logo

12月08日 - 2025年12月12日

排名: A (CORE2023)Offline

Annual Computer Security Applications Conference

更新于:12 days ago
0.0 (0 评分)
Honolulu, Hawaii, USAApplied Computer Security Associates, IEEE Computer Society

暂无关注者。

概览

The Annual Computer Security Applications Conference (ACSAC) 2025 will be held in Honolulu, Hawaii, USA, from December 8-12, 2025. It brings together researchers, practitioners, and security professionals to discuss the latest cybersecurity results and topics. ACSAC is now accepting submissions for technical papers, case studies, panels, posters, workshops, artifacts, and student conferenceships.

论文征集

ACSAC 2025: Call for Submissions

The Annual Computer Security Applications Conference (ACSAC) 2025 will be held in Honolulu, Hawaii, USA, December 8-12, 2025.

ACSAC is a forum for practitioners, researchers, and developers in information system security to learn and exchange practical ideas and experiences. We solicit submissions that address the application of security technology, the implementation of systems, and the discussion of lessons learned.

Submission Types and Deadlines

Submission TypeDeadline
Technical PapersMay 30
Case StudiesSeptember 17
Panels (abstract)July 8
Panels (details)August 20
Posters and WiPsSeptember 13
Workshop ProposalsMay 26
Workshop—CSETSeptember 10
Workshop—HealthSecJuly 25
Workshop—ICSSAugust 29
Workshop—WAITIOctober 6
Artifacts CompetitionSeptember 17
Student ConferenceshipsSeptember 30

Hard Topic Theme: Automated Detection and Patching of Software Vulnerabilities

This year's hard topic theme solicits research results and technologies that advance our ability to automatically identify and fix software security vulnerabilities.

Read More

Technical Papers

We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from the actual application. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Please ensure that your submission is a PDF file of a maximum of 11 pages, excluding well-marked references and appendices limited to 5 pages. Committee members are not required to read the appendices.

  • Paper Submissions: May 30 (23:59 Anywhere on Earth) — firm deadline
  • Early Rejection Notification: July 14
  • Authors Response Period: August 18-22 (tentative)
  • Acceptance Notification: September 3
  • Minor Revision Period: September 4 - October 3
  • Camera Ready Deadline: October 24

Make Submission

Reproduction and Replication (R+R) Papers

In addition to regular papers and artifact evaluations, this year we are also soliciting studies that confirm, question, or clarify the results of previous research. These papers must contain the prefix “R+R:” in their title and check the corresponding option in the submission form.

We encourage submissions to follow the ACM guidelines on reproducibility (different team, same experimental setup, i.e., artifact re-use) and replicability (different team, different experimental setup, i.e., artifact re-implementation).

Review Process

Paper submissions will be judged based on novelty, relevance to the conference topics, technical correctness, quality of the evaluation, and presentation clarity. Papers will undergo a double-blind review process in two rounds.

Paper Artifacts

Authors of accepted papers are expected to submit their software and data artifacts for formal evaluation by the Artifacts Evaluation Committee and to make them publicly available to the entire community.

Ethical Considerations

Papers that might raise ethical concerns (e.g., papers that use human subjects, leverage potentially sensitive data, or describe experiments related to vulnerabilities in software or systems) must include an Ethical Considerations section that properly describes what procedures have been followed to minimize potential harm.

Paper Format

Please ensure that your submission consists of a PDF file of no more than 11 double-column pages, excluding well-marked references and appendices limited to a maximum of 5 pages. The full PDF document must not exceed a total of 16 pages.

Papers must be appropriately anonymized to the dual anonymous review process. Author names and affiliations must not be included in the PDF submission.

Submissions must be generated using the double-column IEEE format (see template available at https://www.ieee.org/conferences/publishing/templates.html).

Topics

The main topics of interest to ACSAC include, but are not limited to:

  • Access Control, Assurance, Audit
  • Anonymity, Privacy
  • Application Security
  • Automated Detection and Patching of Software Vulnerabilities (Hard Topic)
  • Big Data for Security
  • Cloud and Virtualization Security
  • Cybercrime
  • Cyber-Physical Systems, Embedded Systems, and IoT Security
  • Data Integrity and Protection
  • Denial of Service Attacks and Defenses
  • Deployable Trustworthy Systems
  • Digital Forensics
  • Distributed Systems Security
  • Enterprise Security Management and Incident Response
  • Hardware and Supply Chain Security
  • Identity Management
  • Intrusion Detection and Prevention
  • Machine Learning Security
  • Malware
  • Mobile/Wireless Security
  • Network Security
  • OS and Systems Security
  • Resilience
  • Security Applications of Generative AI
  • Software Security
  • Software-defined Programmable Security
  • Usability and Human-centered Security
  • Web Security

Conflicts of Interest

Authors are required to specify their conflicts of interest with Program Committee (PC) members when submitting a paper.

Equity, Diversity, and Inclusion

ACSAC adheres to the IEEE’s Computer Society Equity, Diversity, and Inclusion guidelines.

Contact

For additional information regarding papers, please contact the Program Chairs.

重要日期

会议日期

Conference Date

2025年12月8日2025年12月12日

投稿

(Workshop) Workshop Proposals

2025年5月26日

(Technical Papers) Paper Submissions

2025年5月30日

(Panels) Abstract Submission

2025年7月8日

通知

(Technical Papers) Early Rejection Notification

2025年7月14日

(Technical Papers) Acceptance Notification

2025年9月3日

终稿

(Technical Papers) Camera Ready Deadline

2025年10月24日

其他日期

(Technical Papers) Authors Response Period

2025年8月18日2025年8月22日

(Technical Papers) Minor Revision Period

2025年9月4日2025年10月3日

来源排名

来源: CORE2023

排名: A

研究领域: Cybersecurity and privacy

地图

Loading feedback section...