Workshop on Automotive Cyber Security

The fourth workshop on Automotive Cyber Security (ACSW) will be organized in conjunction with IEEE EuroS&P 2025. The workshop will take place on TBA, 2025 in Venice, Italy. This edition of the workshop include keynote speakers, discussion panels, and tutorials.

Call for Papers

Modern automotive systems are among the fastest evolving examples of Cyber-Physical Systems, where multiple vehicle features are implemented by embedded systems (powered by microcontrollers) with limited computational power and memory. These microcontrollers are interconnected through a variety of communication networks. Although the underlying communication protocols were designed to operate in the absence of external security threats, the adoption of external connectivity on modern vehicles paved the way for novel attack scenarios exploiting the vulnerabilities of in-vehicle protocols. While both the academic community and industry sector have developed numerous solutions to address these vulnerabilities, the delayed adoption of new security mechanisms in mass-produced vehicles and the ever-increasing number of reported vulnerabilities make modern cars more exposed than ever to security threats. Therefore, the development and adoption of practical security solutions specifically tailored for internal and external vehicle communication networks, adapted to the constraints of automotive systems, is crucial. Automotive security is especially important in the context of next generation vehicles which must comply with upcoming and newly introduced standards.

Aim & Scope

The goal of the Automotive Cyber Security Workshop is to bring together researchers and practitioners, interested in all aspects of automotive systems security, to contribute with and discuss new advances in the field of automotive cybersecurity. The workshop aims to present recent advances in the state-of-the-art for cybersecurity of road vehicles, bringing together researchers and practitioners across all areas of computer security focusing on automotive systems.
All papers discussing security and privacy issues of modern vehicles are welcome for submission. ACSW particularly welcomes papers focusing on the security of communication networks found inside and outside the modern vehicles, on the privacy issues related to modern infotainment systems, and on the forensic analysis of modern vehicle components. Topics of interest include, but are not limited to, the following:

  • Hardware security and privacy in automotive components
  • Forensic analysis of automotive components
  • Firmware analysis and vulnerability assessment in automotive contexts
  • Reverse engineering of automotive components and proprietary protocols
  • Privacy-preserving applications in modern vehicles
  • Secure and privacy-preserving communications for in-vehicle communication protocols
  • Intrusion detection and prevention systems for automotive systems
  • Replication and Reproduction of security and privacy-preserving solutions for automotive systems
  • Secure and privacy-preserving communications for Vehicle-to-Vehicle (V2V) and Vehicle-to-Everything (V2X) applications
  • Secure and privacy-preserving applications in Cooperative Intelligent Transportation Systems (C-ITS)
  • Security and privacy for automotive-related infrastructures
  • Security and privacy in automotive-related industries
  • Vulnerability assessment and attack simulations of automotive systems
[new this year - Replication and Reproduction track] This year, we are inviting studies that confirm, challenge, or clarify the findings of previous research. These papers must include the prefix “R+R:” in their title and select the dedicated track in the submission form. We strongly encourage authors to adhere to the well-known guidelines on reproducibility (same experimental setup, conducted by a different team, utilizing original artifacts) and replicability (different experimental setup, conducted by a different team, re-implementing original artifacts). However, submissions must go beyond merely re-running the original artifacts or re-implementing existing methods. We are seeking contributions that not only replicate previous studies but also critically analyze, refine, and expand upon their findings and limitations. This includes, but is not limited to:
  • Verifying the validity and reliability of existing research results across diverse contexts,
  • Extracting lessons learned from applying research outcomes in real-world or industrial settings, and
  • Adapting artifacts to address modern cybersecurity challenges.
Reproducibility and replication submissions will be subject to the same rigorous scientific standards as other technical paper submissions. They will undergo full program committee review, be included in the proceedings, and have to be presented during the technical program of the conference. We particularly encourage authors of these papers to provide the software and data artifacts used in their studies, making them publicly available to the entire community. For more information about the different types of submission, please refer to the submission page.

Important Dates

Submission deadline for papers: January 27, 2025 AoE
Notification to the authors:March 24, 2025
Workshop date:TBA, 2025