09:00–9:15 | Opening and Welcome |
9:15–10:00 | Keynote 1 (TBA) |
10:00-10:30 | Spotlights (TBA) |
10:30–11:00 | Coffee break |
11:00–12:00 | Poster session 1 |
12:00–13:30 | Lunch |
13:30–14:15 |
Keynote 2 (TBA)
|
14:15–15:00 |
Keynote 3 (TBA)
|
15:00–15:30 | Coffee break |
15:30–16:30 | Poster session 2 |
16:30–16:45 | Closing remarks |
Recent years have seen a dramatic increase in applications of Artificial Intelligence (AI), Machine Learning (ML), and data mining to security and privacy problems. The analytic tools and intelligent behavior provided by these techniques make AI and ML increasingly important for autonomous real-time analysis and decision making in domains with a wealth of data or that require quick reactions to constantly changing situations. The use of learning methods in security-sensitive domains, in which adversaries may attempt to mislead or evade intelligent machines, creates new frontiers for security research. The recent widespread adoption of “deep learning” techniques, whose security properties are difficult to reason about directly, has only added to the importance of this research. In addition, data mining and machine learning techniques create a wealth of privacy issues, due to the abundance and accessibility of data. The AISec workshop provides a venue for presenting and discussing new developments in the intersection of security and privacy with AI and ML.
Topics of interest include (but are not limited to):
Theoretical topics related to security
Security applications
Security-related AI problems
We invite the following types of papers:
The authors can specify the paper type in the submission form. Paper submissions must be at most 10 pages in double-column ACM format, excluding the bibliography and well-marked appendices, and at most 12 pages overall. Papers should be in LaTeX and we recommend using the ACM format. This format is required for the camera-ready version. Please follow the main CCS formatting instructions (except with page limits as described above). In particular, we recommend using the sigconf template, which can be downloaded from https://www.acm.org/publications/proceedings-template . Accepted papers will be published by the ACM Digital Library and/or ACM Press. Committee members are not required to read the appendices, so the paper should be intelligible without them. Submissions must be in English and properly anonymized.
Submission link: https://aisec2024.hotcrp.com .
All accepted submissions will be presented at the workshop as posters. Accepted papers will be selected for presentation as spotlights based on their review score and novelty. Nonetheless, all accepted papers should be considered as having equal importance and will be included in the ACM workshop proceedings.
One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.
For any questions, please contact one the workshop organizers at [email protected]
As in the previous editions of this workshop, we would honor outstanding contributions. To this end, we will award the best paper, selected by the reviewers among all the submitted papers.
The 2023 AISec Best Paper Award was given to:
Sahar Abdelnabi
(CISPA Helmholtz Center for Information Security),
Kai Greshake
(Saarland University, sequire technology GmbH),
Shailesh Mishra
(Saarland University),
Christoph Endres
(sequire technology GmbH),
Thorsten Holz
(CISPA Helmholtz Center for Information Security),
Mario Fritz
(CISPA Helmholtz Center for Information Security)
for the paper
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection
.
Thanks for those who contacted us to help with the reviews!