Present at ACSAC!Some CFP still open
There is still time to submit a case study, poster, or WiP, as well as apply for student conferenceships and artifact awards.
Call for SubmissionsJoin Us in Austin!
The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technology.
ACSAC will be held at the AT&T Conference Center in Austin, Texas. The hotel is 8 miles from the airport, with many attractions and restaurants within walking distance or a short ride.
We invite you to submit your work to the conference. As an internationally recognized forum where practitioners, researchers, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we welcome your contributions. In addition to peer-reviewed papers on new work, we also welcome case studies on real-world applications, panels featuring interactive expert, and workshops comprised of 1-2 days sessions on hot topics.
Submission Deadlines
Technical Papers
May 22 (abstract), May 26 (paper)
Case Studies
June 29
Panels
May 26 (abstract), September 1 (details)
Posters
November 1
Works in Progress
November 1
Workshop Proposals
May 26
Artifacts Competition
September 1
Student Conferenceships
August 15
Hard Topic Theme: Trustworthy Systems
This year's hard topic theme solicits research results and technologies that are considering the concept of trustworthy systems. Trustworthy systems generally involve the development of capabilities that offer security, safety, and reliability guarantees. ACSAC has always solicited work on applied security; with this hard topic, we hope to put great emphasize on deployable trustworthy systems.
Read More