Call for Papers
We encourage submissions of the EuroS&P 2025 rejected papers and welcome the authors to optionally attach prior reviews.
Important Dates
-
Paper submission deadline:
February 20th, 2025 (all deadlines are 11:59 PM CEST)
-
Review Released and Acceptance notification:
March 24th, 2025
-
Final papers and slides due:
April 7th, 2025
- Workshop day: July 4th, 2025
Overview
Building secure by design systems has become a corner stone in software development, but with the rapid adoption of AI in virtually every deployed system, methods used for measuring and analyzing security throughout the software development need substantial rethinking. AI and software should be co-designed with security in mind, rather than addressing it separately or as an afterthought. This workshop aims to bridge the secure software design and security for AI research communities by providing a forum for discussing architectural and implementation challenges. This workshop will focus on security for AI-augmented systems, as well as covering the security aspects of AI, especially in real-world scenarios.
Topics of Interest
Topics of interest include (but are not limited to):
-
Modeling security for AI-augmented systems (including generative AI)
- Approaches to secure software architecture
- Security risk assessment and analysis
- Security risk management
- Threat modelling
- Attack, intrusion and defense modeling
- Challenges with modeling or integrating legacy systems with AI components
-
Enforcing security for AI-augmented systems (including generative AI)
- Preventing AI misuse and AI bench-marking
- Enforcing security between design and implementation
- Enforcing security between implementation and runtime
- Developing attacks and defenses
-
Measuring security for AI-augmented systems (including generative AI)
- Metrics and measurement approaches
- Security, trust and privacy metrics
- Measurement systems and associated data gathering
- Security trade-off analyses
- Assurance and security certification methods
- Devtime and runtime security measurements
- Visualization approaches for security measurements
- Human aspects and diversity effects
-
Applications of AI for enhancing security
- AI for security requirements engineering, secure coding standards, application security guidelines
- AI for assessing security design documents, threat modeling documents, planned mitigations and countermeasures
- AI for aiding security code review, securing the source code, and processing documentation
- AI for SAST, DAST, PEN testing, application and container security testing
- AI for incident response planning and execution
Submission Guidelines
We invite the following types of papers (the page limits exclude well-marked references and appendix):
-
Original research papers
(of a maximum of 6 pages) that describe novel contributions, report on experimental results, or experiences in industry such as case or field studies.
-
Position and open-problem papers
(of a maximum of 6 pages) discussing promising preliminary experimental results, approaches, ideas, or challenging issues for application in the industry, future perspectives and roadmap papers, and "Systematization of knowledge" papers, which provide a comprehensive view of the state-of-the-art on the workshop topics.
-
Extended abstracts
(of a maximum of 2 pages) that describe ongoing ideas and work in progress and would benefit from quick feedback from the research community
All papers should be submitted as a PDF file in double-column IEEE Conference Proceedings format (see
Overleaf template
). Submissions will go through a double-blind peer-reviewing process aimed at selecting the papers to be presented at the workshop.
There will be no formal workshop proceedings
. Papers already published in other venues are welcome in all three categories. The accepted papers or slides will be made available to registered attendees on the workshop's online website.
Submissions must be in English and properly anonymized.
Important:
The use of generative AI for authors and reviewers is not allowed. Should we (or our PC) encounter any suspicious submissions, they will be rejected. The organizers will oversee the review process and ensure high-quality feedback is provided by all reviewers. If we encounter an author or a co-reviewer reporting a suspicious review, one of the workshop chairs will check the review in question and if needed provide an additional review.
Submission Site
Submission link:
https://easychair.org/my/conference?conf=demessai25
.
All accepted submissions will be presented at the workshop as posters. Accepted papers
will be selected for presentation as spotlights based on their review score and novelty.
Nonetheless, all accepted papers should be considered as having equal importance.
One author of each accepted paper is required to attend the workshop and present the paper for
it to be included in the proceedings.
For any questions, please contact one the workshop organizers at
k.tuma@vu.nl
,
maura.pintor@unica.it
and
jamal.el-hachem@univ-ubs.fr
.