19th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2025)

The 19th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2025) invites researchers from academia and industry to explore innovative methods, tools, and emerging technologies to enhance the security, trust, and privacy of software applications. This workshop will bring together experts to discuss state-of-the-art techniques, share experiences, and review lessons learned in addressing both pervasive and non-pervasive software applications.

In today’s increasingly connected and complex environment, traditional protection measures—such as IDS and firewalls—are no longer sufficient to counteract the evolving threat landscape. Modern software systems must be engineered with robust protection mechanisms that not only secure data but also maintain user trust and privacy, all while delivering the expected value. However, a principal obstacle in developing STP-aware software is that current practices in specification, design, implementation, and testing often lack the adequate methods and tools needed to meet these goals.

To address these challenges, the workshop emphasizes the integration of advanced techniques such as artificial intelligence (AI), large language models (LLM), and blockchain technology into every phase of software development. These emerging technologies offer transformative potential to innovate traditional STP practices by enhancing threat detection and analysis, automating testing and verification, and ultimately building more resilient and trustworthy systems.

Moreover, as most systems are now connected to the Internet, the attack surface has increased dramatically, and threat scenarios have become more varied. Pervasive applications, in particular, introduce unique challenges due to their reliance on location and context—factors that demand novel approaches to privacy and security management. Therefore, we have a special consideration for papers that address security, privacy, and trust in both pervasive and non-pervasive applications.

We welcome contributions that examine both established and emerging challenges in the field. Join us at STPSA 2025 to help shape the future of secure and intelligent software applications by sharing your research, experiences, and insights.

Scope of the Workshop

Topics of interest include, but are not limited to:

  • Security, trust, and privacy (STP)-Aware Software Development and Practices:
    Innovative methods and tools to integrate security, trust, and privacy into software engineering practices, including AI-driven approaches.
  • STP Requirements Elicitation and Specification:
    Techniques for capturing and specifying security, trust, and privacy requirements in modern software systems, including those enhanced by AI and LLM capabilities.
  • Models, Languages, and Methodologies for STP-Aware Software Design:
    Formal models, domain-specific languages, and methodologies for designing secure and privacy-aware software, with consideration for AI and machine learning components.
  • STP Challenges for Pervasive and Mobile Applications:
    Addressing the unique security and privacy challenges of applications in pervasive computing, mobile platforms, and context-aware environments.
  • AI, Machine Learning, and LLM in Security:
    Applications of AI, machine learning, and large language models for automated threat detection, risk assessment, and security analytics in both traditional and emerging software systems.
  • Testing and Verification of STP Properties:
    Approaches to testing and verifying security, trust, and privacy properties, including automated testing frameworks enhanced by AI.
  • Management and Usability in STP-Aware Applications:
    Exploring the intersection of usability, human factors, and STP in software applications, particularly when integrating advanced AI technologies.
  • User Interfaces for STP-Aware Applications:
    Designing interfaces that promote secure behaviors and ensure user trust and privacy, with a focus on systems incorporating AI-driven features.
  • STP in E-Services and Cyber-Physical Systems (CPS)/IoT:
    Security, trust, and privacy challenges in e-health, e-government, e-banking, e-commerce, CPS, and IoT, including the role of AI in these domains.
  • Blockchain and Distributed Ledger Technologies:
    Exploring the integration of blockchain with AI to enhance STP in software applications.
  • Educational Innovations:
    Teaching methods, innovative courses, and curriculum developments for STP-aware software applications, particularly in the context of emerging AI and LLM technologies.
  • Experience Reports and Case Studies:
    Real-world reports on developing STP-aware software systems, including challenges and lessons learned when integrating AI and LLM.
  • Ethical and Societal Issues:
    Discussions on the ethical implications of using AI and LLM in security, trust, and privacy contexts, and strategies to mitigate potential risks.

Workshop organizer(s)

Hossain Shahriar
University of West Florida, USA
Email: hshahria@kennesaw.edu

Mohammad Ashiqur Rahman
Florida International University, USA
Email: marahman@fiu.edu

Program Co-Chairs

Debbie Perouli
Marquette University, USA
Email: despoina.perouli@marquette.edu

Abdullah Farooq
Wentworth Institute of Technology, USA
Email: farooqa@wit.edu

Md Golam Hasan
Iona University
Email: mmehedihasan@iona.edu

Important Dates

UPDATED: Full symposium papers due
January 31, February 15, February 28, 2025
Final extension: March 5, 2025

Symposium paper notification
April 7, 2025
Updated: April 17, 2025

Workshop & special session papers due
April 15, 2025
Updated: April 20, 2025

Workshop & special session papers notification
May 1, 2025

Camera-ready copy
June 1, 2025

Conference Dates
July 8-11, 2025

Paper Templates

IEEE Paper templates are available in MS Word 2003 and LaTex. All submissions must use US 8.5×11 letter page format.

IEEE Conference Publishing Policies

All submissions must adhere to IEEE Conference Publishing Policies.

IEEE Cross Check

All submission will be screened for plagiarized material through the IEEE Cross Check portal.