CODASPY 2025 is the 15th ACM Conference on Data and Application Security and Privacy.

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area.

The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:

  • Application-layer security policies
  • Access control for applications
  • Access control for databases
  • Artificial intelligence for security
  • Data-dissemination controls
  • Data forensics
  • Data leak detection and prevention
  • Enforcement-layer security policies
  • Machine learning for security
  • Privacy-preserving techniques
  • Private information retrieval
  • Search on protected/encrypted data
  • Secure auditing
  • Secure collaboration
  • Secure data provenance
  • Secure electronic commerce
  • Secure information sharing
  • Secure knowledge management
  • Secure multiparty computation
  • Secure software development
  • Securing data/apps on untrusted platforms
  • Securing the semantic web
  • Security and privacy in GIS/spatial data
  • Security and privacy in healthcare
  • Security and privacy in the Internet of Things
  • Security policies for databases
  • Social computing security and privacy
  • Social networking security and privacy
  • Trust metrics for applications, data, and users
  • Trustworthy artificial intelligence / machine learning
  • Usable security and privacy
  • Web application security

CODASPY 2025 will also feature a dataset and tool paper track, which will provide a unique venue for researchers and practitioners to make available and citable their work done to achieve datasets or tools relevant in the security and privacy domain. Papers accepted in this track have to describe the available datasets or reporting on the design and implementation of application security and privacy tools. Dataset/tool papers are limited to 6 pages.


Instructions for Research Paper Authors

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.

Submissions must be at most 12 pages in double-column ACM "sigconf" format (as specified at ACM Proceedings Template). Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines will be rejected without review.

Submissions should be made electronically at EasyChair CODASPY 2025.


Instructions for Dataset/Tool Paper Authors

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.

Submissions must be at most 6 pages in double-column ACM "sigconf" format (as specified at ACM Proceedings Template) and must include "Data/Toolset paper" as a subtitle. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines will be rejected without review.

Submissions should be made electronically at EasyChair CODASPY 2025.


Note that in both cases the page limit includes references. The submitted version can also include up to 2 additional pages of appendices. The appendices should only be used to add information that might help reviewers, such as additional figures/tables/proofs/etc. They are not compulsory reading for reviewers so the paper should be understandable without appendices. The appendices will not be included in the final version of accepted papers.


By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM's new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.


Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors . We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.


Important Dates

Abstract submission deadline: December 1 December 9, 2024, 23:59 anywhere in the world

Research paper submission deadline: December 6 December 16, 2024, 23:59 anywhere in the world

Dataset/tool paper submission deadline: December 6 December 16, 2024, 23:59 anywhere in the world

Rebuttal phase: January 17 - January 20 January 24 - January 27, 2025

Notification to (conference) authors: January 24 January 31, 2025

The above deadlines are firm.


Organization

Program Co-Chairs

  • Haya Schulmann, Goethe-Universität Frankfurt | National Research Center for Applied Cybersecurity ATHENE, Germany
  • Jaideep Vaidya, Rutgers University, USA

General Chair

  • James Joshi, University of Pittsburgh, USA

Organizing Committee