Program at a glance

ACM CCS 2021, November 15-19

Pre-Conference Workshops
(Monday, November 15, 2021)

Please note the timezone differences:
Nov 15, 7AM (KST) Nov 14, 5PM (EST) Nov 14, 11PM (CET)
  • Individualized Cybersecurity Research Mentoring Workshop (iMentor) (website).
  • 20th Workshop on Privacy in the Electronic Society (WPES) (website)
  • 2021 Cloud Computing Security Workshop (CCSW) (website)
  • 2nd Workshop on CPS&IoT Security and Privacy (CPSIoTSec) (website)
  • 9th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC) (website)
  • Artificial Intelligence and Security (AISec) (website)
  • 8th ACM Workshop on Moving Target Defense (MTD) (website)

Main Conference
(November 16~18, 2021)

Click to show the timezone:
KST EST CET

KST
(Tue,
Nov 16)
EST
(Mon,
Nov 15)
CET
(Tue,
Nov 16)
Day 1 of Main Conference
8:00AM 6:00PM 12:00AM Opening Remarks (PC Chairs and General Chairs Presentation)
8:15AM 6:15PM 12:15AM Keynote (Cynthia Dwork)
9:00AM 7:00PM 1:00AM Keynote Q&A
9:15AM 7:15PM 1:15AM Break
      Track A Track B Track C Track D
9:20AM-10:00AM 7:20PM-8:00PM 1:20AM-2:00AM Web Security 1:
Cybercrime
Machine Learning and Security 1:
Attacks on Robustness
Applied Crypto 1:
Zero Knowledge I
Usability and Measurement 1:
Authentication and Click Fraud
10:00AM-10:40AM 8:00PM-8:40PM 2:00AM-2:40AM Software Security 1:
Fuzzing and Bug Finding
Formal Methods and PL 1:
Formal Analysis and Verification
Machine Learning and Security 2:
Defenses for ML Robustness
Applied Crypto 2:
Secure Multiparty Computation
10:40AM-11:20AM 8:40PM-9:20PM 2:40AM-3:20AM Break and CCS Town Hall LGBTQ+ and Allies Social Hour
11:20AM-12:00PM 9:20PM-10:00PM 3:20AM-4:00AM Hardware, Side Channels, and CPS 1:
Side Channels
Software Security 2:
Operating Systems
Privacy and Anonymity 1:
Inference Attacks
Network Security 1:
DoS
12:00PM-12:40PM 10:00PM-10:40PM 4:00AM-4:40AM Blockchain and Distributed Systems 1:
Modeling Blockchains and Distributed Ledgers
Network Security 2:
Wireless, Mobile, and IoT
Applied Crypto 3:
Private Set Intersection
Privacy and Anonymity 2:
Differential Privacy

KST (Wed, Nov 17) EST (Tue, Nov 16) CET (Wed, Nov 17) Day 2 of Main Conference
8:00AM 6:00PM 12:00AM Opening Remarks (Best Paper Awards)
8:15AM 6:15PM 12:15AM Keynote (Dawn Song)
9:00AM 7:00PM 1:00AM Keynote Q&A
9:15AM 7:15PM 1:15AM Break
      Track A Track B Track C Track D
9:20AM-10:00AM 7:20PM-8:00PM 1:20AM-2:00AM Hardware, Side Channels, and CPS 2:
Control System Security
Network Security 3:
PKI and Access Control
Applied Crypto 4:
Messaging and Privacy
Software Security 3:
Misc: Android and Vulnerabilities
10:00AM-10:40AM 8:00PM-8:40PM 2:00AM-2:40AM Blockchain and Distributed Systems 2:
Consensus and Attacks
Web Security 2:
Web Vulnerabilities
Hardware, Side Channels, and CPS 3:
Audio Systems and Autonomous Driving
Applied Crypto 5:
Authentication and Privacy
10:40AM-11:20AM 8:40PM-9:20PM 2:40AM-3:20AM Machine Learning and Security 3:
Privacy Attacks and Defenses for ML
Software Security 4:
Fuzzing
Applied Crypto 6:
Database and Privacy
Privacy and Anonymity 3:
Privacy for Distributed Data and Federated Learning
11:20AM-12:00PM 9:20PM-10:00PM 3:20AM-4:00AM Poster and Demo Session 1
12:00PM-12:40PM 10:00PM-10:40PM 4:00AM-4:40AM Poster and Demo Session 2

KST (Thur, Nov 18) EST (Wed, Nov 17) CET (Thur, Nov 18) Day 3 of Main Conference
8:00AM 6:00PM 12:00AM Opening Remarks (CCS'21 Welcome Event & CCS'22 Venue Announcement)
8:15AM 6:15PM 12:15AM Keynote (Taesoo Kim)
9:00AM 7:00PM 1:00AM Keynote Q&A
9:15AM 7:15PM 1:15AM Break
      Track A Track B Track C Track D
9:20AM-10:00AM 7:20PM-8:00PM 1:20AM-2:00AM Software Security 5:
Crypto, Symbols and Obfuscation
Formal Methods and PL 2:
Crypto and Protocol Security
Applied Crypto 7:
Foundations
Privacy and Anonymity 4:
Applied Privacy
10:00AM-10:40AM 8:00PM-8:40PM 2:00AM-2:40AM Hardware, Side Channels, and CPS 4:
Attestation and Firmware Security
Applied Crypto 8:
Zero Knowledge II
Usability and Measurement 2:
Software Development and Analysis
Machine Learning and Security 4:
Data Poisoning and Backdoor Attacks in ML
10:40AM-11:20AM 8:40PM-9:20PM 2:40AM-3:20AM Break
11:20AM-12:00PM 9:20PM-10:00PM 3:20AM-4:00AM Machine Learning and Security 5:
Applications and Privacy of ML
Software Security 6:
Analyzing Crashes and Incidents
Network Security 4:
Traffic Analysis and Side Channels
Blockchain and Distributed Systems 3:
Decentralized Cryptographic Protocols
12:00PM-1:00PM 10:00PM-11:00PM 4:00AM-5:00AM SIGSAC Award Ceremony and Business Meeting

Post-Conference Workshops
(Friday, November 19, 2021)

Please note the timezone differences:
Nov 19, 7AM (KST) Nov 18, 5PM (EST) Nov 18, 11PM (CET)
  • Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks (Checkmate) (website)
  • Privacy Preserving Machine Learning (PPML) (website)
  • Decentralized Finance and Security (DeFi) (website)
  • Additive Manufacturing (3D Printing) Security (AMSec) (website)
  • 3rd Workshop on Cyber-Security Arms Race (CYSARM) (website)
  • Attacks and Solutions in Hardware Security (ASHES) (website)