ACSAC 2018: Security Conference, Security Training &amp

ACSAC 2018: Security Conference, Security Training &amp

ACSAC
venue photos; Skyline photo by Aaron Logan, from http://www.lightmatter.net/gallery/albums.php cc-by
December 3–7, 2018 | Condado Plaza Hilton | San Juan, Puerto Rico, USA
ACSAC logo - click for Home Page
  • Registration
  • Venue
  • Program
  •         At-a-Glance
  •         Mobile
  • Training
  • Workshops
  •         DYNAMICS
  •         ICSS
  •         SSPREW
  •         STAST
  • Call for Submissions
  • Sponsorships
  • Committees
  • About ACSAC
  • Code of Conduct
  • FAQs
  • Mailing List
  • Security Bookshelf
  • SWSIS
  • Past ACSACs
Presented by
Visit the ACSA site
In cooperation with

USENIX

sponsors

NSF

DHS S&T

Charles Koch Institute

published by ACM
2018 Annual Computer Security Applications Conference
Add to my calendar

+ iCal / Outlook
+ Google Calendar

Register Now

Latest News

Registration open

Program posted

Hotel reservations open

Posters CFP still open

Help support Puerto Rico’s recovery from Hurricane Maria when you come to ACSAC — stay an extra half- or full-day and volunteer with reconstruction efforts. Learn how
Important Dates:
15 Nov – Early Registration
15 Nov – Great Hotel Rates Expire
3-7 Dec – ACSAC 2018
Scholarships for Women Studying Information Security

SWSIS logo

SANS award image

Join Us in San Juan!

ACSAC brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, workshops, and professional development and training courses, ACSAC continues its core mission of investigating practical solutions for computer and network security technology.

ACSAC will be held at the Condado Plaza Hilton in San Juan, Puerto Rico. Centrally located in the trendy Condado Beach area, near historic Old San Juan, the hotel is an ideal location to both attend the conference and spend time relaxing and sightseeing in the warm tropical weather. Puerto Rico has worked hard to recover and rebuild from the devastating impact of Hurricane Maria. ACSAC organizers recently visited Puerto Rico to confirm its readiness and found most of the island including San Juan operational. The Condado Plaza Hilton is undergoing a comprehensive restoration program and will be fully functioning in December. We are receiving weekly updates to monitor progress and ensure that they will be ready for ACSAC.

Hard Topic Theme: Big Data for Security

The security industry is rapidly amassing an incredible amount of information that can be mined for vulnerabilities and allow researchers to observe phenomena that can play an important role in many other aspects of security, from analytics and intelligence support, to training automated classification and reasoning techniques. However, using large datasets in security also faces many technical and scientific challenges. Therefore, we need to design new data-driven techniques and we need to rethink our existing solutions to take advantage of this vast amount of information to improve security. Many conference sessions will address the hard topic theme. I encourage you to attend the conference to learn about this timely topic.

Artifact Submission

To help support the reproducibility for research results, ACSAC encourages authors of accepted papers to submit software they have developed and datasets they have used to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceed faster by taking advantage of systems previously built by other researchers. We encourage all authors to participate in this initiative!

David Balenson
ACSAC 2018 Conference Chair


Invited Speakers

Alina Oprea

Alina Oprea

Professor of Computer Science, Northeastern University

AI in Cybersecurity: Applications, Open Problems, and Future Directions


Peer-Reviewed Papers:

ACSAC papers undergo a rigorous peer-review process. Here are some of the papers to be presented at ACSAC in 2018: (refresh the page to see other titles)

Accurate Malware Detection by Extreme Abstraction

An Extensive Evaluation of the Internet’s Open Proxies

Do Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing Attacks

LROV: Practical Library-aware Provenance Tracing


Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results
Home |
Mailing List |
FAQs |
Privacy Policy |
Contact Us
Copyright © 2018 ACSAC
WikiCFP

Home

  • Login
  • Register
  • Account
  • Logout

Categories
CFPs

  • Post a CFP

Conf Series

My List

  • Timeline

My Archive

On iPhone

On Android


ACSAC: Annual Computer Security Applications Conference


Facebook Twitter LinkedIn Google

 

Past:   Proceedings on DBLP

Future: 
Post a CFP for 2019 or later   |   Invite the Organizers

Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ACSAC 2018 Annual Computer Security Applications Conference
Dec 3, 2018 – Dec 7, 2018San Juan, Puerto Rico, USAJun 8, 2018
ACSAC 2017 Annual Computer Security Applications Conference
Dec 4, 2017 – Dec 8, 2017San Juan, Puerto Rico, USAJun 1, 2017
ACSAC 2016 Annual Computer Security Applications Conference 2016
Dec 5, 2016 – Dec 9, 2016Los Angeles, California, USAJun 1, 2016
ACSAC 2014 Annual Computer Security Applications Conference
Dec 8, 2014 – Dec 12, 2014New Orleans, Louisiana, USAJun 1, 2014
ACSAC 2013 29th Annual Computer Security Applications Conference
Dec 9, 2013 – Dec 13, 2013New Orleans, Louisiana, USAJun 1, 2013
ACSAC 2012 28th Annual Computer Security Applications Conference (ACSAC 2012)
Dec 3, 2012 – Dec 7, 2012Orlando, FloridaJun 1, 2012
ACSAC 2011 The 27th Annual Computer Security Applications Conference
Dec 5, 2011 – Dec 9, 2011Orlando, FloridaJun 6, 2011
ACSAC 2010 26th Annual Computer Security Applications Conference
Dec 6, 2010 – Dec 10, 2010Austin, Texas, USAJun 14, 2010
 
 

Present CFP : 2018

Call for Submissions

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.

If you are developing practical solutions to problems related to the protection of users, commercial enterprises, or countries’ information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We solicit submissions that address the application of security technology, the implementation of systems, and the discussion of lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme for 2018, Big Data for Security.

Summary:

* Technical Track, peer-reviewed papers, deadline June 8, 2018, notification Aug. 23, 2018
* Case Studies, real-world security application reports, deadline June 8, 2018, notification Aug. 15, 2018
* Panels, interactive expert panels, deadline June 8, 2018, notification Aug. 15, 2018
* Professional Development Courses, in-depth courses on new and emerging security topics, deadline June 8, 2018, notification July 19, 2018
* Workshops, 1-2 day sessions on hot topics, deadline June 8, 2018, notification Aug. 15, 2018
* Posters, new and innovative preliminary work, deadline Aug. 1 to Nov. 15, 2018, notification rolling
* Works in Progress, short works-in-progress reports, Sept. 1, 2018 Sept. 15, 2018
* Conferenceships, student grant requests, deadline Sept. 1, 2018, notification Oct. 15, 2018

Submission Formats:

Technical Track Paper Submissions

Juan Caballero, IMDEA Software Institute (Program Chair)
Guofei Gu, Texas A&M University (Program Co-Chair)

We solicit papers offering novel contributions in any aspect of applied security. Papers are encouraged on results that have been demonstrated to be useful for improving information systems security and that address lessons learned from actual application. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Please ensure that your submission is a PDF file of a maximum of 10 pages, excluding well-marked references and appendices limited to 5 pages. Committee members are not required to read the appendices. Submissions must be generated using the ACM 2017 acmart template available at https://www.acm.org/publications/proceedings-template, using the [sigconf, anonymous] options. Submissions should not use older ACM templates (e.g., sig-alternate).

All submissions must be anonymous (i.e., papers should not contain author names or affiliations, or obvious citations). In the rare case that citing previous work in the 3rd person is impossible, blind the reference and notify the PC Chair. Submissions violating any of the above constraints, e.g., going beyond the page limit, moving to Appendices content that belongs in the main body, or failing to properly anonymize, risk rejection without consideration of their merits.

Submissions are to be made using the OpenConf system. Only PDF files will be accepted and papers must be submitted by the deadline listed on the conference website.

Papers will be reviewed in two consecutive rounds, and early-reject notifications will be sent to authors after the first round, if a paper has received only strongly negative reviews. Appeals based on factual disagreements may be submitted to the Program Chairs, who may appoint an independent reviewer to decide the appeal. In any case, papers cannot be re-submitted elsewhere until the authors are notified of acceptance or rejection, early or final, and until any appeal has been resolved.

All authors of accepted papers must guarantee that their papers will be presented at the conference. In case the authors encounter problems to obtain a VISA to participate to the conference, they are encouraged to contact the Program Chairs as soon as possible to discuss possible solutions.

Hard Topic Theme

This year, ACSAC especially encourages submissions in the area of Big Data for Security. The security industry is rapidly amassing an incredible amount of information: billions of malicious samples and emails attachments, Internet-wide scans that can be repeated multiple times a day, collections of DNS queries and HTTP requests, and an unprecedented amount of open source software to mine for vulnerabilities are only the tip of the iceberg. This information allows researchers to observe phenomena that do not manifest on a small scale and can play an important role in many other aspects of security, from analytics and intelligence support, to training automated classification and reasoning techniques. However, using large datasets in security also faces many technical and scientific challenges. Therefore, we need to design new data-driven techniques and we need to rethink our existing solutions to take advantage of this vast amount of information to improve security.

Submissions in this area include (but are not limited to) the use of machine learning and data mining techniques to explore and extract information from large datasets of security-relevant information, defenses against adversarial machine learning, and novel techniques to cluster and classify security data. They also include the presentation of new large-scale data collection and analysis techniques, and the discussion of longitudinal studies that bring new insights into attackers’ behavior, or help researchers to better understand the evolution of a given threat.

Artifact Submission

Security research is often criticized for the poor reproducibility of its results. Unfortunately, authors seldom release the software they develop and the datasets they use to perform their experiments. This makes it difficult to compare different solutions and force other researchers to undergo the tedious and error-prone task of re-implementing previous approaches and to compare solutions on different datasets, which may not be a fair comparison.

To help improve this situation, ACSAC encourages authors of accepted papers to submit software and data artifacts and make them publicly available to the entire community. These artifacts are not part of the paper evaluation. Their submission is strictly optional and occurs only after a paper has been accepted – to prevent any influence on the decision process. Authors who decide to participate in this program will interact with a special committee dedicated to verifying the submitted artifacts (e.g., to test that source code compiles and runs correctly, or that datasets content match their description). Authors can decide what they want to submit (software, data, or both) and the verification procedure will take place in parallel with the preparation of the camera-ready version of the paper. The authors of the submitted artifacts need to commit to keep them available online on a publicly accessible website for a minimum period of three months between October and December 2018.

We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. Therefore, we plan to reward authors who participate in this program with a special mention during the conference and on the ACSAC webpage, a stamp of reproducibility on their papers, and (if enough authors participate to the program) by reserving a Distinguished Paper Award for this group.

Case Studies in Applied Security

Larry Wagoner, NSA (Case Studies Co-Chair)
Randy Smith, Boeing (Case Studies Co-Chair)

The Case Studies in Applied Security Track is a critical part of the technical conference. It is an opportunity for professionals to share information that is current without writing a detailed technical paper, but enables attendees to learn about the next generation of products and solutions. It is open to anyone in the community such as vendors, network providers, systems integrators, government civil/federal/military programs or users across the spectrum of computer security applications. Potentially this is where attendees can learn about client needs and vendors solutions. In keeping with this year’s theme of “Big Data for Security”, we seek presentations where Big Data techniques and Emergent Properties of Data were leveraged to solve cybersecurity problems; both successful examples and lessons learned are encouraged. We also welcome broader submissions addressing solutions to current cybersecurity challenges. While the Case Studies will not be included in the Proceedings, the presentations will be posted to the ACSAC site following the conference.

Professional Development Courses

Daniel Faigin, The Aerospace Corporation, USA. (Professional Development Co-Chair)
Michael Clifford, Noblis NSP (Professional Development Co-Chair)

Courses (formerly known as Tutorials) are full (6 hour) or half (3 hour) day classes on how to apply or use a particular technology to address a security need. We especially welcome courses on new and emerging topics. A typical course submission includes an abstract of the course, a brief (1-2 page) outline, an instructor bio, an indication of length, and notes on prerequisites and textbooks. Course instructors receive an honorarium and expenses. If you would like to indicate a topic you would like to see, you may do that as well; please suggest an instructor if you can.

Panels

Suzanne McIntosh, New York University – Courant Institute and Center for Data Science (Panels Chair)

Panels should encourage audience participation and focus on the sharp edges of a topic where there is controversy or where there are widely varying positions. Panels focused on a topic related to the conference theme are especially welcomed, but this is not a hard requirement; some additional topics are listed here. A typical panel proposal should list the moderator, three panel members and an abstract of the proposed topic. Full details are provided on the Panels webpage.

Workshops

Harvey Rubinovitz, The MITRE Corporation (Workshops Chair)

ACSAC workshops are on up to date topics that attendees usually rate to provide a useful and exciting forum for information technology professionals (e.g., standards developers, software developers, security engineers, security officers) to exchange ideas, concerns, and opinions.

Posters

Thomas Moyer, MIT Lincoln Laboratory (Posters Co-Chair)
Adam Aviv, USNA (Poster Co-Chair)

The poster session provides an opportunity for researchers and practitioners to present their new and innovative preliminary work in an informal, interactive setting. Conference attendees can learn about novel on-going research projects that might not yet be complete, but whose preliminary results are already interesting. Poster presenters will have an opportunity to discuss their work and get invaluable feedback from knowledgeable sources at an early stage of their research.

Works in Progress

Thomas Moyer, MIT Lincoln Laboratory (WiP Co-Chair)
Adam Aviv, USNA (WiP Co-Chair)

The Works in Progress (WiP) session offers short presentations (5 minutes maximum) of ongoing work. These presentations highlight the most current work in both business and academia, emphasizing goals and value added, accomplishments to date, and future plans. Special consideration is given to topics that discuss real life security experience, including system implementation, deployment, and lessons learned.

Conferenceship Grants

ACSAC offers conferenceships to enable students to attend the conference. This program will help pay for some of the cost to attend ACSAC. Additional information about this program is available on the Student Conferenceships page.

Additional Information

ACSAC does not accept “speaking proposals” per se, however; you are encouraged to submit suggestions in the form of a one paragraph description of a topic and a biography of the proposed presenter. Depending on a proposal’s technical content, it may be acceptable as a case study. If a full paper is available, it may be acceptable as a technical paper. If a presentation by a group of related speakers is contemplated, a proposal for this session may be acceptable as a panel. If a proposal for a half day or full day seminar is appropriate, it may be acceptable as a professional development course. If a one or two page technical write-up is available that describes work that is not yet completed, it may be acceptable as a poster. Finally, if your have an interest in a full day interactive dialogue, exchanging ideas, opinions and concerns between multiple presenters and attendees, consider being a workshop presenter.

About the Sponsor

Applied Computer Security Associates (ACSA) had its genesis in the first Aerospace Computer Security Applications Conference in 1985. That conference was a success and evolved into the Annual Computer Security Applications Conference (ACSAC). Several years ago the word “Aerospace” was dropped from the name to promote a wider range of government and commercial applications. ACSA was incorporated in 1987 as a non-profit association of computer security professionals who have a common goal of improving the understanding, theory, and practice of computer security. ACSA continues to be the primary sponsor of the annual conference.

In 1989, ACSA began the Distinguished Lecture Series at the annual conference. Each year, an outstanding computer security professional is invited to present a lecture of current topical interest to the security community. In 1991, ACSA began a Best-Paper by a Student Award, presented at the Annual conference. This award is intended to encourage active student participation in the annual conference. The award-winning student author receives an honorarium and all expenses to the conference.

ACSA continues to be committed to serving the security community by finding additional approaches for encouraging and facilitating dialogue and technical interchange. ACSA is always interested in suggestions from interested professionals and computer security professional organizations on how to achieve these goals.

 

Related Resources

ICCV 2019   
International Conference on Computer Vision
ICDM 2019   
19th Industrial Conference on Data Mining ICDM 2019
ETRIJ Cyber Security & AI 2019   
ETRI Journal Special issue on Cyber Security and AI
ISBDAI 2018   
2018 International Symposium on Big Data and Artificial Intelligence
ITCE 2019   
The International Conference on Innovative Trends in Computer Engineering
ACISP 2019   
The 24th Australasian Conference on Information Security and Privacy
DSA 2019   
The Frontiers in Intelligent Data and Signal Analysis DSA 2019
DBSEC 2019   
33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
AI 2019   
Artificial Intelligence
CAIP 2019   
Computer Analysis of Images and Patterns

About Us |
Contact Us |
Data |
Privacy Policy |
Terms and Conditions
This wiki is licensed under a
Creative Commons Attribution-Share Alike 3.0 License .

Guide 2 Research

ACSAC 2018 : Computer Security Applications Conference

  in Conferences  
 Posted on March 8, 2018

Conference Information

Submission DeadlineFriday 08 Jun 2018
Conference & Submission Link https://www.acsac.org/
Conference Dates Dec 3, 2018 – Dec 7, 2018
Conference Address Puerto Rico, Puerto Rico
Proceedings indexed by
Conference Organizers : ( Deadline extended ? Click here to edit )

Conference Ranking & Metrics (This is a TOP Conference)

Google Scholar H5-index:29
CORE 2017 Rating:Aus
Guide2Research Overall Ranking:122
Category Rankings
Computer Security and Cryptography12

Conference Call for Papers

When are papers due?
The deadline for submitting papers is June 8 (23:59:59 PST). Authors will be notified of acceptance by August 23. Early reject notifications will be sent tentatively by July 24.
What format should the paper be in?
Please ensure that your submission is a PDF file of a maximum of 10 pages, excluding well-marked references and appendices limited to 5 pages. Submissions must be generated using the ACM 2017 acmart template available at https://www.acm.org/publications/proceedings-template, using the [sigconf, anonymous] options. Submissions should not use older ACM templates (e.g., sig-alternate). Committee members are not required to read the appendices. All submissions must be anonymous (i.e., papers should not contain author names or affiliations, or obvious citations). In the rare case that citing previous work in the 3rd person is impossible, blind the reference and notify the Program Chairs.

Both of these constraints (page limit and anonymity) are hard constraints. Submissions not meeting these guidelines risk rejection without consideration of their merits.
What should I propose a paper on?
If you are developing practical solutions to problems relating to protecting commercial enterprises\’ or countries\’ information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned.

Special consideration will be given to papers that discuss system implementation, deployment, and lessons learned.

  • All Conferences

    Top Conferences

    Top 600 Journals

    Top 1000 Scientists

    Special Issues

    Research Blog
    Contact us

  • Follow @guide2research
  • Conference Alerts by Email

  • Top Scientists by H-Index

    United States United Kingdom
    Canada Germany
    Switzerland Australia
    Netherlands Hong Kong
    France Italy
    Spain Belgium
    Singapore Japan
    All other countries
  • Upcoming Conferences






  • Top Conferences By Deadlines

    • All Top Conferences
    • Image Processing & Computer Vision
    • Machine Learning & Arti. Intelligence
    • Graphics and Computer-Aided Design
    • Computer Networks and Communications
    • Hardware, Robotics & Electronics
    • Human Computer Interaction
    • Software Engineering & Programming
    • Computational Theory and Mathematics
    • Signal Processing
    • Databases & Information Systems
    • Web, Mobile & Multimedia Technologies
    • General Computer Science
    • Biomedical & Medical Engineering
    • Computer Security and Cryptography
    • Computational Linguistics & Speech
  • Top Journals with Impact Factor

    • All Computer Science & Electronics
    • Image Processing & Computer Vision
    • Machine Learning & Arti. Intelligence
    • Graphics and Computer-Aided Design
    • Computer Networks and Communications
    • Hardware, Robotics & Electronics
    • Human Computer Interaction
    • Software Engineering & Programming
    • Computational Theory and Mathematics
    • Signal Processing
    • Information Systems
    • Web, Mobile & Multimedia Technologies
    • General Computer Science
    • Biomedical & Medical Engineering
  • To Download :

    • Special Issues for Journals With Impact Factor, 2017/2017
    • Conference Ranking : Top Computer Science Conferences, 2017/2017
    • Impact Factor for Top Journals of Computer Science and Electronics, 2017
    • Impact Factor for Top Journals of Computer Science and Electronics, 2016
    • Impact Factor for Top Journals of Computer Science and Electronics, 2015
    • How to chart a successful research career by Prof Alan Johnson
    • Top H-Index for Scholars of Computer Science & Electronics, 2014
  • Pages

    • About us
    • Contact us
    • Privacy Policy

© 2018 Guide 2 Research . All Rights Reserved.

Maintained by Imed .  Back to Top ↑


About the Author: admin