30. ACSAC 2014: New Orleans, LA, USA

Invited essayist

Secure builds and configuration

Mobile systems security I

Social computing and networks

Systems security

Cyber physical systems I

Secure distributed systems

Securing memory and storage

Mobile systems security II

Secure communications

Usable security


Network infrastructure security

Access control and malware

Software security

Cyber physical systems II

Web security