skip to main content
10.1145/2382196acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'12: the ACM Conference on Computer and Communications Security Raleigh North Carolina USA October 16 - 18, 2012
ISBN:
978-1-4503-1651-4
Published:
16 October 2012
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is a pleasure to present to you the proceedings of this year's ACM Conference on Computer and Communications Security (CCS 2012), held October 16-18 in Raleigh, NC, USA.

This year we received 423 submissions from 41 countries. Each submission was reviewed by a technical program committee of 61 experts as well as over 293 external reviewers. The final program contains 81 full papers, a record number for any computer security conference so far, representing an acceptance rate of 19%.

The double-blind review process was organised in two rounds; it included an opportunity for authors to respond to reviews between rounds; and was followed by a discussion amongst the PC - a process that spanned overall 10 weeks. Reviews were assigned between phases dynamically to maximise scrutiny and discussion around submissions whose inclusion in the program was most uncertain. Overall 1395 reviews were filled, including 489 from external reviewers. Overall 365 papers received at least 3 reviews and 149 papers received at least 4 reviews - some 5 or 6. The decision to allocate fewer than 3 reviews to some papers was taken on the basis of both qualitative feedback, as well as a systematic quantitative analysis of the likelihood of them being included in the program given the first round reviews.

Many papers that were not selected for presentation contained interesting results and ideas, and we hope that the authors have benefitted from reviews to improve them further and eventually present them. We have also worked closely with the Program Chairs of workshops associated with CCS to ensure that authors have an opportunity to submit their work in those venues.

Cited By

  1. ACM
    Fischlin M and Günther F Verifiable Verification in Cryptographic Protocols Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (3239-3253)
  2. Luo L, Dong X, Shen J, Cao Z, Zhang T and Yang T (2023). A lightweight delegated private set intersection in the internet setting for the cloud computing environments Third International Conference on Computer Vision and Data Mining (ICCVDM 2022), 10.1117/12.2661220, 9781510661363, (151)
  3. Zhang T, Gong B and Yan Y (2022). Design and implementation of Android VPN client based on GMSSL International Conference on Computer, Artificial Intelligence, and Control Engineering (CAICE 2022), 10.1117/12.2640914, 9781510655942, (22)
  4. ACM
    Davidson A, Snyder P, Quirk E, Genereux J, Livshits B and Haddadi H STAR Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (697-710)
  5. Coppens B, De Sutter B and Volckaert S Multi-variant execution environments The Continuing Arms Race, (211-258)
  6. Jin Y, Sullivan D, Arias O, Sadeghi A and Davi L Hardware control flow integrity The Continuing Arms Race, (181-210)
  7. Schuster F and Holz T Attacking dynamic code The Continuing Arms Race, (139-180)
  8. Göktas E, Athanasopoulos E, Bos H and Portokalidis G Evaluating control-flow restricting defenses The Continuing Arms Race, (117-137)
  9. Kuznetzov V, Szekeres L, Payer M, Candea G, Sekar R and Song D Code-pointer integrity The Continuing Arms Race, (81-116)
  10. Crane S, Homescu A, Larsen P, Okhravi H and Franz M Diversity and information leaks The Continuing Arms Race, (61-79)
  11. Tan G and Niu B Protecting dynamic code The Continuing Arms Race, (25-60)
  12. Payer M How memory safety violations enable exploitation of programs The Continuing Arms Race, (1-23)
  13. Preface The Continuing Arms Race, (xi-xiii)
  14. Fung I, Fu K, Ying Y, Schaible B, Hao Y, Chan C and Tse Z (2013). Chinese social media reaction to the MERS-CoV and avian influenza A(H7N9) outbreaks, Infectious Diseases of Poverty, 10.1186/2049-9957-2-31, 2:1, Online publication date: 1-Dec-2013.
Contributors
  • NC State University
  • University College London
  • Carnegie Mellon University
  1. Proceedings of the 2012 ACM conference on Computer and communications security

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate1,261of6,999submissions,18%
    YearSubmittedAcceptedRate
    CCS '1993414916%
    CCS '1880913417%
    CCS '1783615118%
    CCS '1683113716%
    CCS '1566012819%
    CCS '1458511419%
    CCS '1353010520%
    CCS '114296014%
    CCS '103255517%
    CCS '082805118%
    CCS '073025518%
    CCS '011532718%
    CCS '001322821%
    CCS '97641727%
    CCS '96591932%
    CCS '94703144%
    Overall6,9991,26118%