PDF CFPCall for Papers
Deadline: June 29 (23:59:59 Anywhere on Earth) — hard deadline
Notification: September 2, with early reject notifications tentatively sent by August 1
Final Papers Due: October 17
Program Chair: Gabriela Ciocarlie, The University of Texas at San Antonio
Program Co-Chair: Roberto Perdisci, University of Georgia
Artifacts Evaluation Co-Chair: Martina Lindorfer, TU Wien
Artifacts Evaluation Co-Chair: Gianluca Stringhini, Boston University
We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from the actual application, especially those related to our hard topic theme — Trustworthy Systems. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
During submission, authors of papers whose main contributions and experimental results rely primarily on new or reproduced artifacts (e.g., code and/or data) should indicate whether they will separately submit their artifacts for evaluation by the artifacts evaluation committee and make the artifacts publicly available, if their paper is accepted. This acknowledgement will be visible to the reviewers and may therefore be taken into consideration during the review process. Authors who have justifiable reasons to not submit their artifacts for evaluation (if their paper is accepted) should add a comment in the corresponding comment box in the submission form.
Papers that might raise ethical concerns (e.g., papers that use human subjects or describe experiments related to vulnerabilities in software or systems) must include an Ethical Considerations section that properly describes what procedures have been followed to minimize potential harm. Such papers should discuss the steps taken to avoid negatively affecting any third-parties, whether an institutional ethics committee reviewed the research, or how the authors plan to responsibly disclose the vulnerabilities to the appropriate software/system vendors or owners before publication.
What format should the paper be in?
Please ensure that your submission is a PDF file of a maximum of 10 2-column pages, excluding well-marked references and appendices limited to 5 pages. Submissions must be generated using the 2-column ACM acmart template available at https://www.acm.org/publications/proceedings-template, using the [sigconf, anonymous] options. Submissions should not use older ACM templates (e.g., sig-alternate). Committee members are not required to read the appendices. All submissions must be anonymous (i.e., papers should not contain author names or affiliations, or obvious citations). In the rare case that citing previous work in the 3rd person is impossible, blind the reference and notify the Program Chairs.
Both of these constraints (page limit and anonymity) are hard constraints. Submissions not meeting these guidelines risk rejection without consideration of their merits.
What should I propose a paper on?
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Special consideration will be given to papers that discuss system implementation, deployment, and lessons learned.
What makes a good ACSAC paper?
We've gone through the papers submitted in recent years, and have collected a set of characteristics of good ACSAC papers. These should be read by anyone considering submitting a paper.
Do you have any other advice regarding writing papers?
Yes, they are enumerated here. This advice covers presentation, copyright issues, alternate places at ACSAC for your submission, and restrictions on submissions.
What awards are given for papers?
Accepted papers will be judged by the program committee and two papers will be given a Distinguished Paper Award at the conference.
Who is on the Program Committee?
The list of program committee members may be found here.
How do I submit a paper?
- Determine what your paper is going to be about.
- Review the characteristics of a good paper and the other paper advice.
- Prepare your paper in the proper format, including "blinding" it for review.
- Submit the paper no later than the due date above.
How do I get more information?
For additional information regarding papers, please contact the Program Chair.