We are soliciting research papers on topics covering all well-motivated computer security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons learned
We are looking for volunteers and accepting nominations (self-nominations welcome!).
Volunteer / NominateRAID solicits submissions on all aspects of computer security, including but not limited to:
Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable the reproducibility of their experimental results. We encourage authors to make both the tools and data publicly available.
More information is available at https://raid2026.sptagelab.org.
We are looking for volunteers, and we are accepting nominations (self-nominations are welcome as well). If interested, please fill this form: TBD Link.
Get IEEE Template Submit Paper (TBD Link)
Note: Reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the IEEE format. Submissions not following the required format may be rejected without review.
Anonymization: Papers must be properly anonymized—author names/affiliations must not appear, refer to your own prior work in third person, avoid titles matching public technical reports, and anonymize bibliographies appropriately. Papers not properly anonymized may be rejected without review.
Originality: Submissions must not substantially duplicate published work or be submitted in parallel to other venues with proceedings. Simultaneous submission, previously published work, and plagiarism constitute dishonesty.
Submissions involving human subjects, human-derived data (even anonymized), or that may put humans at risk should:
If your submission deals with vulnerabilities (e.g., software vulnerabilities or hardware design weaknesses), you must discuss in detail the steps already taken or planned to address them, such as coordinated disclosure to vendors.
The same applies for submissions dealing with personally identifiable information (PII) or other sensitive data—explain your data handling and protection procedures.
Note: Papers raising significant ethical or legal concerns may be rejected based on these concerns alone.
Accepted papers will be:
Registration Policy: Each accepted paper requires at least one full author registration. For papers sharing authors, a separate author registration is required for each paper.
No-Show Policy: Papers not presented at the conference will be reported to the publisher and removed from the proceedings.
Ethics: Authors must adhere to IEEE Code of Ethics and IEEE Submission Policies.
Questions? Contact PC chairs at TBD.