Visible to the public Call for WIP: ACSAC 2020Conflict Detection Enabled

No replies
Anonymous
Anonymous's picture

CALL FOR WIP

Annual Computer Security Applications Conference

Deadline: November 7
Notification: rolling

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. If you are developing practical solutions to problems related to the protection of users, commercial enterprises, or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We solicit submissions that address the application of security technology, the implementation of systems, and the discussion of lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme, Deployable and Impactful Security.

WiP Co-Chair: Kevin Roundy, NortonLifeLock Research Group
WiP Co-Chair: Brendan Saltaformaggio, Georgia Tech

The Works in Progress (WiP) session offers short presentations (5 minutes maximum) of ongoing work. These presentations highlight the most current work in both business and academia, emphasizing goals and value added, accomplishments to date, and future plans. Special consideration is given to topics that discuss real life security experience, including system implementation, deployment, and lessons learned.

What should I propose a WiP on?

We are looking for Works in Progress that address just about any current security topic. We are particularly interested in Works in Progress abstracts that share real-life experiences, and discuss actual system or product implementation, deployment, and lessons learned.

If you are developing practical solutions to problems relating to protecting information technology environments, be it your country's information infrastructure or a commercial enterprise, consider submitting an abstract to the Annual Computer Security Applications Conference. This internationally recognized conference provides a forum for experts in information system security to exchange innovative ideas about solving these critical problems.

How do I submit a WiP?

Abstracts should be at most one page in length and should briefly describe the objectives of the current work, any accomplishments to date, and future plans. WiP proposals should be submitted in PDF format. When available, a Make Submission button will appear above. Works in Progress proposals are not anonymous, so please make sure you include author information (name, affiliation, country) in your proposal. Any questions should be sent to wips@acsac.org.

What happens if I get accepted?

We will be delighted to have you present during the WiP session at the conference. You will need to register and pay for the conference, attend it (much of the value of ACSAC and WiP are the informal interactions that take place during the conference), and present your WiP during the appropriate session. We will publish your abstract on the conference web site (under the WiP section).

How do I get more information?

For additional information regarding Works in Progress, please contact the WiP Chair.

We invite you to submit your work to the conference. As an internationally recognized forum where practitioners, researchers, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we welcome your contributions. In addition to peer-reviewed papers on new work, we also welcome case studies on real-world applications, panels featuring interactive expert discussions, hands-on training courses on new and emerging topics, and workshops comprised of 1-2 days sessions on hot topics.

Topics of Interest:

  • Access Control
  • Anonymity
  • Applied Cryptography
  • Assurance
  • Audit
  • Big Data for Security
  • Biometrics
  • Security case studies
  • Cloud Security
  • Cyber-Physical Systems
  • Denial of Service
  • Distributed Systems Security
  • Embedded Systems Security
  • Enterprise Security Management
  • Digital Forensics
  • Identity Management
  • Incident Response
  • Insider Threat Protection
  • Integrity
  • Intrusion Detection
  • Intellectual Property
  • Machine Learning Security
  • Malware
  • Mobile/Wireless Security
  • Network Security
  • OS Security
  • Privacy & Data Protection
  • Privilege Management
  • Resilience
  • Security and Privacy of the Internet of Things
  • Security Engineering
  • Software Security
  • Software-Defined Programmable Security
  • Supply Chain Security
  • Trust Management
  • Trustworthy Computing
  • Usability and Human-centric Aspects of Security
  • Virtualization Security
  • Web Security