LLMpediaThe first transparent, open encyclopedia generated by LLMs

CCS (ACM Conference on Computer and Communications Security)

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: Tor Project Hop 4
Expansion Funnel Raw 109 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted109
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
CCS (ACM Conference on Computer and Communications Security)
NameCCS (ACM Conference on Computer and Communications Security)
DisciplineComputer security
AbbreviationCCS
PublisherACM SIGSAC
First1993
FrequencyAnnual
CountryInternational

CCS (ACM Conference on Computer and Communications Security) is an annual academic conference focused on computer security, information assurance, and privacy research that gathers researchers, practitioners, and policymakers from around the world. Founded in the early 1990s, the conference serves as a flagship venue for presenting peer-reviewed work in systems security, cryptography applications, network security, and applied privacy topics, attracting submissions from universities, industry research labs, and government agencies. CCS proceedings and talks often influence standards, product development, and subsequent research directions across both academia and industry.

Overview

CCS functions as a premier venue similar in stature to IEEE Symposium on Security and Privacy, USENIX Security Symposium, Network and Distributed System Security Symposium, NDSS, and Black Hat USA, and routinely features contributions from institutions such as Massachusetts Institute of Technology, Stanford University, Carnegie Mellon University, University of California, Berkeley, and University of Cambridge. The conference typically includes technical paper sessions, poster sessions, keynote addresses by figures from Microsoft Research, Google Research, IBM Research, Facebook AI Research, and Amazon Web Services, as well as panels and tutorials involving participants from National Institute of Standards and Technology, European Union Agency for Cybersecurity, and Defense Advanced Research Projects Agency.

History and Development

CCS originated in the early 1990s with antecedents in venues connected to ACM SIGCOMM, ACM SIGOPS, and other computing societies, evolving alongside milestones like the publication of the RSA (cryptosystem), the growth of Internet Engineering Task Force standards, and high-profile incidents such as the Morris worm that shaped research priorities. Over time, CCS expanded its scope in response to developments at organizations like Intel Corporation, Cisco Systems, Apple Inc., and Nokia, and to advances in methodologies associated with projects at DARPA, European Research Council, and national laboratories such as Los Alamos National Laboratory. The conference moved locations internationally, hosting editions in cities tied to major research hubs including San Francisco, London, Beijing, Sydney, and Toronto.

Conference Scope and Topics

Topics at CCS encompass intersections of applied cryptography and systems work influenced by breakthroughs at Courant Institute, ETH Zurich, Princeton University, and Tsinghua University, covering areas such as secure software engineering, vulnerability analysis, hardware security, intrusion detection, privacy-preserving computation, and adversarial machine learning. Sessions often reference foundational technologies and standards developed at IETF, IEEE, W3C, and papers that relate to deployed platforms like Android (operating system), iOS, Windows NT, Linux kernel, and Apache HTTP Server. Research ties into fields represented by institutions such as Google, Apple, Mozilla Foundation, Red Hat, and startups spun out of universities including Spintronics-adjacent labs and security-focused companies.

Organizational Structure and Sponsorship

CCS is organized under the auspices of ACM SIGSAC with program committees comprising members from universities like Harvard University, Yale University, University of Pennsylvania, University of Maryland, College Park, and industry labs including Microsoft Research, Google Research, Intel Labs, and IBM Research. Sponsorship and partnerships have historically included technology corporations such as Amazon, Facebook, Cisco Systems, and cloud providers like Google Cloud, alongside governmental and standards bodies like NIST and regional organizations including ENISA. Steering committees and conference chairs have been drawn from academics who hold appointments at places such as University of Illinois Urbana-Champaign, University of California, San Diego, Cornell University, and University College London.

Notable Papers and Contributions

CCS has published influential papers that impacted cryptographic practice, vulnerability disclosure models, and secure system design, including work connected to the development of practical implementations of homomorphic encryption, differential privacy methods, and attacks on widely used protocols like Transport Layer Security and Secure Shell. Landmark contributions have involved collaborations between researchers at MIT CSAIL, UC Berkeley EECS, Imperial College London, Technische Universität Darmstadt, and industry teams from Apple, Google, and Microsoft that demonstrated novel exploitation techniques, defenses such as formal verification of kernels, and empirical studies of large-scale deployments like Tor and Bitcoin. The conference has been a venue for influential disclosures that prompted responses from organizations such as CERT Coordination Center, US-CERT, and major vendors including Intel and AMD.

Selection Process and Awards

Papers submitted to CCS undergo rigorous peer review managed by program committees and area chairs drawn from institutions including ETH Zurich, University of Oxford, California Institute of Technology, and University of Toronto, with acceptance rates comparable to IEEE S&P and USENIX Security. The conference recognizes outstanding work with awards such as Best Paper, Distinguished Paper, and Test of Time, honoring authors affiliated with universities like Princeton, Columbia University, Duke University, and industry researchers from IBM Research and Microsoft Research. Workshops and student research competitions often mirror award structures found at KDD, NeurIPS, and ICML, providing career-stage recognition and opportunities for collaboration across academia and industry.

Attendance, Workshops, and Community Impact

Annual attendance draws academics, practitioners, and policy actors from organizations such as Google, Facebook, Apple, Amazon Web Services, NSA, and regional labs, and supports satellite workshops and co-located events run by groups including Women in CyberSecurity, ACM-W, and specialized workshops affiliated with IEEE, NDSS, and Usenix. The conference ecosystem fuels startup formation, technology transfer to companies like CrowdStrike and FireEye, and policy discussions engaging agencies such as European Commission and US Department of Homeland Security, while alumni networks connect researchers across Stanford University, MIT, CMU, EPFL, and National University of Singapore.

Category:Computer security conferences