posted by organizer: fuwenqing || 1390 views || tracked by 3 users: [display]

SNS 2025 : The 12th International Symposium on System and Network Security (SNS 2025)

FacebookTwitterLinkedInGoogle

 
When Apr 28, 2025 - Apr 30, 2025
Where Chengdu, China
Submission Deadline Apr 23, 2025
Notification Due Apr 25, 2025
Final Version Due Apr 27, 2025
 

Call For Papers



---

# Call for Papers

## **The 12th International Symposium on System and Network Security (SNS 2025)**

**Location:** Chengdu, Sichuan, China
**Date:** April 28–30, 2025

---

### About SNS

The **International Symposium on System and Network Security (SNS)** is a premier forum for researchers, practitioners, and policy-makers to present and discuss the most recent innovations, trends, results, experiences, and challenges in the field of **computer systems and network security**.

Since its inception in 2014, SNS has provided a vibrant and inclusive platform for the security community, attracting contributions from academia, industry, and government sectors. It has earned a reputation for high-quality peer review, thought-provoking keynotes, and impactful discussions that shape the future of secure systems design.

SNS 2025 invites submissions that explore theoretical foundations, practical systems, and real-world deployment of secure computer and network systems.

---

### Topics of Interest

We invite high-quality original research papers in, but not limited to, the following categories:

#### 1. Operating System and Platform Security

- Secure OS architectures and kernel security
- Secure boot and firmware integrity
- Virtualization and container security
- Trusted Execution Environments (TEEs), e.g., Intel SGX, ARM TrustZone
- Mobile OS and app sandboxing

#### 2. Network and Distributed Systems Security

- Secure communication protocols (TLS, QUIC, VPNs)
- Software-defined networking (SDN) and NFV security
- Network intrusion detection and response
- DoS/DDoS mitigation techniques
- Blockchain and decentralized systems security

#### 3. Cloud, Edge, and IoT Security

- Cloud-native application security
- Multi-tenant data isolation and access control
- Edge computing and fog layer threats
- Security of IoT operating systems and protocols (e.g., MQTT, CoAP)
- Supply-chain security in embedded and constrained devices

#### 4. System-level Threat Modeling and Attack Techniques

- Reverse engineering and binary exploitation
- Rootkits, bootkits, and firmware-level threats
- Advanced persistent threats (APTs) in system-level environments
- Memory corruption, ROP/JOP attacks, and mitigation bypasses
- Malware and botnet analysis

#### 5. Formal Methods and Program Analysis for Security

- Static and dynamic analysis of software
- Automated vulnerability detection and patch generation
- Formal verification of security-critical components
- Secure programming languages and compilers
- Symbolic execution and fuzz testing advances

#### 6. Applied Cryptography in Systems and Networks

- Secure protocols design and cryptographic engineering
- Side-channel attack mitigations at system/network level
- Privacy-preserving systems (e.g., differential privacy, homomorphic encryption)
- Usability of cryptographic interfaces in real systems

#### 7. Security of AI and AI for Security

- Attacks against machine learning systems (e.g., adversarial examples, model inversion)
- ML-based system and network anomaly detection
- Robustness and trustworthiness in AI-enabled systems
- LLM security and its system-level implications

#### 8. Measurement and Empirical Studies

- Large-scale measurement of vulnerabilities or malware
- Deployment studies of security patches, protocols, or tools
- User studies on system/network security usability
- Empirical evaluations of defense effectiveness in the wild

---

### Submission Details

- All submissions must be **original and not under concurrent review** at another venue.
- Submitted papers must be written in **English**, formatted using the **ACM double-column format**, and must not exceed **12 pages**, excluding references and appendices.
- **Double-blind review** process: author names and affiliations must be anonymized.

---

### Important Dates

- **Paper Submission Deadline:** April 23, 2025 (23:59 Beijing Time)
- **Notification of Acceptance:** April 25, 2025
- **Camera-Ready Version Due:** April 27, 2025
- **Conference Dates:** April 28–30, 2025

---

### Organizers

- Wang Qian
- Wang Shali
- Fu Wenqing


Related Resources

IEEE-ASENS 2026   2026 3rd International Conference on Algorithms, Software Engineering and Network Security
IJNSA 2026   International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52
CNSA 2026   19th International Conference on Network Security & Applications
IJMNCT 2026   International Journal of Mobile Network Communications & Telematics
Applied System Innovation 2026   Special Issue: AI-Driven Computational Methods for Social Media Analysis
SoSE 2026   21st Annual System of Systems Engineering Conference 2026
DFTS 2026   IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems
DFTS 2026   International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems
ICoSSE 2026   2026 9th International Conference on Software and System Engineering (ICoSSE 2026)
ICoSSE--Ei 2026   2026 9th International Conference on Software and System Engineering (ICoSSE 2026)