- Sponsor:
- sigsac
It is a pleasure to present to you the proceedings of this year's ACM Conference on Computer and Communications Security (CCS 2011), held October 17-21 in Chicago, Illnois, USA.
This year we received a record 429 submissions from 39 countries. Each submission was reviewed by the technical program committee of 53 experts, as well as over 280 external reviewers. The final program contains 60 full papers, representing the acceptance rate of 14%.
The single-blind review process was organised in two rounds spanning 10 weeks. It included an opportunity for the authors to respond to reviews after the first round. Author response was followed by an electronic discussion among the PC members. Many reviews were assigned to PC members dynamically to maximise scrutiny and discussion of the submissions whose inclusion in the program was most uncertain. Overall, 1366 reviews were filed, including 430 from external reviewers. Despite the unexpected increase in submissions relative to CCS 2010, 327 papers received at least 3 reviews and 158 papers received at least 4 reviews, with some receiving as many as 5 or 6 reviews. The decision to allocate fewer than 3 reviews to some papers was taken on the basis of both the qualitative feedback from the first-round reviewers and a systematic quantitative analysis of the likelihood of their acceptance given the first-round reviews.
Many papers that could not be selected for presentation contained interesting results and ideas. We hope that the reviews will help improve these papers for future re-submissions. We also worked closely with the program chairs of CCS-affiliated workshops to ensure that the authors of rejected papers had an opportunity to submit their work to those venues.
Cited By
-
Bostik O and Klecka J (2018). Recognition of CAPTCHA Characters by Supervised Machine Learning Algorithms, IFAC-PapersOnLine, 10.1016/j.ifacol.2018.07.155, 51:6, (208-213),
- Preface The Continuing Arms Race, (xi-xiii)
- Payer M How memory safety violations enable exploitation of programs The Continuing Arms Race, (1-23)
- Tan G and Niu B Protecting dynamic code The Continuing Arms Race, (25-60)
- Crane S, Homescu A, Larsen P, Okhravi H and Franz M Diversity and information leaks The Continuing Arms Race, (61-79)
- Kuznetzov V, Szekeres L, Payer M, Candea G, Sekar R and Song D Code-pointer integrity The Continuing Arms Race, (81-116)
- Göktas E, Athanasopoulos E, Bos H and Portokalidis G Evaluating control-flow restricting defenses The Continuing Arms Race, (117-137)
- Schuster F and Holz T Attacking dynamic code The Continuing Arms Race, (139-180)
- Jin Y, Sullivan D, Arias O, Sadeghi A and Davi L Hardware control flow integrity The Continuing Arms Race, (181-210)
- Coppens B, De Sutter B and Volckaert S Multi-variant execution environments The Continuing Arms Race, (211-258)
-
Gu Q and Guirguis M (2014). Secure Mobile Cloud Computing and Security Issues High Performance Cloud Auditing and Applications, 10.1007/978-1-4614-3296-8_3, (65-90),
-
Luo W, Xu L, Zhan Z, Zheng Q and Xu S (2014). Federated Cloud Security Architecture for Secure and Agile Clouds High Performance Cloud Auditing and Applications, 10.1007/978-1-4614-3296-8_7, (169-188),