Skip to main content

Present at ACSAC!Some CFP still open

There is still time to submit a case study, poster, or WiP, as well as apply for student conferenceships and artifact awards.

Call for Submissions
©Geoff Duncan

Join Us in Austin!

The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technology.

ACSAC will be held at the AT&T Conference Center in Austin, Texas. The hotel is 8 miles from the airport, with many attractions and restaurants within walking distance or a short ride.

We invite you to submit your work to the conference. As an internationally recognized forum where practitioners, researchers, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we welcome your contributions. In addition to peer-reviewed papers on new work, we also welcome case studies on real-world applications, panels featuring interactive expert, and workshops comprised of 1-2 days sessions on hot topics.

Submission Deadlines

Technical Papers

May 22 (abstract), May 26 (paper)

Case Studies

June 29

Panels

May 26 (abstract), September 1 (details)

Posters

November 1

Works in Progress

November 1

Workshop Proposals

May 26

Artifacts Competition

September 1

Student Conferenceships

August 15

Hard Topic Theme: Trustworthy Systems

This year's hard topic theme solicits research results and technologies that are considering the concept of trustworthy systems. Trustworthy systems generally involve the development of capabilities that offer security, safety, and reliability guarantees. ACSAC has always solicited work on applied security; with this hard topic, we hope to put great emphasize on deployable trustworthy systems.

Read More