Join Us in Los Angeles!

ACSAC brings together cutting edge researchers, with a broad cross-section of security professionals drawn from industry, government and academia, gathered to present and discuss the latest security results and topics. With peer reviewed papers, invited talks, panels, workshops, national interest discussions, and professional development and training courses, ACSAC continues its core mission of investigating practical solutions for computer security technology.

Special Focus: Security and Privacy in the Internet of Things

With estimates ranging from 10 to 50 Billion, the number of devices incorporating embedded computation and communicating over the Internet is expected to grow unimaginably large in just the next few years. In the past year, awareness of the security and privacy challenges posed by the Internet-of-Things has emerged as a major theme in Government, Industry, Academia, and the mainstream press. The practical nature of this problem area and urgency for novel solutions raises the bar for the cybersecurity research community. I encourage everyone to submit timely work on this topic, and look forward to hearing about progress at this year's conference.

Stephen Schwab
ACSAC 2016 Conference Chair


Invited Speakers

Paul Vixie

Paul Vixie

CEO, Farsight Security

Scaling Properties of Software and System Security

Úlfar Erlingsson

Úlfar Erlingsson

Manager of Security Research, Google

Software Security in the Real World


Peer-Reviewed Papers:

ACSAC papers undergo a rigorous peer-review process. Here are some of the papers to be presented at ACSAC in 2016: (refresh the page to see other titles)

Gametrics: Towards Attack-Resilient Behavioral Authentication with Simple Cognitive Games

Practical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure

Catching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites

CoKey: Fast Token-Based Cooperative Cryptography


Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results