ACM logo

ACM CCS 2025

October 13-17, 2025

Taipei, Taiwan

Call for Posters & Demos

CCS will include poster/demonstration sessions in order to provide a forum to present and discuss works in progress, industry demonstrations of new applications or techniques, research demonstrations and test beds, upcoming research challenges, future directions, and novel approaches in the field of computer and communications security. One of the key goals of this conference is to foster collaboration between industry and academia. Participation of researchers and developers from industry and posters/demonstrations reporting on joint work between industry and academia are therefore especially encouraged. Poster sessions will be held in presence.

Submission Guidelines

Posters are solicited that present unpublished in-progress or late-breaking research or extensions of published work on security-and privacy-related topics. Authors are asked to submit a short proposal that describes the main contributions of the poster or demonstration. Proposals should contain a brief abstract, place an emphasis on the motivation for the work, and summarize contributions being presented. Preliminary results may also be included. Submitted proposals must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. The list of authors cannot be changed after submission or acceptance. Presentation proposals will be evaluated primarily on their potential to stimulate interesting discussions, facilitate the exchange of ideas, and promote collaborations.

Authors of accepted poster proposals will be provided instructions for preparing the posters. Poster sessions will be held in presence. At least one author of each accepted poster will be required to attend the conference. Questions shall be directed via email to the Poster/Demo Chair.

Proposals should adhere to the ACM double-column format with 3-page maximum (i.e., including title, abstract, content, and any references). Proposals are not blinded, and must contain the authors’ names, affiliations, and contact information. Submissions that are not formatted as described above are subject to rejection without review. All submissions must designate a single corresponding author. In order to be included in the conference, at least one presenter per accepted poster/demo must register for the conference. The accepted posters/demos will be published in the proceedings. The poster/demo submission system is available at: https://ccs2025posters.hotcrp.com/

Important Dates

  • Submission deadline: July 11, 2025, 23:59:59 (AoE, or UTC -12)
  • Author notification: August 4, 2025, 23:59:59 (AoE, or UTC -12)
  • Camera-ready deadline: August 11, 2025, 23:59:59 (AoE, or UTC -12)

Program Committee Chairs

Email: ccs25-poster-chairs@acm.org

  • Xiaoyan (Sherry) Sun - Worcester Polytechnic Institute
  • Hsu-Chun Hsiao - National Taiwan University
  • Muoi Tran - Chalmers University of Technology

Program Committee

  • Adrià Torralba-Agell, Universitat Oberta de Catalunya (Open University of Catalonia)
  • Andrei-Alexandru Ionescu, Chalmers University of Technology and Gothenburg University
  • Dinh Duy Kha, Sungkyunkwan University
  • Hengkai Ye, Pennsylvania State University
  • Hoang Nguyen, ETH Zurich
  • Hocheol Nam, KAIST
  • Ismat Jarin, University of California, Irvine
  • Jan Pennekamp, RWTH Aachen University
  • Jinseo Lee, KAIST
  • Jun Shao, Zhejiang Gongshang University
  • Jun Yan, Concordia University
  • Mengwei Yang, University of California, Irvine
  • Peizhuo Lv, Nanyang Technological University
  • ping chen, Fudan University
  • Ping-Lun Wang, Carnegie Mellon University
  • Quoc Do Le, Huawei Munich Research Center
  • Romaric Duvignau, Chalmers University of Technology
  • Samuele Casarin, Ca' Foscari University
  • Satadal Sengupta, Princeton University
  • Shou-Ching Hsiao, National Taiwan University
  • Shuangpeng Bai, Pennsylvania State University
  • Tran Duc Le, University of Wisconsin-Stout
  • Van-Linh Nguyen, National Chung Cheng University
  • Waleed Al-Gobi, KFUPM
  • Ya-Nan Li, University of Sydney
  • Ye Dong, National University of Singapore
  • Yingzi Gao, Shandong University
  • Yujin Huang, The University of Melbourne
  • Zhenliang Lu, Nanyang Technological University
  • Zheyuan He, KTH Royal Institute of Technology
  • Anselme Tueno, SAP Security Research
  • Duohe Ma, Institute of Information Engineering Chinese Academy of Sciences
  • Jiaqi Huang, University of Central Missouri
  • Juan Wang, Wuhan University
  • Junwei Zhou, Wuhan University of Technology
  • Lan Zhang, Northern Arizona University
  • Lingyun Situ, Nanjing University
  • Nima Karimian, West Virginia University
  • Ruisheng Shi, Beijing University of Posts and Telecommunications
  • Sara Tehranipoor, West Virginia University
  • Sean Choi, Santa Clara University
  • Wenhui Zhang, Bytedance
  • Yili Jiang, Georgia State University
  • Yinxin Wan, UMass Boston
  • Changlai Du, Georgia Tech Shenzhen Institute (GTSI), Tianjin University
  • Enrico Bacis, Google
  • Hafiz Asif, Rutgers University
  • Héber H. Arcolezi, Inria Grenoble
  • Marco Rosa, SAP Security Research
  • Onur Duman, Glasgow Caledonian University
  • Roberto Gonzalez, NEC Labs Europe