CfP: ACSAC 2024

The Annual Computer Security Applications Conference (ACSAC) brings together leading researchers and practitioners, along with a diverse group of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest cybersecurity results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical solutions for computer and network security technologies.

This year, we will celebrate ACSAC's 40th edition. ACSAC's first edition was held in 1985 and is now one of the oldest computer security conferences, second only to the IEEE Symposium on Security and Privacy. We invite you to join us for this special anniversary!

As an internationally recognized forum where researchers, practitioners, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we invite you to submit your work. In addition to peer-reviewed papers on novel applied research, we also welcome case studies on real-world applications, panels featuring world experts, and workshops consisting of 1-2 day sessions on hot cybersecurity and privacy topics.

Submission Deadlines

  • Technical Papers: May 28
  • Case Studies: September 4
  • Panels: May 26 (abstract), August 1 (details)
  • Posters: September 6
  • Works in Progress: September 6
  • Workshop Proposals: May 26
  • Artifacts Competition: September 17
  • Student Conferenceships: September 30
  • Workshop: December 9-13

Hard Topic Theme: Security Applications of Generative AI

This year's hard topic theme solicits research results and technologies that advance our understanding of the applicability of Generative AI and Large Language Models to computer security. These transformative new technologies can have a significant impact in addressing traditional security problems, such as vulnerability detection, fraud detection, reverse engineering, threat intelligence, and many others. At the same time, the complexity of these systems also exposes new potential vulnerabilities that are still not well understood by the research community.

Submission Types

Technical Papers

We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from the actual application. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Please ensure that your submission is a PDF file of a maximum of 10 pages, excluding well-marked references and appendices limited to 5 pages. Committee members are not required to read the appendices.

Case Studies

The Case Studies in Applied Security Track is a critical part of the technical conference. It is an opportunity for professionals to share information that is current without writing a detailed technical paper, but enables attendees to learn about the next generation of products and solutions. It is open to anyone in the community such as vendors, network providers, systems integrators, government civil/federal/military programs or users across the spectrum of computer security applications. Potentially this is where attendees can learn about client needs and vendors solutions. While the Case Studies will not be included in the Proceedings, the presentations will be posted to the ACSAC site following the conference.


Panels should encourage audience participation and focus on the sharp edges of a topic where there is controversy or where there are widely varying positions. Panels focused on a topic related to the conference theme are especially welcomed, but this is not a hard requirement; some additional topics are listed here. A typical panel proposal should list the moderator, three panel members and an abstract of the proposed topic.


The poster session provides an opportunity for researchers and practitioners to present their new and innovative preliminary work in an informal, interactive setting. Conference attendees can learn about novel on-going research projects that might not yet be complete, but whose preliminary results are already interesting. Poster presenters will have an opportunity to discuss their work and get invaluable feedback from knowledgeable sources at an early stage of their research.

Works in Progress

The Works in Progress (WiP) session offers short presentations (5 minutes maximum) of ongoing work. These presentations highlight the most current work in both business and academia, emphasizing goals and value added, accomplishments to date, and future plans. Special consideration is given to topics that discuss real life security experience, including system implementation, deployment, and lessons learned.


ACSAC workshops are on up to date topics that attendees usually rate to provide a useful and exciting forum for information technology professionals (e.g., standards developers, software developers, security engineers, security officers) to exchange ideas, concerns, and opinions.

Artifacts Competition

This competition invites the submission of applied cybersecurity artifacts that have been published in previous years in academic or industry venues. In particular, the competition aims to identify previously published applied security artifacts that have demonstrated meaningful impact for the security and privacy research communities. For instance, demonstrable impact may be represented by an artifact that has been reused in multiple subsequent publications by different research groups, that has received multiple "stars" and/or "forks" on platforms such as GitHub, or that has been successfully transitioned to a commercial technology.

Student Conferenceships

ACSAC offers conferenceships to enable students to attend the conference. This program will help pay for some of the cost to attend ACSAC.

General Submissions and Speaking Proposals

ACSAC does not accept "speaking proposals" per se, however; you are encouraged to submit suggestions in the form of a one paragraph description of a topic and a biography of the proposed presenter. Depending on a proposal's technical content, it may be acceptable as a case study. If a full paper is available, it may be acceptable as a technical paper. If a presentation by a group of related speakers is contemplated, a proposal for this session may be acceptable as a panel. If a proposal for a half day or full day seminar is appropriate, it may be acceptable as a professional development course. If a one or two page technical write-up is available that describes work that is not yet completed, it may be acceptable as a poster. Finally, if your have an interest in a full day interactive dialogue, exchanging ideas, opinions and concerns between multiple presenters and attendees, consider being a workshop presenter.


We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:

  • Access Control
  • Anonymity
  • Applied Cryptography
  • Assurance
  • Audit
  • Big Data for Security
  • Biometrics
  • Security case studies
  • Cloud Security
  • Cyber-Physical Systems
  • Denial of Service
  • Distributed Systems Security
  • Embedded Systems Security
  • Enterprise Security Management
  • Digital Forensics
  • Identity Management
  • Incident Response
  • Insider Threat Protection
  • Integrity
  • Intrusion Detection
  • Intellectual Property
  • Machine Learning Security
  • Malware
  • Mobile/Wireless Security
  • Network Security
  • OS Security
  • Privacy & Data Protection
  • Privilege Management
  • Resilience
  • Security and Privacy of the Internet of Things
  • Security Engineering
  • Software Security
  • Software-Defined Programmable Security
  • Supply Chain Security
  • Trust Management
  • Trustworthy Computing
  • Usability and Human-centric Aspects of Security
  • Virtualization Security
  • Web Security
Submitted by Amy Karns on