posted by organizer: wmazurczyk || 51 views || tracked by 1 users: [display]

CUING 2026 : 10th International Workshop of Cyber Use of Information Hiding

FacebookTwitterLinkedInGoogle

Link: https://www.ares-conference.eu/cuing
 
When Aug 24, 2026 - Aug 27, 2026
Where Linköping, Sweden
Submission Deadline May 8, 2026
Notification Due Jun 1, 2026
Final Version Due Jun 13, 2026
Categories    steganography   stegomalware   information hiding   security
 

Call For Papers

Workshop Description

The increasing number of Internet users, availability of storage and network resources, and proliferation of as-a-Service frameworks, leads to a new-wave of offensive campaigns targeting the virtual world. With the diffusion of improved defensive methods, attackers now utilize more and more sophisticated techniques to perform their malicious activities. In recent years, information hiding has emerged as one of the most sophisticated and effective mechanisms for launching attacks. Threat actors now regularly use information hiding to elude countermeasures and prevent reversing the attack chain. More recently, hiding techniques have been deployed to create covert channels, i.e., parasitic communications paths nested in network traffic and digital objects, mainly to cloak command & control communications. Unfortunately, detection and mitigation of threats taking advantage of information hiding are hard tasks that pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding techniques when used in cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop are not limited to classic digital steganography applications or the creation and mitigation of covert communications. Therefore, CUIng also welcomes works that pertain to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of processes, and communication flows. To present a more complete picture of the novel research on hiding methods and their utilization by the attackers, submissions dealing with impersonation or mimicking are encouraged as well, especially to address information hiding in a complete manner, for instance, to discuss ideas for fighting misuse of privacy-enhancing technologies.

Moreover, the extended versions of all accepted papers will be considered for publication in a special issue of the Journal of Cyber Security and Mobility (indexed in Scopus).

Topics of interest include, but are not limited to:

• Cyber information hiding techniques
• Studies regarding the use of information hiding in cybercrime
• Analysis of cybercrime cases related to information hiding
• New steganographic & steganalysis methods
• Local, air-gapped, and network covert channels
• Side channels and less obvious usage of information hiding techniques
• Digital watermarking of multimedia content and network traffic
• Stegomalware-related research, including techniques and detection
• Novel countermeasures against information hiding techniques: detection, prevention, limitation
• Evasion, obfuscation, and anti-forensics techniques used in cyberattacks
• Traffic type obfuscation techniques, e.g., traffic morphing
• Hiding covert communication within network attacks, e.g., DDoS, SPAM, etc.
• Underground marketplaces and their business models (e.g., legal and technical aspects of darknet)
• Information-hiding-based botnets and their mitigation
• Information hiding based on adversarial learning and generative AI
• Utilization of AI/ML techniques for improved data hiding techniques and detection methods
• Information hiding in AI/ML models and datasets
• Utilization of information hiding techniques to fight disinformation
• Privacy enhancing techniques
• Aspects and methods for sharing strategic intelligence
• Abusing legitimate social media, cloud-based services, etc. for information hiding purposes

Important Dates

Submission Deadline: May 08, 2026
Author notification: June 1, 2026
Camera-ready version: June 13, 2026

Workshop Chairs

Wojciech Mazurczyk (Chair)
Warsaw University of Technology, Poland
wojciech.mazurczyk@pw.edu.pl

Philipp Amann (Chair)
Europol, European Cybercrime Centre, The Netherlands
Philipp.Amann@europol.europa.eu

Luca Caviglione (Chair)
CNR – IMATI, Italy
luca.caviglione@ge.imati.cnr.it

Angelo Consoli (Chair)
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
angelo.consoli@supsi.ch

Peter Kieseberg (Chair)
FH St. Pölten, Austria
Peter.Kieseberg@fhstp.ac.at

Joerg Keller (Chair)
FernUniversitaet in Hagen, Germany
Joerg.Keller@fernuni-hagen.de

Related Resources

IJAIT 2026   International Journal of Advanced Information Technology
RAID 2026   The 29th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2026)
EI/Scopus-ICMLM 2026   2026 International Conference on Machine Learning and Large Models-EI/Scopus
Cyber-AI 2026   The 2nd IEEE 2026 International Conference on Cybersecurity and AI-Based Systems (Scopus)
CIOS 2026   4th International Conference on Cloud, IoT and Security
CYBER 2026   The Eleventh International Conference on Cyber-Technologies and Cyber-Systems
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
Cyber Science 2026   International Conference on Cybersecurity, Situational Awareness and Social Media
AI-EE 2026   2026 International Conference on Artificial Intelligence and Electrical Engineering-EI/Scopus
SPIRE 2026   33rd International Symposium on String Processing and Information Retrieval