Visible to the public NDSS Symposium 2023Conflict Detection Enabled

The Network and Distributed System Security Symposium (NDSS 2023)

The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of computer, network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

Technical papers and panel proposals are solicited. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2023. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

Areas of Interest

  • Submissions are solicited in, but not limited to, the following areas:
  • Anti-malware techniques: detection, analysis, and prevention
  • Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques)
  • Security for future Internet architectures and designs (e.g., Software-Defined Networking)
  • Implementation, deployment and management of network security policies
  • Integrating security in network protocols (e.g., routing, naming, and management)
  • Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response
  • Software/firmware analysis, customization, and transformation for systems security
  • Privacy and anonymity in networks and distributed systems
  • Security and privacy for blockchains and cryptocurrencies
  • Public key infrastructures, key management, certification, and revocation
  • Security for cloud/edge computing
  • Security and privacy of mobile/smartphone platforms
  • Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
  • Security for emerging networks (e.g., home networks, IoT, body-area networks, VANETs)
  • Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid)
  • Security and privacy of systems based on machine learning and AI
  • Security of Web-based applications and services (e.g., social networking, crowd-sourcing)
  • Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics
  • Usable security and privacy
  • Trustworthy Computing software and hardware to secure networks and systems
Event Details
San Diego, California