Ranking & Metrics Conference Call for Papers Other Conferences in United States
7th IEEE European Symposium on Security and Privacy (EuroS&P 2022)

7th IEEE European Symposium on Security and Privacy (EuroS&P 2022)

Genoa, Italy

Conference Dates: Jun 06, 2022 - Jun 10, 2022

Impact Score 5.20


Conference Organizers: Deadline extended?
Click here to edit

Ranking & Metrics Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.

Research Impact Score: 5.20
Contributing Best Scientists: 80
Papers published by Best Scientists 85
Research Ranking (Computer Science) 82
Research Ranking (Computer Science) 76

Conference Call for Papers

The IEEE European Symposium on Security and Privacy (Euro S&P) is the European sibling conference of the IEEE Symposium on Security and Privacy (“Oakland”) conference. It is a premier forum for computer security and privacy research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy, as well as Systematization of Knowledge papers that systematize previous results. EuroS&P is interested in all aspects of applied computer security and privacy. We especially encourage papers that are far-reaching and risky, provided those papers show sufficient promise for creating interesting discussions and usefully questioning widely-held beliefs. Papers without a clear connection to security or privacy will be considered out of scope and may be rejected without full review.

Broadened Scope
Euro S&P has traditionally focused on technical aspects of computer security and privacy research. This year we are expanding the scope of the symposium to include economic, ethical, legal, and social aspects and interdependencies of computer security and privacy.

We especially encourage submissions that address global aspects of computer security and privacy, including issues particular to parts of the world and communities that are often neglected. We are including experts in these areas in the program committee to ensure that such papers will receive high-quality reviews from well-qualified reviewers.

Systematization of Knowledge Papers
We solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area; support or challenge long-held beliefs in such an area with compelling evidence; or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate.

Submissions will be distinguished by the prefix "SoK:" in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions, the emphasis will be on their value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

Requirement to Review
As was done for the 2021 symposium, submitting a paper to EuroS&P implies a commitment by the authors to serve as external reviewers, on request, for other papers submitted to the symposium. Each set of authors jointly submitting a paper will cumulatively be asked to contribute up to two external reviews. Requests for external reviews will be for the first round of reviewing (26 September – 3 November 2021).

This requirement exists to help alleviate the review load for PC members, to provide highly expert reviewers on a range of topics, and to provide training for the next generation of PC members (as we expect that many of these external reviewers will be students). If an external review is solicited, a good-faith effort must be made to provide a substantive and timely review; not doing so may risk rejection of the paper whose authors’ are asked to contribute a review. External reviewers will be held to the same standards of confidentiality as the Program Committee. Contact the program committee chairs if there are questions about this policy.

Revision Option
Following the model introduced in 2020, authors of papers that are not accepted may be invited to revise and resubmit their paper for a second round of reviews. Such papers invited for revision will be those for which the program committee sees a path for revision that is likely to lead to acceptance, even though the initial submission as evaluated cannot be accepted, with or without shepherding. If authors who are invited to do so wish to submit a revised paper, they must do so within four weeks of the notification. Revised papers will be re-reviewed by the same set of reviewers that reviewed them originally.

Neither acceptance with shepherding nor invitation to submit a revised paper implies that eventual acceptance is certain.

Best Paper Award
Outstanding paper(s) will be selected by the program committee for the best paper award. The award will be announced at the symposium.

Important Dates
All deadlines are Anywhere on Earth (AoE = UTC-12h).

Research Papers
Submission deadline 22 September 2021 (Wednesday)
Early reject notification 8 November 2021 (Monday)
Rebuttal period 14 – 21 December 2021
Notification 18 January 2022 (Tuesday)
Submission of revised papers 16 February 2022 (Wednesday)
Camera ready deadline 9 March 2022 (Wednesday)
Conference 6–10 June 2022

Instructions for Paper Submission

Proactive Prevention of Harm
We expect authors to carefully consider and address the potential harms associated with carrying out their research, as well as the potential negative consequences that could stem from publishing their work. Failure to adequately discuss such potential harms within the body of the submission may result in rejection of a submission, regardless of its quality and scientific value.

Although risking to cause harm is sometimes a necessary and legitimate aspect of scientific research in computer security and privacy, authors are expected to document how they addressed and mitigated such risks. This includes, but is not limited to, considering the impact of the research on deployed systems, understanding the costs the research imposes on others, safely and appropriately collecting data, and following responsible disclosure practices. Papers should include a clear statement as to how the benefit of the research outweighs the potential harms, and how the authors have taken measures and followed best practices to ensure safety and minimize the potential harms caused by their research.

If the submitted research has potential to cause harm, and authors have access to an Institutional Review Board (IRB), we expect that this IRB was consulted appropriately and that its approval and recommendations are documented in the paper. We note that IRBs are not necessarily well-versed in computer security research and may not know the best practices and community norms in our field, so IRB approval does not absolve researchers from considering ethical aspects of their work. In particular, IRB approval is not sufficient to guarantee that the PC will not have additional concerns with respect to harms associated with the research.

We encourage authors to consult existing documentation, e.g., Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them or the Menlo Report and existing Safety consultation entities, e.g., the Tor Safety Research Board. These can help in thinking about potential harms, and in designing the safest experiments and disclosure processes.

Open Science Expectations
Our expectation for Euro S&P is that researchers will maximize the scientific and community value of their work by making it as open as possible. This means that, by default, all of the code, data, and other materials (such as survey instruments) needed to reproduce your work described in an accepted paper will be released publicly under an open source license. Sometimes it is not possible to share work this openly, such as when it involves malware samples, data from human subjects that must be protected, or proprietary data obtained under agreement that preclude publishing the data itself. All submissions should therefore include a clear statement on Data Availability that explains how the artifacts needed to reproduce their work will be shared, or an explanation of why they will not be shared. The Program Chairs will hold authors to the commitments made in their submissions, and papers that fail to satisfy these commitments may be removed from the conference.

Duplicate Submission, Plagiarism, and Withdrawal
All submissions must be original work. Plagiarism (whether of others or self) will be grounds for rejection. The submission must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection.

Simultaneous submission of the same or substantially similar paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.

Anonymous Submission
Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. References should only be blinded in the (unusual) case that a third-person reference is infeasible. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

The purpose of anonymous submissions is to give reviewers the chance to read the paper without being biased by knowing the authors. Hence authors are required to ensure that the paper they submit does not, within reason, leak their identity.

However, the process of anonymous submission is considered to be cooperative, not adversarial. Authors should not put explicit clues to their identity in the paper or otherwise purposefully deanonymize themselves to reviewers. Authors who think disclosing revealing aspects of their identities or setting would be important for positioning the paper, should consult with the PC chairs on how to do this in their submission. Reviewers are trusted to not actively look for the identity of authors, for instance by searching the internet for the paper title. By policy, authors may post their paper to public “preprint” archives (including arxiv) before, during, or after the review period.

The Program Chairs will reject papers that, in their sole judgement, blatantly violate the requirement for author anonymity.

Reviews from Prior Submissions
For papers that were previously submitted to, and rejected from, another conference, authors are required to submit a separate document containing the (anonymized, but otherwise unedited) prior reviews along with a description of how those reviews were addressed in the current version of the paper. Authors are only required to include reviews from the last time the paper was submitted. Authors who try to circumvent this rule (e.g., by changing the title of the paper without significantly changing the contents) may have their papers rejected without further consideration, at the discretion of the PC chairs.

Page Limit and Formatting
Papers shall not exceed 13 pages of body text, with unlimited additional pages for references and appendices. Reviewers are explicitly not expected to read the appendices while deciding whether to accept or reject the paper.

Papers must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template we supply eurosp-2022-template.zip. We recommend using LaTeX, and suggest you first compile the supplied LaTeX source as is, checking that you obtain the same PDF as the one supplied. Then, write your paper into the LaTeX template, replacing the boilerplate text. Please do not use other IEEE templates. Failure to adhere to the page limit and formatting requirements can be grounds for rejection.

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader XI and when printed in black and white.

Submissions failing to conform to the submission guidelines risk rejection without review.

Conference Submission Server
Papers must be submitted at https://eurosp2022.hotcrp.com/ and may be updated at any time until the submission deadline expires.

Publication and Presentation
Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to present the paper at the conference. We are expecting to hold an in person conference and that authors will be able to travel to the conference to present their paper, but will make allowances for remote presentation in cases where all authors of a paper have legitimate reasons they are unable to attend in person.

For more information, contact the program chairs at: [email protected]


Top Research Topics at IEEE European Symposium on Security and Privacy?

  • Computer security (45.92%)
  • Internet privacy (11.22%)
  • Cryptography (10.71%)

IEEE European Symposium on Security and Privacy primarily tackles Computer security, Internet privacy, Cryptography, Server and Encryption. The Internet and Protocol (object-oriented programming) are some topics wherein Computer security research discussed in the event have an impact. The works on Protocol (object-oriented programming) deal in particular with Cryptographic protocol.

The research on Cryptography discussed in the conference draws on the closely related field of Public-key cryptography. The Malware study featured in the event draws parallels with the field of Artificial intelligence. Artificial neural network is a focus of the presented Artificial intelligence works and it dives deep in Artificial neural network.

What are the most cited papers published at the conference?

  • The Limitations of Deep Learning in Adversarial Settings (2061 citations)
  • Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack (287 citations)
  • SoK: Security and Privacy in Machine Learning (171 citations)

Research areas of the most cited articles at IEEE European Symposium on Security and Privacy:

The conference papers investigate studies in Computer security, Cryptography, Artificial intelligence, Public-key cryptography and Cryptographic protocol. The conference articles explore issues in Computer security which can be linked to other research areas like The Internet and Internet privacy. The most cited publications focus on Artificial intelligence but the discussions also offer insight into other areas such as Machine learning and Data mining.

What topics the last edition of the conference is best known for?

  • Operating system
  • The Internet
  • Computer network

The previous edition focused in particular on these issues:

The scientific interests tackled in the conference are Computer security, Authentication, Internet privacy, Verifiable secret sharing and Distributed computing. Issues in Computer security were discussed, taking into consideration concepts from other disciplines like Usability and Service (systems architecture). It explores Authentication concepts, specifically Man-in-the-middle attack but expands to research in USable.

The Verifiable secret sharing study featured in the conference draws connections with the study of Beacon.

The most cited articles from the last conference are:

  • SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers (1 citations)
  • Compression Boosts Differentially Private Federated Learning (0 citations)
  • Secure Messaging Authentication against Active Man-in-the-Middle Attacks (0 citations)

Papers citation over time

A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.

The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.


The top authors publishing at IEEE European Symposium on Security and Privacy (based on the number of publications) are:

  • Michael Backes (9 papers) absent at the last edition,
  • Wouter Joosen (6 papers) absent at the last edition,
  • Konrad Rieck (6 papers) absent at the last edition,
  • Herbert Bos (6 papers) absent at the last edition,
  • David Basin (5 papers) absent at the last edition.

The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.


Only papers with recognized affiliations are considered

The top affiliations publishing at IEEE European Symposium on Security and Privacy (based on the number of publications) are:

  • French Institute for Research in Computer Science and Automation (14 papers) absent at the last edition,
  • ETH Zurich (13 papers) published 1 paper at the last edition, 3 less than at the previous edition,
  • Ruhr University Bochum (12 papers) published 1 paper at the last edition the same number as at the previous edition,
  • University of Luxembourg (11 papers) absent at the last edition,
  • University of Cambridge (10 papers) published 1 paper at the last edition, 3 less than at the previous edition.

The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.


Publication chance based on affiliation

The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.

The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.


During the most recent 2021 edition, 22.22% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 42.86% were posted by at least one author from the top 10 institutions publishing at the conference. Another 14.29% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 14.29% of all publications and 28.57% were from other institutions.

Returning Authors Index

A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.

The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.


Returning Institution Index

The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.


The experience to innovation index

Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).

The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:

  • Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
  • Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
  • Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
  • Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
  • Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).


The chart below illustrates experience levels of first authors in cases of publications with multiple authors.


Previous Editions

EuroS&P 2021 : 6th IEEE European Symposium on Security and Privacy

Sep 07, 2021 - Sep 07, 2021

Vienna, Austria

IEEE European Symposium on Security and Privacy

Jul 03, 2023 - Jul 07, 2023

Delft, Netherlands

Something went wrong. Please try again later.