Italian Trulli

ACM CCS 2024

October 14-18, 2024 Salt Lake City, U.S.A.

Program Committee

Program Chairs

  • Engin Kirda, Northeastern University
  • David Lie, University of Toronto

Track Chairs

  • Software Security, Yuan Tian, UCLA
  • Web Security, Jason Polakis, University of Illinois, Chicago
  • Network Security, Aanjhan Ranganathan, Northeastern University
  • Formal Methods and Programming Languages, Catalin Hritcu, MPI-SP
  • Hardware, Side Channels, and CyberPhysical Systems, Yinqian Zhang, SUSTech
  • Applied Cryptography, Melek Onen, Institut Eurecom
  • Applied Cryptography, Katerina Mitrokotsa, University of St. Gallen
  • Machine Learning and Security, Reza Shokri, National University of Singapore
  • Machine Learning and Security, Murat Kantarcioglu, UT Dallas
  • Security Usability and Measurement, Blase Ur, University of Chicago
  • Security Usability and Measurement, Gianluca Stringhini, Boston University
  • Blockchain and Distributed Systems, Stefanie Roos, University of Kaiserslautern-Landau
  • Privacy and Anonymity, Wouter Lueks, CISPA

Program Committee

  • Software Security
    • Alessandro Sorniotti, IBM Research, Switzerland
    • Alexandre Bartel, Umeå University (Sweden), Sweden
    • Alexios Voulimeneas, Assistant Professor at TU Delft, Netherlands
    • Anil Kurmus, IBM Research Europe - Zurich, Switzerland
    • Aravind Machiry, Purdue University, United States of America
    • Binbin Zhao, Georgia Institute of Technology, China
    • Daniele Cono D’Elia, Sapienza University of Rome, Italy
    • Daoyuan Wu, The Hong Kong University of Science and Technology, China
    • Dongdong She, Hong Kong University of Science and Technology, China
    • Erik Tews, University of Twente, Netherlands
    • Faysal Hossain Shezan, University of Texas at Arlington,
    • Fengwei Zhang, Southern University of Science and Technology, China
    • Fengyuan Xu, Nanjing University, China
    • Gaoning Pan, Hangzhou Dianzi University, China
    • Geng Hong, Fudan University,
    • Guangliang Yang, Fudan University, China
    • Guofei Gu, Texas A&M, United States of America
    • Guozhu Meng, Institute of Information Engineering, Chinese Academy of Sciences, China, China
    • Haipeng Cai, Washington State University, United States of America
    • Hang Zhang, Indiana University Bloomington, United States of America
    • Heqing Huang, City University of Hong Kong, China
    • Hong Hu, The Pennsylvania State University, United States of America
    • Huaming Chen, The University of Sydney, Australia
    • Hugo Lefeuvre, The University of Manchester, United Kingdom
    • Jie Zhou, University of Rochester, United States of America
    • Kun Sun, George Mason University, United States of America
    • Lannan Lisa Luo, George Mason University, United States of America
    • Le Guan, University of Georgia, United States of America
    • Lei Zhang, Fudan University, China
    • Long Cheng, Clemson University, United States of America
    • Manuel Egele, Boston University, United States of America
    • Marcus Botacin, Texas A&M University, United States of America
    • Mathias Payer, EPFL, Switzerland
    • Mohannad Alhanahnah, University of Wisconsin Madison,
    • Mu Zhang, University of Utah, United States of America
    • Peisen Yao, Zhejiang University, China
    • Peng Gao, Virginia Tech, Department of Computer Science, United States of America
    • Pramod Bhatotia, TU Munich,
    • Qiben Yan, MSU, United States of America
    • Qingkai Shi, Nanjing University,
    • Ruoxi Sun, CSIRO’s Data61, Australia
    • Ruoyu “Fish” Wang, Arizona State University, United States of America
    • Sanchuan Chen, Auburn University,
    • Sang Kil Cha, KAIST, Korea, South – Republic of Korea
    • Santiago Torres-Arias, Purdue University, United States of America
    • Sen Chen, Tianjin University, China
    • Sepideh Ghanavati, University of Maine, United States of America
    • Shangwen Wang, National University of Defense Technology, China
    • Shengjian (Daniel) Guo, AWS Proactive Security, United States of America
    • Shiyi Wei, University of Texas at Dallas, United States of America
    • Shweta Shinde, ETH Zurich, Switzerland
    • Solmaz Salimi, Eurecom, France
    • Stefan Nagy, University of Utah, United States of America
    • Sukarno Mertoguno, Georgia Tech, United States of America
    • Tiffany Bao, Arizona State University, United States of America
    • Tu Le, UC Irvine, United States of America
    • Vasileios Kemerlis, Brown University, United States of America
    • Vasily Sartakov, Imperial College London, United Kingdom
    • Wei You, Renmin University of China, China
    • Weiteng Chen, Microsoft Research, Redmond, United States of America
    • Wenbo Shen, Zhejiang University, China
    • Wenrui Diao, Shandong University, China
    • Xiangkun Jia, Institute of Software Chinese Academy of Sciences, China
    • Xingwei Lin, Ant Group, China
    • Xinwen Fu, University of Massachusetts Lowell, United States of America
    • Xueqiang Wang, University of Central Florida, United States of America
    • Xusheng Xiao, Arizona State University, United States of America
    • Yajin Zhou, Zhejiang University, China
    • Yonghwi Kwon, University of Maryland, United States of America
    • Yu Ding, Google Research, United States of America
    • Yu Jiang, Tsinghua University, China
    • Yuan Tian, UCLA, United States of America
    • Yuandao Cai, Huawei, China
    • Yue Duan, Singapore Management University, Singapore
    • Yuekang Li, University of New South Wales, Australia
    • Yuseok Jeon, UNIST, Korea, South – Republic of Korea
    • Zahra Tarkhani, Microsoft, United Kingdom
    • Zhen Huang, De Paul University, United States of America
    • Zhihao (Zephyr) Yao, New Jersey Institute of Technology, United States of America
    • Zhiqiang Lin, Ohio State University, United States of America
    • Zhuo Zhang, Purdue University, United States of America
  • Web Security
    • Adam Doupe, Arizona State University, United States of America
    • Alexandros Kapravelos, NCSU, United States of America
    • Amin Kharraz, Florida International University,
    • Aurore Fass, CISPA Helmholtz Center for Information Security, Germany
    • Babak AminAzad, Cloudflare, United States of America
    • Bahruz Jabiyev, Dartmouth College, United States of America
    • Ben Stock, CISPA Helmholtz Center for Information Security, Germany
    • Chris Kanich, UIC, United States of America
    • Cristian-Alexandru Staicu, CISPA, Germany
    • Iskander Sanchez-Rola, Norton, United States of America
    • Jason Polakis, University of Illinois at Chicago, United States of America
    • Kostas Drakonakis, University of Crete & FORTH, Greece
    • Marco Squarcina, TU Wien, Austria
    • Martin Johns, TU Braunschweig, Germany
    • Meng Luo, Zhejiang University, China
    • Mohammad Ghasemisharif, Palo Alto Networks, United States of America
    • Nick Nikiforakis, Stony Brook University, United States of America
    • Oana Goga, CNRS, France
    • Panagiotis Ilia, Cyprus University of Technology, Cyprus
    • Phani Vadrevu, Louisiana State University, United States of America
    • Pierre Laperdrix, CNRS, Inria Lille, France
    • Roberto Perdisci, University of Georgia, United States of America
    • Soheil Khodayari, CISPA Helmholtz Center for Information Security, Germany
    • Soteris Demetriou, Imperial College London, United Kingdom
    • Stefano Calzavara, Università Ca’ Foscari Venezia, Italy
    • Tom Van Goethem, Google / KU Leuven, Belgium
    • Umar Iqbal, Washington University in St. Louis, United States of America
    • Walter Rudametkin, IRISA / Inria / Univ. Rennes / IUF, France
    • Wei Meng, The Chinese University of Hong Kong, China
    • Xiaojing Liao, Indiana University Bloomington, United States of America
    • Yinzhi Cao, Johns Hopkins University, United States of America
    • Yousra Aafer, University of Waterloo, Canada
    • Yuan Zhang, Fudan University, China
    • Zheng Yang, Georgia Institute of Technology, United States of America
  • Network Security
    • Aanjhan Ranganathan, Northeastern, United States of America
    • Alan Zaoxing Liu, University of Maryland, United States of America
    • Anat Bremler Barr, Tel Aviv University, Israel
    • Ang Chen, University of Michigan, United States of America
    • Benjamin Ujcich, Georgetown University,
    • Feng Wu, University of Science and Technology of China, China
    • Gargi Mitra, University of British Columbia, Canada
    • Georgios Smaragdakis, Delft University of Technology, Netherlands
    • Hongxin Hu, University at Buffalo, United States of America
    • Imtiaz Karim, Purdue University, United States of America
    • Jedidiah R. Crandall, Arizona State University,
    • Jianjun Chen, Tsinghua University, China
    • Jun Han, KAIST, Korea, South – Republic of Korea
    • Katharina Kohls, Ruhr University Bochum, Germany
    • Kevin Borgolte, Ruhr University Bochum, Germany
    • Lingyu Wang, Concordia University, Canada
    • Mathy Vanhoef, KU Leuven, Belgium, Belgium
    • Mauro Conti, University of Padua, Italy & Delft University of Technology, The Netherlands
    • Michael Waidner, TU Darmstadt, Germany
    • Mridula Singh, CISPA, Germany
    • Muoi Tran, ETH Zurich, Switzerland
    • Qi Li, Tsinghua University, China
    • Roger Piqueras Jover, Google, United States of America
    • Sandeep Pisharody, MIT Lincoln Labs, United States of America
    • Sebastian Köhler, University of Oxford, United Kingdom
    • Syed Rafiul Hussain, Pennsylvania State University, United States of America
    • Xiapu Luo, The Hong Kong Polytechnic University, China
    • Xing Gao, University of Delaware, United States of America
    • Yue Zhang, Drexel University, United States of America
    • Zhiyun Qian, UC Riverside, United States of America
  • Formal Methods and Programming Languages
    • Adrien Koutsos, Inria Paris, France
    • Alejandro Russo, Chalmers University, Sweden
    • Bas Spitters, Aarhus University, Denmark
    • Benjamin Gregoire, Inria Sophia-Antipolis,
    • Boris Köpf, Azure Research, Microsoft, United Kingdom
    • Bruno Blanchet, Inria Paris, France
    • Cas Cremers, CISPA Helmholtz Center for Information Security, Germany
    • Catalin Hritcu, MPI-SP, Germany
    • Clara Schneidewind, MPI-SP, Germany
    • Frank Piessens, KU Leuven, Belgium
    • Frédéric Besson, Inria Rennes,
    • Guido Schmitz, Lancaster University Leipzig, Germany
    • Ioana Boureanu, University of Surrey, United Kingdom
    • Joshua Gancher, CMU,
    • Justin Hsu, Cornell University, United States of America
    • Limin Jia, CMU, United States of America
    • Marco Guarnieri, IMDEA Software Institute, Spain
    • Mohsen Lesani, University of California, Riverside, United States of America
    • Stéphanie Delaune, CNRS,
    • Swarn Priya, Virginia Tech, United States of America
  • Hardware, Side Channels, and CyberPhysical Systems
    • Ali Abbasi, CISPA Helmholtz Center for Information Security, Germany
    • Alvaro A. Cardenas, University of California, Santa Cruz, United States of America
    • Amro Awad, North Carolina State University, United States of America
    • Catherine Easdon, Dynatrace Research, Austria
    • Daniel Genkin, Georgia Tech,
    • Daniel Gruss, Graz University of Technology, Austria
    • Daniel Holcomb, UMass Amherst, United States of America
    • Daniel Moghimi, Google, United States of America
    • David Oswald, University of Birmingham, United Kingdom
    • Dmitry Evtyushkin, William & Mary, United States of America
    • Dmitry Ponomarev, Binghamton University, United States of America
    • Dong Du, Shanghai Jiao Tong University, China
    • Guoxing Chen, Shanghai Jiao Tong University, China
    • Guru Venkataramani, George Washington University, United States of America
    • Hamed Okhravi, MIT Lincoln Laboratory, United States of America
    • Indrakshi Ray, Colorado State University, United States of America
    • Kaveh Razavi, ETH Zürich, Switzerland
    • Kehuan Zhang, Chinese University of Hong Kong, China
    • Martin Henze, RWTH Aachen University & Fraunhofer FKIE, Germany
    • Mengyuan Li, MIT, United States of America
    • Mert Pesé, Clemson University,
    • Michael Schwarz, CISPA Helmholtz Center for Information Security, Germany
    • Michail Maniatakos, NYU Abu Dhabi, United Arab Emirates
    • Ming Li, University of Texas,
    • Moritz Lipp, Amazon Web Services, Austria
    • Nader Sehatbakhsh, UCLA, United States of America
    • Neetesh Saxena, Cardiff University, United Kingdom
    • Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security, Germany
    • Ning Zhang, Washington University in St. Louis, United States of America
    • Norrathep Rattanavipanon, Prince of Songkla University, Thailand
    • Oleksii Oleksenko, Azure Research, Cambridge, United Kingdom
    • Petr Svenda, Masaryk University, Czech Republic
    • Qiang Zeng, George Mason University, United States of America
    • Qingchuan Zhao, City University of Hong Kong,
    • Ramya Masti, Ampere Computing, United States of America
    • Riccardo Spolaor, Shandong University, China
    • Ryan Kastner, University of California, San Diego, United States of America
    • Saman Zonouz, Georgia Tech, United States of America
    • Samira Ajorpaz Mirbagher, North Carolina State University, United States of America
    • Song Fang, University of Oklahoma,
    • Stefan Mangard, Graz University of Technology, Austria
    • Stefano Zanero, Politecnico di Milano, Italy
    • Stephen Herwig, William & Mary, United States of America
    • Taegyu Kim, Pennsylvania State University, Korea, South – Republic of Korea
    • Thomas Eisenbarth, University of Lübeck, Germany
    • Thomas Unterluggauer, Intel labs, Austria
    • Tom Chotia, University of Birmingham,
    • Urbi Chatterjee, IIT Kanpur, India
    • Wei Huang, University of Toronto, Canada
    • Wei Sun, University of California San Diego,
    • Xiaokuan Zhang, George Mason University,
    • Xiaolin Xu, Northeastern University, United States of America
    • Xiaoyu Ji, Zhejiang University, China
    • Yan Meng, Shanghai Jiao Tong University,
    • Yinqian Zhang, SUSTech, China
    • Z. Berkay Celik, Purdue University, United States of America
    • Zhen Ling, Southeast University, China
    • Zhenkai Zhang, Clemson University, United States of America
    • Zhongjie Ba, Zhejiang University, China
    • Ziming Zhao, University at Buffalo,
    • Ziqiao Zhou, MSR Redmond, United States of America
  • Applied Cryptography
    • Alex Davidson, Universidade NOVA de Lisboa, United Kingdom
    • Anca Nitulescu, IOG, France
    • Andreas Peter, Carl von Ossietzky Universität Oldenburg, Germany
    • Antonio Faonio, EURECOM, France
    • Archita Agarwal, MongoDB, United States of America
    • Benjamin Fuller, University of Connecticut, United States of America
    • Benny Pinkas, Aptos Labs, Bar Ilan University, Israel
    • Charalampos Papamanthou, Yale University, United States of America
    • Chaya Ganesh, Indian Institue of Science, India
    • Chelsea H. Komlo, University of Waterloo, Canada, United States of America
    • Chenkai Weng, Northwestern University, United States of America
    • Claudio Soriente, NEC Laboratories Europe, Spain
    • Cristina Onete, University of Limoges/XLIM/CNRS 7252, France
    • Daniel Escudero, J.P. Morgan AI Research, United States of America
    • Daniel Masny, Meta, United States of America
    • Daniel Slamanig, Universität der Bundeswehr München, Germany
    • Danilo Francati, Aarhus University, Denmark
    • Dimitrios Papadopoulos, The Hong Kong University of Science and Technology, China
    • Dominique Schröder, Friedrich-Alexander Universität Erlangen-Nürnberg, Germany
    • Eleftheria Makri, LIACS at Leiden University, Netherlands
    • Elisaweta Masserova, Carnegie Mellon University, United States of America
    • Erik-Oliver Blass, Airbus, Germany
    • Evangelia Anna Markatou, TU Delft,
    • Felix Günther, IBM Research Europe – Zurich, Switzerland
    • Foteini Baldimtsi, George Mason University, Mysten Labs, United States of America
    • Frederik Armknecht, University of Mannheim, Germany
    • Gabriel Kaptchuk, Boston University, United States of America
    • Gabrielle Beck, Johns Hopkins University,
    • Greg Zaverucha, Microsoft Research, United States of America
    • Hanwen Feng, The University of Sydney,
    • Harish Karthikeyan, JPMorgan AI Research, United States of America
    • Hikaru Tsuchida, NEC Corporation, Japan
    • Ignacio Cascudo, IMDEA Software Institute,
    • Jakub Klemsa, Zama,
    • Jan Bobolz, University of Edinburgh, United Kingdom
    • Jian Guo, Nanyang Technological University, Singapore
    • Julian Loss, CISPA Helmoltz Center for Information Security, Germany
    • Kang Yang, State Key Laboratory of Cryptology, China
    • Kaoutar Elkhiyaoui, IBM Research Zurich,
    • Katerina Mitrokotsa, University of St. Gallen, Switzerland
    • Katharina Boudgoust, CNRS, Univ Montpellier, LIRMM, France, France
    • Kazue Sako, Waseda University, Japan
    • Keisuke Tanaka, Tokyo Institute of Technology, Japan
    • Lenka Mareková, ETH Zurich, Switzerland
    • Lucjan Hanzlik, CISPA Helmholtz Center for Information Security, Germany
    • Mang Zhao, CISPA Helmholtz Center for Information Security, Germany
    • Marcel Keller, CSIRO’s Data61, Australia
    • Marilyn George, Mongo DB,
    • Matteo Campanelli, Matter Labs, Denmark
    • Melek Onen, EuroCom, France
    • Michele Orrù, University of Berkeley / Sorbonne University,
    • Muhammed F. Esgin, Monash University, Australia
    • Ngoc Khanh Nguyen, King’s College,
    • Olivier Blazy, École Polytechnique, France, France
    • Oriol Farràs, Universitat Rovira i Virgilli, Spain
    • Peeter Laud, Cybernetica AS, Estonia
    • Pratyay Mukherjee, Supra Research, India
    • Qiang Tang, Luxembourg Institute of Science and Technology (LIST), Luxembourg
    • Rei Safavi-Naini, University of Calgary, Canada
    • Rongmao Chen, National University of Defense Technology, China
    • Rosario Gennaro, City College, CUNY,
    • Ruxandra F. Olimid, University of Bucharest, Romania
    • Ryo Nishimaki, NTT Social Informatics Laboratories, Japan
    • Saikrishna Badrinarayanan, LinkedIn,
    • Sébastien Canard, Télécom Paris, France
    • Sergiu Carpov, Inpher, France
    • Shravan Srinivasan, Lagrange Labs, United States of America
    • Sourav Das, University of Illinois at Urbana Champaign, United States of America
    • Sri AravindaKrishnan Thyagarajan, University of Sydney, Australia
    • Srinivasan Raghuraman, Visa Research and MIT, United States of America
    • Stefan Katzenbeisser, University of Passau, Germany
    • Stephan Krenn, AIT Austrian Institute of Technology, Austria
    • Tapas Pal, NTT Corporation, Japan
    • Tarik Moataz, MongoDB,
    • Thomas Schneider, TU Darmstadt, Germany
    • Tjerand Silde, Norwegian University of Science and Technology, Norway
    • Vanessa Teague, Thinking Cybersecurity, Australia
    • Yanxue Jia, Purdue University,
    • Yiannis Tselekounis, Royal Holloway, University of London, United Kingdom
    • Yibin Yang, Georgia Institute of Technology, United States of America
    • Yuriy Polyakov, Duality Technologies, United States of America
    • Zichen Gui, ETH Zürich, Switzerland
  • Machine Learning and Security
    • Adria Gascon, Google LLC,
    • Amit Kumar Sikder, Georgia Institute of Technology, United States of America
    • Ana-Maria Cretu, EPFL, Switzerland
    • Arjun Bhagoji, University of Chicago, United States of America
    • Ashraf Matrawy, Carleton University, Canada
    • Ben Y. Zhao, University of Chicago, United States of America
    • Binghui Wang, Illinois Institute of Technology, United States of America
    • Blaine Hoak, University of Wisconsin-Madison, United States of America
    • Chia-Mu Yu, National Yang Ming Chiao Tung University, Taiwan
    • Christian Wressnegger, Karlsruhe Institute of Technology (KIT), Germany
    • Chuan Guo, Meta, United States of America
    • Davide Maiorca, University of Cagliari, Italy, Italy
    • Eugene Bagdasaryan, UMass / Google / Cornell, United States of America
    • Fatih Turkmen, University of Groningen,
    • Franziska Boenisch, CISPA, Germany
    • Gang Wang, University of Illinois at Urbana-Champaign, United States of America
    • George Theodorakopoulos, Cardiff University, United Kingdom
    • Giovanni Apruzzese, Liechtenstein Business School, Liechtenstein
    • Giuseppe Ateniese, George Mason University, United States of America
    • Güliz Seray Tuncay, Google, United States of America
    • Ilia Shumailov, Google Deepmind, United Kingdom
    • Jamie Hayes, Deepmind, United Kingdom
    • Jason (Minhui) Xue, CSIRO’s Data61, Australia
    • Javier Carnerero Cano, IBM Research Europe/Imperial College London, Ireland
    • Jian Liu, University of Tennessee, Knoxville, United States of America
    • Jiayuan Ye, National University of Singapore, Singapore
    • Jinyuan Jia, Penn State, United States of America
    • Kai Chen, Institute of Information Engineering, China
    • Kangkook Jee, The University of Texas at Dallas, United States of America
    • Konrad Rieck, TU Berlin, Germany
    • Lea Schönherr, CISPA Helmholtz Center for Information Security, Germany
    • Lorenzo Cavallaro, University College London, United Kingdom
    • Luca Mariot, University of Twente,
    • Mathias Humbert, University of Lausanne, Switzerland
    • Matthew Jagielski, Google Research,
    • Maura Pintor, University of Cagliari, Italy
    • Ming Li, University Of Arizona, United States of America
    • Murat Kantarcioglu, UT Dallas,
    • Neil Gong, Duke University, United States of America
    • Nidhi Rastogi, Rochester Institute of Technology, United States of America
    • Niloofar Mireshghallah, University of Washington,
    • Nirnimesh Ghose, University of Nebraska, Lincoln, United States of America
    • Olga Ohrimenko, The University of Melbourne,
    • Omid Mirzaei, Cisco Talos, United States of America
    • Pierre Parrend, EPITA / University of Strasbourg, France
    • Reza Shokri, NUS, Singapore
    • Riccardo Lazzeretti, Sapienza University of Rome, Italy
    • Ruimin Sun, Florida International University, United States of America
    • Saeed Sharifi-Malvajerdi, Toyota Technological Institute at Chicago, United States of America
    • Sanghyun Hong, Oregon State University, United States of America
    • Sébastien Gambs, Université du Québec à Montréal, Canada
    • Selcuk Uluagac, Florida International University, United States of America
    • Shagufta Mehnaz, Penn State University, United States of America
    • Shiqing Ma, University of Massachusetts Amherst, United States of America
    • Shouling Ji, Zhejiang University, China
    • Suman Jana, Columbia University, United States of America
    • Thorsten Eisenhofer, TU Berlin, Germany
    • Ting Wang, Stony Brook University, United States of America
    • Varun Chandrasekaran, University of Wisconsin-Madison,
    • Wenbo Guo, UCSB, United States of America
    • Xiangyu Zhang, Purdue University, United States of America
    • Xiao Zhang, CISPA Helmholtz Center for Information Security, Germany
    • Yang Liu, NTU, Singapore
    • Yang Zhang, CISPA Helmholtz Center for Information Security, Germany
    • Yanjiao Chen, Zhejiang University, China
    • Yingying Chen, Rutgers University, United States of America
    • Yuan Hong, University of Connecticut, United States of America
    • Zaixi Zhang, Harvard University,
    • Zhan Qin, Zhejiang University, China
    • Zhuotao Liu, Tsinghua University, China
  • Security Usability and Measurement
    • Allison McDonald, Boston University, United States of America
    • Anupam Das, NC State, United States of America
    • Bailey Kacsmar, University of Alberta, Canada
    • Blase Ur, University of Chicago, United States of America
    • Camille Cobb, University of Illinois Urbana Champaign, United States of America
    • Carlos Gañán, ICANN, Netherlands
    • Chen Ling, Boston University, United States of America
    • Deepak Kumar, UC San Diego,
    • Doowon Kim, University of Tennessee, Knoxville, United States of America
    • Emiliano De Cristofaro, UC Riverside, United States of America
    • Filipo Sharevski, DePaul University, United States of America
    • Gianluca Stringhini, Boston University, United States of America
    • Giovane Moura, SIDN Labs and TU Delft, Netherlands
    • Guangdong Bai, University of Queensland, Australia
    • Habiba Farrukh, University of California Irvine, United States of America
    • Jingjie Li, University of Edinburgh, United Kingdom
    • Lucy Simko, George Washington University, United States of America
    • Mainack Mondal, Indian Institute of Technology Kharagpur, India
    • Nalin Arachchilage, University of Auckland, Australia
    • Patricia Arias Cabarcos, Paderborn University, Germany
    • Reham Mohamed Aburas, Purdue University, United States of America
    • Savino Dambra, Norton Research Group, France
    • Savvas Zannettou, TU Delft, Netherlands
    • Shirin Nilizadeh, The University of Texas at Arlington, United States of America
    • Stephen McQuistin, University of St Andrews, United Kingdom
    • Tatsuya Mori, Waseda University, Japan
    • Tingmin Wu, CSIRO’s Data61, Australia
    • Tobias Fiebig, Max-Planck Insitut for Informatics, Netherlands
    • Weijia He, Dartmouth College,
    • Yaxing Yao, Virginia Tech, United States of America
    • Yixin Zou, Max Planck Institute for Security and Privacy, Germany
    • Eleanor Birrell, Pomona College, United States of America
  • Blockchain and Distributed Systems
    • Adithya Bhat, Visa Research, United States of America
    • Aisling Connolly, DFINITY, Switzerland
    • Alberto Sonnino, Mysten Labs & University College London (UCL), United Kingdom
    • Alysson Bessani, LASIGE, Faculdade de Ciencias, Universidade de Lisboa, Portugal
    • Andrew Lewis-Pye, London School of Economics, United Kingdom
    • Aniket Kate, Purdue University / Supra Research, United States of America
    • Arthur Gervais, University College London & UC Berkeley RDI, United Kingdom
    • Atsuki Momose, University of Illinois Urbana-Champaign, United States of America
    • Aviv Zohar, Hebrew University of Jerusalem,
    • Balaji Palanisamy, University of Pittsburgh,
    • Chen-Da Liu-Zhang, Lucerne University of Applied Sciences and Arts & Web3 Foundation, Switzerland
    • Devashish Gosain, MPI-INF, Germany
    • Duc Le, Visa Research, United States of America
    • Fan Zhang, Yale University, United States of America
    • Ghada Almashaqbeh, University of Connecticut,
    • Ghassan Karame, Ruhr University Bochum, Germany
    • Haibin Zhang, Yangtze Delta Region Institute of Tsinghua University, China
    • Haoyu Wang, Huazhong University of Science and Technology, China
    • Hong-Sheng Zhou, Virginia Commonwealth University, United States of America
    • Ittay Eyal, Technion, Israel
    • James Hsin-yu Chiang, Aarhus University,
    • Jeffrey Burdges, Web 3.0 Technologies Foundation,
    • Jérémie Decouchant, TU Delft, Netherlands
    • Jeremy Clark, Concordia University, Canada
    • Jiangshan Yu, The University of Sydney, Australia
    • Jianyu Niu, Southern University of Science and Technology, China
    • Jing Chen, Tsinghua University, China
    • Jonathan Katz, University of Maryland, United States of America
    • Kaihua Qin, Yale University, United Kingdom
    • Kang Li, CertiK,
    • Kari Kostiainen, ETH Zurich, Switzerland
    • Karl Wüst, Mysten Labs, Switzerland
    • Kristina Hostakova, ETH Zürich,
    • Lefteris Kokoris-Kogias, IST Austria & Mysten Labs, Austria
    • Ling Ren, University of Illinois at Urbana-Champaign, United States of America
    • Lucas Davi, University of Duisburg-Essen, Germany
    • Lucianna Kiffer, ETH Zurich, Switzerland
    • Mario Larangeira, IOHK, Japan
    • Mariusz Nowostawski, Norwegian University of Science and Technology, Norway
    • Massimo Bartoletti, University of Cagliari, Italy
    • Matteo Maffei, TU Wien, Austria
    • Michelle Yeo, National University of Singapore,
    • Min Suk Kang, KAIST, Korea, South – Republic of Korea
    • Pedro Moreno Sanchez, IMDEA Software Institute, Spain
    • Peter Gazi, IOG, Slovakia
    • Qiang Tang, The University of Sydney, Australia
    • Ren Zhang, Cryptape Co. Ltd. and Nervos, China
    • Sisi Duan, Tsinghua University, China
    • Stefan Schmid, TU Berlin, Germany
    • Stefanie Roos, University of Kaiserslautern-Landau, Germany
    • Valeria Nikolaenko, A16Z Crypto Research, United States of America
    • Vero Estrada, EPFL, Switzerland
    • Xuechao Wang, HKUST(GZ), China
    • Yu Feng, University of California, Santa Barbara, United States of America
    • Yuan Lu, Institute of Software Chinese Academy of Sciences, China
    • Yun Lu, University of Victoria, Canada
    • Zeta Avarikioti, TU Wien, Austria
  • Privacy and Anonymity
    • Aaron Johnson, US Naval Research Laboratory, United States of America
    • Albert Cheu, Google Research, United States of America
    • Amir Houmansadr, UMass Amherst, United States of America
    • Anna Maria Mandalari, University College London, United Kingdom
    • Badih Ghazi, Google, United States of America
    • Benjamin NGUYEN, INSA Centre Val de Loire, France
    • Bolin Ding, Alibaba Group, United States of America
    • Catuscia Palamidessi, Inria, France
    • Debajyoti Das, KU Leuven, Belgium
    • Di Wang, King Abdullah University of Science and Technology, Saudi Arabia
    • Diogo Barradas, University of Waterloo, Canada
    • Duc Bui, Snap Inc., United States of America
    • Ellis Fenske, U.S. Naval Academy, United States of America
    • Emre Gursoy, Koc University, Turkey
    • Florentin Rochet, University of Namur, Belgium
    • Héber H. Arcolezi, Inria, France
    • Isabel Wagner, University of Basel, Switzerland
    • Jaewoo Lee, University of Georgia, United States of America
    • Jean-François Couchot, Femto-ST Institute, Univ. Franche-Comté, CNRS, Besançon, France
    • Jian Lou, Zhejiang University, China
    • Jinfei Liu, Zhejiang University, China
    • Joel Reardon, University of Calgary, Canada
    • Joseph Near, University of Vermont, United States of America
    • Kirill Nikitin, Columbia University & New York Genome Center, United States of America
    • Marco Gaboardi, Boston University, United States of America
    • Marika Swanberg, Boston University, United States of America
    • Mário S. Alvim, Universidade Federal de Minas Gerais - UFMG, Brazil
    • Meisam Mohammady, Iowa State University of Science and Technology, Iowa, The USA, United States of America
    • Minxin Du, Chinese University of Hong Kong, China
    • Nicholas Hopper, University of Minnesota, United States of America
    • Piotr Mardziel, Independent, United States of America
    • Piyush Kumar Sharma, University of Michigan, United States of America
    • Qichen Wang, Hong Kong Baptist University, China
    • Rahat Masood, University of New South Wales, Australia
    • Raouf Kerkouche, The CISPA Helmholtz Center for Information Security, Germany
    • Rui Wen, CISPA Helmholtz Center for Information Security, Germany
    • Ryan Henry, University of Calgary, Canada
    • Ryan Wails, Georgetown University, US Naval Research Laboratory, United States of America
    • Sadia Afroz, Gen Digital Inc, United States of America
    • Saeed Mahloujifar, Meta, United States of America
    • Shufan Zhang, University of Waterloo, Canada
    • Siamak F. Shahandashti, University of York, United Kingdom
    • Simon Koch, Institute for Application Security (TU-Braunschweig), Germany
    • Simon Oya, The University of British Columbia, Canada
    • Takao Murakami, ISM, Japan
    • Tao Wang, Simon Fraser University,
    • Tariq Elahi, University of Edinburgh, United Kingdom
    • Thorsten Strufe, Karlsruhe Institute of Technology, Germany
    • Tianhao Wang, University of Virginia, United States of America
    • Tobias Pulls, Karlstad University, Sweden
    • Trung Tin Nguyen, CISPA Helmholtz Center for Information Security, Saarland University, Germany
    • Vera Rimmer, KU Leuven, Belgium
    • Wouter Lueks, CISPA, Germany
    • Xi He, University of Waterloo, Canada
    • Xiaokui Xiao, NUS, Singapore
    • Xin Yuan, CSIRO’s Data61, Australia
    • Yan Shvartzshnaider, York University, Canada
    • Yash Vekaria, University of California, Davis, United States of America
    • Yuhong Nan, Sun Yat-sen University, China
    • Zhikun Zhang, Stanford & CISPA, United States of America