NDSS Symposium 2025 Call for Papers

The call for papers is now open.

The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS 2025 Symposium and Workshops will take place in San Diego, CA, from 23 to 28 February 2025. The target audience includes everyone interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2025. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first page of the paper. The authors are thus free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

Paper Submission Information

NDSS 2025 will have two review cycles: a summer submission cycle and a fall submission cycle. The full list of important dates for each session is listed below. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.

For each submission to any of the two review cycles, one of the following decisions will be made:

  • Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference.
  • Minor Revision: Papers in this category will be accepted for publication in the proceedings and presentation at the conference if and only if they undergo a minor revision and the revision is determined satisfactory by their shepherd(s).
  • Major Revision: Papers in this category are considered promising but need additional work (e.g., new implementations, experiments, and/or proofs). Authors may choose to revise and resubmit such papers to NDSS 2025, with appropriate revisions and within six weeks after notification (see specific deadlines below). The revision and second review of “Major Revision” papers will be based on a list of “revision tasks” clearly specified by the original reviewers and conveyed to the authors upon notification. A revised paper will be accepted to NDSS 2025 if it satisfactorily fulfills the revision tasks. A paper may undergo at most one major revision for NDSS 2025.
  • Reject: Papers in this category are not allowed to be resubmitted to NDSS 2025.

The review process will happen in two rounds for each submission cycle. The goal of Round 1 is to identify the papers that warrant further reviews and discussion among the technical program committee members. The goal of Round 2 is to select those papers that will be accepted and appear at the conference. Both review cycles will have an early notification during which the Round 1 reviews will be shared along with the information on whether the paper is early rejected or will proceed to Round 2. Authors of papers proceeding to Round 2 will have an opportunity to rebut the reviews and to interact with the reviewers during an interactive discussion phase.

Authors of accepted papers must ensure that their papers will be presented at the conference according to the conference participation policy.

Artifact Evaluation

Authors of accepted papers are strongly encouraged to open-source their artifacts and to submit them for an artifact evaluation. The details of the artifact evaluation will be released on the NDSS website.

Important Dates

Summer Review Cycle:

  • Wed, 17 April 2024: Paper submission deadline
  • Tue, 21 May 2024: Early reject/Round 2 notification and Round 1 reviews
  • Mon, 10 June to Thu, 13 June 2024: Author rebuttal
  • Mon, 10 June to Tue, 18 June 2024: Interactive discussion with reviewers
  • Thu, 20 June 2024: Author notification
  • Wed, 7 August 2024: Resubmission of Major Revision papers, Minor Revision decision
  • Thu, 29 August 2024: Author notification for Major Revision
  • Thu, 12 September 2024: Camera Ready deadline

Fall Review Cycle:

  • Wed 10 July 2024: Paper submission deadline
  • Tue, 20 August 2024: Early reject/Round 2 notification and Round 1 reviews
  • Mon, 9 September to Thu, 13 September 2024: Author rebuttal
  • Mon, 9 September to Tue, 17 September 2024: Interactive discussion with reviewers
  • Thu, 19 September 2024: Author notification
  • Wed, 30 October 2024: Resubmission of Major Revision papers, Minor Revision decision
  • Thu, 21 November 2024: Author notification for Major Revision
  • Thu, 5 December 2024: Camera Ready deadline

Areas/Topics of Interest

Submissions are solicited in, but not limited to, the following areas:

  • Anti-malware techniques: detection, analysis, and prevention
  • Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response
  • Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques)
  • Integrating security in network protocols (e.g., routing, naming, and management)
  • Mobile and wireless network security
  • Network security policy implementation, deployment, and management
  • Privacy and anonymity in networks and distributed systems
  • Public key infrastructures, key management, certification, and revocation
  • Security and privacy for blockchains and cryptocurrencies
  • Security and privacy of mobile/smartphone platforms and their operating systems
  • Security and privacy of systems based on machine learning, federated learning, AI, and large language models
  • Security for cloud/edge computing
  • Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
  • Security for emerging networks (e.g., smart homes, IoT, body-area networks, VANETs)
  • Security for future Internet architectures and designs (e.g., Software-Defined Networking)
  • Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid)
  • Security of web-based applications and services (e.g., social networking, crowd-sourcing, fake news/disinformation), web security and privacy
  • Software/firmware/hardware security analysis, customization, and extensions
  • Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics
  • Trustworthy computing software and hardware to secure networks and systems
  • Usable security and privacy

A special note on “fit” for all submissions: NDSS is primarily a venue focusing on network and systems security. As such, the Program Committee will be looking for papers that have a clear relation to real systems, networks, and their applications. For instance, a paper that makes significant contributions in an area such as theoretical cryptography but that fails to demonstrably tie those advances to real systems is unlikely to be accepted.

Review Goals

The Program Committee (PC) has an exceedingly difficult job that demands, collectively, many thousands of hours of volunteered effort. The goal of NDSS is not only to select the submissions that are ready for presentation at this venue but also to assist the authors of rejected papers in improving their work as much as possible. To assist in this process, we aim for the following goals as central parts of the review feedback:

  1. Provide concrete steps for improving the work;
  2. Separate reviewer opinion from demonstrable technical weaknesses; and
  3. Provide clear citations to work when claims of novelty are raised.

We may be creating a review task force to support this by selecting a group of PC members who will read reviews across many papers and ensure that all feedback achieves these goals. While we make no claims that this will make the peer-review process perfect (i.e., very good papers may still not be selected), we believe that this will help to improve the process

Paper Formatting

Technical papers submitted for NDSS must not exceed 13 pages, excluding references or appendices, and must be written in English. Papers must be formatted for US letter size (not A4) paper in a two-column layout, with columns no more than 9.25 in. high and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors must use the NDSS templates. Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Documents should render correctly in Adobe Reader when printed in black and white.

Double and Concurrent Submissions

Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

Double-submissions will result in immediate rejection. The Program Committee may share information with other conference chairs and journal editors to detect such cases.

Ethical Considerations

If a paper relates to human subjects, analyzes data derived from human subjects, may put humans at risk, or might have other ethical implications or introduce legal issues of potential concern to the NDSS community, authors should disclose if an ethics review (e.g., IRB approval) was conducted, and discuss in the paper how ethical and legal concerns were addressed. If the paper reports a potentially high-impact vulnerability the authors should report or at least discuss their plan for responsible disclosure. The chairs will contact the authors in case of concerns. The Program Committee reserves the right to reject a submission if insufficient evidence was presented that ethical or relevant legal concerns were appropriately addressed.

Anonymous Submissions

NDSS implements a double-blind reviewing process. Author names and affiliations should not appear in the paper. The authors should make a reasonable effort not to reveal their identities or institutional affiliations in the text, figures, photos, links, or other data that is contained in the paper. Authors’ prior work must be referred to in the third person; if this is not feasible, the

references should be blinded. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed while the paper is under review unless approved by the Program Chairs. Publishing a technical report on a preprint repository, such as arXiv, while not encouraged, is not forbidden. Authors should refrain from broadly advertising their results and may not contact TPC members regarding their submitted work. Please contact the PC chairs if you have questions or concerns.

Conflicts of Interest

Authors and Program Committee members are required to indicate any conflict of interest and its nature. Advisors and those that they are advising, as well as authors and PC members with an institutional relationship are considered to share a conflict of interest. Professional collaborations (irrespective of whether they resulted in publication or funding) that occurred in the past 2 years and close personal relationships equally constitute a conflict of interest. PC members, including chairs, that have a conflict of interest with a paper, will be excluded from the evaluation of that paper.

The PC Co-Chairs are not allowed to submit papers to the conference.

A Special Note on “Fake Conflicts”: Declaring conflicts of interest to avoid certain (otherwise non-conflicting) PC members is not allowed and can constitute grounds for rejection. The PC Chairs reserve the right to request additional explanation for any declared conflict. If authors have concerns about the fair treatment of their submissions, they should instead contact the chairs and provide convincing arguments for any special consideration that they are requesting.

Questions? Contact PC chair at [email protected].