacy in Communication Networks2025-04-102025-05-102025-07-04
cbb1SECInternational Conference on ICT Systems Security and Privacy Protection2022-01-152022-03-082022-06-13
cACISPAustralasian Conference on Information Security and Privacy2025-02-192025-04-082025-07-14
b4CODASPYACM Conference on Data and Application Security and Privacy2024-12-012025-01-242025-06-04
ccNSPWNew Security Paradigms Workshop2025-04-252025-05-302025-08-24
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18