The 2013 Annual Computer Security Applications Conference (ACSAC 2013) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences.
The ACSAC technical program is composed of keynotes, peer-reviewed paper presentations, case studies, panels, posters, and works-in-progress. In addition, two days of workshops and professional development training are offered, which along with the technical program, qualify for continuing education credit. Proposals and nominations are accepted for all aspects of the program. ACSAC enlists leading practitioners in the field to review submitted papers, accepting 20% or less of submissions in the last couple of years. Posters and works-in-progress provide additional venues for practitioners to present their work and solicit feedback on ideas. The diverse, multi-track program is sure to engage attendees’ interests throughout the conference.
Once again, ACSAC is pleased to have the Layered Assurance Workshop (LAW) as an affiliated workshop. The LAW workshop will occur during the early part of the week in parallel with ACSAC.
Contributing to ACSAC 2013
We solicit submissions on a variety of topics that address the application of security technology, the implementation of systems, and lessons learned.
For ACSAC 2013, we especially encourage submissions in the area of Cybersecurity for Cyber Physical Systems. Examples of these systems include industrial control systems, automobiles, medical devices, robotics, ground control systems, nuclear systems and other critical infrastructures. These systems have been studied extensively from a safety perspective, but their proliferation now motivates focused research from a security perspective. Selected submissions will be featured in a special track at the conference. For more information about our selected hard topic theme, please follow the Hard Topic Theme link on your left.
Please consider showcasing your work in one of the following ways:
- TECHNICAL PAPER: Peer-reviewed, 10-page, scholarly work. Awards are given for best paper and best student paper.
- CASE STUDY: Presentation-only opportunity for professionals to share details about next generation products and solutions.
- PANEL: Moderated debate on a controversial question, or summary of interesting results, designed to encourage audience participation.
- WORKSHOP: Forum for information technology professionals to exchange ideas, concerns, and opinions.
- POSTER or WORK-IN-PROGRESS: Presentation of new and innovative, but preliminary, work.
- PROFESSIONAL DEVELOPMENT COURSE: Full (6 hour) or half (3 hour) day class on how to apply or use a particular technology to address a security need.