Scope

Cybercrime has increasingly evolved into Crime-as-a-Service (CaaS) ecosystems, where specialized actors provide tools, infrastructure, and services that lower barriers to entry and enable both purely digital and cyber-assisted physical crime. These developments demand security research that goes beyond malware analysis to include detection pipelines, adversarial marketplaces, and a human-centered understanding of cybercriminal behavior.

The TAKEDOWN Workshop seeks to bring together researchers and practitioners studying the technical, behavioral, and systemic dimensions of cybercrime, with particular emphasis on detecting and disrupting service-based criminal ecosystems and the human actors who operate them.

We invite submissions across three categories: full papers, short papers (including position papers and experience reports), and dataset papers, covering original research, work-in-progress, and novel datasets.

Topics of Interest

Topics include, but are not limited to, the following areas.

Crime-as-a-Service Ecosystems
  • Measurement and modeling of CaaS markets (phishing-, ransomware-, access-as-a-service)
  • Roles, specialization, and trust mechanisms in underground services
  • Automation and commodification of cybercrime
  • Interdependencies between service providers and downstream criminal activity
Bulletproof Hosting & Resilient Services
  • Detection and attribution of bulletproof hosting providers
  • Hosting migration patterns and infrastructure resilience
  • Relationships between bulletproof hosts and downstream criminal services
  • Economic models and pricing structures of abuse-tolerant hosting
Detection and Technical Countermeasures
  • Detection of scams, phishing, fraud, and malware delivery infrastructure
  • Network-, system-, and platform-level detection of cybercriminal services
  • Tracking bulletproof hosting via passive and active measurement
  • AS-level and BGP-based detection of malicious infrastructure
  • ML- and AI-based detection under adversarial conditions
  • Early-warning systems for emerging cybercrime campaigns
Human and Behavioral Aspects
  • Profiling and behavioral analysis of cybercriminals
  • Incentive structures, reputation, and decision-making in underground markets
  • Socio-technical analysis of cybercriminal communities
  • Human factors in attacker / defender dynamics
Cyber-Assisted and Hybrid Crime
  • Technical mechanisms enabling cyber-assisted physical crime
  • Online facilitation of fraud, extortion, trafficking, and financial crime
  • Linking online criminal infrastructure to offline harms
  • Detection and mitigation of hybrid cyber-physical activity
Disruption, Intervention, and Impact
  • Technical approaches to disrupting CaaS supply chains
  • Measuring real-world impact of takedowns and interventions
  • Infrastructure resilience and criminal adaptation post-disruption
  • Case studies from industry, ISPs, platforms, and CERTs
  • Legal, ethical, and operational constraints on countermeasures
Submissions should clearly articulate how the work contributes to detecting, understanding, or disrupting cybercrime ecosystems, with an emphasis on real-world impact.

Submission guidelines

Papers that do not comply with the following requirements will be desk-rejected.

Ethical Considerations

All papers must contain an Ethical Considerations appendix that follows the requirements laid out in the CCS Submission Policies and Instructions. For more details you may refer to the corresponding part of the CCS Call for Papers.

Important Dates

Paper Submission Deadline
July 13th, 2026
Notification to Authors
September 1st, 2026
Camera-ready deadline
September 17th, 2026
Workshop Date
TBD
Colocated with ACM CCS 2026

All deadlines are Anywhere on Earth (AoE).

Submissions

Full Papers
Mature research results 8–10 pages
Short Papers
Work-in-progress, tools, preliminary findings, position papers, and experience reports 4–6 pages
Dataset Papers
Novel datasets with availability commitments 4–6 pages

Submission Site

Submission link: https://takedown26.hotcrp.com/

Review Process

The workshop follows a double-blind review process with at least 3 reviews per submission. Conflicts of interest are declared and managed via HotCRP. All accepted papers will be published in the ACM CCS workshops’ proceedings.

Committee

Program Chairs

Constantinos Patsakis

University of Piraeus, Greece

George Smaragdakis

Delft University of Technology, Netherlands

Program Committee

Ioannis Agrafiotis

Oxford University

David Arroyo

Spanish National Research Council

Alastair Beresford

University of Cambridge

Juan Caballero

IMDEA Software Institute

Yi Ting Chua

University of Tulsa

David Decary-Hetu

University of Montreal

Harm Griffioen

Delft University of Technology

Alice Hutchings

University of Cambridge

Vasilios Katos

Bournemouth University

Platon Kotzias

BforeAI

Shujun Li

University of Kent

David Maimon

Georgia State University

Tobias Mattes

Bavarian State Police

Wojciech Mazurczyk

Warsaw University of Technology

Marco Musumeci

United Nations InterregionalCrime and Justice Research Institute

Juha Nurmi

Tampere University

Raul Orduna

Vicomtech

George Stergiopoulos

Athens University of Economics and Business

Francesco Zola

Vicomtech