Call for Papers

Topics of Interest

We invite submissions on all aspects of cyberbiosecurity, including but not limited to:


Security of Biological Infrastructure

  • Authentication and authorization for laboratory equipment and automated systems
  • Secure communication protocols for biomanufacturing networks
  • Zero-trust architectures for biotechnology environments
  • Physical-digital security for biocontainment facilities
  • Supply chain security for biological materials and reagents

Agricultural Cyberbiosecurity

  • Security of precision agriculture and smart farming
  • Threats to food supply chains and automated harvesting
  • Data integrity in digital agriculture systems
  • Vulnerabilities in agri-biotech machinery
  • Secure environmental monitoring networks

AI Safety in Biotechnology

  • Adversarial attacks on machine learning models in biological applications
  • Safety alignment for AI-driven protein design and metabolic engineering
  • Formal verification methods for bio-AI systems
  • Information hazard management in AI-accelerated biological research
  • Robustness testing for biological discovery models

Biomedical Device and System Security

  • Security of implantable and wearable medical devices
  • Hospital network security and medical data interoperability
  • Vulnerabilities in telemedicine infrastructure
  • Software Bill of Materials (SBOM) for medical devices
  • Cybersecurity for bio-integrated electronics
  • Security of DIY and bio-hacking implantables

Data Protection and Privacy

  • Genomic data security and privacy-preserving computation
  • Secure storage and transmission of biological research data
  • Security of bio-banks and genetic databases
  • Privacy risks in direct-to-consumer genetic testing
  • Anonymization techniques for biological datasets
  • Consent and governance frameworks for biological data sharing
  • Intellectual property protection in collaborative biological research

Biometric Security and Authentication

  • Cancelable biometrics and privacy-preserving authentication
  • Presentation attack detection (liveness detection)
  • Deepfake attacks on biometric systems
  • Multi-modal biometric fusion security
  • Secure storage of biometric templates

Neurotechnology Security

  • Brain-Computer Interface (BCI) vulnerabilities
  • Neural data privacy and integrity
  • Neuro-rights and cognitive liberty
  • Security of closed-loop neuromodulation systems
  • Authentication using neural signals

Threat Detection and Response

  • Anomaly detection in biological data streams and laboratory workflows
  • Forensic analysis techniques for cyber-bio incidents
  • Incident response protocols for biotechnology organizations
  • Attribution methodologies for attacks on biological infrastructure
  • Threat intelligence sharing for the bioeconomy

DNA Synthesis and Screening Security

  • Vulnerabilities in nucleic acid synthesis screening systems
  • Cryptographic protocols for DNA synthesis order verification
  • Advanced screening techniques resistant to AI-generated sequences
  • Secure multi-party computation for sequence analysis
  • Blockchain-based traceability for synthetic biological materials

Regulatory and Policy Frameworks

  • Cybersecurity requirements for biotechnology compliance
  • International cooperation on cyberbiosecurity standards
  • Risk assessment frameworks for bio-cyber systems
  • Ethics and dual-use considerations in cyberbiosecurity research
  • Legal and regulatory responses to cyberbiosecurity incidents
  • Regulation and security of DIY biology and biohacking

Case Studies and Threat Analysis

  • Analysis of real-world cyberbiosecurity incidents
  • Threat modeling for specific biological systems or organizations
  • Red team exercises and penetration testing in biotechnology environments
  • Economic impact analysis of cyberbiosecurity threats
  • Lessons learned from traditional cybersecurity applied to biological systems

Contribution Categories

  • Full Papers (6-10 pages): Original research contributions with comprehensive evaluation
  • Short Papers (up to 5 pages): Work-in-progress, preliminary results, or focused contributions
  • Industry Papers (up to 5 pages): Practical experiences, deployed solutions, or industrial case studies
  • Position Papers (up to 5 pages): Vision statements, outstanding challenges, or perspectives on future directions
  • Presentation abstracts (up to 2 pages): Prominent cyberbiosecurity papers recently accepted elsewhere

Submission Instructions

Papers must be submitted via the HotCRP submission site.


Go to HotCRP Submission Site

Submission Policies

  • Registration: At least one author of accepted papers must register for and attend the workshop to present the paper.
  • Dual Submission & Proceedings: Submissions of papers should not substantially overlap with papers published or under review at other venues. Accepted papers will appear in the IEEE CS Press published proceedings.
  • Presentation Abstracts: Presentation abstracts may report findings that were published or are about to be published elsewhere. Presentation abstracts will appear on the workshop website and will not be included in proceedings.

Guidelines

  • All submissions must be original work not under review elsewhere (except Presentation Abstracts).
  • Submissions should be anonymized for double-blind review.

Important Dates

All deadlines are 23:59:59 AoE (UTC-12)

  • Paper Submission Deadline: January 30, 2026
  • Notification of Acceptance: February 27, 2026
  • Camera-Ready Papers Due: April 10, 2026
  • Workshop Date: May 21, 2026

Contact

For questions regarding submissions or the workshop, please contact the Program Chairs: