Upgrade to Pro — share decks privately, control downloads, hide ads and more …

CCS 2017 Program Chairs' Welcome

David Evans
October 31, 2017
27k

CCS 2017 Program Chairs' Welcome

ACM Conference on Computer and Communications Security 2017
Dallas, TX
https://acmccs.github.io

Video: https://youtu.be/IiV3fFFBOu4?t=8m3s

David Evans

October 31, 2017
Tweet

Transcript

  1. PC Chairs Welcome David Evans, University of Virginia Tal Malkin,

    Columbia University Dongyan Xu, Purdue University 24th ACM Conference on Computer and Communications Security 2017
  2. CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research

    Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops
  3. CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research

    Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops
  4. CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research

    Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops
  5. CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research

    Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops
  6. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments 165 days ago 75 days to complete review process
  7. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments 6 papers eliminated because of duplicate submissions, ethical issues, or egregious CFP violations
  8. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments Each PC member had 25 days to review 10-12 papers Each paper assigned 2 reviews Papers with both reviewers negative and substantive reasons considered unviable
  9. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments Viable papers assigned additional review After R2, reviews released to authors for responses 7-11 July: Author Response Period
  10. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 322 papers in discussion 4+ reviews 151 2 August: Final Decisions 17 papers “revived” by author responses
  11. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 322 papers in discussion 4+ reviews 151 Additional reviews Extensive on-line discussion helped by “Discussion Committee” over 6000 comments
  12. 0 100 200 300 400 500 600 700 800 CFP

    Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 322 papers in discussion 4+ reviews 151 2 August: Final Decisions 1 1
  13. How can I get my paper accepted to CCS? Have

    brilliant ideas, do outstanding work, get breakthrough results, write superbly, and follow the CFP guidelines.
  14. 1 5 25 125 625 1 2 3 4 5

    6 7-13 2251 authors submitted 1 paper Number of Authors 340 authors submitted 2 papers 101 authors submitted 3 papers 35 17 5 12
  15. 8% 10% 12% 14% 16% 18% 20% 22% 24% 26%

    1 5 25 125 625 1 2 3 4 5 6 7-13 Number of Authors Acceptance Rate Overall 21.4% accepted 10% accepted Don’t submit too many papers…
  16. 8% 10% 12% 14% 16% 18% 20% 22% 24% 26%

    1 5 25 125 625 1 2 3 4 5 6 7-13 Number of Authors Acceptance Rate 25.7% accepted Don’t submit too many papers…
  17. 0 50 100 150 200 1 2 3 4 5

    6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% 2.9% Number of Papers Number of Co-Authors Accepted Not Accepted
  18. 0 50 100 150 200 1 2 3 4 5

    6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% 2.9% Number of Papers Number of Co-Authors 34 single-author papers, 1 accepted: Economic Factors of Vulnerability Trade and Exploitation: Empirical evidence from a prominent Russian cybercrime market Luca Allodi (session 2G, Weds 4pm)
  19. 0 50 100 150 200 1 2 3 4 5

    6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% 2.9% Number of Papers Number of Co-Authors Accepted Not Accepted 0 50 100 150 200 250 2 3 4 Number of Countries Represented 15.3% 30.6% 33.3% (2 of 6) >4 (0 of 1)
  20. 0 50 100 150 200 1 2 3 4 5

    6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% Number of Papers Number of Co-Authors 133 five-author papers, 33 accepted 2.9% 1 thirteen-author paper, 1 accepted: Data breaches, phishing, or malware? Understanding the risks of stolen credentials Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein (session 5F, Wednesday 2:00pm)
  21. Number of Papers 0% 5% 10% 15% 20% 25% 30%

    0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols <none> Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Author-selected Topic
  22. Number of Papers 0% 5% 10% 15% 20% 25% 30%

    0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols <none> Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Applied Cryptography (186 submissions, 49 accepted) Software security (162 submissions, 31 accepted)
  23. Number of Papers 0% 5% 10% 15% 20% 25% 30%

    0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols <none> Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Applied Cryptography (186 submissions, 49 accepted) Software security (162 submissions, 31 accepted) Metrics 7 of 21 papers accepted (33%)
  24. Number of Papers 0% 5% 10% 15% 20% 25% 30%

    0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols <none> Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Applied Cryptography (186 submissions, 49 accepted) Software security (162 submissions, 31 accepted) Cyber-physical systems (including IoT) security 7 of 80 papers accepted (8.75%) Metrics 7 of 21 papers accepted (33%)
  25. High-Accept Topic Pairs Number of Papers Accept Rate User studies

    Applied cryptography 1 100% Mobile security and privacy Metrics 1 100% Mobile security and privacy Forensics 1 100% Privacy policies Metrics 1 100% Malware Forensics 1 100% Metrics Cyber-physical systems (including IoT) 1 100% Web security and privacy User studies 5 80% Protocols Hardware and architecture security 6 67% Protocols Language-based security 3 67% All topic-pairs with > 50% acceptance rate No-Accept Topic Pairs Number of Submissions (None Accepted) Distributed systems security Cloud security 14 Distributed systems security Cyber-physical systems (including IoT) 13 Privacy-preserving systems Network security 13 Software security Cloud security 12 Mobile security and privacy Malware 12 Network security Cloud security 12 Most “popular” topic-pairs with 0% acceptance rate
  26. 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

    100% 0 10 20 30 40 50 60 70 80 Czech Republic Portugal Belgium Spain Denmark Austria France Qatar Netherlands India United States Israel Finland Taiwan Sweden Australia Germany Singapore Luxembourg Switzerland UK Japan South Korea China Italy Canada Country of Author (Affiliation) (16 countries with 0% acceptance rate not shown) USA: 540 submissions (44%), 114 accepts (51%) China: 132 submissions, 12 accepts
  27. 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

    100% 0 10 20 30 40 50 60 70 80 Czech Republic Portugal Belgium Spain Denmark Austria France Qatar Netherlands India United States Israel Finland Taiwan Sweden Australia Germany Singapore Luxembourg Switzerland UK Japan South Korea China Italy Canada Country of Author (Affiliation) (16 countries with 0% acceptance rate not shown) Czech Republic: 2 submissions, 2 accepts: A Touch of Evil: … (5G, Weds 4pm) (…, Petr Svenda, …) ROCA (1H, Thurs 9am) (…, Petr Svenda, …)
  28. Guarantee Success for CCS 2018: “Hard” Way Have brilliant ideas,

    do outstanding work, get breakthrough results, write superbly, and follow the CFP guidelines. CCS 2018: Toronto, Canada
  29. Guarantee Success for CCS 2018: “Hard” Way Have brilliant ideas,

    do outstanding work, get interesting results, write superbly, and follow the CFP guidelines. “Easy” Way Find 13 co-authors (in 4 different countries), submit 4 papers about user studies on metrics for web security and privacy, and move to the Czech Republic.
  30. Program Committee Sadia Afroz (UC Berkeley / ICSI) • Gail-Joon

    Ahn (Arizona State University) • Ehab Al-Shaer (UNC Charlotte) Elias Athanasopoulos (University of Cyprus) • Foteini Baldimtsi (George Mason University) • David Basin (ETH Zurich) • Adam Bates (UIUC) Lujo Bauer (CMU) • Konstantin Beznosov (University of British Columbia) • Karthikeyan Bhargavan (INRIA) Alex Biryukov (University of Luxembourg) • Jeremiah Blocki (Purdue University) • Elette Boyle (IDC Herzliya) Levente Buttyán (CrySyS Lab, BME) • Juan Caballero (IMDEA Software Institute) • Joseph Calandrino (Federal Trade Commission) Aylin Caliskan (Princeton University) • Yinzhi Cao (Lehigh University) • Alvaro A. Cardenas (University of Texas at Dallas) Lorenzo Cavallaro (Royal Holloway, University of London) • Neha Chachra (Facebook) • Melissa Chase (Microsoft Research) Haibo Chen (Shanghai Jiao Tong University) • Hao Chen (UC Davis) • Omar Chowdhury (University of Iowa) • Nicolas Christin (CMU) Véronique Cortier (Loria (CNRS, France) • Manuel Costa (Microsoft Research) • Scott Coull (FireEye) • Weidong Cui (Microsoft Research) Anupam Das (CMU) • Anupam Datta (CMU) • Lucas Davi (University of Duisburg-Essen) • Emiliano De Cristofaro (University College London) Tamara Denning (University of Utah) • Xuhua Ding (Singapore Management University) • Brendan Dolan-Gavitt (New York University) Adam Doupé (Arizona State University) • Tudor Dumitraş (University of Maryland) • Serge Egelman (UC Berkeley / ICSI) Ittay Eyal (Cornell University) • Sascha Fahl (Saarland University) • Christopher Fletcher (NVIDIA/UIUC) • Aurélien Francillon (EURECOM) Matt Fredrikson (CMU) • Xinyang Ge (Microsoft Research) • Daniel Genkin (University of Pennsylvania / University of Maryland) Rosario Gennaro (City College of New York) • Phillipa Gill (UMass) • Dov Gordon (George Mason University) Andreas Haeberlen (University of Pennsylvania) • J. Alex Halderman (University of Michigan) • Shai Halevi (IBM Research) Matthew Hicks (MIT Lincoln Laboratory) • Michael Hicks (University of Maryland) • Thorsten Holz (Ruhr-Universität Bochum) Amir Houmansadr (UMass) • Yan Huang (Indiana University) • Kyu Hyung Lee (University of Georgia) • Trent Jaeger (Penn State University) Suman Jana (Columbia University) • Limin Jia (CMU) • Yier Jin (University of Central Florida) • Aaron Johnson (US Naval Research Lab) Brent ByungHoon Kang (KAIST) • Aniket Kate (Purdue University) • Jonathan Katz (University of Maryland) Stefan Katzenbeisser (TU Darmstadt) • Marcel Keller (University of Bristol) • Aggelos Kiayias (University of Edinburgh) Taesoo Kim (Georgia Tech) • Yongdae Kim (KAIST) • Engin Kirda (Northeastern University) • David Kotz (Dartmouth) Farinaz Koushanfar (UC San Diego) • Ralf Küsters (University of Stuttgart) • Andrea Lanzi (University of Milan) Byoungyoung Lee (Purdue University) • Wenke Lee (Georgia Tech) • Brian N. Levine (UMass) • Zhichun Li (NEC Labs) • Zhou Li (RSA) David Lie (University of Toronto) • Yao Liu (University of South Florida) • Matteo Maffei (TU Vienna) Mohammad Mahmoody (University of Virginia) • Z. Morley Mao (University of Michigan) • Ivan Martinovic (University of Oxford) Michelle L. Mazurek (University of Maryland) • Jonathan McCune (Google) • Andrew Miller (UIUC) • Tal Moran (IDC Herzliya) Muhammad Naveed (University of Southern California) • Nick Nikiforakis (Stony Brook University) • Hamed Okhravi (MIT Lincoln Laboratory) Alina Oprea (Northeastern University) • Mathias Payer (Purdue University) • Adrian Perrig (ETH Zurich)