IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools


SP 2020: IEEE Symposium on Security and Privacy - Call for paper, ranking, acceptance rate, submission deadline, notification date, conference location, submission guidelines, and other important details


This article provides the call for paper, ranking, acceptance rate, submission deadline, notification date, conference location, submission guidelines, and other important details of SP 2020: IEEE Symposium on Security and Privacy all at one place.

Conference Location San Francisco, California, USA
Conference Date 2020-05-18
Notification Date 2 months after submission
Submission Deadline Rolling (Next deadline: August 1, 2019)
Conference Website and Submission Link http://www.ieee-security.org/TC/SP2020/


Conference Ranking


IEEE Symposium on Security and Privacy ranking based on CCF, Core, and Qualis is shown below:

CCF Ranking A
Core Ranking A*
Qualis Ranking

Click here to check the ranking of any conference.
  • About CCF Ranking: The Chinese Computing Federation (CCF) Ranking provides a ranking of peer-reviewed journals and conferences in the field of computer science.

  • About Core Ranking: The CORE Conference Ranking is a measure to assess the major conference in the computing field. This ranking is governed by the CORE Executive Committee. To know more about Core ranking, visit Core ranking portal.

  • About Qualis Ranking: This conference ranking is published by the Brazilian ministry of education. It uses the h-index as a performance metric to rank conferences. Conferences are classified into performance groups that range from A1 (to the best), A2, B1, B2,..., B5 (to the wost). To know more about qualis ranking, visit here

Conference Acceptance Rate


Below is the acceptance rate of IEEE Symposium on Security and Privacy conference for the last few years:

Year Submitted Papers Accepted Papers Accepted Percentage/Acceptance Rate
2018 549 63 11.5%
2017 457 60 13.1%
2016 413 55 13.3%
2015 407 55 13.5%
2014 334 44 13.2%
2013 315 38 12.1%
2013 315 38 12.1%
2012 307 40 13%
2011 306 34 11.1%
2010 267 31 11.6%
2009 254 28 11%
2008 249 28 11.2%
2007 246 29 11.8%
2006 251 32 12.7%
2005 192 17 8.9%
2004 192 19 9.9%
2003 131 19 14.5%
2002 95 21 22.1%
2001 107 19 17.8%
2000 137 18 13.1%
1999 61 15 24.6%
1998 116 19 16.4%
1997 110 20 18.2%
1996 67 20 29.9%
1995 72 20 27.8%
1994 65 19 29.2%
1993 70 17 24.3%
1992 89 21 23.6%
1991 92 28 30.4%
1986 91 25 27.5%
1985 63 25 39.7%
1984 39 25 64.1%
1983 34 23 67.6%
1982 34 19 55.9%
1980 19 19 100%

We are working hard to collect and update the acceptance rate details of the conferences for recent years. However, you can consider the above (if available) acceptance rates to predict the average chances of acceptance of your research paper at this conference.



Conference Call for paper


Please note that revisions for papers submitted to the 2019 Symposium need to be submitted to the S&P 2019 submission site.


Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.

Topics of interest include:

  • Access control and authorization
  • Anonymity
  • Application security
  • Attacks and defenses
  • Authentication
  • Blockchains and distributed ledger security
  • Censorship resistance
  • Cloud security
  • Cyber physical systems security
  • Distributed systems security
  • Economics of security and privacy
  • Embedded systems security
  • Forensics
  • Hardware security
  • Intrusion detection and prevention
  • Malware and unwanted software
  • Mobile and Web security and privacy
  • Language-based security
  • Machine learning and AI security
  • Network and systems security
  • Privacy technologies and mechanisms
  • Protocol security
  • Secure information flow
  • Security and privacy for the Internet of Things
  • Security and privacy metrics
  • Security and privacy policies
  • Security architectures
  • Usable security and privacy
  • Trustworthy computing
  • Web security

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers

As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings.

Ongoing Submissions

To enhance the quality and timeliness of the scientific results presented as part of the Symposium, and to improve the quality of our reviewing process, IEEE S&P now accepts paper submissions 12 times a year, on the first of each month. The detailed process is as follows.

  • A rolling deadline occurs on the 1st of each month, at 3:00 PM (UTC-7, i.e., PDT). This deadline is strict and no extensions will be granted.
  • Within two months of submission, author notifications of Accept/Revise/Reject decisions will be sent out.
  • Within one month of acceptance, all accepted papers must submit a camera-ready copy incorporating reviewer feedback. The papers will immediately be published, open access, in the Computer Society’s Digital Library, and they may be cited as “To appear in the IEEE Symposium on Security & Privacy, May 20XX”.
  • A limited number of papers will be invited to submit a revision; such papers will receive a specific set of expectations to be met by that revision. Authors may take up to three months from decision notification to produce a revised manuscript and submit it as part of the standard deadline on the 1st of the month. Authors will receive decisions on revisions within one month. See below for additional details on the resubmission procedure.
  • Rejected papers must wait for one year, from the date of original submission, to resubmit to IEEE S&P.
    • A paper will be judged to be a resubmit (as opposed to a new submission) if the paper is from the same or similar authors, and a reviewer could write a substantially similar summary of the paper compared with the original submission. As a rule of thumb, if there is more than 40% overlap between the original submission and the new paper, it will be considered a resubmission.
  • All papers accepted by February 1st, 2020, or that are submitted as a revision by February 1st, 2020 and the revision is then accepted, will be included in the proceedings of the symposium in May, 2020 and invited to present their work. Other papers will be included in the 2021 proceedings.
    • As a result, for authors who anticipate using the full three months to respond to a Revision decision, the final submission deadline for possible inclusion in the 2020 proceedings is September 1st, 2019.
    • For authors who anticipate using only one month to respond to a Revision decision, the final submission deadline for possible inclusion in the 2020 proceedings is November 1st, 2019.
    • The final submission deadline for possible inclusion in the 2020 proceedings is December 1st, 2019, but only for papers accepted without revision.

Revised Submissions

As described above, some number of papers will receive a Revise decision, rather than Accept or Reject. This decision will be accompanied by a detailed summary of the expectations for the revision, in addition to the standard reviewer comments. Authors may take up to three months to prepare a revision, which may include running additional experiments, improving the paper’s presentation, or other such improvements. Papers meeting the expectations will typically be accepted. Those that do not will be rejected. Only in exceptional circumstances will additional revisions be requested.

Upon receiving a Revise decision, authors can choose to withdraw their paper or not submit a revision within three months, but they will be asked to not submit the same or similar work again (following the same rules as for Rejected papers) for 1 year from the date of the original submission.

Revised submissions should be submitted on the first of the month, just as with new submissions. Revisions must be accompanied by a summary of the changes that were made.

Submission Statistics

Statistics on the submissions and decisions made thus far are available here.

Student Program Committee

Following a successful model used at last year’s conference, as well as other premier technical conferences, some paper submissions will be reviewed by a “shadow PC” of students and junior researchers. For more information see https://www.ieee-security.org/TC/SP2020/studentpc.html.

Instructions for Paper Submission


These instructions apply to both the research papers and systematization of knowledge papers.

All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy.

Anonymous Submission

Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Publication as a technical report or in an online repository does not constitute a violation of this policy. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Conflicts of Interest

Drawn from the ACM SIGMOD 2015 CFP

During submission of a research paper, the submission site will request information about conflicts of interest of the paper's authors with program committee (PC) members. It is the full responsibility of all authors of a paper to identify all and only their potential conflict-of-interest PC members, according to the following definition. A paper author has a conflict of interest with a PC member when and only when one or more of the following conditions holds:

  1. The PC member is a co-author of the paper.
  2. The PC member has been a co-worker in the same company or university within the past two years.
    • For student interns, the student is conflicted with their supervisors and with members of the same research group. If the student no longer works for the organization, then they are not conflicted with a PC member from the larger organization.
  3. The PC member has been a collaborator within the past two years.
  4. The PC member is or was the author's primary thesis advisor, no matter how long ago.
  5. The author is or was the PC member's primary thesis advisor, no matter how long ago.
  6. The PC member is a relative or close personal friend of the author.

For any other situation where the authors feel they have a conflict with a PC member, they must explain the nature of the conflict to the PC chairs, who will mark the conflict if appropriate. Papers with incorrect or incomplete conflict of interest information as of the submission closing time are subject to immediate rejection.

Human Subjects and Ethical Considerations

Drawn from the USENIX Security 2016 CFP

Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:

  1. Disclose whether the research received an approval or waiver from each of the authors' institutional ethics review boards (IRB) if applicable.
  2. Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.

If the submission deals with vulnerabilities (e.g., software vulnerabilities in a given program or design weaknesses in a hardware system), the authors need to discuss in detail the steps they have taken or plan to take to address these vulnerabilities (e.g., by disclosing vulnerabilities to the vendors). The same applies if the submission deals with personal identifiable information (PII) or other kinds of sensitive data. If a paper raises significant ethical and legal concerns, it might be rejected based on these concerns.

Contact the program co-chairs [email protected] if you have any questions.

Page Limit and Formatting

Submitted papers may include up to 13 pages of text and up to 5 pages for references and appendices, totalling no more than 18 pages. The same applies to camera-ready papers, although, at the PC chairs’ discretion, additional pages may be allowed for references and appendices. Reviewers are not required to read appendices.

Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8. All submissions will be automatically checked for conformance to these requirements. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review.

Reviews from Prior Submissions

Authors may optionally submit a document (PDF or text) containing:

  1. the complete reviews they received from prior submission(s) and
  2. a page of up to 500 words documenting the improvements made since the prior submission(s).

Also starting this year, if a submission is derived in any way from a submission submitted to another venue (conference, journal, etc.) in the past twelve months, we require that the authors provide the name of the most recent venue to which it was submitted. This information will not be shared with reviewers. It will only be used (1) for aggregate statistics to understand the percent of resubmissions among the set of submitted (and accepted) papers; (2) at the Chairs’ discretion, to identify dual submissions and verify the accuracy of prior reviews provided by authors regarding previously rejected papers.

Submission

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Conference Submission Server

Papers must be submitted at https://oakland20.seclab.cs.ucsb.edu.

Publication and Presentation

Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference.

Program Committee


PC Chairs

Alina Oprea Northeastern University
Hovav Shacham The University of Texas at Austin

PC Members

Manos Antonakakis Georgia Institute of Technology
Davide Balzarotti Eurecom
Adam Bates University of Illinois at Urbana-Champaign
Konstantin (Kosta) Beznosov University of British Columbia
Karthikeyan Bhargavan INRIA
Battista Biggio University of Cagliari, Italy
Leyla Bilge Symantec
Marina Blanton University at Buffalo
Joseph Bonneau NYU
Chris Brzuska Aalto University
Kevin Butler University of Florida
Juan Caballero IMDEA Software Institute
Joe Calandrino Federal Trade Commission
Aylin Caliskan The George Washington University
Nicholas Carlini Google
Melissa Chase Microsoft Research
Stephen Checkoway Oberlin College
Haibo Chen Shanghai Jiao Tong University
David Choffnes Northeastern University
Omar Chowdhury The University of Iowa
Nicolas Christin Carnegie Mellon University
Mihai Christodorescu Visa Research
Henry Corrigan-Gibbs Stanford University
Véronique Cortier CNRS, Loria, France
Lorrie Cranor Carnegie Mellon University
Weidong Cui Microsoft Research
Emiliano De Cristofaro University College London
Brendan Dolan-Gavitt NYU
Adam Doupé Arizona State University
Thomas Dullien optimyze
Annie Edmundson Squarespace
Manuel Egele Boston University
Roya Ensafi University of Michigan
Sascha Fahl Leibniz University Hannover
Giulia Fanti Carnegie Mellon University
Nick Feamster Princeton
Anders Fogh Intel Corporation
Aurélien Francillon EURECOM
Michael Franz University of California, Irvine
Christina Garman Purdue University
Daniel Genkin University of Michigan
Rosario Gennaro The City College of New York
Cristiano Giuffrida VU Amsterdam
Virgil Gligor CMU
Ian Goldberg University of Waterloo
Guofei Gu Texas A&M University
Andreas Haeberlen University of Pennsylvania
Thorsten Holz Ruhr-Universität Bochum
Amir Houmansadr University of Massachusetts Amherst
Limin Jia Carnegie Mellon University
Brent ByungHoon Kang KAIST
Alexandros Kapravelos North Carolina State University
Aniket Kate Purdue University
Stefan Katzenbeisser TU Darmstadt
Aggelos Kiayias University of Edinburgh & IOHK
Engin Kirda Northeastern University
David Kohlbrenner UC Berkeley
Vladimir Kolesnikov Georgia Institute of Technology
Ralf Kuesters University of Stuttgart
Wenke Lee Georgia Institute of Technology
Anja Lehmann IBM
Kirill Levchenko University of Illinois
Dave Levin UMD
Bo Li UIUC
Xiaojing Liao Indiana University Bloomington
Martina Lindorfer TU Wien
Long Lu Northeastern University
Matteo Maffei TU Wien
Sergio Maffeis Imperial College London
Piotr Mardziel Carnegie Mellon University
Clémentine Maurice CNRS, IRISA
Prateek Mittal Princeton University
Payman Mohassel Visa Research
Fabian Monrose UNC
Neha Narula MIT Media Lab
Nick Nikiforakis Stony Brook University
Daniela Oliveira University of Florida
Yossi Oren Ben Gurion University
Nicolas Papernot Google Brain
Mathias Payer EPFL
Marcus Peinado Microsoft Research
Roberto Perdisci University of Georgia and Georgia Institute of Technology
Adrian Perrig ETH Zurich
Frank Piessens KU Leuven
Christina Poepper New York University Abu Dhabi
Michalis Polychronakis Stony Brook University
Raluca Ada Popa UC Berkeley
Zhiyun Qian University of California, Riverside
Ananth Raghunathan Google
Aanjhan Ranganathan Northeastern University
Kasper Rasmussen University of Oxford
Eric Rescorla Mozilla
Konrad Rieck TU Braunschweig
Tom Ristenpart Cornell Tech
William Robertson Northeastern University
Joanna Rutkowska Golem Project
Nitesh Saxena University of Alabama at Birmingham
Prateek Saxena National university of Singapore
Vyas Sekar Carnegie Mellon University
Simha Sethumadhavan Columbia University/Chip Scan
Srinath Setty Microsoft Research
abhi shelat Northeastern
Reza Shokri National University of Singapore (NUS)
Natalie Silvanovich Google
Asia Slowinska IBM Security
Emily Stark Google
Deian Stefan UC San Diego
Gianluca Stringhini Boston University
Vanessa Teague university of Melbourne
Yuan Tian University of Virginia
Mohit Tiwari UT Austin
Selcuk Uluagac Florida International University
Thyla van der Merwe Mozilla
XiaoFeng Wang Indiana University
Christo Wilson Northeastern University
Emmett Witchel The University of Texas at Austin
Wenyuan Xu Zhejiang University
Danfeng (Daphne) Yao Virginia Tech
Yuval Yarom University of Adelaide and Data61
Yanfang (Fanny) Ye West Virginia University
Yinqian Zhang The Ohio State University
Saman Zonouz Rutgers University

Submission Deadline


SP 2020: IEEE Symposium on Security and Privacy submission deadline is Rolling (Next deadline: August 1, 2019).

Note: It is generally recommended to submit your conference paper on or before the submission deadline. Generally, conferences do not encourage to submit the research paper after the deadline is over. In rare scenarios, conferences extend their deadline. Decision about the extension of the deadline is generally updated on the official conference webpage.


Notification date


Notification date of SP 2020: IEEE Symposium on Security and Privacy is 2 months after submission.

Note: This is the date on which conference announces the result about acceptance or rejection of submitted papers. If your research paper is accepted, the conference will request you to submit the camera ready version of your research paper by the due date. Due date to submit the camera ready version of the paper is generally posted on the official web page of the conferences or notified to you via. email.


Conference Date


SP 2020: IEEE Symposium on Security and Privacy will start on 2020-05-18.

Note: This is the date on which the conference starts.


Conference Location


SP 2020: IEEE Symposium on Security and Privacy will be organized at San Francisco, California, USA. This is the place where the conference is organized and the research paper is to be presented.