ACM logo

ACM CCS 2025

October 13-17, 2025

Taipei, Taiwan

Keynote Talks

Keynote Talk #1

Autonomous Vulnerability Analysis, Triaging, and Repair: A Historical Perspective

9:30--10:30, Oct. 14, 2025.

Prof. Giovanni Vigna

Prof. Giovanni Vigna

Abstract

The software components that support critical infrastructure are riddled with vulnerabilities, whose exploitation could cause service disruption, financial damage, and possibly loss of life.

Although there are efforts, such as OSS-Fuzz, to continuously analyze these components for vulnerabilities, some categories of security bugs are still hard to detect. In addition, the creation of testing harnesses and the generation of effective patches still require substantial effort from human experts.

To address these issues, researchers and practitioners alike have focused on automating the vulnerability analysis and repair process. In particular, DARPA has supported these research efforts with two challenges: the DARPA Cyber Grand Challenge (CGC) in 2016 and the AI Cyber Challenge (AIxCC) in 2025. In these two challenges, participants had to create Cyber Reasoning Systems (CRS) that, in different contexts, had to identify vulnerabilities, exploit them, and provide patches without any human involvement.

In this talk, we take a historical look at these efforts that span a decade, especially in light of the recent advances in Large Language Models (LLMs), and highlight the lessons learned from participating in these competitions, as well as the challenges that still need to be addressed to achieve a completely autonomous vulnerability analysis, triaging, and repair process.

Vulnerability analysis
Software patching

Keynote Talk #2

Mechanizing Privacy by Design

9:30--10:30, Oct. 15, 2025.

Prof. David Basin

Prof. David Basin

Abstract

Privacy by design requires integrating data protection into systems from the outset, during their design, rather than building it in later. Related legislation does not specify how to achieve this and main-stream languages and frameworks lack support for privacy by design. To address this long-standing problem, we have developed different, effective technical solutions. First, we have developed powerful logic-based tools that enforce formal data protection policies at runtime by controlling relevant system actions. Second, we have proposed methods and tools for integrating privacy models into system design models, enabling model-driven privacy enforcement. We report on our methods, tools, and practical experiences using them.

Data protection
Runtime enforcement
Model-driven development