Call for Papers

Topics of Interest

We invite submissions on all aspects of cyberbiosecurity, including but not limited to:


Security of Biological Infrastructure

  • Authentication and authorization for laboratory equipment and automated systems
  • Secure communication protocols for biomanufacturing networks
  • Zero-trust architectures for biotechnology environments
  • Physical-digital security for biocontainment facilities
  • Supply chain security for biological materials and reagents

Agricultural Cyberbiosecurity

  • Security of precision agriculture and smart farming
  • Threats to food supply chains and automated harvesting
  • Data integrity in digital agriculture systems
  • Vulnerabilities in agri-biotech machinery
  • Secure environmental monitoring networks

AI Safety in Biotechnology

  • Adversarial attacks on machine learning models in biological applications
  • Safety alignment for AI-driven protein design and metabolic engineering
  • Formal verification methods for bio-AI systems
  • Information hazard management in AI-accelerated biological research
  • Robustness testing for biological discovery models

Biomedical Device and System Security

  • Security of implantable and wearable medical devices
  • Hospital network security and medical data interoperability
  • Vulnerabilities in telemedicine infrastructure
  • Software Bill of Materials (SBOM) for medical devices
  • Cybersecurity for bio-integrated electronics
  • Security of DIY and bio-hacking implantables

Data Protection and Privacy

  • Genomic data security and privacy-preserving computation
  • Secure storage and transmission of biological research data
  • Security of bio-banks and genetic databases
  • Privacy risks in direct-to-consumer genetic testing
  • Anonymization techniques for biological datasets
  • Consent and governance frameworks for biological data sharing
  • Intellectual property protection in collaborative biological research

Biometric Security and Authentication

  • Cancelable biometrics and privacy-preserving authentication
  • Presentation attack detection (liveness detection)
  • Deepfake attacks on biometric systems
  • Multi-modal biometric fusion security
  • Secure storage of biometric templates

Neurotechnology Security

  • Brain-Computer Interface (BCI) vulnerabilities
  • Neural data privacy and integrity
  • Neuro-rights and cognitive liberty
  • Security of closed-loop neuromodulation systems
  • Authentication using neural signals

Threat Detection and Response

  • Anomaly detection in biological data streams and laboratory workflows
  • Forensic analysis techniques for cyber-bio incidents
  • Incident response protocols for biotechnology organizations
  • Attribution methodologies for attacks on biological infrastructure
  • Threat intelligence sharing for the bioeconomy

DNA Synthesis and Screening Security

  • Vulnerabilities in nucleic acid synthesis screening systems
  • Cryptographic protocols for DNA synthesis order verification
  • Advanced screening techniques resistant to AI-generated sequences
  • Secure multi-party computation for sequence analysis
  • Blockchain-based traceability for synthetic biological materials

Regulatory and Policy Frameworks

  • Cybersecurity requirements for biotechnology compliance
  • International cooperation on cyberbiosecurity standards
  • Risk assessment frameworks for bio-cyber systems
  • Ethics and dual-use considerations in cyberbiosecurity research
  • Legal and regulatory responses to cyberbiosecurity incidents
  • Regulation and security of DIY biology and biohacking

Case Studies and Threat Analysis

  • Analysis of real-world cyberbiosecurity incidents
  • Threat modeling for specific biological systems or organizations
  • Red team exercises and penetration testing in biotechnology environments
  • Economic impact analysis of cyberbiosecurity threats
  • Lessons learned from traditional cybersecurity applied to biological systems

Contribution Categories

  • Full Papers (6-10 pages): Original research contributions with comprehensive evaluation
  • Short Papers (up to 5 pages): Work-in-progress, preliminary results, or focused contributions
  • Industry Papers (up to 5 pages): Practical experiences, deployed solutions, or industrial case studies
  • Position Papers (up to 5 pages): Vision statements, outstanding challenges, or perspectives on future directions
  • Presentation abstracts (up to 2 pages): Recent late breaking news or prominent cyberbiosecurity papers accepted elsewhere

Formatting Instructions

Page limits of submitted papers do not include the references and appendices. The total page length may not exceed 15 pages (full papers) or 8 pages (short,industry, and position papers). Presentation abstracts may not exceed 2 pages including references, figures, and tables. No appendices are allowed for presentation abstracts. Papers must be formatted for US letter (not A4) size paper. All submissions must use the IEEE “compsoc” conference proceedings template. LaTeX submissions using the IEEE templates must use IEEEtran.cls version 1.8b with options “conference,compsoc.” (That is, begin your LaTeX document with the line \documentclass[conference,compsoc]{IEEEtran}.). See the “IEEE Demo Template for Computer Society Conferences” Overleaf template for an example. We are not aware of an MS Word template that matches this style.

Submission Instructions

Papers must be submitted via the HotCRP submission site.


Go to HotCRP Submission Site

Submission Policies

  • Registration: At least one author of accepted papers must register for and attend the workshop to present the paper in person. Papers with remote presentations are possible but will receive a lower priority in the selection process.
  • Originality: All submitted papers must describe original work not substantially overlapping with papers published or under review at other venues. Presentation abstracts may report findings that were published or are about to be published elsewhere.
  • Proceedings:Accepted papers will appear in the IEEE CS Press published proceedings. Accepted Presentation abstracts will appear on the workshop website and will not be included in proceedings.
  • Double-blind Review:Authors may choose to anonymize their submissions for double-blind review.

Important Dates

All deadlines are 23:59:59 AoE (UTC-12)

  • Paper Registration Deadline: February 21, 2026
  • Paper Submission Deadline: January 30, 2026 February 28, 2026
  • Paper Notification of Acceptance: February 27, 2026 March 27, 2026
  • Presentation Abstracts Due: April 10, 2026
  • Paper Camera-Ready Papers Due: April 10, 2026
  • Presentation Abstracts Notification: April 20, 2026
  • Workshop Date: May 21, 2026

Contact

For questions regarding submissions or the workshop, please contact the Program Chairs: