Conference Information
CCS 2026: ACM Conference on Computer and Communications Security
Please Login to view website of conference

Submission Date:
2026-04-22
Notification Date:
2026-07-17
Conference Date:
2026-11-15
Location:
The Hague, The Netherlands
Years:
33
CCF: a   CORE: a*   QUALIS: a1   Viewed: 294123   Tracked: 337   Attend: 35

Call For Papers
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

CCS has two review cycles in 2026. For each submission, one of the following decisions will be made:

Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd.
Minor revision: Papers in this category are considered to be promising but need some minor additional work (e.g., minor experiments, proofs to minor lemmas). Authors will be given the opportunity to revise such papers for inclusion in the same cycle, in which case they should clearly explain in a separate note how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected.
Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle.

Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference.

Conference Tracks

Like last year, the ACM CCS Conference features a multi-track format. Each track operates as a separate mini-conference, with its own Track Chairs and Track Program Committee. The overall process is managed by the Program Chairs (Véronique Cortier and Zhiqiang Lin). At the time of submission, authors must select one track, which should be the most relevant to the topic of the paper. We understand that some papers might span multiple topics. In specific cases, PC members might be asked to provide reviews for papers outside their track, in an effort to provide the best possible reviews to the authors. The chairs may decide to move a paper to another track.
Program Co-Chairs ccs26-pc-chairs@acm.org

Véronique Cortier (CNRS, Loria)
Zhiqiang Lin (The Ohio State University, USA)

Track Chairs

Software Security ccs26-software-track@acm.org
Zhiyun Qian (University of California, Riverside, USA)
Vasileios P. Kemerlis (Brown University, USA)
Web Security ccs26-web-track@acm.org
Limin Jia (CMU, USA)
Network Security ccs26-netsec-track@acm.org
Christian Rossow (CISPA, Germany)
Security Usability and Measurement ccs26-usablesec-track@acm.org
Mainack Mondal (IIT Kharagpur, India)
Michelle Mazurek (University of Maryland, USA)
Security and Privacy of Machine Learning ccs26-mlsec-track@acm.org
Shiqing Ma (UMass Amherst, USA)
Lea Schönherr (CISPA, Germany)
Fabio Pierazzi (University College London, UK)
Formal Methods and Programming Languages ccs26-formal-track@acm.org
Toby Murray (University of Melbourne, Australia)
Hardware, Side Channels, and Cyber Physical Systems ccs26-hardware-track@acm.org
Christopher Fletcher (University of California, Berkeley, USA)
Alvaro Cardenas (University of California, Santa Cruz, USA)
Applied Cryptography ccs26-crypto-track@acm.org
Dominique Schroeder (TU Wien, Austria)
Foteini Baldimtsi (George Mason University, USA)
Blockchain and Distributed Systems ccs26-distributed-track@acm.org
Kartik Nayak (Duke University, USA)
Privacy and Anonymity ccs26-privacy-track@acm.org
Thorsten Strufe (Karlsruhe Institute of Technology, Germany)
Last updated by Dou Sun in 2025-12-18
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
202187919622.3%
202071512116.9%
201993414916%
201880913416.6%
201784315117.9%
201683113716.5%
201566012819.4%
201458511419.5%
201353010519.8%
20124238018.9%
20114296014%
20103205517.2%
20093155818.4%
20082805118.2%
20073025518.2%
20062563814.8%
20052493815.3%
20042513513.9%
20031282116.4%
20021532717.6%
20011532717.6%
20001312821.4%
1999831619.3%
1998851720%
1997641726.6%
1996591932.2%
1994703144.3%
1993602745%
Best Papers
YearBest Papers
2021On the Rényi Differential Privacy of the Shuffle Model
2021XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers
2021One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
2021On the Rényi Differential Privacy of the Shuffle Model
2021On the (In)Security of ElGamal in OpenPGP
2021V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing
2021XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers
2021One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
2021On the Rényi Differential Privacy of the Shuffle Model
2021On the (In)Security of ElGamal in OpenPGP
2021V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing
2021XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers
2021One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization
2021On the (In)Security of ElGamal in OpenPGP
2021V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing
2020DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels
2019Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis
2019A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
2018LEMNA: Explaining Deep Learning based Security Applications
2018Detecting Violations of Differential Privacy
2017Scaling ORAM for Secure Computation
2017Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
2017DolphinAttack: Inaudible Voice Commands
2017Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
2017A Formal Foundation for Secure Remote Execution of Enclaves
2016PhishEye: Live Monitoring of Sandboxed Phishing Kits
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
aa*a1CCSACM Conference on Computer and Communications Security2026-04-222026-07-172026-11-15
cab1ICCCNInternational Conference on Computer Communications and Networks2026-03-072026-04-242026-07-27
cba2ISCCIEEE symposium on Computers and Communications2026-02-012026-03-202026-06-23
cbb1AsiaCCSACM ASIA Conference on Computer and Communications Security2025-12-122026-03-102026-06-01
b1CCNCIEEE Consumer Communications and Networking Conference2025-08-012025-09-302026-01-09
aa*a1INFOCOMInternational Conference on Computer Communications2025-07-242025-12-082026-05-18
b4GreenComInternational Conference on Green Computing and Communications2025-06-152025-06-302025-10-30
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
cICIS'''International Conference on Computer and Information Science2020-08-102020-08-272020-11-18
cb2ISCISInternational Symposium on Computer and Information Sciences2015-03-302015-05-212015-09-21