Call for Papers

NEW FOR 2012 — Authors of this year's top papers will be invited to submit their work to a special issue of the Journal of Computer Security (JCS).

When are papers due?
The deadline for submitting papers is June 8 June 1 (23:59 GMT-8). Authors will be notified of acceptance by approximately August 15.
What should I propose a paper on?
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned.

Special consideration will be given to papers that discuss system implementation, deployment, and lessons learned.

What awards are given for papers?
Papers will be judged for best paper awards. A prize will be given for Outstanding Conference Paper and the Best Student Paper.
How is the outstanding paper award selected?
The Program Committee selects three to five papers as candidates for the award based on reviewer recommendations. A small best paper selection committee reads each of the candidate papers in advance of the conference. This committee also attends the presentations of the candidate papers. After each of the candidate papers has been presented, the committee meets and selects the best paper based on both the written paper and the conference presentation. The outstanding paper winner receives a plaque and an honorarium.
What makes a good ACSAC paper?
We've gone through the papers submitted in recent years, and have collected a set of characteristics of good ACSAC papers. These should be read by anyone considering submitting a paper.
What format should the paper be in?
Please ensure that your submission is a PDF file of a maximum of 10 pages (including all references and appendices) generated according to the ACM instructions at http://www.acm.org/sigs/publications/proceedings-templates, using the template Option 2 "WITH permission block". Committee members are not required to read the appendices.

All submissions must be anonymous (i.e., papers should not contain author names or affiliations, or obvious citations). In the rare case that citing previous work in the 3rd person is impossible, blind the reference and notify the PC Chair.

Both of these constraints (page limit and anonymity) are hard constraints. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Do you have any other advice regarding writing papers?
Yes. They are enumerated here. This advice covers presentation, copyright issues, alternate places at ACSAC for your submission, and restrictions on submissions.
Who is on the Program Committee?
Program committee members may be found here.
How do I submit a paper?
How do I get more information?
For additional information regarding papers, please contact the Program Chair.
Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results