NDSS Symposium 2025 Call for Papers

The call for papers is now closed.

The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS 2025 Symposium and Workshops will take place in San Diego, CA, from 24 to 28 February 2025. The target audience includes everyone interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2025. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first page of the paper. The authors are thus free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

Paper Submission Information

NDSS 2025 will have two review cycles: a summer submission cycle and a fall submission cycle. The full list of important dates for each session is listed below. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.

For each submission to any of the two review cycles, one of the following decisions will be made:

  • Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference.
  • Minor Revision: Papers in this category will be accepted for publication in the proceedings and presentation at the conference if and only if they undergo a minor revision and the revision is determined satisfactory by their shepherd(s).
  • Major Revision: Papers in this category are considered promising but need additional work (e.g., new implementations, experiments, and/or proofs). Authors may choose to revise and resubmit such papers to NDSS 2025, with appropriate revisions and within six weeks after notification (see specific deadlines below). The revision and second review of “Major Revision” papers will be based on a list of “revision tasks” clearly specified by the original reviewers and conveyed to the authors upon notification. A revised paper will be accepted to NDSS 2025 if it satisfactorily fulfills the revision tasks. A paper may undergo at most one major revision for NDSS 2025.
  • Reject: Papers in this category are not allowed to be resubmitted to NDSS 2025.

The review process will happen in two rounds for each submission cycle. The goal of Round 1 is to identify the papers that warrant further reviews and discussion among the technical program committee members. The goal of Round 2 is to select those papers that will be accepted and appear at the conference. Both review cycles will have an early notification during which the Round 1 reviews will be shared along with the information on whether the paper is early rejected or will proceed to Round 2. Authors of papers proceeding to Round 2 will have an opportunity to rebut the reviews and to interact with the reviewers during an interactive discussion phase.

Authors of accepted papers must ensure that their papers will be presented at the conference according to the conference participation policy.

Artifact Evaluation

Authors of accepted papers are strongly encouraged to open-source their artifacts and to submit them for an artifact evaluation. The details of the artifact evaluation will be released on the NDSS website.

Important Dates

Summer Review Cycle:

  • Wed, 17 April 2024: Paper submission deadline
  • Tue, 21 May 2024: Early reject/Round 2 notification and Round 1 reviews
  • Mon, 10 June to Thu, 13 June 2024: Author rebuttal
  • Mon, 10 June to Tue, 18 June 2024: Interactive discussion with reviewers
  • Thu, 20 June 2024: Author notification
  • Wed, 7 August 2024: Resubmission of Major Revision papers, Minor Revision decision
  • Thu, 29 August 2024: Author notification for Major Revision
  • Thu, 12 September 2024: Camera Ready deadline

Fall Review Cycle:

  • Wed, 10 July 2024: Paper submission deadline
  • Tue, 20 August 2024: Early reject/Round 2 notification and Round 1 reviews
  • Mon, 9 September to Thu, 13 September 2024: Author rebuttal
  • Mon, 9 September to Tue, 17 September 2024: Interactive discussion with reviewers
  • Thu, 19 September 2024: Author notification
  • Wed, 30 October 2024: Resubmission of Major Revision papers, Minor Revision decision
  • Thu, 21 November 2024: Author notification for Major Revision
  • Thu, 5 December 2024: Camera Ready deadline

Areas/Topics of Interest

Submissions are solicited in, but not limited to, the following areas:

  • Anti-malware techniques: detection, analysis, and prevention
  • Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response
  • Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques)
  • Integrating security in network protocols (e.g., routing, naming, and management)
  • Mobile and wireless network security
  • Network security policy implementation, deployment, and management
  • Privacy and anonymity in networks and distributed systems
  • Public key infrastructures, key management, certification, and revocation
  • Security and privacy for blockchains and cryptocurrencies
  • Security and privacy of mobile/smartphone platforms and their operating systems
  • Security and privacy of systems based on machine learning, federated learning, AI, and large language models
  • Security for cloud/edge computing
  • Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
  • Security for emerging networks (e.g., smart homes, IoT, body-area networks, VANETs)
  • Security for future Internet architectures and designs (e.g., Software-Defined Networking)
  • Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid)
  • Security of web-based applications and services (e.g., social networking, crowd-sourcing, fake news/disinformation), web security and privacy
  • Software/firmware/hardware security analysis, customization, and extensions
  • Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics
  • Trustworthy computing software and hardware to secure networks and systems
  • Usable security and privacy

Papers that focus on the systematization of knowledge (called SoK-papers at other venues) are within the scope of NDSS, particularly if they provide new insights and compelling evidence. Such papers do NOT need to be prefixed with “SoK:”, but the authors may choose to do so. Such papers go beyond summarizing previous research (like in surveys); they also include a thorough examination and analysis of existing approaches, identify gaps and limitations, offer insights or new perspectives on a given, major research area, and may also involve new experiments to replicate and compare previous solutions.

A special note on “fit” for all submissions: NDSS is primarily a venue focusing on network and systems security. As such, the Program Committee will be looking for papers that have a clear relation to real systems, networks, and their applications. For instance, a paper that makes significant contributions in an area such as theoretical cryptography but that fails to demonstrably tie those advances to real systems is unlikely to be accepted.

Review Goals

The Program Committee (PC) has an exceedingly difficult job that demands, collectively, many thousands of hours of volunteered effort. The goal of NDSS is not only to select the submissions that are ready for presentation at this venue but also to assist the authors of rejected papers in improving their work as much as possible. To assist in this process, we aim for the following goals as central parts of the review feedback:

  1. Provide concrete steps for improving the work;
  2. Separate reviewer opinion from demonstrable technical weaknesses; and
  3. Provide clear citations to work when claims of novelty are raised.

We may be creating a review task force to support this by selecting a group of PC members who will read reviews across many papers and ensure that all feedback achieves these goals. While we make no claims that this will make the peer-review process perfect (i.e., very good papers may still not be selected), we believe that this will help to improve the process

Paper Formatting

Technical papers submitted for NDSS must not exceed 13 pages, excluding references or appendices, and must be written in English. Papers must be formatted for US letter size (not A4) paper in a two-column layout, with columns no more than 9.25 in. high and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors must use the NDSS templates. Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Documents should render correctly in Adobe Reader when printed in black and white.

Double and Concurrent Submissions

Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

Double-submissions will result in immediate rejection. The Program Committee may share information with other conference chairs and journal editors to detect such cases.

Ethical Considerations

If a paper relates to human subjects, analyzes data derived from human subjects, may put humans at risk, or might have other ethical implications or introduce legal issues of potential concern to the NDSS community, authors should disclose if an ethics review (e.g., IRB approval) was conducted, and discuss in the paper how ethical and legal concerns were addressed. If the paper reports a potentially high-impact vulnerability the authors should report or at least discuss their plan for responsible disclosure. The chairs will contact the authors in case of concerns. An Ethics Review Board (ERB), consisting of TPC members, will check papers flagged by reviewers as potentially including ethically fraught research. Authors are encouraged to review the Menlo Report for general ethical guidelines for computer and information security research. The Program Committee reserves the right to reject a submission if insufficient evidence was presented that ethical or relevant legal concerns were appropriately addressed.

Anonymous Submissions

NDSS implements a double-blind reviewing process. Author names and affiliations should not appear in the paper. The authors should make a reasonable effort not to reveal their identities or institutional affiliations in the text, figures, photos, links, or other data that is contained in the paper. Authors’ prior work must be referred to in the third person; if this is not feasible, the references should be blinded. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed while the paper is under review unless approved by the Program Chairs. Publishing a technical report on a preprint repository, such as arXiv, while not encouraged, is not forbidden. Authors should refrain from broadly advertising their results and may not contact TPC members regarding their submitted work. Please contact the PC chairs if you have questions or concerns.

Conflicts of Interest

Authors and Program Committee members are required to indicate any conflict of interest and its nature. Advisors and those that they are advising, as well as authors and PC members with an institutional relationship are considered to share a conflict of interest. Professional collaborations (irrespective of whether they resulted in publication or funding) that occurred in the past 2 years and close personal relationships equally constitute a conflict of interest. PC members, including chairs, that have a conflict of interest with a paper, will be excluded from the evaluation of that paper.

The PC Co-Chairs are not allowed to submit papers to the conference.

A Special Note on “Fake Conflicts”: Declaring conflicts of interest to avoid certain (otherwise non-conflicting) PC members is not allowed and can constitute grounds for rejection. The PC Chairs reserve the right to request additional explanation for any declared conflict. If authors have concerns about the fair treatment of their submissions, they should instead contact the chairs and provide convincing arguments for any special consideration that they are requesting.

Use of Generative AI

The use of Generative Artificial Intelligence, i.e., tools capable of generating text, images, or other data using generative models, often in response to prompts, is permitted for paper preparation as long as (1) the result does not plagiarize, misrepresent, or falsify content, (2) the resulting work in its totality is an accurate representation of the authors’ underlying work and novel intellectual contributions and is not primarily the result of the tools’ generative capabilities, and (3) the authors accept responsibility for the veracity and correctness of all material in their paper, including any AI-generated material.

The use of generative AI software tools must be disclosed as part of the paper submission. The level of disclosure should be commensurate with the proportion of new text or content generated by these tools. If entire (sub)sections of a paper, including tables, graphs, images, and other content were AI-generated, the authors must disclose which sections and which tools and tool versions were used to generate those sections (e.g., by preparing an Appendix that describes the use, specific tools and versions, the text of the prompts provided as input, and any post-generation editing). If the amount of text being generated is small (limited to phrases or a few sentences), then it would be sufficient to add a citation or a footnote to the relevant section of the submission utilizing the system(s) and include a general disclaimer in the Acknowledgements section. If generative AI software tools are only used to edit and improve the quality of human-generated existing text in much the same way as one would use a basic word processing system to correct spelling or grammar or use a typing assistant (like Grammarly) to improve spelling, grammar, punctuation, clarity, engagement, it is not necessary to disclose such usage of these tools in the paper.

Questions? Contact the PC chair at [email protected].