
08 de diciembre - 12 de diciembre de 2025
Annual Computer Security Applications Conference
Aún no hay seguidores.
Resumen General
The Annual Computer Security Applications Conference (ACSAC) 2025 will be held in Honolulu, Hawaii, USA, from December 8-12, 2025. It brings together researchers, practitioners, and security professionals to discuss the latest cybersecurity results and topics. ACSAC is now accepting submissions for technical papers, case studies, panels, posters, workshops, artifacts, and student conferenceships.
ACSAC 2025: Call for Submissions
The Annual Computer Security Applications Conference (ACSAC) 2025 will be held in Honolulu, Hawaii, USA, December 8-12, 2025.
ACSAC is a forum for practitioners, researchers, and developers in information system security to learn and exchange practical ideas and experiences. We solicit submissions that address the application of security technology, the implementation of systems, and the discussion of lessons learned.
Submission Types and Deadlines
Submission Type | Deadline |
---|---|
Technical Papers | May 30 |
Case Studies | September 17 |
Panels (abstract) | July 8 |
Panels (details) | August 20 |
Posters and WiPs | September 13 |
Workshop Proposals | May 26 |
Workshop—CSET | September 10 |
Workshop—HealthSec | July 25 |
Workshop—ICSS | August 29 |
Workshop—WAITI | October 6 |
Artifacts Competition | September 17 |
Student Conferenceships | September 30 |
Hard Topic Theme: Automated Detection and Patching of Software Vulnerabilities
This year's hard topic theme solicits research results and technologies that advance our ability to automatically identify and fix software security vulnerabilities.
Technical Papers
We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from the actual application. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Please ensure that your submission is a PDF file of a maximum of 11 pages, excluding well-marked references and appendices limited to 5 pages. Committee members are not required to read the appendices.
- Paper Submissions: May 30 (23:59 Anywhere on Earth) — firm deadline
- Early Rejection Notification: July 14
- Authors Response Period: August 18-22 (tentative)
- Acceptance Notification: September 3
- Minor Revision Period: September 4 - October 3
- Camera Ready Deadline: October 24
Reproduction and Replication (R+R) Papers
In addition to regular papers and artifact evaluations, this year we are also soliciting studies that confirm, question, or clarify the results of previous research. These papers must contain the prefix “R+R:” in their title and check the corresponding option in the submission form.
We encourage submissions to follow the ACM guidelines on reproducibility (different team, same experimental setup, i.e., artifact re-use) and replicability (different team, different experimental setup, i.e., artifact re-implementation).
Review Process
Paper submissions will be judged based on novelty, relevance to the conference topics, technical correctness, quality of the evaluation, and presentation clarity. Papers will undergo a double-blind review process in two rounds.
Paper Artifacts
Authors of accepted papers are expected to submit their software and data artifacts for formal evaluation by the Artifacts Evaluation Committee and to make them publicly available to the entire community.
Ethical Considerations
Papers that might raise ethical concerns (e.g., papers that use human subjects, leverage potentially sensitive data, or describe experiments related to vulnerabilities in software or systems) must include an Ethical Considerations section that properly describes what procedures have been followed to minimize potential harm.
Paper Format
Please ensure that your submission consists of a PDF file of no more than 11 double-column pages, excluding well-marked references and appendices limited to a maximum of 5 pages. The full PDF document must not exceed a total of 16 pages.
Papers must be appropriately anonymized to the dual anonymous review process. Author names and affiliations must not be included in the PDF submission.
Submissions must be generated using the double-column IEEE format (see template available at https://www.ieee.org/conferences/publishing/templates.html).
Topics
The main topics of interest to ACSAC include, but are not limited to:
- Access Control, Assurance, Audit
- Anonymity, Privacy
- Application Security
- Automated Detection and Patching of Software Vulnerabilities (Hard Topic)
- Big Data for Security
- Cloud and Virtualization Security
- Cybercrime
- Cyber-Physical Systems, Embedded Systems, and IoT Security
- Data Integrity and Protection
- Denial of Service Attacks and Defenses
- Deployable Trustworthy Systems
- Digital Forensics
- Distributed Systems Security
- Enterprise Security Management and Incident Response
- Hardware and Supply Chain Security
- Identity Management
- Intrusion Detection and Prevention
- Machine Learning Security
- Malware
- Mobile/Wireless Security
- Network Security
- OS and Systems Security
- Resilience
- Security Applications of Generative AI
- Software Security
- Software-defined Programmable Security
- Usability and Human-centered Security
- Web Security
Conflicts of Interest
Authors are required to specify their conflicts of interest with Program Committee (PC) members when submitting a paper.
Equity, Diversity, and Inclusion
ACSAC adheres to the IEEE’s Computer Society Equity, Diversity, and Inclusion guidelines.
Contact
For additional information regarding papers, please contact the Program Chairs.
Fechas del Congreso
Conference Date
8 de diciembre de 2025 → 12 de diciembre de 2025
Envío
(Workshop) Workshop Proposals
26 de mayo de 2025
(Technical Papers) Paper Submissions
30 de mayo de 2025
(Panels) Abstract Submission
8 de julio de 2025
Notificación
(Technical Papers) Early Rejection Notification
14 de julio de 2025
(Technical Papers) Acceptance Notification
3 de septiembre de 2025
Versión Final
(Technical Papers) Camera Ready Deadline
24 de octubre de 2025
Otras Fechas
(Technical Papers) Authors Response Period
18 de agosto de 2025 → 22 de agosto de 2025
(Technical Papers) Minor Revision Period
4 de septiembre de 2025 → 3 de octubre de 2025
Clasificación de la Fuente
Fuente: CORE2023
Clasificación: A
Campo de Investigación: Cybersecurity and privacy