LLMpediaThe first transparent, open encyclopedia generated by LLMs

ACM CCS

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: CRYPTO Hop 4
Expansion Funnel Raw 119 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted119
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
ACM CCS
NameACM Conference on Computer and Communications Security
AbbreviationACM CCS
DisciplineComputer security
PublisherAssociation for Computing Machinery
First1993
FrequencyAnnual

ACM CCS

ACM CCS is an annual flagship Association for Computing Machinery conference focusing on computer security and privacy, attracting researchers from institutions such as Carnegie Mellon University, Massachusetts Institute of Technology, Stanford University, University of California, Berkeley and University of Cambridge. The conference convenes academics and industry practitioners affiliated with organizations like Google, Microsoft Research, Intel Corporation, IBM Research and Facebook to present peer‑reviewed work on topics relevant to standards bodies such as IETF and regulatory stakeholders like European Commission and United States Department of Justice. ACM CCS papers are frequently cited alongside works from venues such as IEEE Symposium on Security and Privacy, USENIX Security Symposium, Network and Distributed System Security Symposium and NDSS.

Overview

ACM CCS covers research areas including cryptography implementations by teams at Radboud University Nijmegen, protocol analysis from University of Cambridge Computer Laboratory, usable security studies from University College London, and systems security research from Princeton University and University of Illinois Urbana-Champaign. The program often references standards and algorithms developed by National Institute of Standards and Technology, Internet Engineering Task Force, and cipher designs originating with researchers from RSA Security and Bell Labs. Attendees include representatives from research labs such as SRI International, Xerox PARC, Microsoft Research Cambridge, and corporate security groups at Amazon and Apple Inc..

History

The conference lineage traces to early 1990s security workshops involving authors from Stanford University, Brown University, University of Massachusetts Amherst, and Cornell University. Over time organizational leadership has included program chairs from University of California, San Diego, Georgia Institute of Technology, ETH Zurich, and École Polytechnique Fédérale de Lausanne. Early influential papers cited work from cryptographers at RSA Laboratories, Cryptography Research, Inc., Bell Communications Research, and theorists associated with MIT Media Lab and Harvard University. The event evolved alongside policy debates at venues such as DEF CON and Black Hat and academic forums like ACM SIGSAC and ACM SIGCOMM.

Conference Structure and Organization

ACM CCS is organized under the auspices of Association for Computing Machinery special interest groups and involves program committees drawn from Google Research, Microsoft Research Silicon Valley, Facebook AI Research, Alibaba Group, Tencent, Huawei Technologies and academic departments including University of Oxford, University of Toronto, Technical University of Munich, University of Washington and University of Michigan. The conference features keynote addresses by figures affiliated with institutions such as DARPA, European Union Agency for Cybersecurity, National Security Agency, Office of the Director of National Intelligence and prominent labs at Bell Labs. Local organizing committees have been hosted in cities like San Francisco, Vienna, London, Beijing, Sydney, Paris, Toronto, Berlin and Tokyo.

Technical Program and Topics

The technical program includes sessions on applied cryptography with contributors from Weizmann Institute of Science and École Normale Supérieure, formal methods research linked to Carnegie Mellon University Software Engineering Institute, vulnerability analysis referencing teams at Cisco Systems and Juniper Networks, hardware security from researchers at Nanyang Technological University and Tsinghua University, and privacy engineering contributions involving scholars from Yale University and Columbia University. Workshops and tutorials often feature collaborations with IETF Working Groups, standards groups at ITU, and consortia like Open Web Application Security Project and Internet Society.

Awards and Recognition

ACM CCS presents awards and honors that recognize contributions comparable to prizes awarded by ACM SIGSAC, IEEE Computer Society, ACM Fellow designations, and lifetime achievement acknowledgments similar to those given by IFIP. Best paper and distinguished paper awards have been won by teams from Princeton University, Cornell Tech, University of Pennsylvania, University of Maryland, College Park and industrial labs at Bell Labs and Google DeepMind. Program committee service and shepherding are coordinated with efforts akin to award processes at NeurIPS, ICML and SIGGRAPH.

Impact and Influence

Research from ACM CCS has influenced protocols and implementations adopted by OpenSSL, TLS Consortium, OAuth, Signal Protocol, and cryptographic libraries used by Mozilla Foundation, Red Hat, Canonical Ltd. and Debian Project. Results presented at the conference have been cited in policy reports by European Parliament, technical advisories from US Cybersecurity and Infrastructure Security Agency, and standardization activities at IEEE Standards Association. Alumni of CCS program committees and authors hold positions at National Institute of Standards and Technology, European Commission Directorate-General for Communications Networks, Google Brain, Amazon Web Services and leading academic departments worldwide.

Notable Conferences and Controversies

Notable conference editions featured landmark papers from teams at University of California, Berkeley on side‑channel attacks, Imperial College London on cryptographic primitives, and University of Cambridge on protocol verification; these talks stimulated follow-up work by research groups at Princeton University and MIT Lincoln Laboratory. Controversies have arisen when corporate sponsorship from firms such as Palantir Technologies or Clearview AI prompted debates similar to those at ACM SIGGRAPH and NeurIPS, and when program committee conflicts echoed disputes seen in IETF working groups and panels at DEF CON. Issues over paper acceptances and dual submissions have paralleled cases handled by IEEE and Springer Nature editorial boards, leading to updated policies modeled after procedures at ACL and SIGMOD.

Category:Computer security conferences