Conference Information
CCS 2026: ACM Conference on Computer and Communications Security
https://www.sigsac.org/ccs/CCS2026/Submission Date: |
2026-04-22 |
Notification Date: |
2026-07-17 |
Conference Date: |
2026-11-15 |
Location: |
The Hague, The Netherlands |
Years: |
33 |
CCF: a CORE: a* QUALIS: a1 Viewed: 241074 Tracked: 335 Attend: 35
Call For Papers
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.
CCS has two review cycles in 2026. For each submission, one of the following decisions will be made:
Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd.
Minor revision: Papers in this category are considered to be promising but need some minor additional work (e.g., minor experiments, proofs to minor lemmas). Authors will be given the opportunity to revise such papers for inclusion in the same cycle, in which case they should clearly explain in a separate note how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected.
Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle.
Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference.
Conference Tracks
Like last year, the ACM CCS Conference features a multi-track format. Each track operates as a separate mini-conference, with its own Track Chairs and Track Program Committee. The overall process is managed by the Program Chairs (Véronique Cortier and Zhiqiang Lin). At the time of submission, authors must select one track, which should be the most relevant to the topic of the paper. We understand that some papers might span multiple topics. In specific cases, PC members might be asked to provide reviews for papers outside their track, in an effort to provide the best possible reviews to the authors. The chairs may decide to move a paper to another track.
Program Co-Chairs ccs26-pc-chairs@acm.org
Véronique Cortier (CNRS, Loria)
Zhiqiang Lin (The Ohio State University, USA)
Track Chairs
Software Security ccs26-software-track@acm.org
Zhiyun Qian (University of California, Riverside, USA)
Vasileios P. Kemerlis (Brown University, USA)
Web Security ccs26-web-track@acm.org
Limin Jia (CMU, USA)
Network Security ccs26-netsec-track@acm.org
Christian Rossow (CISPA, Germany)
Security Usability and Measurement ccs26-usablesec-track@acm.org
Mainack Mondal (IIT Kharagpur, India)
Michelle Mazurek (University of Maryland, USA)
Security and Privacy of Machine Learning ccs26-mlsec-track@acm.org
Shiqing Ma (UMass Amherst, USA)
Lea Schönherr (CISPA, Germany)
Fabio Pierazzi (University College London, UK)
Formal Methods and Programming Languages ccs26-formal-track@acm.org
Toby Murray (University of Melbourne, Australia)
Hardware, Side Channels, and Cyber Physical Systems ccs26-hardware-track@acm.org
Christopher Fletcher (University of California, Berkeley, USA)
Alvaro Cardenas (University of California, Santa Cruz, USA)
Applied Cryptography ccs26-crypto-track@acm.org
Dominique Schroeder (TU Wien, Austria)
Foteini Baldimtsi (George Mason University, USA)
Blockchain and Distributed Systems ccs26-distributed-track@acm.org
Kartik Nayak (Duke University, USA)
Privacy and Anonymity ccs26-privacy-track@acm.org
Thorsten Strufe (Karlsruhe Institute of Technology, Germany)
Last updated by Dou Sun in 2025-12-18
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2021 | 879 | 196 | 22.3% |
| 2020 | 715 | 121 | 16.9% |
| 2019 | 934 | 149 | 16% |
| 2018 | 809 | 134 | 16.6% |
| 2017 | 843 | 151 | 17.9% |
| 2016 | 831 | 137 | 16.5% |
| 2015 | 660 | 128 | 19.4% |
| 2014 | 585 | 114 | 19.5% |
| 2013 | 530 | 105 | 19.8% |
| 2012 | 423 | 80 | 18.9% |
| 2011 | 429 | 60 | 14% |
| 2010 | 320 | 55 | 17.2% |
| 2009 | 315 | 58 | 18.4% |
| 2008 | 280 | 51 | 18.2% |
| 2007 | 302 | 55 | 18.2% |
| 2006 | 256 | 38 | 14.8% |
| 2005 | 249 | 38 | 15.3% |
| 2004 | 251 | 35 | 13.9% |
| 2003 | 128 | 21 | 16.4% |
| 2002 | 153 | 27 | 17.6% |
| 2001 | 153 | 27 | 17.6% |
| 2000 | 131 | 28 | 21.4% |
| 1999 | 83 | 16 | 19.3% |
| 1998 | 85 | 17 | 20% |
| 1997 | 64 | 17 | 26.6% |
| 1996 | 59 | 19 | 32.2% |
| 1994 | 70 | 31 | 44.3% |
| 1993 | 60 | 27 | 45% |
Best Papers
| Year | Best Papers |
|---|---|
| 2016 | PhishEye: Live Monitoring of Sandboxed Phishing Kits |
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| ISCIS | International Symposium on Computer and Information Sciences | 2015-09-21 |
| ICIS''' | International Conference on Computer and Information Science | 2020-11-18 |
| GreenCom | International Conference on Green Computing and Communications | 2025-10-30 |
| CCNC | IEEE Consumer Communications and Networking Conference | 2026-01-09 |
| ICICS | International Conference on Information and Communications Security | 2025-10-29 |
| ICCCN | International Conference on Computer Communications and Networks | 2026-07-27 |
| ISCC | IEEE symposium on Computers and Communications | 2026-06-23 |
| INFOCOM | International Conference on Computer Communications | 2026-05-18 |
| AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2026-06-01 |
| CCS | ACM Conference on Computer and Communications Security | 2026-11-15 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| c | Computer Communications | 4.5 | Elsevier | 0140-3664 |
| Computer Communication Review | ACM | 0146-4833 | ||
| International Journal of Computers Communications & Control | 2.000 | Agora University | 1841-9836 | |
| IEEE Open Journal of the Communications Society | 6.1 | IEEE | 2644-125X | |
| Composites Communications | 6.500 | Elsevier | 2452-2139 | |
| Computer Physics Communications | 3.4 | Elsevier | 0010-4655 | |
| b | Computers & Security | 4.800 | Elsevier | 0167-4048 |
| International Journal of Computer Networks & Communications | AIRCC | 0975-2293 | ||
| Journal of Computer Networks and Communications | 2.000 | Hindawi | 2090-7141 | |
| b | Journal of Computer Security | IOS Press | 0926-227X |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Computer Communications | 4.5 | Elsevier |
| Computer Communication Review | ACM | |
| International Journal of Computers Communications & Control | 2.000 | Agora University |
| IEEE Open Journal of the Communications Society | 6.1 | IEEE |
| Composites Communications | 6.500 | Elsevier |
| Computer Physics Communications | 3.4 | Elsevier |
| Computers & Security | 4.800 | Elsevier |
| International Journal of Computer Networks & Communications | AIRCC | |
| Journal of Computer Networks and Communications | 2.000 | Hindawi |
| Journal of Computer Security | IOS Press |