posted by organizer: fuwenqing || 475 views || tracked by 2 users: [display]

SNS 2025 : The 12th International Symposium on System and Network Security (SNS 2025)

FacebookTwitterLinkedInGoogle

 
When Apr 28, 2025 - Apr 30, 2025
Where Chengdu, China
Submission Deadline Apr 23, 2025
Notification Due Apr 25, 2025
Final Version Due Apr 27, 2025
 

Call For Papers



---

# Call for Papers

## **The 12th International Symposium on System and Network Security (SNS 2025)**

**Location:** Chengdu, Sichuan, China
**Date:** April 28–30, 2025

---

### About SNS

The **International Symposium on System and Network Security (SNS)** is a premier forum for researchers, practitioners, and policy-makers to present and discuss the most recent innovations, trends, results, experiences, and challenges in the field of **computer systems and network security**.

Since its inception in 2014, SNS has provided a vibrant and inclusive platform for the security community, attracting contributions from academia, industry, and government sectors. It has earned a reputation for high-quality peer review, thought-provoking keynotes, and impactful discussions that shape the future of secure systems design.

SNS 2025 invites submissions that explore theoretical foundations, practical systems, and real-world deployment of secure computer and network systems.

---

### Topics of Interest

We invite high-quality original research papers in, but not limited to, the following categories:

#### 1. Operating System and Platform Security

- Secure OS architectures and kernel security
- Secure boot and firmware integrity
- Virtualization and container security
- Trusted Execution Environments (TEEs), e.g., Intel SGX, ARM TrustZone
- Mobile OS and app sandboxing

#### 2. Network and Distributed Systems Security

- Secure communication protocols (TLS, QUIC, VPNs)
- Software-defined networking (SDN) and NFV security
- Network intrusion detection and response
- DoS/DDoS mitigation techniques
- Blockchain and decentralized systems security

#### 3. Cloud, Edge, and IoT Security

- Cloud-native application security
- Multi-tenant data isolation and access control
- Edge computing and fog layer threats
- Security of IoT operating systems and protocols (e.g., MQTT, CoAP)
- Supply-chain security in embedded and constrained devices

#### 4. System-level Threat Modeling and Attack Techniques

- Reverse engineering and binary exploitation
- Rootkits, bootkits, and firmware-level threats
- Advanced persistent threats (APTs) in system-level environments
- Memory corruption, ROP/JOP attacks, and mitigation bypasses
- Malware and botnet analysis

#### 5. Formal Methods and Program Analysis for Security

- Static and dynamic analysis of software
- Automated vulnerability detection and patch generation
- Formal verification of security-critical components
- Secure programming languages and compilers
- Symbolic execution and fuzz testing advances

#### 6. Applied Cryptography in Systems and Networks

- Secure protocols design and cryptographic engineering
- Side-channel attack mitigations at system/network level
- Privacy-preserving systems (e.g., differential privacy, homomorphic encryption)
- Usability of cryptographic interfaces in real systems

#### 7. Security of AI and AI for Security

- Attacks against machine learning systems (e.g., adversarial examples, model inversion)
- ML-based system and network anomaly detection
- Robustness and trustworthiness in AI-enabled systems
- LLM security and its system-level implications

#### 8. Measurement and Empirical Studies

- Large-scale measurement of vulnerabilities or malware
- Deployment studies of security patches, protocols, or tools
- User studies on system/network security usability
- Empirical evaluations of defense effectiveness in the wild

---

### Submission Details

- All submissions must be **original and not under concurrent review** at another venue.
- Submitted papers must be written in **English**, formatted using the **ACM double-column format**, and must not exceed **12 pages**, excluding references and appendices.
- **Double-blind review** process: author names and affiliations must be anonymized.

---

### Important Dates

- **Paper Submission Deadline:** April 23, 2025 (23:59 Beijing Time)
- **Notification of Acceptance:** April 25, 2025
- **Camera-Ready Version Due:** April 27, 2025
- **Conference Dates:** April 28–30, 2025

---

### Organizers

- Wang Qian
- Wang Shali
- Fu Wenqing


Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ICDMIS 2025   International Conference on Data Mining and Information Security
SPIE-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
ICSSS 2025   2025 The International Conference on System Safety and Security (ICSSS 2025)
ICINT--EI 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ICACT 2026   The 28th International Conference on Advanced Communications Technology
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)