Cybersecurity Artifacts Competition and Impact Award
Deadline: September 26 October 7
Notification: October 21
The competition is open to cybersecurity artifacts previously published in all peer-reviewed venues (conferences, journals), both in academia and industry, not just at ACSAC.
Importance of Cybersecurity Artifacts
Since 2017, ACSAC has encouraged the publication of software and data artifacts of academic research papers accepted at the conference. We strongly believe that publishing artifacts is an important step towards facilitating the reproducibility of research results and contributing to the real-world deployment of novel and reliable security solutions. To this end, this year we are introducing a new Artifacts Competition that is broadly open to cybersecurity artifacts previously published in all peer-reviewed venues (conferences, journals), both in academia and industry.
Cybersecurity Artifacts Competition
This competition invites the submission of applied cybersecurity artifacts that have been published in previous years in academic or industry venues. In particular, the competition aims to identify previously published applied security artifacts that have demonstrated meaningful impact for the security and privacy research communities. For instance, demonstrable impact may be represented by an artifact that has been reused in multiple subsequent publications by different research groups, that has received multiple "stars" and/or "forks" on platforms such as GitHub, or that has been successfully transitioned to a commercial technology.
Eligible submissions include artifacts that meet the following conditions:
- The artifact is related to applied security or privacy technologies.
- The artifact consists of one or more of the following
- open-source software
- open or reusable dataset
- online service that can be used free of charge for research
- open testbed that can be used free of charge for research
- user study materials such as questionnaires or codebooks for qualitative analyses
- The artifact is part of previously published academic or industry research.
- For this year’s competition, the artifact must have been published before 2020 (i.e., the publication date must be on or before Dec. 31, 2019) and demonstrate that it has since accumulated some meaningful (even if small) impact with benefits for the security research community. This timeline will be rolling forward accordingly each year.
Definition of "Impact"
Examples of demonstrable impact include, but are not limited to, the following:
- The artifact has been reused and cited in subsequent research publications presented in academic or industry venues.
- The artifact has been released as open-source software and has received demonstrable appreciation by the security community (e.g., in the form of "stars," "forks," or other types of citations).
- The artifact has been successfully transitioned to a commercial technology.
- The artifact consists of an online service that is open to the public or to researchers and demonstrates a significant number of users benefiting from it.
- The artifact has become a de facto benchmark for one or more use cases.
To take part in the competition, authors should submit the following:
- A URL pointing to the artifacts’ online repository and documentation.
- A short paper that describes what problem the artifacts address, how the artifacts work, and provides evidence of the artifacts’ impact since their initial release.
Short papers accompanying the artifacts submission must be in PDF format and not exceed 4 pages, excluding well-marked references. The paper format should follow the 2-column ACM acmart template available at https://www.acm.org/publications/proceedings-template, using the [sigconf] option.
Initial Review, Finalists Notifications and Presentations at ACSAC
The Artifacts Competition Committee will review the artifacts by evaluating the description paper that accompanies each submission, the utility of the artifact, as well as other available documentation (e.g., online documentation).
Based on the quality of the description, documentation, utility of the artifacts and evidence of impact, the committee will select up to 10 top finalist artifacts for further review. The authors of these finalist submissions will be notified and will be invited to the ACSAC conference for an oral presentation of their artifacts’ design, technical demonstration, and impact.
Impact Award and Publication
The Artifacts Competition committee will then select up to three best artifacts among the finalist submissions, which will be awarded the "2022 ACSAC Cybersecurity Artifacts Impact Award" (1st place, 2nd place, and 3rd place) at the conference. Short papers of all the finalist submissions will be published on the ACSAC website with open access.
For questions regarding this competition, please contact email@example.com.