3rd International Workshop on
Trusted Computing and Artificial Intelligence
applied to Cybersecurity
3rd International Workshop on
Trusted Computing and Artificial Intelligence
applied to Cybersecurity
November 15 - 19, 2026, The Hague, The Netherlands, The World Forum
Call for Papers
Since ancient times, offensive and defensive strategies have evolved in sequence: once a defense is deployed for a given attack, new and more effective forms of attack emerge. In the digital era, the situation is developing similarly, and security attacks now affect many entities, from large organizations and critical infrastructures to individual persons.
It is widely acknowledged that security incidents and attacks are becoming increasingly complex, requiring in-depth technical expertise across multiple domains, including networking protocols, security techniques, machine learning algorithms, and risk management. Traditional approaches, such as network or host-based firewalls and intrusion detection systems, are commonly employed to detect attacks and automate responses. Nevertheless, they are not always effective, and further innovative solutions are required to detect, investigate, and respond to emerging cybersecurity incidents as rapidly as possible. For instance, most network traffic is encrypted nowadays, which makes it difficult to analyze using signature-based tools. Consequently, Artificial Intelligence (AI) models are increasingly used to detect network attacks and malware from measured parameters.
As widely used cryptographic algorithms become outdated, new post-quantum algorithms are being designed and deployed. However, their integration into large-scale security data structures (e.g., X.509 certificates) and protocols (e.g., TLS, IPSec) remains limited, and their performance (in terms of speed and scalability) must be further investigated and improved.
With the exponential proliferation of Internet of Things (IoT) devices, attack strategies have evolved accordingly. Numerous cyberattacks primarily target end nodes, particularly less-protected client devices or systems with limited resources, such as embedded systems or IoT devices, and subsequently propagate—based on the permissions obtained—to more critical systems. Cryptography alone is insufficient, as the code, once installed, must ultimately be executed on an end node or device. Many security breaches exploit software vulnerabilities or misconfigurations, whether on servers or on client devices. In particular, such attacks concentrate on the execution environment, seeking to exploit data while it is in use on an end-user device, that is, after it has been received and processed through cryptographic mechanisms. To mitigate these threats, trusted computing and remote attestation techniques can be employed to establish a robust foundation for trusted execution environments for critical applications across various types of devices.
This workshop seeks to provide a venue for ongoing research in the security attacks and defenses, including, but not limited to:
a) description of (advanced) cybersecurity attacks exploiting both technical and non-technical means
b) solutions for countering cyberattacks by exploiting trusted computing techniques and standards, e.g., by using the Trusted Platform Module (TPM) 2.0, or alternative standards that are more flexible and suitable for resource-constrained platforms
c) post-quantum algorithms integration into security protocols and systems
d) trust management and identification techniques for cyberattacks prevention and investigation
e) solutions for automated incident response and management in network and cloud environments
f) challenges and solutions for IoT and embedded systems security, including attacks in vehicular networks, and related defense mechanisms
g) design and development of innovative solutions for incident management in enterprise networks, required by incident response teams and security operation centers
h) machine/deep learning algorithms for security attacks detection
Important Dates
Submission Deadline: July 10, 2026 AoE
Notification Date: August 12, 2026
Camera Ready: September 17, 2026
Submission Guidelines
Submissions will be done through HotCRP: Submission Link.
A paper submitted to TrustAICyberSec workshop must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 10 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template), including references and appendices. Note that reviewers are not required to read appendices or any supplementary material. Authors must not alter font sizes, margins, or any other aspects of the standard ACM template.
The workshop will allow submission of two types of papers:
- Full Research Papers: These papers should present new work, evidence, or ideas related to the aforementioned topics of interest. Research papers must be well-argued and worthy of publication and citation, on one of the workshop's topics.
- Systematization-of-knowledge Papers: These papers should distill the contributions in the topic of the workshop (including trusted computing, PQC, automated incident response, or AI for cybersecurity) from a previously published series of security papers.
If the workshop will receive a significant number of submissions, we will perform a selection of the papers that will be presented. In this case, due to time constraints, accepted papers will be selected for presentation as either talk or poster based on their review score and novelty. Nonetheless, all accepted papers should be considered as having equal importance and will be published in the ACM workshop proceedings and published by the ACM Digital Library and/or ACM Press.
Submissions that do not adhere to these formatting or anonymization requirements may be rejected without review. All manuscripts must be uploaded through the official submission site.
One author per accepted paper must attend the workshop event and register on the ACM CCS 2026 web site.
Topics of interest
We invite innovative and high-quality submissions focusing on, but not restricted to, any combination of the following areas:
Trusted computing, confidential computing for telecommunication networks
Artificial intelligence algorithms for intrusion detection
Intrusion detection and prevention systems
Security attacks, incident management and response
Network security attacks investigation and mitigation solutions
Security automation in network and cloud environments
Automation for network security configuration in virtualized networks
Techniques and tools for cybersecurity attack defense
Tools for processing security vulnerabilities
Post-quantum computing algorithms integration into security protocols and solutions
Design and implementation of hybrid (post-quantum / traditional) PQC solutions
Remote attestation techniques and protocols
Internet of Things (IoT) security
General Chair(s)
Diana Gratiela Berbecaru, Politecnico di Torino, Italy
Deepika Saxena, The University of Aizu, Japan
Organizing and TPC Chair
Silvia Sisinni, Politecnico di Torino, Italy
Technical Program Committee
Luca Ardito, Politecnico di Torino, Italy
Cataldo Basile, Politecnico di Torino, Italy
Mauro Conti, University of Padova, Italy
Satyendra Singh Chouhan, MNIT Jaipur, Jaipur-302017
Piedad Brox, CSIC - Microelectronics Institute of Seville, Spain
Maxime Compastié, Fondació i2CAT, Spain
Subhrajyoti Deb, Indian Institute of Information Technology Bhopal, India
Alessandra De Benedictis, Universitá Federico II di Napoli, Italy
Edlira Dushku, Aalborg University, Denmark
Vikas Goyal, Richmond Upon Thames College, Twickenham, United Kingdom
Paolo Falcarin, Università Ca' Foscari Venezia, Italy
Daishi Kondo, University of Tokyo, Japan
Aaisha Makkar, College of Science and Engineering, University of Derby, Derby, United Kingdom
Alessandra Rizzardi, University of Insubria, Italy
Riccardo Sisto, Politecnico di Torino, Italy
Alessio Sacco, Politecnico di Torino, Italy
Simone Soderi, University of Padova, Italy
Contact
Diana Gratiela Berbecaru
diana.berbecaru[at]polito.it
Deepika Saxena
deepika[at]u-aizu.ac.jp
Silvia Sisinni
silvia.sisinni[at]polito.it