Call for Papers
The IEEE Conference on Dependable and Secure Computing (DSC 2025) invites submissions of papers, posters, and practices/experiences showcasing innovative research, practical solutions, and emerging challenges in dependable and secure computing. This premier conference aims to bring together researchers, practitioners, and industry leaders to advance the state-of-the-art in designing, implementing, and analyzing dependable and secure computing systems. We welcome contributions covering the entire IT landscape, including hardware design, software engineering, network security, cloud computing, IoT security, and AI-driven security solutions, with a strong focus on dependability and security. Accepted papers will be eligible for submission to the IEEE Xplore Digital Library.
Main Track: Regular Papers
The DSC conference accepts regular research papers that have no more than 8 pages. Topics of interest include, but are not limited to:
- Advanced Persistent Threat (APT)
- Big Data Analysis
- Botnet and Intrusion Detection
- Cryptographic Methods and Toolkits
- Cyber attacks
- Data/Information Reliability
- Database Security and Privacy
- Embedded Systems and IoT Devices
- Experimentation, Measurement, and Assessment
- Mobile and Cloud Computing
- Software vulnerabilities
- Malware analysis
- SDN and NFV
- Security and Privacy for AI
- Hardware security and reliability
- CAD Algorithms and Tools
- Electronic Circuits and Systems
- Fault-Tolerant Architectures and Designs
- Industrial Design Experiences
- Noise-Aware Designs
- Power-Aware Designs
- Soft-Error Analysis and Models
- Stochastic Circuits and Systems
- Temperature-Aware Designs
- Variable-Latency Designs
- Security Circuits, Designs, and Detection
Experience and Practice Track: Short Papers
The DSC conference also solicits short (2-page) experience and practice papers that present new findings from operational or experimental systems. Submissions to this track will be evaluated with the understanding that they primarily contribute to practical know-how or an enhanced understanding of how established security techniques perform in real-world deployments. Authors have to submit a 2-page paper along with a supplemental video (up to 3 minutes) demonstrating the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:
- Attacks on Information Systems and/or Digital Information Storage
- CSIRTs, Incident Analysis, and Response
- Honeypots/Honeynets
- Malware Analysis and Reversing
- Mobile Communications Security and Vulnerabilities
- Newly discovered vulnerabilities in software and hardware
- Offensive (and Counter-Offensive) Information Technology
- Reverse Engineering, Forensics, and Anti-Forensics
- Spyware, Phishing and Distributed Attacks
- VLSI/CAD Design Knowhow
- Data Security and Privacy
- PPML and online advertising
- Attacks on model robustness
Important Dates
- Paper submission: May 24, 2025
- Notification of paper acceptance: July 15, 2025
- Camera ready: August 22, 2025
Submission Instructions
Papers must be written in English and should not exceed 8 pages for regular papers and 2 pages for experience and practice papers, inclusive of figures, tables, references and appendix using IEEE Conference Proceedings Manuscripts style (two-columns, single-spaced, 10 fonts). The materials presented in the papers should not be published or under submission/review elsewhere. All submitted papers will be peer-reviewed. Accepted papers will appear in the conference proceedings and will be eligible for submission to the IEEE Xplore Digital Library. At least one of the authors of any accepted paper is requested to register the paper at the conference.
Paper templates can be downloaded from IEEE website.
Electronic submission site: https://edas.info/N33678
Anonymous Submission Guidelines
The review process will be anonymous. Papers must be submitted in a format that ensures anonymity:
- Do not include author names or affiliations on the submitted paper.
- Review all figures and appendices to ensure no affiliations are accidentally included.
- Refer to your previous work in the third person, as if it was authored by someone else.
- You may include links to websites containing source code, tools, or other supplementary materials, but ensure neither the link nor the website reveal the authors’ identities (e.g., by including names or affiliations).
Papers that are not properly anonymized may be rejected without review.
Ethical Considerations for Paper Submissions
Authors are expected to carefully consider and address any ethical issues associated with their research. This includes potential harms, vulnerabilities, and the treatment of human subjects. Failure to address these concerns adequately may result in rejection of the submission.
- Vulnerability Disclosure: If your research identifies vulnerabilities (e.g., software, hardware, or other systems), you must take steps to avoid harm to affected users. Responsible disclosure to vendors and stakeholders is expected, typically within a 45 to 90-day window prior to publication. Detail the steps taken or planned to address these vulnerabilities in your submission.
- Human Subjects Research: For research involving human subjects or data derived from them, discuss the measures taken to ensure ethical treatment and respect for participants. If your research received approval or waiver from an ethics review board (IRB), please include this information in your submission. If dealing with personal identifiable information (PII) or sensitive data, outline the steps to mitigate potential harms.
- General Ethical Concerns: All submissions should include a clear statement on how ethical and legal concerns were addressed. This is crucial for papers with significant ethical implications or high-impact findings.