Generated by GPT-5-mini| Conference on Computer and Communications Security | |
|---|---|
| Name | Conference on Computer and Communications Security |
| Abbreviation | CCS |
| Discipline | Computer Security |
| Publisher | Association for Computing Machinery |
| Frequency | Annual |
| First | 1993 |
| Country | International |
Conference on Computer and Communications Security is an annual scholarly meeting that brings together researchers, practitioners, and policymakers from fields related to Association for Computing Machinery, Cryptography Research Group, Microsoft Research, Google Research, IBM Research and other institutions to present peer‑reviewed work. The event attracts submissions and attendees from Carnegie Mellon University, Massachusetts Institute of Technology, Stanford University, University of California, Berkeley, University of Cambridge and industrial laboratories such as Intel, Facebook, Apple Inc. and Amazon Web Services. Proceedings are indexed alongside publications from IEEE Symposium on Security and Privacy, USENIX Security Symposium, Network and Distributed System Security Symposium and International Conference on Financial Cryptography and Data Security.
The conference functions as a flagship venue within the broader security research ecosystem including ACM SIGSAC, IETF, NIST, European Union Agency for Cybersecurity, ITU and regional meetings such as AsiaCCS and ACM CCS Asia. Typical attendees include faculty from Princeton University, ETH Zurich, University of Oxford, and researchers from Nokia Bell Labs, Qualcomm, Samsung Research. The program emphasizes rigorous, novel contributions comparable to work published at CRYPTO, EUROCRYPT, USENIX Security, IEEE S&P, and NDSS.
Origins trace to efforts by organizations including ACM, SIGSAC, and academic groups at Brown University and University of Illinois at Urbana–Champaign during the early 1990s, paralleling the rise of conferences like RSA Conference and DEF CON. Over time the event evolved alongside milestones involving PGP, SSL/TLS, WPA, and standards activity at IETF. Program committees and steering committees commonly include members affiliated with Cisco Systems, HP Labs, Bell Labs, Oracle Corporation, Qualcomm Research, and government research labs such as Lawrence Livermore National Laboratory and Sandia National Laboratories.
Accepted papers cover cryptographic protocols linked to work at CRYPTO, privacy techniques reflected in NDSS outputs, systems security topics akin to USENIX ATC, applied research related to IEEE INFOCOM, and interdisciplinary studies involving institutions such as Harvard University, Yale University, Columbia University and New York University. Areas include applied cryptography with ties to RSA Conference developments, side‑channel analysis resonant with CHES, malware and intrusion research overlapping Virus Bulletin and Black Hat USA, formal methods influenced by CAV and POPL, hardware security in the tradition of ISCA and MICRO, and privacy engineering reflecting initiatives at Electronic Frontier Foundation and Open Rights Group.
Typical format mirrors established conferences like NeurIPS and ICML with a combination of peer‑reviewed paper sessions, invited keynote talks by figures from DARPA, European Commission, Facebook, Google, and Microsoft, panel discussions featuring representatives from EFF, ACLU, Heinrich‑Böll‑Stiftung and tutorials led by academics from University of Washington and University of California, San Diego. Ancillary events include workshops similar to Workshop on Hot Topics in Privacy (HotPrivacy), doctoral consortiums like those at SIGCOMM, industry tracks as seen at KDD, and poster sessions modeled on CHI.
The conference has published influential work that intersects with contributions at CRYPTO, EUROCRYPT, IACR, SIGCOMM, S&P and has disseminated breakthroughs in areas such as differential privacy inspired by Dwork, homomorphic encryption related to research from Microsoft Research Redmond, TLS analysis comparable to studies from Google Chrome Security Team, mobile platform exploits paralleling disclosures at Black Hat, and microarchitectural attacks in the lineage of Spectre and Meltdown publications. Authors frequently hail from Princeton University, UC Berkeley, ETH Zurich, Stanford University, Massachusetts Institute of Technology, and labs including Google Project Zero.
The conference grants best paper and distinguished paper awards; recipients have included researchers affiliated with ACM SIGSAC, ACM Fellows, IEEE Fellows, winners of Turing Award, and recipients of honors from Royal Society. Institutional recognition often involves sponsorship or partnership with NSF, DARPA, European Research Council, Google, Microsoft, and Amazon. Career awards and test-of-time recognitions highlight enduring contributions parallel to accolades given at IEEE S&P and USENIX.
Impact is evident through citations in standards work at IETF, regulatory discussions involving European Commission, and technology adoption by companies such as Apple Inc., Cisco Systems, Intel, and Amazon Web Services. Criticism has arisen—similar to debates at NeurIPS and ICLR—about reproducibility, diversity of program committees including representation from Women in CyberSecurity and geographic balance between North American, European, and Asian venues like AsiaCCS and ACM CCS Asia, and issues concerning responsible disclosure echoed in controversies at Black Hat and DEF CON. Some observers call for greater industry‑academic collaboration akin to initiatives at Partnership on AI and enhanced open data efforts reminiscent of OpenAI's datasets.
Category:Computer security conferences