Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3133956acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security Dallas Texas USA 30 October 2017- 3 November 2017
ISBN:
978-1-4503-4946-8
Published:
30 October 2017
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 24th ACM Conference on Computer and Communications Security!

Since 1993, CCS has been the ACM's flagship conference for research in all aspects of computing and communications security and privacy. This year's conference attracted a record number of 836 reviewed research paper submissions, of which a record number of 151 papers were selected for presentation at the conference and inclusion in the proceedings.

The papers were reviewed by a Program Committee of 146 leading researchers from academic, government, and industry from around the world. Reviewing was done in three rounds, with every paper being reviewed by two PC members in the first round, and additional reviews being assigned in later rounds depending on the initial reviews. Authors had an opportunity to respond to reviews received in the first two rounds. We used a subset of PC members, designated as the Discussion Committee, to help ensure that reviewers reconsidered their reviews in light of the author responses and to facilitate substantive discussions among the reviewers. Papers were discussed extensively on-line in the final weeks of the review process, and late reviews were requested from both PC members and external reviewers when additional expertise or perspective was needed to reach a decision. We are extremely grateful to the PC members for all their hard work in the review process, and to the external reviewers that contributed to selecting the papers for CCS.

Before starting the review process, of the 842 submissions the PC chairs removed six papers that clearly violated submission requirements or were duplicates, leaving 836 papers to review. In general, we were lenient on the requirements, only excluding papers that appeared to deliberately disregard the submission requirements. Instead of excluding papers which carelessly deanonymized the authors, or which abused appendices in the opinion of the chairs, we redacted (by modifying the submitted PDF) the offending content and allowed the papers to be reviewed, and offered to make redacted content in appendices available to reviewers upon request.

Our review process involved three phases. In the first phase, each paper was assigned two reviewers. Following last year's practice, we adopted the Toronto Paper Matching System (TPMS) for making most of the review assignments, which were then adjusted based on technical preferences declared by reviewers. Each reviewer had about 3 weeks to complete reviews for around 12 papers. Based on the results of these reviews, an additional reviewer was assigned to every paper that had at least one positive-leaning review. Papers where both initial reviews were negative, but with low confidence or significant positive aspects, were also assigned additional reviews. At the conclusion of the second reviewing round, authors had an opportunity to see the initial reviews and to submit a short rebuttal. To ensure that all the authors' responses were considered seriously by the reviewers, the Discussion Committee members worked closely with the reviewers to make sure that they considered and responded to the authors' rebuttals. When reviewers could not reach an agreement, or additional expertise was needed, we solicited additional reviews. The on-line discussion period was vibrant and substantive, and at the end of this process the 151 papers you find here were selected for CCS 2017.

Cited By

  1. Taheri Sarteshnizi I, Bagloee S, Sarvi M and Nassir N (2023). Traffic Anomaly Detection: Exploiting Temporal Positioning of Flow-Density Samples, IEEE Transactions on Intelligent Transportation Systems, 25:5, (4166-4180), Online publication date: 1-May-2024.
  2. Li J, Lv Z, Chen C, Li Y, Yao H and Liu X (2024). Log anomaly detection method based on CNN and LSTM fusion Second International Conference on Informatics, Networking, and Computing (ICINC 2023), 10.1117/12.3024645, 9781510674745, (5)
  3. Li X, Weng C, Xu Y, Wang X and Rogers J (2023). ZKSQL: Verifiable and Efficient Query Evaluation with Zero-Knowledge Proofs, Proceedings of the VLDB Endowment, 16:8, (1804-1816), Online publication date: 1-Apr-2023.
  4. He J, Qiu W, He R, Zhuo S and Jie W Turbo: A High-Performance and Secure Off-Chain Payment Hub Machine Learning for Cyber Security, (67-75)
  5. ACM
    Weng C, Yang K, Yang Z, Xie X and Wang X AntMan Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (2901-2914)
  6. ACM
    Garg S, Jain A, Jin Z and Zhang Y Succinct Zero Knowledge for Floating Point Computations Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1203-1216)
  7. ACM
    Davidson A, Snyder P, Quirk E, Genereux J, Livshits B and Haddadi H STAR Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (697-710)
  8. ACM
    Güneysu T, Hodges P, Land G, Ounsworth M, Stebila D and Zaverucha G Proof-of-Possession for KEM Certificates using Verifiable Generation Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1337-1351)
  9. ACM
    Luo N, Antonopoulos T, Harris W, Piskac R, Tromer E and Wang X Proving UNSAT in Zero Knowledge Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (2203-2217)
  10. ACM
    Aumayr L, Thyagarajan S, Malavolta G, Moreno-Sanchez P and Maffei M Sleepy Channels Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (179-192)
  11. ACM
    Dobraunig C, Kales D, Rechberger C, Schofnegger M and Zaverucha G Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (843-857)
  12. ACM
    Fu Y, Yan M, Xu J, Li J, Liu Z, Zhang X and Yang D Investigating and improving log parsing in practice Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (1566-1577)
  13. Bouma H, van Mil J, ten Hove J, Pruim R, van Rooijen A, Kern A, Ballan L, Kromhout B, Wolbers D, de Moel H, Dolstra N, Bomhof G, de Rooij D, Bouma H, Stokes R, Yitzhaky Y and Prabhu R (2022). Combatting fraud on travel, identity, and breeder documents Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies VI, 10.1117/12.2637416, 9781510655539, (10)
  14. Wang Y, Cao Z, Dong X, Shen J, Zhao C and Imane H (2022). NIPVS-FL: a non-interactive publicly verifiable secure federated-learning scheme against malicious servers Third International Conference on Computer Communication and Network Security (CCNS 2022), 10.1117/12.2659133, 9781510660113, (12)
  15. Liang X and Xiao T (2022). RLF: Directed Fuzzing based on Deep Reinforcement Learning 2022 International Conference on Machine Learning, Control, and Robotics (MLCR), 10.1109/MLCR57210.2022.00032, 978-1-6654-5459-9, (127-133)
  16. Georgiadis A, Babbar V, Silavong F, Moran S, Otter R, Park B and Deserno T (2022). ST-FL: style transfer preprocessing in federated learning for COVID-19 segmentation Imaging Informatics for Healthcare, Research, and Applications, 10.1117/12.2611096, 9781510649491, (3)
  17. Jiang Y, Ye D and Wang D (2022). Black-Box Adversarial Attacks against Audio Forensics Models, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  18. Arakelyan S, Arasteh S, Hauser C, Kline E and Galstyan A (2021). Bin2vec: learning representations of binary executable programs for security tasks, Cybersecurity, 10.1186/s42400-021-00088-4, 4:1, Online publication date: 1-Dec-2021.
  19. ACM
    Delpech de Saint Guilhem C, Orsini E and Tanguy T Limbo: Efficient Zero-knowledge MPCitH-based Arguments Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (3022-3036)
  20. ACM
    Yang K, Sarkar P, Weng C and Wang X QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2986-3001)
  21. Laud P Efficient Permutation Protocol for MPC in the Head Security and Trust Management, (62-80)
  22. Bouma H, Reuter A, Brouwer P, George M, Ferryman J, Boyle J, Jursenas A, Karinsalo A, Pruim R, van Rooijen A, ten Hove J, Van Mil J, Gicic D, Goller G, Ledinauskas E, Ruseckas J, Kromhout B, de Moel H, Dolstra N, Bouma H, Stokes R, Yitzhaky Y and Prabhu R (2021). Authentication of travel and breeder documents Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies V, 10.1117/12.2598143, 9781510645820, (13)
  23. Liang J, Wu Y, Li J, Chen X, Tong H, Ni M and Li X (2021). Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks, Complexity, 2021, Online publication date: 1-Jan-2021.
  24. Jiang K, Zhang H, Zhang W, Fang L, Ge C, Yuan Y, Liu Z and Han J (2021). TapChain, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  25. ACM
    Thyagarajan S, Bhat A, Malavolta G, Döttling N, Kate A and Schröder D Verifiable Timed Signatures Made Practical Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (1733-1750)
  26. Zhang L, Meng Y, Yu J, Xiang C, Falk B and Zhu H Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (377-386)
  27. ACM
    Dathathri R, Kostova B, Saarikivi O, Dai W, Laine K and Musuvathi M EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, (546-561)
  28. ACM
    Liu Z, Xiang Y, Shi J, Gao P, Wang H, Xiao X, Wen B and Hu Y HyperService Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (549-566)
  29. ACM
    Lai R, Malavolta G and Ronge V Succinct Arguments for Bilinear Group Arithmetic Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (2057-2074)
Contributors
  • The University of Texas at Dallas
  • University of Virginia
  • Columbia University

Recommendations

Acceptance Rates

CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%
YearSubmittedAcceptedRate
CCS '1993414916%
CCS '1880913417%
CCS '1783615118%
CCS '1683113716%
CCS '1566012819%
CCS '1458511419%
CCS '1353010520%
CCS '114296014%
CCS '103255517%
CCS '082805118%
CCS '073025518%
CCS '011532718%
CCS '001322821%
CCS '97641727%
CCS '96591932%
CCS '94703144%
Overall6,9991,26118%