Program at a Glance
| Day 1 (Monday, June 1 2026) | ||||||
| Indian Affairs + Poolside | ||||||
| 18:00-21:00 | Registration | |||||
| 18:30-23:00 | Welcome Reception | |||||
| Day 2 (Tuesday, June 2 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Sigma-1 | Sigma-3 | Indian Affairs | ||
| 08:00-17:30 | Registration | |||||
| 09:00-10:00 | WDC-1 | CPSS-1 | SPAIC-1 | LM-SHIELD-1 | BSCI-1 | |
| 10:00-10:15 | Tea Break | |||||
| 10:15-11:15 | WDC-2 | CPSS-2 | SPAIC-2 | LM-SHIELD-2 | BSCI-2 | |
| 11:15-11:30 | Tea Break | |||||
| 11:30-12:30 | WDC-3 | CPSS-3 | SPAIC-3 | LM-SHIELD-3 | BSCI-3 | |
| 12:30-14:00 | Lunch | |||||
| 14:00-15:00 | WDC-3 | CPSS-3 | FL-1 | AMASS-1 | APKC-1 | |
| 15:00-15:15 | Tea Break | |||||
| 15:15-16:15 | WDC-5 | CPSS-5 | FL-2 | AMASS-2 | APKC-2 | |
| 16:15-16:30 | Tea Break | |||||
| 16:30-17:30 | WDC-6 | CPSS-6 | FL-3 | AMASS-3 | APKC-3 | |
| Esquire/Executive conference room | ||||||
| 18:00-21:00 | AsiaCCS (steering committee) meeting (possibly online) | |||||
| Day 3 (Wednesday, June 3 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Indian Affairs | ||||
| 08:00-17:30 | Registration | |||||
| 09:00-09:30 | Opening Remarks | |||||
| 9:30-10:30 | Plenary Talk-1 (Grand Ballroom – 1 + 2) | |||||
| 10:30-10:45 | Tea Break | |||||
| 10:45-11:30 |
Session-1a: Outsourced Computation – I |
Session-1b: Security – I | Session-1c: Cyber Physical Systems Security – I | |||
| 11:30-11:45 | Tea Break | |||||
| 11:45-12:30 | Session-2a: Outsourced Computation – II | Session-2b: Program Analysis | Session-2c: Cyber Physical Systems Security – II | |||
| 12:30-14:00 | Lunch | |||||
| 14:00-15:00 | Session-3a: Encryption and Signatures | Session-3b: Cryptanalysis & Implementation Attacks | Session-3c: Machine Learning – I | |||
| 15:00-15:15 | Tea Break | |||||
| 15:15-16:15 | Session-4a: Advanced Constructions | Session-4b: Confidential Computing & Containers |
Session-4c: Machine Learning II | |||
| 16:15-16:30 | Tea Break | |||||
| 16:30-17:30 | Session-5a: Protocols I | Session-5b: Security II | Session-5c: Machine Learning – III | |||
| Day 4 (Thursday, June 4 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Indian Affairs | ||||
| 08:00-17:30 | Registration | |||||
| 08:00-08:45 | Session-6a: Zero-Knowledge Proofs | Session-6b: Privacy I | ||||
| 08:45-09:00 | Tea Break | |||||
| 9:00-10:00 | Plenary Talk-2 (Grand Ballroom – 1 + 2) | |||||
| 10:00-10:15 | Tea Break | |||||
| 10:15-11:15 | Session-7a: Microarchitectural Attacks and Defences | Session-7b: Botnets and Intrusion Detection Systems | Session-7c: Federated Learning | |||
| 11:15-11:30 | Tea Break | |||||
| 11:30-12:30 | Session-8a: Fuzzing and Program Obfuscation | Session-8b: Web Security | Session-8c: Privacy II | |||
| 12:30-14:00 | Lunch | |||||
| Indian Affairs + Poolside | ||||||
| 14:00-17:00 | Poster Session | |||||
| Grand Ballroom – 1 + 2 | ||||||
| 18:00-19:00 | Award Ceremony | |||||
| 19:00-20:00 | Cultural Event | |||||
| 20:00-23:00 | Gala Dinner | |||||
| Day 5 (Friday, June 5 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Indian Affairs | ||||
| 08:00-17:30 | Registration | |||||
| 9:00-10:00 | Plenary Talk-3 (Grand Ballroom – 1 + 2) | |||||
| 10:00-10:15 | Tea Break | |||||
| 10:15-11:15 | Session-9a: Malware and Vulnerability Analysis | Session-9b: Homomorphic Encryption | Session-9c: Mobile Security | |||
| 11:15-11:30 | Tea Break | |||||
| 11:30-12:30 | Session-10a: Vulnerability Detection | Session-10b: Protocols II | Session-10c: Privacy and Usable Security | |||
| 12:30-14:00 | Lunch | |||||
| 14:00-15:00 | Session-11a: Attacks | Session-11b: Differential Privacy | Session-11c: Defenses | |||
| 15:00-15:15 | Tea Break | |||||
| 15:15-16:00 | Closing Remarks | |||||
