Scope and Motivation
The Silicon Valley Cybersecurity Conference (SVCC) is an annual international conference in cybersecurity held at the heart of Silicon Valley, which is supported by the Silicon Valley Cybersecurity Institute (SVCSI). SVCC focuses on research in dependability, reliability, and security to address cyber-attacks, vulnerabilities, faults, and errors in networks and systems.
​
This conference is a forum to present research in robustness and resilience in a wide spectrum of computing systems and networks. All aspects of the research and practice of applied security are within the scope of this conference. Relevant topics include innovative system design, protocols, and algorithms for detecting, preventing, mitigating, and responding to malicious threats in dependable and secure systems and networks including experimentation and assessment. The topics of interest are in the security of hardware, software, networks, clouds, cyber-physical systems, socio-technical systems, blockchain, and healthcare.
​
Important Deadlines
Research Paper Submission Deadline: Jan. 31, 2025 (Firm)
Notification: Feb 28, 2025
Camera-ready: March 18, 2025
​
Two best paper awards will be available for non-student and student authors. The awardee will receive $500 cash.
Call-for-Papers
The authors need to submit their original, unpublished papers along with an abstract of about 200 words to EasyChair. Submitted papers may not be accepted or under review elsewhere. Submissions should be at least six (6) pages long but not exceed eight (8) pages, in conference format (double blind reviewing) , should not use smaller than 10pt font size, and must be consistent with the IEEE conference format provided in the IEEE website https://www.ieee.org/conferences/publishing/templates.html.
The accepted paper will be submitted to IEEE Xplore as well as Indexing (A&I) databases. SVCC 2025 uses a double-blind review policy. Authors are required to remove their names, affiliation(s), and other identifying information from the header of the manuscript. This also includes meta-data in the submitted document as well as acknowledgment sections. To permit a blind review, do not include name(s) or affiliation(s) of the author(s) on the manuscript and abstract. Papers that do not meet these anonymization requirements may be rejected without further review.
Summary for Instructions for Manuscript Submission
-
All papers should be submitted through the EasyChair system: https://easychair.org/conferences/?conf=svcc2025
-
Submissions should represent original research results and may not be under review or accepted for publication in another venue. Review submissions should not exceed 10 pages for full papers, 6 pages for short papers and 2-3 pages for poster papers.
-
Paper submissions should be formatted according to the IEEE standard double-column format with a font size of 10 pt or larger. Please refer to the IEEE formatting instruction for details:
http://www.ieee.org/conferences_events/conferences/publishing/templates.htm
All Regular, Short, Workshop and Poster Papers must adhere to the following page limit rules:
-
Regular Paper: may have up to 8 pages without extra charge, and up to 2 extra pages at $100
-
Short Paper: may have up to 6 pages
-
Poster Abstract Paper: may have up to 2-3 pages. No extra pages are available for poster abstract papers.
Author Changes or Title Change Policy
In order to ensure an appropriate consideration of conflicts of interest in the review process, IEEE SVCC prohibits any change to the list of authors and/or the title of a paper when the paper is under review or if accepted for final publication. The author list or the title of a paper may be changed only prior to the submission deadline.
​
No Show Policy
For All (Regular/Short/Poster) Paper Authors:
Authors are required to present their paper at the conference in order for a paper to appear in the conference proceedings. Registration receipts and proceedings will be available only for papers that are presented. Your paper will be excluded from being published and included in the IEEE Xplore and the CSDL should your paper fail to be presented at the conference. Any exceptions to this policy can only be made by the General and Program Chairs. IEEE always reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference.​
​
Questions related to paper submission?
If you have any questions or problems with the manuscript submission process, please contact the Publications Chairs.

Topics of Interest
Authors are invited to submit original papers on the current areas of emphasis, but not limited to:
Network Security
-
 Intrusion and anomaly detection and prevention
-
 Attack detection, prevention, or mitigation
-
 Cryptography for network security
-
 Denial-of-service attacks and countermeasures
-
 Mobile and wireless network security
System and Hardware Security
-
 Security primitives in system architecture and systems
-
 Side-channel attacks and mitigation
-
 Anti-counterfeit, anti-tamper
-
 Hardware obfuscation
-
 FPGA design and security
-
 Cryptographic processors
-
 Post-quantum security primitives
Blockchain Security
-
 Security and privacy in decentralized applications
-
 Distributed consensus protocols
-
 Blockchain theory and algorithms
-
 Communication protocols and standards for dApps
-
 Decentralized identity and identity management
Software Security
-
 Secure software design/architecture
-
 Secure software practices
-
 Security analysis tools and methods
-
 Security evaluation criteria and methodology
-
 Vulnerability, threat, and risk analysis
-
 Malware detection/intrusion detection
-
 Obfuscation and software security
Machine learning security and privacy
-
 Machine learning applications to security and privacy
-
 Machine learning privacy issues and methods
-
 Adversarial machine learning
-
 Ethical, Social and Legal Issues
-
 DeepFakes
-
 Federated learning security
HCI for Cybersecurity
-
Behavior-based cybersecurity
-
Human detection of trusted execution
-
HCI for web technologies
-
HCI for mobile or cloud computing
-
Smart cities
-
Social networks
-
User privacy
-
Cyber Security Application and Technology
-
VR/AR systems