STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics).
STM 2025 is the twenty-first workshop in this series and will be held in Toulouse, France, in conjunction with the 30th European Symposium On Research in Computer Security (ESORICS 2025). The workshop seeks submissions from academia, industry, and government, presenting novel research on all theoretical and practical aspects of security and trust in ICTs. Topics of interest include, but are not limited to:Paper Submission | Author Notification | Camera Ready |
---|---|---|
July 13, 2025 | July 28, 2025 | August 1, 2025 |
All deadlines are at 11.59PM / 23:59 American Samoa Time
Submissions are to be made to via EasyChair and received by the deadline (11:59 p.m. American Samoa time).
All submissions must be written in high-quality English and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers).
All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages (using 10-point font) in the LNCS format, excluding the bibliography and well-marked appendices, and at most 20 pages in total. For more information about templates (LaTex or Word) and conditions, please go to here.
A paper submitted to STM 2025 must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Moreover, after you submit to STM 2025, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before or after submission of the paper to STM 2025, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.
As in previous years, the proceedings will be published online by Springer in the Lecture Notes in Computer Science (LNCS) series (past STM proceedings are available here). As such, the final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs (https://goo.gl/hbsa4D) in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits.
In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
At least one author of accepted papers must guarantee that they will present their paper at the workshop.
(Note: presentation times include 5 mins for Q&A)
13:30-13:45 | WELCOME SESSION (Program Chairs) |
---|---|
13:45-14:45 | ERCIM STM AWARD 2025 (Session Chair: Cristina Alcaraz) |
Talk: TBD, Speaker: TBD | |
14:45-15:00 | COFFEE/TEA BREAK |
15:00-17:00 | SESSION 1: IDENTITY MANAG., AUTHENTICATION, ACCESS CONTROL & FORMAL MODELING (Session Chair: TBD) |
15:00-15:30 | Gianluca Sassetti, Amir Sharif, Roberto Carbone and Silvio Ranise. Toward Secure and Trustworthy Identity Management Systems: A Knowledge-base Driven Approach |
15:30-16:00 | Dennis Hamm, Erwin Kupris and Thomas Schreck. Always Authenticated, Never Exposed: Continuous Authentication via Zero-Knowledge Proofs |
16:00-16:30 | Barbara Fila and Ermenda Hoxha. Pragmatic guidelines for formal modeling of security ceremonies |
16:30-17:00 | Clara Bertolissi and Maribel Fernandez. Access Control Administration for Smart Homes |
(Note: presentation times include 5 mins for Q&A)
09:30-10:30 | KEYNOTE SESSION (Session Chair: Sokratis Katsikas) |
---|---|
Talk: TBD, Speaker: TBD | |
10:30-10:50 | COFFEE/TEA BREAK |
10:50-12:20 | SESSION 2: AI & MACHINE LEARNING FOR SECURITY (Session Chair: Cristina Alcaraz) |
10:50-11:20 | Chi Zhang, Muhammad Shadi Hajar, Harsha Kalutarage and Lankeshwara Munasinghe. Parameter-Efficient Fine-Tuning of LLMs for Intrusion Detection and Firewall Rule Generation: A Comparative Study |
11:20-11:50 | Crawford Brown, Nikolaos Pitropakis, Christos Chrysoulas and Costas Lambrinoudakis. ABusing social media & sentiment analysis for stock market prediction |
11:50-12:20 | Davide Ferraris, Letizia Russo and Lorenzo Monti. DrATC+: A Divide et Impera Extension to Trust-Based Dynamic Routing |
12:20-13:50 | LUNCH BREAK |
13:50-15:20 | SESSION 3: CYBERSECURITY STRATEGIES, REGULATIONS, PRIVACY SESSION (Session Chair: TBD) |
13:50-14:20 | Håvard J. Ofte and Sokratis Katsikas. How to Train Your Guardian: Evaluating Cyber Security Exercises Using Situation Awareness |
14:20-14:50 | Daniele Canavese, Afonso Ferreira, Romain Laborde and Mohamed Ali Kandi. Towards an architecture for managing security under the EU Cyber Resilience Act |
14:50-15:20 | Javiera Alegría Dinamarca, Ivana Bachmann and Javier Bustos-Jiménez. Google Tag Manager and its Privacy Issues |
15:20-15:30 | COFFEE/TEA BREAK |
15:30-17:00 | SESSION 4: CRYPTOGRAPHY & THREAT ANALYSIS (Session Chair: TBD) |
15:30-16:00 | Antony Dalmiere, Zheng Zhou, Guillaume Auriol, Vincent Nicomette and Pascal Marchand. Measuring Modern Phishing Tactics: A Quantitative Study of Body Obfuscation Prevalence, Co-occurrence, and Filter Impact |
16:00-16:30 | Guillaume Quispe, Pierre Jouvelot and Gérard Memmi. Nicknames for Group Signatures |
16:30-17:00 | Ivan Costa, Ivone Amorim, Eva Maia and Isabel Praça. The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8 |
17:00-17:10 | CLOSING SESSION (Program Chairs) |
Any doubts or queries can be addressed to the PC Chairs using the following emails: