Call for Submissions
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. If you are developing practical solutions to problems related to the protection of users, commercial enterprises, or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.
We solicit submissions that address the application of security technology, the implementation of systems, and the discussion of lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme, Trustworthy Systems.
We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from the actual application. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Please ensure that your submission is a PDF file of a maximum of 10 pages, excluding well-marked references and appendices limited to 5 pages. Committee members are not required to read the appendices.
The Case Studies in Applied Security Track is a critical part of the technical conference. It is an opportunity for professionals to share information that is current without writing a detailed technical paper, but enables attendees to learn about the next generation of products and solutions. It is open to anyone in the community such as vendors, network providers, systems integrators, government civil/federal/military programs or users across the spectrum of computer security applications. Potentially this is where attendees can learn about client needs and vendors solutions. While the Case Studies will not be included in the Proceedings, the presentations will be posted to the ACSAC site following the conference.
Panels should encourage audience participation and focus on the sharp edges of a topic where there is controversy or where there are widely varying positions. Panels focused on a topic related to the conference theme are especially welcomed, but this is not a hard requirement; some additional topics are listed here. A typical panel proposal should list the moderator, three panel members and an abstract of the proposed topic.
The poster session provides an opportunity for researchers and practitioners to present their new and innovative preliminary work in an informal, interactive setting. Conference attendees can learn about novel on-going research projects that might not yet be complete, but whose preliminary results are already interesting. Poster presenters will have an opportunity to discuss their work and get invaluable feedback from knowledgeable sources at an early stage of their research.
Works in Progress
The Works in Progress (WiP) session offers short presentations (5 minutes maximum) of ongoing work. These presentations highlight the most current work in both business and academia, emphasizing goals and value added, accomplishments to date, and future plans. Special consideration is given to topics that discuss real life security experience, including system implementation, deployment, and lessons learned.
ACSAC workshops are on up to date topics that attendees usually rate to provide a useful and exciting forum for information technology professionals (e.g., standards developers, software developers, security engineers, security officers) to exchange ideas, concerns, and opinions.
This competition invites the submission of applied cybersecurity artifacts that have been published in previous years in academic or industry venues. In particular, the competition aims to identify previously published applied security artifacts that have demonstrated meaningful impact for the security and privacy research communities. For instance, demonstrable impact may be represented by an artifact that has been reused in multiple subsequent publications by different research groups, that has received multiple "stars" and/or "forks" on platforms such as GitHub, or that has been successfully transitioned to a commercial technology.
ACSAC offers conferenceships to enable students to attend the conference. This program will help pay for some of the cost to attend ACSAC.
General Submissions and Speaking Proposals
ACSAC does not accept "speaking proposals" per se, however; you are encouraged to submit suggestions in the form of a one paragraph description of a topic and a biography of the proposed presenter. Depending on a proposal's technical content, it may be acceptable as a case study. If a full paper is available, it may be acceptable as a technical paper. If a presentation by a group of related speakers is contemplated, a proposal for this session may be acceptable as a panel. If a proposal for a half day or full day seminar is appropriate, it may be acceptable as a professional development course. If a one or two page technical write-up is available that describes work that is not yet completed, it may be acceptable as a poster. Finally, if your have an interest in a full day interactive dialogue, exchanging ideas, opinions and concerns between multiple presenters and attendees, consider being a workshop presenter.