{"id":22334,"date":"2025-10-16T20:55:05","date_gmt":"2025-10-16T20:55:05","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=22334"},"modified":"2025-10-23T16:55:13","modified_gmt":"2025-10-23T16:55:13","slug":"cfp-last-x","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/","title":{"rendered":"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading purple-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding section-title-r is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p>We invite researchers to submit original research papers to the LAST-X Workshop, to be held in conjunction with the NDSS 2026 conference. With the rapid evolution of LLMs in the past few years, researchers have brought novelsolutions to hardware and software system security areas, including fuzzing, code generation, code analysis, etc. At LAST-X Workshop, we aim to provide a forum for researchers from industry and academia to discuss the latestadvancements, challenges, and solutions in using LLM for hardware and software security and validation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Topics of Interest<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>LLM-assisted fuzzing;<\/li>\n\n\n\n<li>LLM-assisted code-analysis and verification;<\/li>\n\n\n\n<li>LLM-assisted adversarial attacks and defenses in hardware and software systems;<\/li>\n\n\n\n<li>Case studies and practical applications of LLMs in real-world software development and testing.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Submission Guidelines<\/strong><\/h2>\n\n\n\n<p>Submissions to the LAST-X Workshop will be judged by the review committee based on quality and novelty in a double-blind review process. A detailed list of requirements is given as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Page limit: 10 pages (excluding bibliography and appendices)<\/li>\n\n\n\n<li>Paper template: Double-column IEEE format<\/li>\n\n\n\n<li>All submissions must be anonymous. Authors should not disclose information about their names, institutes, etc. Previous works should be referred in third person.<\/li>\n\n\n\n<li>Submissions must not overlap with papers that are already published or concurrently submitted to other venues.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4f0f7\"><strong>The submission portal for papers is: <a href=\"https:\/\/lastx2026.hotcrp.com\/\">https:\/\/lastx2026.hotcrp.com\/<\/a><\/strong><\/p>\n\n\n\n<p>The PC will select a best paper among the accepted workshop papers. The award will be presented during the workshop.<br><\/p>\n\n\n\n<p>We also strongly encourage researchers to submit papers covering other topics in the broad field of LLM-assisted hardware and software security and validation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Important Dates<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Submission deadline: 10 December 2025 (AoE)<\/li>\n\n\n\n<li>Author notification: 15 January 2026 (AoE)<\/li>\n\n\n\n<li>Camera-paper submission deadline: 30 January 2026 (AoE)<\/li>\n<\/ul>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 We invite researchers to submit original research papers to the LAST-X Workshop, to be held in conjunction with the NDSS 2026 conference. With the rapid evolution of LLMs in the past few years, researchers have brought novelsolutions to hardware and software system &hellip; <a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/\">Continued<\/a><\/p>\n","protected":false},"author":259,"featured_media":0,"parent":21279,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-22334","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 - NDSS Symposium<\/title>\n<meta name=\"description\" content=\"Call for papers for the Workshop on LLM Assisted Security and Trust Exploration (LAST-X) at the NDSS Symposium 2026 is now open.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 - NDSS Symposium\" \/>\n<meta property=\"og:description\" content=\"Call for papers for the Workshop on LLM Assisted Security and Trust Exploration (LAST-X) at the NDSS Symposium 2026 is now open.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T16:55:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/\",\"name\":\"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 - NDSS Symposium\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"datePublished\":\"2025-10-16T20:55:05+00:00\",\"dateModified\":\"2025-10-23T16:55:13+00:00\",\"description\":\"Call for papers for the Workshop on LLM Assisted Security and Trust Exploration (LAST-X) at the NDSS Symposium 2026 is now open.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Calls for Submissions for NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 - NDSS Symposium","description":"Call for papers for the Workshop on LLM Assisted Security and Trust Exploration (LAST-X) at the NDSS Symposium 2026 is now open.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/","og_locale":"en_US","og_type":"article","og_title":"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 - NDSS Symposium","og_description":"Call for papers for the Workshop on LLM Assisted Security and Trust Exploration (LAST-X) at the NDSS Symposium 2026 is now open.","og_url":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2025-10-23T16:55:13+00:00","og_image":[{"width":815,"height":345,"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/","url":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/","name":"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026 - NDSS Symposium","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"datePublished":"2025-10-16T20:55:05+00:00","dateModified":"2025-10-23T16:55:13+00:00","description":"Call for papers for the Workshop on LLM Assisted Security and Trust Exploration (LAST-X) at the NDSS Symposium 2026 is now open.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-last-x\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/"},{"@type":"ListItem","position":3,"name":"Calls for Submissions for NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/"},{"@type":"ListItem","position":4,"name":"Call for Papers: Workshop on LLM Assisted Security and Trust Exploration (LAST-X) 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/c-bianchiisoc-org\/","display_name":"Agustin Bianchi"},"relative_dates":{"created":"Posted 2 months ago","modified":"Updated 2 months ago"},"absolute_dates":{"created":"Posted on 16 October 2025","modified":"Updated on 23 October 2025"},"absolute_dates_time":{"created":"Posted on 16 October 2025 8:55 pm","modified":"Updated on 23 October 2025 4:55 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=22334"}],"version-history":[{"count":10,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22334\/revisions"}],"predecessor-version":[{"id":22618,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22334\/revisions\/22618"}],"up":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/21279"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=22334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=22334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=22334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}