logo

08 de diciembre - 12 de diciembre de 2025

Clasificación: A (CORE2023)Offline

Annual Computer Security Applications Conference

Actualizado: 5 days ago
0.0 (0 Calificaciones)
Honolulu, Hawaii, USAApplied Computer Security Associates, IEEE Computer Society

Aún no hay seguidores.

Resumen General

The Annual Computer Security Applications Conference (ACSAC) 2025 will be held in Honolulu, Hawaii, USA, from December 8-12, 2025. It brings together researchers, practitioners, and security professionals to discuss the latest cybersecurity results and topics. ACSAC is now accepting submissions for technical papers, case studies, panels, posters, workshops, artifacts, and student conferenceships.

Convocatoria

ACSAC 2025: Call for Submissions

The Annual Computer Security Applications Conference (ACSAC) 2025 will be held in Honolulu, Hawaii, USA, December 8-12, 2025.

ACSAC is a forum for practitioners, researchers, and developers in information system security to learn and exchange practical ideas and experiences. We solicit submissions that address the application of security technology, the implementation of systems, and the discussion of lessons learned.

Submission Types and Deadlines

Submission TypeDeadline
Technical PapersMay 30
Case StudiesSeptember 17
Panels (abstract)July 8
Panels (details)August 20
Posters and WiPsSeptember 13
Workshop ProposalsMay 26
Workshop—CSETSeptember 10
Workshop—HealthSecJuly 25
Workshop—ICSSAugust 29
Workshop—WAITIOctober 6
Artifacts CompetitionSeptember 17
Student ConferenceshipsSeptember 30

Hard Topic Theme: Automated Detection and Patching of Software Vulnerabilities

This year's hard topic theme solicits research results and technologies that advance our ability to automatically identify and fix software security vulnerabilities.

Read More

Technical Papers

We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from the actual application. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Please ensure that your submission is a PDF file of a maximum of 11 pages, excluding well-marked references and appendices limited to 5 pages. Committee members are not required to read the appendices.

  • Paper Submissions: May 30 (23:59 Anywhere on Earth) — firm deadline
  • Early Rejection Notification: July 14
  • Authors Response Period: August 18-22 (tentative)
  • Acceptance Notification: September 3
  • Minor Revision Period: September 4 - October 3
  • Camera Ready Deadline: October 24

Make Submission

Reproduction and Replication (R+R) Papers

In addition to regular papers and artifact evaluations, this year we are also soliciting studies that confirm, question, or clarify the results of previous research. These papers must contain the prefix “R+R:” in their title and check the corresponding option in the submission form.

We encourage submissions to follow the ACM guidelines on reproducibility (different team, same experimental setup, i.e., artifact re-use) and replicability (different team, different experimental setup, i.e., artifact re-implementation).

Review Process

Paper submissions will be judged based on novelty, relevance to the conference topics, technical correctness, quality of the evaluation, and presentation clarity. Papers will undergo a double-blind review process in two rounds.

Paper Artifacts

Authors of accepted papers are expected to submit their software and data artifacts for formal evaluation by the Artifacts Evaluation Committee and to make them publicly available to the entire community.

Ethical Considerations

Papers that might raise ethical concerns (e.g., papers that use human subjects, leverage potentially sensitive data, or describe experiments related to vulnerabilities in software or systems) must include an Ethical Considerations section that properly describes what procedures have been followed to minimize potential harm.

Paper Format

Please ensure that your submission consists of a PDF file of no more than 11 double-column pages, excluding well-marked references and appendices limited to a maximum of 5 pages. The full PDF document must not exceed a total of 16 pages.

Papers must be appropriately anonymized to the dual anonymous review process. Author names and affiliations must not be included in the PDF submission.

Submissions must be generated using the double-column IEEE format (see template available at https://www.ieee.org/conferences/publishing/templates.html).

Topics

The main topics of interest to ACSAC include, but are not limited to:

  • Access Control, Assurance, Audit
  • Anonymity, Privacy
  • Application Security
  • Automated Detection and Patching of Software Vulnerabilities (Hard Topic)
  • Big Data for Security
  • Cloud and Virtualization Security
  • Cybercrime
  • Cyber-Physical Systems, Embedded Systems, and IoT Security
  • Data Integrity and Protection
  • Denial of Service Attacks and Defenses
  • Deployable Trustworthy Systems
  • Digital Forensics
  • Distributed Systems Security
  • Enterprise Security Management and Incident Response
  • Hardware and Supply Chain Security
  • Identity Management
  • Intrusion Detection and Prevention
  • Machine Learning Security
  • Malware
  • Mobile/Wireless Security
  • Network Security
  • OS and Systems Security
  • Resilience
  • Security Applications of Generative AI
  • Software Security
  • Software-defined Programmable Security
  • Usability and Human-centered Security
  • Web Security

Conflicts of Interest

Authors are required to specify their conflicts of interest with Program Committee (PC) members when submitting a paper.

Equity, Diversity, and Inclusion

ACSAC adheres to the IEEE’s Computer Society Equity, Diversity, and Inclusion guidelines.

Contact

For additional information regarding papers, please contact the Program Chairs.

Fechas Importantes

Fechas del Congreso

Conference Date

8 de diciembre de 202512 de diciembre de 2025

Envío

(Workshop) Workshop Proposals

26 de mayo de 2025

(Technical Papers) Paper Submissions

30 de mayo de 2025

(Panels) Abstract Submission

8 de julio de 2025

Notificación

(Technical Papers) Early Rejection Notification

14 de julio de 2025

(Technical Papers) Acceptance Notification

3 de septiembre de 2025

Versión Final

(Technical Papers) Camera Ready Deadline

24 de octubre de 2025

Otras Fechas

(Technical Papers) Authors Response Period

18 de agosto de 202522 de agosto de 2025

(Technical Papers) Minor Revision Period

4 de septiembre de 20253 de octubre de 2025

Clasificación de la Fuente

Fuente: CORE2023

Clasificación: A

Campo de Investigación: Cybersecurity and privacy

Mapa

Loading feedback section...