Journal Information
IEEE Security & Privacy
Impact Factor:
Call For Papers
IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community — ranging from academic researchers to industry practitioners.IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal and ethical issues, privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology, and other topics of interest to a general, technically oriented readership.All submissions in the magazine’s scope will be peer-reviewed, and accepted manuscripts will be professionally copy-edited to ensure a common style and level of content for the magazine.Articles that report the latest advances in research, particularly those that address a narrow technical area and those that lack content reporting results of experimental validation or deployment of new methods or technologies, are generally not suitable for publication in IEEE Security & Privacy. Authors of such works are advised to submit them to research conferences and journals with the appropriate scope. IEEE Transactions on Reliability or IEEE Transactions on Secure and Dependable Systems, for example, might provide appropriate venues for some such submissions.S&P is copublished by the IEEE Computer Society and the IEEE Reliability Society. Technical cosponsors are the IEEE Signal Processing Society and IEEE Engineering in Medicine & Biology Society.S&P accepts commercial and classified advertisements.
Last updated by Dou Sun in 2021-05-02
Special Issues
Special Issue on the Impact of Emerging Hardware on Security and Privacy
Submission Date: 2022-10-13

Recently, we have seen a variety of hardware features released that are designed to improve software security. In the 30 years since the Morris worm, we have found that software-only solutions to prevent memory errors from being exploited are either too expensive to be deployed broadly or are too prone to being circumvented. This situation motivates the use of hardware to implement key defensive features more reliably and efficiently. For example, several hardware features have been introduced that provide fine-grained control of access to memory. In addition, other hardware features provide protected environments to reduce dependence on complex systems software that may be prone to memory errors, limiting the trusted computing base of systems. The introduction of these hardware features is a potential boon for improving software security, but several challenges remain. One challenge is to develop software that utilizes such features effectively to achieve desired security goals with low overhead. Only then will we be able to see the wide adoption of such hardware necessary to reduce the exploitation of memory errors broadly. However, another challenge is that these hardware features may have blind spots that create new exploitable attack surfaces that may require yet additional defenses. We must ensure that proposed solutions do not also present new vulnerabilities that adversaries can exploit to circumvent security enforcement. This special issue aims at collecting the most relevant ongoing research efforts in the security and privacy field concerning the development, use, and evaluation of new hardware features to improve software security. Topics include, but are not limited to: - Experiences with hardware-enabled security and privacy - Software support for hardware features for security and privacy - Security evaluation of hardware features - Comparison of security capabilities of related hardware features - Lessons in achieving security goals using hardware features - Changes to hardware features to improve security and privacy - Market forces and potential for adoption Guest Editors: - Trent Jaeger, Penn State University - Brent ByungHoon Kang, KAIST University - Nele Mentens, Leiden University and KU Leuven - Cynthia Sturton, University of North Carolina
Last updated by Dou Sun in 2022-09-25
Special Issue on Securing Critical Infrastructure across Cyber and Physical Dimensions
Submission Date: 2022-12-05

From smart cities, to smart cars and smart manufacturing, we live in a fully connected world that relies on complex supply chains. To make matters worse, attacks against such cyber-physical critical infrastructure are evolving and expanding, while their disruption comes at a cost in terms of economic losses and even human-life losses. This special issue of IEEE Security & Privacy is soliciting articles focusing on the research and practices for securing physical critical infrastructure. Topics of interest include but are not limited to: - Verification and validation techniques for cyber-physical systems security; - Design-centric approach for securing cyber-physical critical infrastructure; - Digital twins for cyber-physical systems — scalable platforms for security validations for research, training, and operational environments; - Data-centric approaches for securing cyber-physical critical infrastructure; - Secure supply chains – covering multiple perspectives such as hardware, software, operational state; - Cyber-physical systems testbeds that provide realistic environments for security research and training.
Last updated by Dou Sun in 2022-09-25
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICICN'International Conference on Information, Communication and Networks2021-07-102021-07-302021-08-19
BIOSEInternational Conference on Bioscience & Engineering2022-06-042022-06-162022-06-25
RoboComInternational Workshop on Communication and Networking for Swarms Robotics2020-10-162020-11-022021-01-09
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
HealthSecUSENIX Workshop on Health Security and Privacy 2012-05-222012-08-06
AIPR'Applied Imagery Pattern Recognition2021-08-15 2021-10-12
WUWNetACM International Conference on Underwater Networks & Systems2022-08-082022-09-192022-11-14
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
ICEMAInternational Conference on Energy Materials and Applications2022-02-102022-03-012022-05-05
EBCCSPInternational Conference on Event-Based Control, Communication and Signal Processing2016-03-202016-04-102016-06-13