Slide 1

Slide 1 text

PC Chairs Welcome David Evans, University of Virginia Tal Malkin, Columbia University Dongyan Xu, Purdue University 24th ACM Conference on Computer and Communications Security 2017

Slide 2

Slide 2 text

CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops

Slide 3

Slide 3 text

CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops

Slide 4

Slide 4 text

CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops

Slide 5

Slide 5 text

CCS Program Yesterday: Workshops Today: Keynote (David Wagner) 15 Research Paper Sessions, 2 Tutorials Reception and Poster Session Wednesday: 20 Research Paper Sessions, 2 Tutorials Panel: The AI-Industrial Complex Banquet and Awards Thursday: 17 Research Paper Sessions, 2 Tutorials Business Meeting Friday: Workshops

Slide 6

Slide 6 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments 165 days ago 75 days to complete review process

Slide 7

Slide 7 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments 6 papers eliminated because of duplicate submissions, ethical issues, or egregious CFP violations

Slide 8

Slide 8 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments Each PC member had 25 days to review 10-12 papers Each paper assigned 2 reviews Papers with both reviewers negative and substantive reasons considered unviable

Slide 9

Slide 9 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 3 reviews 329 papers viable 346 papers viable 17 papers revived by author responses 2 ultimately accepted 322 papers in discussion 4+ reviews 151 2 August: Final Decisions Extensive on-line discussion helped by “Discussion Committee” over 6000 comments Viable papers assigned additional review After R2, reviews released to authors for responses 7-11 July: Author Response Period

Slide 10

Slide 10 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 322 papers in discussion 4+ reviews 151 2 August: Final Decisions 17 papers “revived” by author responses

Slide 11

Slide 11 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 322 papers in discussion 4+ reviews 151 Additional reviews Extensive on-line discussion helped by “Discussion Committee” over 6000 comments

Slide 12

Slide 12 text

0 100 200 300 400 500 600 700 800 CFP Deadline (19 May) Culling Invalid Submissions Round 1 Round 2 After Author Responses Round 3 Accepted Selecting the Research Papers 842 submissions 836 valid submissions 518 papers viable 2 reviews 7-11 July: Author Response Period 3 reviews 329 papers viable 346 papers viable 322 papers in discussion 4+ reviews 151 2 August: Final Decisions 1 1

Slide 13

Slide 13 text

How can I get my paper accepted to CCS?

Slide 14

Slide 14 text

How can I get my paper accepted to CCS? Have brilliant ideas, do outstanding work, get breakthrough results, write superbly, and follow the CFP guidelines.

Slide 15

Slide 15 text

How can I get my paper accepted to CCS? mediocre

Slide 16

Slide 16 text

How many papers should I submit?

Slide 17

Slide 17 text

1 5 25 125 625 1 2 3 4 5 6 7-13 2251 authors submitted 1 paper Number of Authors 340 authors submitted 2 papers 101 authors submitted 3 papers 35 17 5 12

Slide 18

Slide 18 text

8% 10% 12% 14% 16% 18% 20% 22% 24% 26% 1 5 25 125 625 1 2 3 4 5 6 7-13 Number of Authors Acceptance Rate Overall 21.4% accepted 10% accepted Don’t submit too many papers…

Slide 19

Slide 19 text

8% 10% 12% 14% 16% 18% 20% 22% 24% 26% 1 5 25 125 625 1 2 3 4 5 6 7-13 Number of Authors Acceptance Rate 25.7% accepted Don’t submit too many papers…

Slide 20

Slide 20 text

How many co-authors should I have?

Slide 21

Slide 21 text

0 50 100 150 200 1 2 3 4 5 6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% 2.9% Number of Papers Number of Co-Authors Accepted Not Accepted

Slide 22

Slide 22 text

0 50 100 150 200 1 2 3 4 5 6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% 2.9% Number of Papers Number of Co-Authors 34 single-author papers, 1 accepted: Economic Factors of Vulnerability Trade and Exploitation: Empirical evidence from a prominent Russian cybercrime market Luca Allodi (session 2G, Weds 4pm)

Slide 23

Slide 23 text

0 50 100 150 200 1 2 3 4 5 6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% 2.9% Number of Papers Number of Co-Authors Accepted Not Accepted 0 50 100 150 200 250 2 3 4 Number of Countries Represented 15.3% 30.6% 33.3% (2 of 6) >4 (0 of 1)

Slide 24

Slide 24 text

0 50 100 150 200 1 2 3 4 5 6 7 8 9 10 11 12 13 24.8% 17.8% 15.5% 14.5% 15.3% 17.4% 20.8% 26.7% 20.0% 0.0% 0.0% 100% Number of Papers Number of Co-Authors 133 five-author papers, 33 accepted 2.9% 1 thirteen-author paper, 1 accepted: Data breaches, phishing, or malware? Understanding the risks of stolen credentials Kurt Thomas, Frank Li, Ali Zand, Jake Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Dan Margolis, Vern Paxson, Elie Bursztein (session 5F, Wednesday 2:00pm)

Slide 25

Slide 25 text

What should I write about?

Slide 26

Slide 26 text

Number of Papers 0% 5% 10% 15% 20% 25% 30% 0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Author-selected Topic

Slide 27

Slide 27 text

Number of Papers 0% 5% 10% 15% 20% 25% 30% 0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Applied Cryptography (186 submissions, 49 accepted) Software security (162 submissions, 31 accepted)

Slide 28

Slide 28 text

Number of Papers 0% 5% 10% 15% 20% 25% 30% 0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Applied Cryptography (186 submissions, 49 accepted) Software security (162 submissions, 31 accepted) Metrics 7 of 21 papers accepted (33%)

Slide 29

Slide 29 text

Number of Papers 0% 5% 10% 15% 20% 25% 30% 0 20 40 60 80 100 120 140 160 180 Metrics Secure and verifiable … Privacy policies Applied cryptography Protocols Hardware and architecture … Information flow Language-based security User studies Software security Web security and privacy Malware Mobile security and privacy Privacy-preserving systems Authentication and … Machine learning Access control Intrusion detection Forensics Network security Distributed systems security Anonymity Censorship-resistance Cloud security Cyber-physical systems … Applied Cryptography (186 submissions, 49 accepted) Software security (162 submissions, 31 accepted) Cyber-physical systems (including IoT) security 7 of 80 papers accepted (8.75%) Metrics 7 of 21 papers accepted (33%)

Slide 30

Slide 30 text

High-Accept Topic Pairs Number of Papers Accept Rate User studies Applied cryptography 1 100% Mobile security and privacy Metrics 1 100% Mobile security and privacy Forensics 1 100% Privacy policies Metrics 1 100% Malware Forensics 1 100% Metrics Cyber-physical systems (including IoT) 1 100% Web security and privacy User studies 5 80% Protocols Hardware and architecture security 6 67% Protocols Language-based security 3 67% All topic-pairs with > 50% acceptance rate No-Accept Topic Pairs Number of Submissions (None Accepted) Distributed systems security Cloud security 14 Distributed systems security Cyber-physical systems (including IoT) 13 Privacy-preserving systems Network security 13 Software security Cloud security 12 Mobile security and privacy Malware 12 Network security Cloud security 12 Most “popular” topic-pairs with 0% acceptance rate

Slide 31

Slide 31 text

Where should I live?

Slide 32

Slide 32 text

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 0 10 20 30 40 50 60 70 80 Czech Republic Portugal Belgium Spain Denmark Austria France Qatar Netherlands India United States Israel Finland Taiwan Sweden Australia Germany Singapore Luxembourg Switzerland UK Japan South Korea China Italy Canada Country of Author (Affiliation) (16 countries with 0% acceptance rate not shown) USA: 540 submissions (44%), 114 accepts (51%) China: 132 submissions, 12 accepts

Slide 33

Slide 33 text

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 0 10 20 30 40 50 60 70 80 Czech Republic Portugal Belgium Spain Denmark Austria France Qatar Netherlands India United States Israel Finland Taiwan Sweden Australia Germany Singapore Luxembourg Switzerland UK Japan South Korea China Italy Canada Country of Author (Affiliation) (16 countries with 0% acceptance rate not shown) Czech Republic: 2 submissions, 2 accepts: A Touch of Evil: … (5G, Weds 4pm) (…, Petr Svenda, …) ROCA (1H, Thurs 9am) (…, Petr Svenda, …)

Slide 34

Slide 34 text

Guarantee Success for CCS 2018: “Hard” Way Have brilliant ideas, do outstanding work, get breakthrough results, write superbly, and follow the CFP guidelines. CCS 2018: Toronto, Canada

Slide 35

Slide 35 text

Guarantee Success for CCS 2018: “Hard” Way Have brilliant ideas, do outstanding work, get interesting results, write superbly, and follow the CFP guidelines. “Easy” Way Find 13 co-authors (in 4 different countries), submit 4 papers about user studies on metrics for web security and privacy, and move to the Czech Republic.

Slide 36

Slide 36 text

Program Committee Sadia Afroz (UC Berkeley / ICSI) • Gail-Joon Ahn (Arizona State University) • Ehab Al-Shaer (UNC Charlotte) Elias Athanasopoulos (University of Cyprus) • Foteini Baldimtsi (George Mason University) • David Basin (ETH Zurich) • Adam Bates (UIUC) Lujo Bauer (CMU) • Konstantin Beznosov (University of British Columbia) • Karthikeyan Bhargavan (INRIA) Alex Biryukov (University of Luxembourg) • Jeremiah Blocki (Purdue University) • Elette Boyle (IDC Herzliya) Levente Buttyán (CrySyS Lab, BME) • Juan Caballero (IMDEA Software Institute) • Joseph Calandrino (Federal Trade Commission) Aylin Caliskan (Princeton University) • Yinzhi Cao (Lehigh University) • Alvaro A. Cardenas (University of Texas at Dallas) Lorenzo Cavallaro (Royal Holloway, University of London) • Neha Chachra (Facebook) • Melissa Chase (Microsoft Research) Haibo Chen (Shanghai Jiao Tong University) • Hao Chen (UC Davis) • Omar Chowdhury (University of Iowa) • Nicolas Christin (CMU) Véronique Cortier (Loria (CNRS, France) • Manuel Costa (Microsoft Research) • Scott Coull (FireEye) • Weidong Cui (Microsoft Research) Anupam Das (CMU) • Anupam Datta (CMU) • Lucas Davi (University of Duisburg-Essen) • Emiliano De Cristofaro (University College London) Tamara Denning (University of Utah) • Xuhua Ding (Singapore Management University) • Brendan Dolan-Gavitt (New York University) Adam Doupé (Arizona State University) • Tudor Dumitraş (University of Maryland) • Serge Egelman (UC Berkeley / ICSI) Ittay Eyal (Cornell University) • Sascha Fahl (Saarland University) • Christopher Fletcher (NVIDIA/UIUC) • Aurélien Francillon (EURECOM) Matt Fredrikson (CMU) • Xinyang Ge (Microsoft Research) • Daniel Genkin (University of Pennsylvania / University of Maryland) Rosario Gennaro (City College of New York) • Phillipa Gill (UMass) • Dov Gordon (George Mason University) Andreas Haeberlen (University of Pennsylvania) • J. Alex Halderman (University of Michigan) • Shai Halevi (IBM Research) Matthew Hicks (MIT Lincoln Laboratory) • Michael Hicks (University of Maryland) • Thorsten Holz (Ruhr-Universität Bochum) Amir Houmansadr (UMass) • Yan Huang (Indiana University) • Kyu Hyung Lee (University of Georgia) • Trent Jaeger (Penn State University) Suman Jana (Columbia University) • Limin Jia (CMU) • Yier Jin (University of Central Florida) • Aaron Johnson (US Naval Research Lab) Brent ByungHoon Kang (KAIST) • Aniket Kate (Purdue University) • Jonathan Katz (University of Maryland) Stefan Katzenbeisser (TU Darmstadt) • Marcel Keller (University of Bristol) • Aggelos Kiayias (University of Edinburgh) Taesoo Kim (Georgia Tech) • Yongdae Kim (KAIST) • Engin Kirda (Northeastern University) • David Kotz (Dartmouth) Farinaz Koushanfar (UC San Diego) • Ralf Küsters (University of Stuttgart) • Andrea Lanzi (University of Milan) Byoungyoung Lee (Purdue University) • Wenke Lee (Georgia Tech) • Brian N. Levine (UMass) • Zhichun Li (NEC Labs) • Zhou Li (RSA) David Lie (University of Toronto) • Yao Liu (University of South Florida) • Matteo Maffei (TU Vienna) Mohammad Mahmoody (University of Virginia) • Z. Morley Mao (University of Michigan) • Ivan Martinovic (University of Oxford) Michelle L. Mazurek (University of Maryland) • Jonathan McCune (Google) • Andrew Miller (UIUC) • Tal Moran (IDC Herzliya) Muhammad Naveed (University of Southern California) • Nick Nikiforakis (Stony Brook University) • Hamed Okhravi (MIT Lincoln Laboratory) Alina Oprea (Northeastern University) • Mathias Payer (Purdue University) • Adrian Perrig (ETH Zurich)