28th International Symposium on Research in Attacks, Intrusions, and Defenses
Since its inception in 1997, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community.
The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.
We are soliciting research papers on topics covering all well-motivated computer security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons learned
Specific topics of interest to RAID include, but are not limited to:
Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable the reproducibility of their experimental results. We encourage authors to make both the tools and data publicly available.
More information is available at https://raid2025.github.io/.
Submission Deadline: |
Thursday April 17th 2025, 11:59:59pm
Anywhere on earth (UTC-12) |
Notification to Authors: | Wednesday July 9th 2025 |
Camera-ready Deadline: | Thursday Aug 14th 2025 |
Conference Dates: | October 19th - October 22nd 2025 |
We are looking for volunteers, and we are accepting nominations (self-nominations are welcome as well). If interested, please fill this form: https://forms.gle/yVia9CV9wtRxQY388.
The submission site is available here: https://raid2025.hotcrp.com/.
Submissions must be a PDF file, and should follow the IEEE 8.5″ x 11″ two-column format using 10pt fonts and the IEEE Conference template (downloadable by selecting “Conferences” in the IEEE-Template Selector https://template-selector.ieee.org/). The submission must be no more than 12 pages long, excluding the bibliography, well-marked appendices, and supplementary material.
Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the IEEE format. Submissions not following the required format may be rejected without review.
Reviewing will be double-blind, meaning the authors’ identities will be hidden from the reviewers. All papers will be reviewed by at least three reviewers and will receive notification according to the timeline above. No major/minor revision options are allowed. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, you should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not properly anonymized may be rejected without review. While submitted papers must be anonymous, authors may choose to give talks about their work, post a preprint of the paper online, disclose security vulnerabilities to vendors or the public, etc. during the review process. In case of doubts, please reach out to the program committee chairs at raid25.pc.chairs@gmail.com.
All submissions will be judged on originality, relevance, correctness, and clarity. Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission.
Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:
Disclose whether the research received approval or a waiver from each of the authors’ institutional ethics review boards (e.g., an IRB). Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect. If the submission deals with vulnerabilities (e.g., software vulnerabilities in a given program or design weaknesses in a hardware system), the authors need to discuss in detail the steps they have already taken or plan to take to address these vulnerabilities (e.g., by disclosing vulnerabilities to the vendors). The same applies if the submission deals with personally identifiable information (PII) or other kinds of sensitive data. If a paper raises significant ethical and legal concerns, it might be rejected based on these concerns.
Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee chairs at raid25.pc.chairs@gmail.com.
Papers that have been formally reviewed and accepted will be presented at RAID 2025 and published in conference proceedings by Conference Publishing Services, CPS, and will be submitted to IEEE Xplore Digital Library. By submitting a paper, you agree that at least one of the authors will attend the conference to present it.
For each accepted paper, at least one author is required to pay a full author registration. Any no-show papers will be reported to the publisher and removed from the conference proceedings. Note that for papers that share authors, a separate author registration is required for each paper.
Note that the authors should adhere to ethical and professional standards of IEEE. Please refer to IEEE Code of Ethics and IEEE Submission Policies.