Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3243734acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security Toronto Canada October 15 - 19, 2018
ISBN:
978-1-4503-5693-0
Published:
15 October 2018
Sponsors:

Reflects downloads up to 10 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

As the ACM's flagship security and privacy conference for more than two decades and the world's largest forum on computing and communications security research, CCS today is facing great challenges in meeting the demands of an expanding community and also ensuring high quality of its published research. This year's conference is unique as the last one before the conference's model change, moving from a single deadline toward a multiple deadline and more journal-like system.

This year, a total of 809 submissions were received by the conference. Among them, 134 were selected to appear in the program and be included in the proceedings, with an acceptance rate of 16.6%. These papers were reviewed by a Program Committee of 159 security and privacy experts from academia, industry and government around the world. Following the convention in the past years, the review process includes three rounds. Each submission were reviewed by two PC members in the first round and those moving to the later rounds received additional reviews, depending on the results of the initial reviews. The vast majority of the accepted papers have 4 to 5 reviews. Right after the second round, authors were given the opportunities to respond to the reviews received. During the final review stage, papers were extensively discussed online, taking into account both reviews and the author responses, and additional reviews were assigned to those controversial or with low confident reviews only. Like last year, we used Toronto Paper Matching System (TPMS) to automatically assign papers and then manually adjusted the assignments when necessary. Most PC members have reviewed 16 to 20 papers.

The accepted papers cover a large spectrum of security and privacy topics, ranging from cryptography and formal methods to SDN, blockchain and IoT security. This diversity demonstrates the breadth of applied security and privacy research and also reflects the technological trends in the area.

Cited By

  1. Ma Z, Wu Z, Wei Q, Jabbar M and Lorenz P (2024). CWEInject: build fuzzer benchmark through bug templates 3rd International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024), 10.1117/12.3032933, 9781510680531, (122)
  2. Wu Y, Li Q, Wu X, Liu W and Xia J (2022). Denglu1-extension: solve password vulnerabilities and optimize user experience Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 10.1117/12.2653713, 9781510660557, (63)
  3. Varma G, Chauhan R and Singh D (2022). Sarve: synthetic data and local differential privacy for private frequency estimation, Cybersecurity, 10.1186/s42400-022-00129-6, 5:1, Online publication date: 1-Dec-2022.
  4. ACM
    Kadron İ and Bultan T TSA: a tool to detect and quantify network side-channels Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1760-1764)
  5. Bursuc S and Mauw S (2022). Contingent payments from two-party signing and verification for abelian groups 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 10.1109/CSF54842.2022.9919674, 978-1-6654-8417-6, (195-210)
  6. Bursuc S and Mauw S (2022). Contingent payments from two-party signing and verification for abelian groups 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 10.1109/CSF54842.2022.9919654, 978-1-6654-8417-6, (195-210)
  7. Zhu F, Liu L, Hu S, Lv T, Ye R and Karuppiah M (2021). WND-Identifier, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  8. Laštovička M, Špaček S, Velan P and Čeleda P Using TLS Fingerprints for OS Identification in Encrypted Traffic NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, (1-6)
  9. Eagon M, Tu Z, Fei F, Xu D, Deng X, Dudzik M and Ricklin J (2019). Sensitivity-based dynamic control frequency scheduling of quadcopter MAVs Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, 10.1117/12.2519105, 9781510626836, (9)
Contributors
  • University of Toronto
  • Concordia University
  • CISPA - Helmholtz Center for Information Security

Index Terms

  1. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%
      YearSubmittedAcceptedRate
      CCS '1993414916%
      CCS '1880913417%
      CCS '1783615118%
      CCS '1683113716%
      CCS '1566012819%
      CCS '1458511419%
      CCS '1353010520%
      CCS '114296014%
      CCS '103255517%
      CCS '082805118%
      CCS '073025518%
      CCS '011532718%
      CCS '001322821%
      CCS '97641727%
      CCS '96591932%
      CCS '94703144%
      Overall6,9991,26118%