Annual Computer Security Applications Conference

One of the longest-running computer security conferences.
This yearβ€˜s edition:
Annual Computer Security Applications Conference (ACSAC) ACSAC 2025 | December 8–12, 2025 | Waikiki, Hawaii, USA

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-13

It's a wrap folks! #ACSAC2025 is officially over. It was a blast having all you here in Hawai'i! Thanks a lot to all presenters, panelists, and attendees for making the conference a success! πŸ‘πŸ‘πŸ‘
We hope to see everyone in one year in LA for #ACSAC2026!

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

If you join us for the social event today, remember that the busses for the visit to the Bishop Museum board at 12:40! Be down in the lobby in time to be on the bus by the time it leaves 🚌

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

Big congrats to the #ACSAC2025 student CTF winners:

1st place: Sebastian "gehaxelt" Neef (TU Berlin)
2nd place: Kyounghwan "kbhetrr" Kim (Pusan National University)
3rd place: Florian "holsec" Holzbauer (University of Vienna)

Great work! Thanks to all participants πŸ‘πŸ‘πŸ‘

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

The #ACSAC2025 best case study award goes to: "Systematic Probing of AI Risks: Methods and Real-World Case Study" by Raja Sekhar Rao Dheekonda. Congratulations πŸ‘πŸ‘πŸ‘

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

The #ACSAC2025 Closing Plenary is starting now in Alohilani II on the 6th floor. Meet us there to see the Case Study Presentations Award, CTF Award, infos about next year's conference, and of course win big in the traditional great prize giveaway!

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

This concludes the technical paper sessions for this year. Thanks a lot to all presenters and attendees!

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

There is now a break. Then the #ACSAC2025 program continues with the last three technical paper sessions: Privacy Abuse and Privacy Enhancing Technologies (Yellowtail II), Generative AI (for) Security (Stingray), and Network Security and Privacy (Bluefin).

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

The #ACSAC2025 main conference program will continue at 8:30 with three technical paper sessions: System Security II (Yellowtail II), Privacy and Payment Security (Stingray), and Machine Learning Security II (Bluefin).

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

If you have still waited to pick up your #ACSAC2025 badge, the registration desk is open today 7:30-10:00. You can find it in Yellowtail I on the 3rd floor.

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

Thanks a lot to everyone who presented or visited the posters! You helped make the #ACSAC2025 posters & works-in-progress reception a great success! πŸ™Œ See you tomorrow for the third day of the main conference!

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

The Posters & Works in Progress Reception will start in just 5 minutes. Join in for light refreshments and a deep discussions in Alohilani I on the sixth floor. You can find on overview of all posters being presented here: openconf.org/acsac2025/modules

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

This brings the technical paper, panel, and case study sessions to a close on this second day of #ACSAC2025. But the conference day is not over yet: The Posters & Works in Progress Reception with Light Refreshments will start at 18:00. See you there!

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-12

After a 30-minutes break, the #ACSAC2025 program continues at 15:30 with the following sessions: IoT and Smart-Home Security (Stingray), Machine Learning Security I (Bluefin), and the case studies on Security for Real-World Challenges (Yellowtail II).

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

There is now lunch 12:00-13:30. Then #ACSAC2025 will continue at 13:30 with the following sessions: Microarchitectural Attacks and Side-Channels (Stingray), Authentication and Privacy II (Bluefin), and the case studies on Agentic AI Security and Applications (Yellowtail II).

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

πŸ‘πŸ‘πŸ‘ 2nd place goes to XMap by Xiang Li, Zixuan Xie, Lu Sun, Yuqi Qiu, Zuyao Xu, Zheli Liu
πŸ‘πŸ‘πŸ‘ 3rd place goes to HAL by Julian Speith, JΓΆrn Langheinrich, Marc Fyrbiak, Max Hoffmann, Sebastian Wallat, Simon Klix, Nils Albartus, RenΓ© Walendy, Steffen Becker, and Christof Paar

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

Congratulations to the three Cybersecurity Artifacts Impact Awards and Presentations winners! πŸŽ‰πŸ‘πŸ‘πŸ‘πŸŽ‰ 1st place goes to FIRMADYNE by Daming D. Chen, Manuel Egele, Maverick Woo, David Brumley πŸ‘πŸ‘πŸ‘

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

There will now be a 30-minutes break. At 10:30, the program of #ACSAC2025 will continue with the following sessions: Cyber-Physical Systems (Stingray), Web Security and Censorship (Bluefin), and the panel "Cybersecurity Research Funding in New Era" (Yellowtail II).

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

Congratulations to the winners of #ACSAC2025's third test of time award: "Cujo: Efficient Detection and Prevention of Drive-By-Download Attacks" by Konrad Rieck, Tammo Krueger, and Andreas Dewald published in ACSAC 2010. πŸ‘πŸ‘πŸ‘

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

Congratulations to the winners of #ACSAC2025's second test of time award: "Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software" by Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, and Peng Ning published in ACSAC 2006. πŸ‘πŸ‘πŸ‘

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-12-11

Congratulations to the winners of #ACSAC2025's first test of time award: "Paranoid Android: Versatile Protection for Smartphones" by Georgis Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos published in ACSAC 2010. πŸ‘πŸ‘πŸ‘

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst