ACM CCS 2010 – ACM Computer and Communications Security

ACM CCS 2010 OCT 4-8, 2010


The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security, as well as case studies and implementation experiences. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope. Accepted paper will be published by ACM Press in the conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security.

Paper Submission Process

Submissions must be made by the deadline of April 17, 2010, through the website: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Paper Format

Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must NOT be anonymized. Only PDF or Postscript files will be accepted. Submissions may also be accompanied by a link to a short (at most 3 minutes) video or slide presentation. For more details on the supplemental material, see the CCS 2010 website. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Tutorial Submissions

Proposals for long (3-hour) and short (1.5-hour) tutorials on research topics of current and emerging interest should be submitted electronically to the tutorials chair by May 24, 2010. The guidelines for tutorial proposals can be found on the website.

Important Dates

– Paper submission due: Saturday, April 17, 2010
– Acceptance notification: Monday, June 21, 2010
– Final papers due: Friday, July 16, 2010

Ehab Al-Shaer (University of North Carolina Charlotte, USA)

Angelos D. Keromytis (Columbia University, USA)
Vitaly Shmatikov (University of Texas at Austin, USA)

Tutorial Chair
Gail-Joon Ahn Arizona State University

Workshop Co-Chairs
Ting Yu North Carolina State University, USA
Ninghui Li Purdue University

Sencun Zhu Pennsylvania Sate University, USA

Publication Chair
Hao Chen, UC Davis

Web Chair
Kun Bai IBM T.J. Watson Research, USA

Student Travel Grant Chairs
Angelos Stavrou George Mason University, USA

Poster& Demo Chairs
Adam Lee, University of Pittsburgh, USA
Xinming Ou Kansas State University, USA

Publicity Chairs
Chris Kruegel University of California, Santa Barbara, USA Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Patrons& Industry Outreach
Bill Chu University of North Carolina Charlotte, USA
XiaoFeng Wang Indiana University, USA
Jorge Lobo IBM T.J. Watson Research, USA

Local Arrangements Committee
Yan Chen (Chair) Northwestern University, USA
V.N. Venkatakrishnan University of Illinois Chicago, USA
Tricha Anjali Illinois Institute of Technology, USA

Regional Arrangements Committee
Alex Liu (Chair) Michigan State University, USA
EJ Jung University of Iowa, USA
Yong Guan Iowa State University, USA
Kui (Quinn) Ren, Illinois Institute of Technology, USA


Ben Adida (Harvard, USA)
Adam Barth (UC Berkeley, USA)
Emery Berger (U of Massachusetts, USA)
Bruno Blanchet (CNRS, ENS, INRIA, France)
Steve Borbash (Dept of Defense, USA)
Nikita Borisov (UIUC, USA)
Stephen Chong (Harvard, USA)
Mihai Christodorescu (IBM Research, USA)
Veronique Cortier (LORIA-CNRS, France)
Jed Crandall (U of New Mexico, USA)
Weidong Cui (Microsoft Research, USA)
Marc Dacier (Eurecom, France)
George Danezis (Microsoft Research, UK)
Roger Dingledine (Tor Project, USA)
Ulfar Erlingsson (Microsoft Research, USA)
Cedric Fournet (MSR-INRIA, France)
Vanessa Friaz-Martinez (Telefonica Research, Spain)
Vinod Ganapathy (Rutgers, USA)
Philippe Golle (PARC, USA)
Virgil Gligor (CMU, USA)
Steven Gribble (U of Washington, USA)
Alex Halderman (U of Michigan, USA)
Susan Hohenberger (Johns Hopkins, USA)
Trent Jaeger (Penn State, USA)
Stas Jarecki (UC Irvine, USA)
Ari Juels (RSA Laboratories, USA)
Apu Kapadia (Indiana U, USA)
Engin Kirda (Eurecom, France)
Yoshi Kohno (U of Washington, USA)
Ralf Kuesters (U of Trier, Germany)
Michael Locasto (George Mason, USA)
Tal Malkin (Columbia, USA)
Patrick McDaniel (Penn State, USA)
Dave Molnar (Microsoft Research, USA)
Fabian Monrose (U of North Carolina, USA)
Steven Murdoch (U of Cambridge, UK)
Steven Myers (Indiana U, USA)
David Naumann (Stevens Tech, USA)
Lasse Overlier (FFI, Norway)
Benny Pinkas (U of Haifa, Israel)
Bart Preneel (KU Leuven, Belgium)
Tom Reps (U of Wisconsin, USA)
Reiner Sailer (IBM Research, USA)
Steve Schneider (U of Surrey, UK)
R. Sekar (SUNY Stony Brook, USA)
Anil Somayaji (Carleton U, Canada)
Angelos Stavrou (George Mason, USA)
Jonathan Trostle (JHU APL, USA)
Helen Wang (Microsoft Research, USA)
XiaoFeng Wang (Indiana U, USA)
Brent Waters (U of Texas at Austin, USA)
Haifeng Yu (NUS, Singapore)
Yuanyuan Zhou (UCSD, USA)
Mary Ellen Zurko (IBM, USA)


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.