Skip to main content

Until next year!Proceedings are now available

Awards announced – check out the archive.
Presentations may be found in program.

View Program Read Papers
©Geoff Duncan

Thank you for joining us!

Plan Ahead — ACSAC 39 will be held December 4-8, 2023 in Austin, Texas

The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technology.

ACSAC will be held at the AT&T Conference Center in Austin, Texas. The hotel is 8 miles from the airport, with many attractions and restaurants within walking distance or a short ride.

We invite you to submit your work to the conference. As an internationally recognized forum where practitioners, researchers, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we welcome your contributions. In addition to peer-reviewed papers on new work, we also welcome case studies on real-world applications, panels featuring interactive expert, and workshops comprised of 1-2 days sessions on hot topics.

Keynote

Automated Data-driven Binary Analysis for Security

Suman Jana Photo

Suman Jana

Associate Professor, Department of Computer Science and the Data Science Institute, Columbia University

Hard Topic Theme: Trustworthy Systems

This year's hard topic theme solicits research results and technologies that are considering the concept of trustworthy systems. Trustworthy systems generally involve the development of capabilities that offer security, safety, and reliability guarantees. ACSAC has always solicited work on applied security; with this hard topic, we hope to put great emphasize on deployable trustworthy systems.

Read More