Originating from every continent, the 52 submissions were included in a blind review process that involved 33 reviewers (composed of PC members and their delegates) from many different institutions. The reviewers did an outstanding job and the whole process generated more than 150 reviews – each paper was reviewed by at least 3 reviewers. Based on the reviewers' reports and the general ACM SAC guidelines for evaluation of submissions, only 8 papers were accepted, corresponding to an acceptance rate of 15%, among the lowest in the whole Symposium. Contents cover various aspects of applied computer security. This year's programme has been divided into two sessions, chaired by the track chair, where the following papers have been presented:
- Rieck et al. show how to automatically construct signatures for the command-and-control messages sent and received by malware.
- Chowdhury et al. evaluate the suitability of complexity, coupling and cohesion metrics to assess the likelihood of security vulnerabilities.
- Blackshear et al. address the key management problem in wireless sensor networks.
- Flegel et al. propose a way for organisations to cooperate in detecting malware attacks.
- McDonald et al. compare two approaches to reverse engineering non-trivially obfuscated logic circuits.
- Lee et al. attempt the detection of metamorphic malware through the analysis of code semantics.
- Yasir et al. propose to leverage on biological analogies to address security issues in MANETs.
- Blundo et al. put forward a heuristic for finding an optimal role set in a RBAC scenario.