{"id":22623,"date":"2025-10-24T10:17:01","date_gmt":"2025-10-24T10:17:01","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=22623"},"modified":"2025-12-11T15:47:59","modified_gmt":"2025-12-11T15:47:59","slug":"cfp-prism","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/","title":{"rendered":"Call for Papers: Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading purple-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">Call for Papers: Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding section-title-r is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p>We invite researchers and practitioners to submit original research papers for the first Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM). PRISM emphasizes holistic reasoning and human-centered after-the-fact investigation. Its mission is to catalyze a shift in the security community: from fragmented, alert-centric detection toward causal, explainable, and analyst-friendly approaches that capture the complexity of modern cyber attacks. By integrating provenance research with advances in AI, systems design, and human factors, the workshop aims to establish a new foundation for how defenders understand and respond to sophisticated threats, leading to a safer and trustworthy cyberspace ultimately.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Areas of Interest<\/h2>\n\n\n\n<p>PRISM solicits contributions on a broad range of topics, including but not limited to:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Provenance graphs and attack-path reconstruction<\/li>\n\n\n\n<li>Causal inference under partial or adversarial telemetry<\/li>\n\n\n\n<li>Learning and new models for detection and investigation (graph learning, diffusion models, LLMs, etc.)<\/li>\n\n\n\n<li>Systems and infrastructure for provenance analytics (query, indexing, storage)<\/li>\n\n\n\n<li>Cross-domain and cross-layer correlation<\/li>\n\n\n\n<li>Human factors and operator workflows<\/li>\n\n\n\n<li>Modern deployments (cloud, containers\/serverless, IoT, CPS\/OT)<\/li>\n\n\n\n<li>Case studies from industry, government, and critical infrastructure<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Log capture and integrity<\/li>\n\n\n\n<li>Log compression and reduction<\/li>\n\n\n\n<li>Adversarial attacks and defenses on provenance-aware systems<\/li>\n\n\n\n<li>Real-time and cost-aware pipelines<\/li>\n\n\n\n<li>Explainability and uncertainty<\/li>\n\n\n\n<li>Datasets and benchmarks<\/li>\n\n\n\n<li>Standards and interoperability (W3C PROV, OpenTelemetry, MITRE ATT&amp;CK).<\/li>\n\n\n\n<li>Privacy, governance, and compliance for provenance data.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Submission Guidelines for Papers<\/h2>\n\n\n\n<p>We invite both regular papers and work-in-progress papers. Regular papers should have <strong>no more than<\/strong> <strong>10 pages in total<\/strong> (excluding references and appendices). Work-in-progress papers must have <strong>no more than 6 pages (again, excluding references and appendices),<\/strong> which discuss work-in-progress and novel ideas. Work-in-progress papers will be selected based on their potential to spark interesting discussions during the workshop.<\/p>\n\n\n\n<p>All papers must be written in English. Papers must be formatted with <a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/templates\/\">the official NDSS templates<\/a>.<\/p>\n\n\n\n<p>Submissions must be properly anonymized for double-blind review (please follow NDSS guidelines on paper anonymization).<\/p>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4f0f7\"><strong>The submission portal for papers is: <a href=\"https:\/\/prism26.hotcrp.com\/\">https:\/\/prism26.hotcrp.com\/<\/a><\/strong><\/p>\n\n\n\n<p>One author of each accepted paper is expected to present the paper at the workshop. Following notification to authors, more information will be provided regarding speaking times and other details.<\/p>\n\n\n\n<p>The accepted papers will be made available on the workshop website and the workshop will have official proceedings. The proceedings will be published and archived by the Internet Society (ISOC).<\/p>\n\n\n\n<p>The PC will select the <strong>best paper awards<\/strong> and they are presented during the workshop.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Submission Guidelines for Tutorials<\/h2>\n\n\n\n<p>We invite submissions of tutorial proposals that emphasize live demonstration of real systems for attack provenance, investigation and reasoning. We seek engaging, demo-driven sessions in which presenters show how their system actually works (or can be used) in practice.<\/p>\n\n\n\n<p>Each submission will undergo light review (i.e., relevance, originality, and feasibility). Accepted tutorials will be allocated a 30-minute to 60-minute slot during the workshop, with the expectation that a significant portion is devoted to live demo, audience Q&amp;A, and interactive exploration.<\/p>\n\n\n\n<p>The submission link to the tutorials will be provided soon.<\/p>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4f0f7\"><strong>The submission portal for tutorials is <a href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSeZx-zmCIKWP5N0FJOCspK-O5n6ERRdrCaAEmh31LQ0EsKrrA\/viewform\">https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSeZx-zmCIKWP5N0FJOCspK-O5n6ERRdrCaAEmh31LQ0EsKrrA\/viewform<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Important Dates<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Paper\/Tutorial Submission Deadline: <s>15 December 2025<\/s> 2 January 2026 by 11:59pm Anywhere-on-earth (AOE)<\/li>\n\n\n\n<li>Notification of Acceptance: 22 January 2026<\/li>\n\n\n\n<li>Camera Ready Submission: 6 February 2026<\/li>\n\n\n\n<li>Workshop date: 23 February 2026<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call for Papers: Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 We invite researchers and practitioners to submit original research papers for the first Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM). PRISM emphasizes holistic reasoning and human-centered after-the-fact investigation. Its mission &hellip; <a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\">Continued<\/a><\/p>\n","protected":false},"author":237,"featured_media":0,"parent":21279,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-22623","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Call for Papers: PRISM 2026 - NDSS Symposium<\/title>\n<meta name=\"description\" content=\"Call for Papers for the Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 is now open.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call for Papers: PRISM 2026 - NDSS Symposium\" \/>\n<meta property=\"og:description\" content=\"Call for Papers for the Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 is now open.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T15:47:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\",\"name\":\"Call for Papers: PRISM 2026 - NDSS Symposium\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"datePublished\":\"2025-10-24T10:17:01+00:00\",\"dateModified\":\"2025-12-11T15:47:59+00:00\",\"description\":\"Call for Papers for the Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 is now open.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Calls for Submissions for NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Call for Papers: Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call for Papers: PRISM 2026 - NDSS Symposium","description":"Call for Papers for the Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 is now open.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/","og_locale":"en_US","og_type":"article","og_title":"Call for Papers: PRISM 2026 - NDSS Symposium","og_description":"Call for Papers for the Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 is now open.","og_url":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2025-12-11T15:47:59+00:00","og_image":[{"width":815,"height":345,"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/","url":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/","name":"Call for Papers: PRISM 2026 - NDSS Symposium","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"datePublished":"2025-10-24T10:17:01+00:00","dateModified":"2025-12-11T15:47:59+00:00","description":"Call for Papers for the Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026 is now open.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-prism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/"},{"@type":"ListItem","position":3,"name":"Calls for Submissions for NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/"},{"@type":"ListItem","position":4,"name":"Call for Papers: Workshop on Attack Provenance, Reasoning, and Investigation for Security in the Monitored Environment (PRISM) 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/strinekatrbovic\/","display_name":"Ivana Trbovic"},"relative_dates":{"created":"Posted 2 months ago","modified":"Updated 2 days ago"},"absolute_dates":{"created":"Posted on 24 October 2025","modified":"Updated on 11 December 2025"},"absolute_dates_time":{"created":"Posted on 24 October 2025 10:17 am","modified":"Updated on 11 December 2025 3:47 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=22623"}],"version-history":[{"count":8,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22623\/revisions"}],"predecessor-version":[{"id":22890,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22623\/revisions\/22890"}],"up":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/21279"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=22623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=22623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=22623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}