ACM SIGSAC announces the continuation of its annual ACM Conference on Data and Application Security and Privacy. The tenth conference will be held in New Orleans, Louisiana, USA virtually.

On its 8th gathering, the CODASPY community finally reached a consensus on the pronunciation of the conference acronym. It's officially called /ˌkəʊdəˈspaɪ/ or [koh-də-spy].

  • The recorded videos of keynotes and paper presentations are avaialble on YouTube!
  • The recorded videos of IWSPA '20 are available on YouTube!
  • Congratulations to Dr. Chris Clifton for receiving the 2020 CODASPY Research Award!
  • The Best Paper Award goes to ProximiTEE: Hardened SGX Attestation by Proximity Verification (Aritra Dhar (ETH Zurich), Ivan Puddu (ETH Zurich), Kari Kostiainen (ETH Zurich) and Srdjan Capkun (ETH Zurich)). Congratulations!
  • A message from the general chairs.
  • Check out the conference proceedings and table of contents.
  • Update (July 28): Register for free!
  • Update (July 14): AutoSec '20 and IWSPA '20 will take place virtually on Aug. 5. Check out their programs: AutoSec and IWSPA
  • Update (July 8): The organizing team has been closely monitoring the situation of COVID-19. The safety and well-being of all conference participants is our top priority. After careful evaluation, we decide to run CODASPY’20 virtually. Please find the updated program here. All times in the main program are in Eastern Daylight Time (EDT, UTC-04:00).
  • Update (March 13): CyberW workshop will be meeting virtually via Zoom.
  • We are thrilled to announce this year's keynote speakers, Dr. James Joshi and Dr. Somesh Jha!

With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.