Program Committee

Program Chairs ( ccs26-pc-chairs@acm.org)

Université de Lorraine
The Ohio State University

Track Chairs

Software Security ( ccs26-software-track@acm.org)

University of California
Brown University

Web Security ( ccs26-web-track@acm.org)

Carnegie Mellon University

Network Security ( ccs26-netsec-track@acm.org)

CISPA

Security Usability and Measurement ( ccs26-usablesec-track@acm.org)

IIT Kharagpur
University of Maryland

Security and Privacy of Machine Learning ( ccs26-mlsec-track@acm.org)

UMass Amherst
CISPA
University College London

Formal Methods and Programming Languages (ccs26-formal-track@acm.org)

University of Melbourne

Hardware, Side Channels, and Cyber Physical Systems ( ccs26-hardware-track@acm.org)

University of California
University of California

Applied Cryptography ( ccs26-crypto-track@acm.org)

TU Wien
George Mason University

Blockchain and Distributed Systems (ccs26-distributed-track@acm.org)

Duke University

Privacy and Anonymity (ccs26-privacy-track@acm.org)

Karlsruhe Institute of Technology

Program Committee Members

Software Security
  • Alessandro Sorniotti, IBM Research Europe
  • Alexandros Kapravelos, North Carolina State University
  • Alexios Voulimeneas, TU Delft
  • Andrea Mambretti, IBM Research Europe - Zurich
  • Anjo Vahldiek-Oberwagner, Intel Labs
  • Aravind Machiry, Purdue University
  • Bart Coppens, Ghent University
  • Byoungyoung Lee, Seoul National University
  • Carter Yagemann, Ohio State University
  • Chao Zhang, Tsinghua University
  • Chaoshun Zuo
  • Chengyu Song, UC Riverside
  • Christoph Sendner, University of California, Irvine
  • Christopher Kruegel, UC Santa Barbara
  • Chung Hwan Kim, University of Texas at Dallas
  • David Lie, University of Toronto
  • Derrick McKee, MIT Lincoln Lab
  • Dimitris Mitropoulos, University of Athens
  • Ding Li, Peking University
  • Dinghao Wu, Pennsylvania State University
  • Dokyung Song, Yonsei University
  • Dongdong She, HKUST
  • Dongpeng Xu, University of New Hampshire
  • Edward Schwartz, Carnegie Mellon University
  • Elias Athanasopoulos, University of Cyprus
  • Engin Kirda, Northeastern University
  • Fabian Monrose, Georgia Institute of Technology
  • Fengwei Zhang, Southern University of Science and Technology
  • Flavio Toffalini, Ruhr University Bochum
  • Fred Araujo, IBM Research
  • Georgios Portokalidis, IMDEA Software Institute
  • Güliz Seray Tuncay, Google
  • Guofei Gu, Texas A&M University
  • Haipeng Cai, University at Buffalo, SUNY
  • Hamed Okhravi, MIT Lincoln Laboratory
  • Hang Zhang, Indiana University
  • Hao Zhou, The Hong Kong Polytechnic University
  • Haohuang Wen, SE-RAN.ai
  • Heng Yin, UC Riverside
  • Heqing Huang, City University of Hong Kong
  • Hojoon Lee, Sungkyunkwan University
  • Jiang Ming, Tulane University
  • Jianliang Wu, Simon Fraser University
  • Jiarun Dai, Fudan University
  • Jie Lu, Institute of Computing Technology, Chinese Academy of Sciences
  • Jie Zhou, The George Washington University
  • Juanru Li, Shanghai Jiao Tong University
  • Kaiming Huang, The Pennsylvania State University
  • Kangjie Lu, University of Minnesota
  • Kangkook Jee, The University of Texas at Dallas
  • Kexin Pei, The University of Chicago
  • Kyungtae Kim, Dartmouth College
  • Le Guan, University of Georgia
  • Lucas Davi, University of Duisburg-Essen
  • Mahmoud Ammar, Huawei Research
  • Manuel Egele, Boston University
  • Marcel Busch, Unaffiliated
  • Marius Muench, University of Birmingham
  • Mathias Payer, EPFL
  • Michael Franz, University of California, Irvine
  • Michalis Polychronakis, Stony Brook University
  • Nikos Vasilakis, Brown University
  • Qingkai Shi, Nanjing University
  • Sang Kil Cha, KAIST
  • Sangho Lee, Microsoft Research
  • Shih-Wei Li, National Taiwan University
  • Shixuan Zhao, The Ohio State University
  • Shravan Narayan, University of Texas at Austin
  • Stefan Nagy, University of Utah
  • Stijn Volckaert, DistriNet, KU Leuven
  • Tapti Palit, University of California, Davis
  • Teryl Taylor, IBM Research
  • Thomas Pasquier, University of British Columbia
  • Thorsten Holz, Max Planck Institute for Security and Privacy
  • Trent Jaeger, UC Riverside
  • Vaggelis Atlidakis, University of Athens
  • Weidong Zhu, Florida International University
  • Weiteng Chen, Microsoft Research, Redmond
  • Wenbo Shen, Zhejiang University
  • Xiangkun Jia, Institute of Software Chinese Academy of Sciences
  • Xiaokuan Zhang, George Mason University
  • Xinda Wang, University of Texas at Dallas
  • Xing Gao, University of Delaware
  • Xueqiang Wang, University of Central Florida
  • Xuhua Ding, Singapore Management University
  • Xusheng Xiao, Arizona State University
  • Yanan Guo, University of Rochester
  • Yaniv David, Technion - Israel Institute of Technology
  • Yeongjin Jang, Google DeepMind
  • Yinxi Liu, Rochester Institute of Technology
  • Yonghwi Kwon, University of Maryland
  • Yousra Aafer, University of Waterloo
  • Yu Ding, Google DeepMind
  • Yu Hao, University of California, Riverside
  • Yue Duan, Singapore Management University
  • Yue Xiao, William & Mary
  • Yuekang Li, University of New South Wales
  • Yuseok Jeon, Korea University
  • Zephyr Yao, New Jersey Institute of Technology
  • Zhe Wang, Institute of Computing Technology, Chinese Academy of Sciences
  • Zhongshu Gu, IBM Research
  • Zhuo Zhang, Columbia University
  • Ziqiao Zhou, Microsoft Research
Web Security
  • Abhishek Bichhawat, Indian Institute of Technology Gandhinagar
  • Amin Kharraz, Florida International University
  • Aurore Fass, Inria Centre at Université Côte d'Azur
  • Billy Melicher, Palo Alto Networks
  • Christian Mainka, University of Wuppertal
  • Coby Wang, Visa Research
  • Darion Cassel, Amazon Web Services
  • Faysal Hossain Shezan, University of Texas at Arlington
  • Fraser Brown, Carnegie Mellon University
  • Frederik Braun, Mozilla
  • Jason Polakis, University of Illinois Chicago
  • Jihyeok Park, Korea University
  • Juan Caballero, IMDEA Software Institute
  • Kaushal Kafle, University of South Florida
  • Marco Squarcina, TU Wien
  • Martin Johns, TU Braunschweig
  • Merve Sahin, SAP
  • Musard Balliu, KTH Royal Institute of Technology
  • Nick Nikiforakis, Stony Brook University
  • Penghui Li, Columbia University
  • Sergio Maffeis, Imperial College London
  • Shuo Chen, Microsoft Research
  • Stefano Calzavara, Università Ca' Foscari Venezia
  • Tamara Rezk, Inria
  • Tobias Urban, Institute for Internet Security, Westphalian University of Applied Sciences
  • Veelasha Moonsamy, Ruhr University Bochum
  • Yinzhi Cao, Johns Hopkins University
  • Yuan Tian, UCLA
  • Zheng Yang, Georgia Institute of Technology and Microsoft
Network Security
  • Alan Zaoxing Liu, University of Maryland
  • Alessandro Brighente, University of Padova
  • Anat Bremler Barr, Tel Aviv University
  • Baojun Liu, Tsinghua University
  • Benjamin Ujcich, Georgetown University
  • Boubakr Nour, Ericsson Research
  • Christian Doerr, Hasso Plattner Institute
  • Chuhan Wang, Southeast University
  • DaeHun Nyang, Ewha Womans University
  • Dinil Mon Divakaran, A*STAR Institute for Infocomm Research
  • Euijin Choo, University of Alberta
  • Gargi Mitra, University of British Columbia
  • Guannan Liu, Colorado School of Mines
  • Haining Wang, Virginia Tech
  • Haixin Duan, Tsinghua University
  • Haya Schulmann, Goethe-Universität Frankfurt and National Research Center for Applied Cybersecurity ATHENE
  • Hsu-Chun Hsiao, National Taiwan University
  • Imtiaz Karim, The University of Texas at Dallas
  • Jianjun Chen, Tsinghua University
  • Jun Dai, Worcester Polytechnic Institute
  • Jun Han, KAIST
  • Kasper Rasmussen, University of Oxford
  • Kevin Borgolte, Ruhr University Bochum
  • Konrad Rieck, BIFOLD & TU Berlin
  • Lancheng Qin, Zhongguancun Laboratory
  • Lingyu Wang, University of British Columbia (Okanagan Campus)
  • Linke Guo, Clemson University
  • Lorenzo De Carli, University of Calgary
  • Marc Wyss, ETH Zurich
  • Marcin Nawrocki, NETSCOUT
  • Marcus Brinkmann, Ruhr University Bochum
  • Martin Henze, RWTH Aachen University & Fraunhofer FKIE
  • Mathias Fischer, University of Hamburg
  • Matthias Wählisch, TU Dresden
  • Michael Waidner, ATHENE, TU Darmstadt, Fraunhofer SIT
  • Omar Alrawi, Georgia Tech
  • Patrick Kon, University of Michigan
  • Ram Sundara Raman, University of California, Santa Cruz
  • Ravishankar Borgaonkar, SINTEF Digital Norway
  • Sandeep Pisharody, MIT Lincoln Laboratory
  • Savvas Kastanakis, University of Twente
  • Se Eun Oh, Ewha Womans University
  • Sebastian Schinzel, FH Münster, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE
  • Shihan Lin, University of Michigan
  • Shinan Liu, University of Hong Kong
  • Shu Wang, Palo Alto Networks, Inc.
  • Shuai Hao, Old Dominion University
  • Song Fang, University of Oklahoma
  • Syed Rafiul Hussain, Pennsylvania State University
  • Sze Yiu Chau, Simon Fraser University
  • Tao Wang, University of North Texas
  • Wajih UI Hassan, University of Virginia
  • Weitong Li, Virginia Tech
  • Xiang Li, Nankai University
  • Xiaobo Ma, Xi'an Jiaotong University
  • Xiapu Luo, The Hong Kong Polytechnic University
  • Xinshu Ma, University of Edinburgh
  • Xin'an Zhou, Unaffiliated
  • Yao Liu, University of South Florida
  • Yepeng Pan, CISPA Helmholtz Center for Information Security
  • Yi Chen, The University of Hong Kong
  • Yomna Nasser, Google
  • Yongdae Kim, KAIST
  • Yuchen Liu, North Carolina State University
  • Yue Zhang, Shandong University
  • Yunming Xiao, The Chinese Universities of Hong Kong, Shenzhen
  • Zeqi Lai, Tsinghua University
  • Zhenyu Li, Institute of Computing Technology, Chinese Academy of Sciences
  • Zhuo Lu, University of South Florida
  • Zhuotao Liu, Tsinghua University
Formal Methods and Programming Languages
  • Alejandro Russo, Chalmers and Göteborg University, DPella AB
  • Alwen Tiu, The Australian National University
  • Andrei Popescu, University of Sheffield
  • Benjamin Gregoire, Inria Sophia-Antipolis
  • Cas Cremers, CISPA Helmholtz Center for Information Security
  • Corina Pasareanu, Carnegie Mellon University, NASA, KBR
  • Jana Hofmann, Max Planck Institute for Security and Privacy (MPI-SP)
  • Jingyi Wang, Zhejiang University
  • Jonathan Protzenko, Google
  • Kirsten Winter, University of Queensland
  • Lesly-Ann Daniel, EURECOM
  • Marco Eilers, ETH Zurich
  • McKenna McCall, Colorado State University
  • Pasquale Malacaria, Queen Mary University of London
  • Roberto Guanciale, KTH
  • Sabine Oechsner, VU Amsterdam
  • Sébastien Bardin, CEA List & Université Paris-Saclay
  • Thomas Haines, Australian National University
Hardware, Side Channels, and CyberPhysical Systems
  • Adam Hastings, Fordham University
  • Adam Morrison, Tel Aviv University
  • Adwait Godbole, University of California, Berkeley
  • Ali Abbasi, CISPA Helmholtz Center for Information Security
  • Andrew Clark, Washington University at St. Louis
  • Anirban Chakraborty, Max Planck Institute for Security and Privacy
  • Awais Rashid, University of Bristol, UK
  • Billy Brumley, Rochester Institute of Technology
  • Bo Chen, Michigan Technological University
  • Carlos Rubio-Medrano, Texas A&M University - Corpus Christi
  • Cristina Alcaraz, University of Malaga
  • Daisuke Mashima, Singapore University of Technology and Design
  • Danfeng Zhang, Duke University
  • Daniel Genkin, Georgia Tech
  • Daniel Gruss, Graz University of Technology
  • Daniel Holcomb, UMass Amherst
  • Debdeep Mukhopadhyay, IITKGP
  • Efrén López-Morales, New Mexico State University
  • Fan Yao, University of Central Florida
  • Flavien Solt, UC Berkeley
  • Gabriela Ciocarlie, Stevens Institute of Technology
  • Guoxing Chen, Shanghai Jiao Tong University
  • Gururaj Saileshwar, University of Toronto
  • Hamed Nemati, KTH Royal Institute of Technology
  • Hyungsub Kim, Indiana University Bloomington
  • Jesse De Meulemeester, KU Leuven
  • Jeyavijayan Rajendran, TAMU
  • John Castellanos, Hitachi Energy Research
  • Karthik Pattabiraman, University of British Columbia
  • Kaveh Razavi, ETH Zurich
  • Luis Garcia, University of Utah Kahlert School of Computing
  • Marco Vassena, Utrecht University
  • Mark Yampolskiy, Auburn University
  • Mauro Conti, University of Padua & Örebro University
  • Mengjia Yan, MIT
  • Mengyuan Li, USC
  • Michael LeMay, Intel
  • Michael Schwarz, CISPA Helmholtz Center for Information Security
  • Mizan Rahman, The University of Alabama, Tuscaloosa, AL
  • Mohammad Fadiheh, LUBIS EDA
  • Moritz Lipp, Amazon Web Services
  • Muslum Ozgur Ozmen, Arizona State University
  • Neil Zhao, UT Austin & NVIDIA
  • Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
  • Onur Mutlu, ETH Zurich
  • Rakesh Bobba, Oregon State University
  • Riccardo Paccagnella, Carnegie Mellon University
  • Ryan Gerdes, Virginia Tech
  • Ryan Kastner, UCSD
  • Saman Zonouz, Georgia Tech
  • Sandhya Koteeshwara, IBM Research
  • Scott Constable, Intel Corporation
  • Shuwen Deng, Tsinghua University
  • Srdjan Capkun, ETH Zurich
  • Stefan Mangard, Graz University of Technology
  • Thomas Eisenbarth, University of Luebeck
  • Thomas Unterluggauer, Intel
  • Urko Zurutuza, Mondragon Unibertsitatea
  • Wenjie Xiong, Virginia Tech
  • Xiaolin Xu, Northeastern University
  • Yingchen Wang, Google
  • Yinqian Zhang, SUSTech
  • Yossi Oren, Ben-Gurion University of the Negev
  • Zhiyuan Zhang, Max Planck Institute for Security and Privacy
  • Ziming Zhao, Northeastern University
Applied Cryptography
  • Aarushi Goel, Rutgers University
  • Adithya Vadapalli, IIT Kanpur
  • Alessandra Scafuro, North Carolina State University
  • Alex Davidson, Lasige, Universidade de Lisboa
  • Alexander Bienstock, J.P. Morgan AI Research & J.P. Morgan AlgoCRYPT CoE
  • Amin Sakzad, Monash University
  • Amit Agarwal, Category Labs
  • Anca Nitulescu, IOG
  • Anrin Chakraborti, University of Illinois at Chicago
  • Antonio Faonio, EURECOM
  • Antonio Guimarães, IMDEA Software Institute
  • Arantxa Zapico, Ethereum Foundation
  • Arkady Yerukhimovich, George Washington University
  • Ashrujit Ghoshal, IIT Madras
  • Ashwin Jha, Ruhr University Bochum
  • Bei Liang, Beijing Institute of Mathematical Sciences and Applications
  • Benedikt Auerbach, PQShield
  • Benjamin Fuller, University of Connecticut
  • Bertram Poettering, IBM Research Europe -- Zurich
  • Betül Durak, Microsoft Research
  • Bin Xiao, The Hong Kong Polytechnic Univ.
  • Charalampos Papamanthou, Yale University
  • Chaya Ganesh, Indian Institue of Science
  • Chenkai Weng, Arizona State University
  • Chris Peikert, University of Michigan (Ann Arbor)
  • Christian Weinert, Royal Holloway, University of London
  • Cong Zhang, Tsinghua University
  • Damien Vergnaud, Laboratoire d'informatique de Paris 6, Sorbonne Universite
  • Daniel Escudero, TACEO
  • Daniel Jost, New York University
  • Daniel Masny, Meta
  • Daniel Rausch, University of Stuttgart
  • Daniel Slamanig, Universität der Bundeswehr München
  • Danilo Francati, Sapienza University of Rome
  • Dario Fiore, IMDEA Software Institute
  • David Heath, University of Illinois Urbana-Champaign
  • Dimitrios Papadopoulos, Hong Kong University of Science & Technology
  • Dimitris Kolonelos, UC Berkeley
  • Douglas Stebila, University of Waterloo
  • Dov Gordon, George Mason University
  • Dung Bui
  • Dung Hoang Duong, University of Wollongong
  • Erik Pohle, Aarhus University
  • Erkan Tairi, UC Berkeley
  • Eysa Lee, Barnard College
  • Fangyu Zheng, University of Chinese Academy of Sciences
  • Feng Hao Liu, Washington State University
  • Felix Günther, IBM Research Europe - Zurich
  • Gennaro Avitabile, IMDEA Software Institute, Madrid, Spain
  • Giorgos Tsimos, pod
  • Guomin Yang, Singapore Management University
  • Haiyang Xue, Singapore Management University
  • Hanwen Feng, University of Sydney
  • Haodong Jiang, Henan Key Laboratory of Network Cryptography Technology
  • Harish Karthikeyan, JP Morgan AI Research
  • Hilder V. L. Pereira, University of Campinas (UNICAMP)
  • Hiraku Morita, University of Southern Denmark
  • Hyeongmin Choe, University of Luxembourg
  • Igors Stepanovs, Amazon
  • Ioannis Demertzis, University of California, Santa Cruz
  • Jack Doerner, University of Virginia
  • Jaspal Singh, Purdue University, Georgia Institute of Technology
  • Jean Paul Degabriele, Technology Innovation Institute
  • Jiafan Wang, CSIRO's Data61
  • Jian Guo, Nanyang Technological University
  • Jianfeng Wang, Xidian University
  • Jiaxin Pan, University of Kassel, Germany
  • Jiayi Kang, COSIC, KU Leuven
  • Jonathan Katz, Google
  • Joseph Bonneau, New York University
  • Kaitai Liang, University of Turku, Finland
  • Kang Yang, State Key Laboratory of Cryptology
  • Ke Cheng, Xidian university
  • Keewoo Lee, Ethereum Foundation
  • Keita Xagawa, Technology Innovation Institute
  • Leonid Reyzin, Boston University Computer Science
  • Lior Rotem, Hebrew University
  • Lixu Wang, Nanyang Technological University
  • Lucjan Hanzlik, CISPA Helmholtz Center for Information Security
  • Ludovic Perret, EPITA
  • Luigi Russo, Tu Wien
  • Lukas Aumayr, University of Edinburgh & Common Prefix
  • Mahdi Sedaghat, KU Leuven, Soundness
  • Mang Zhao, Wuhan University
  • Marcel Keller, CSIRO's Data61
  • Marina Blanton, University at Buffalo
  • Marloes Venema, University of Wuppertal
  • Marta Mularczyk, Amazon
  • Maximilian Orlt, UCLouvain
  • Melissa Chase, Microsoft Research
  • Meng Hao, Singapore Management University
  • Mingxun Zhou, The Hong Kong University of Science and Technology
  • Monosij Maitra, Indian Institute of Technology Kharagpur
  • Ni Trieu, Arizona State University
  • Ning Luo, UIUC
  • Olivia Franzese-McLaughlin, Vector Institute
  • Olivier Sanders, Orange Labs, France
  • Omid Mir, AIT Austrian Institute Of Technology
  • Panagiotis Chatzigiannis, Visa Research
  • Paul Lou, Bocconi University
  • Paul Rösler, FAU Erlangen-Nürnberg
  • Peihan Miao, Brown University
  • Pratik Soni, University of Utah Kahlert School of Computing
  • Pratyay Mukherjee, Hashgraph
  • Rishab Goyal, University of Wisconsin-Madison
  • Rishiraj Bhattacharyya, University of Birmingham
  • Rupeng Yang, University of Wollongong
  • Satrajit Ghosh, IIT Kharagpur
  • Sebastian Faust, Technische Universität Darmstadt
  • Shi-Feng Sun, Shanghai Jiao Tong University, China
  • Shravan Srinivasan, Lagrange Labs
  • Sihang Pu, CNRS, IRIF
  • Sikhar Patranabis, IBM Research India
  • Song Bian, Beihang University
  • Sourav Das, Category Labs
  • Sri AravindaKrishnan Thyagarajan, University of Sydney
  • Srinath Setty, Microsoft Research
  • Srinivasan Raghuraman, Visa Research and MIT
  • Stanislaw Jarecki, University of California Irvine
  • Svetla Petkova-Nikova, KU Leuven, Belgium
  • Tamer Mour, Bocconi University
  • Thang Hoang, Virginia Tech
  • Thomas Zacharias, University of Glasgow
  • Tianxin Tang, Eindhoven University of Technology
  • Tibor Jager, University of Wuppertal
  • Tim Ruffing, Blockstream Research
  • Tran Viet Xuan Phuong, University of Arkansas at Little Rock
  • Valerio Cini, Bocconi University
  • Viet Tung Hoang, Florida State University
  • Vladimir Kolesnikov, Georgia Tech
  • Wen-jie Lu, TikTok Inc.
  • Xiangfu Song, Nanyang Technological University
  • Xiao Wang, Northwestern University
  • Yanxue Jia, Illinois Institute of Technology
  • Ye Dong, National University of Singapore
  • Yiannis Tselekounis, Royal Holloway, University of London
  • Yibin Yang, NTT Research and University of Toronto
  • Yu Chen, Shandong University
  • Yu Yu, Shanghai Jiao Tong University
  • Zhengzhong Jin, Northeastern University
  • Zichen Gui, University of Georgia
Machine Learning and Security
  • Aashish Kolluri, Microsoft Research
  • Alessandro Erba, Karlsruhe Institute of Technology (KIT)
  • Ali Naseh, University of Massachusetts Amherst
  • Ali Reza Ghavamipour, Maastricht University
  • Angelo Sotgiu, University of Cagliari
  • Antonio Emanuele Cinà, University of Genoa
  • Apostolos Pyrgelis, RISE Research Institutes of Sweden
  • Asmit Nayak, University of Wisconsin Madison
  • Avital Shafran, ETH Zurich
  • Ben Y. Zhao, University of Chicago
  • Binghui Wang, Illinois Institute of Technology
  • Blaine Hoak, University of Wisconsin-Madison
  • Bo Luo, The University of Kansas
  • Boheng Li, Nanyang Technological University
  • Briland Hitaj, SRI International
  • Carlo Mazzocca, University of Salerno
  • Champa Arifa Islam, Idaho State University
  • Changjiang Li, Palo Alto Networks
  • Chawin Sitawarin, Google DeepMind
  • Cheng Hong, Ant Group
  • Cormac Herley, Microsoft Research
  • Cristina Improta, University of Naples Federico II
  • Daniel Arp, TU Wien
  • Dario Pasquini, Cracken
  • David Freeman, Meta
  • David Wagner, University of California, Berkeley
  • Di Tang, Sun Yat-Sen University
  • Diego Soi, University of Cagliary
  • Divya Gupta, Microsoft Research India
  • Dongqi Han, Beijing University of Posts and Telecommunications
  • Emil Lupu, Imperial College London
  • Emily Wenger, Duke University
  • Evgenios Kornaropoulos, George Mason University
  • Fabio Brau, University of Cagliari
  • Fatih Turkmen, University of Groningen
  • Feargus Pendlebury, Meta
  • Feng Xiao, Google DeepMind
  • Fengjun Li, University of Kansas
  • Fnu Suya Suyee, University of Tennessee
  • Gagandeep Singh, UIUC
  • Giorgio Piras, University of Cagliari
  • Giovanni Apruzzese, Reykjavik University
  • Giulia Fanti, Carnegie Mellon University
  • Giulio Rossolini, Scuola Superiore Sant'Anna
  • Gorka Abad, University of Bergen
  • Guangke Chen, Wuhan University
  • Guangyu Shen, Purdue University
  • Guanhong Tao, University of Utah
  • Guowen Xu, University of Electronic Science and Technology of China
  • Haitao Zheng, University of Chicago
  • Halima Bouzidi, University of California, Irvine
  • Hao Chen, UC Davis
  • Hongsheng Hu, University of Newcastle
  • Hongxin Hu, University at Buffalo
  • Hongyan Chang, Meta
  • Jacob Imola, University of Copenhagen
  • Jiahao Yu, Northwestern University
  • Jiaheng Zhang, National University of Singapore
  • Jian Liu, University of Georgia
  • Jiayuan Ye, National University of Singapore
  • Jie Zhang, CFAR and IHPC, Agency for Science, Technology and Research (A*STAR), Singapore
  • Jinyuan Jia, Penn State University
  • Johannes Kinder, LMU Munich
  • John Holodnak, MIT Lincoln Laboratory
  • Jonas Möller, TU Berlin
  • Jonas Ricker, Ruhr University Bochum
  • Jun Sun, Singapore Management University
  • Kai Zhou, The Hong Kong Polytechnic University
  • Kaiyuan Zhang, Purdue University
  • Kun Sun, George Mason University
  • Kunal Mukherjee, Virginia Polytechnic Institute and State University (Virginia Tech)
  • Leo Zhang, Griffith University
  • Lorenzo Cavallaro, University College London
  • Lorenzo Cazzaro, University of Luxembourg
  • Luca Demetrio, University of Genoa
  • Luyi Xing, University of Illinois Urbana-Champaign
  • Mario D'Onghia, University College London
  • Maximilian Noppel, Karlsruhe Institute of Technology
  • Mengxin Zheng, University of Central Florida
  • Michele Carminati, Politecnico di Milano
  • Ming F. Li, University of Arizona
  • Minghong Fang, University of Louisville
  • Mingming Zha, Indiana University Bloomington
  • Muhammad Ibrahim, Georgia Institute of Technology
  • Mulong Luo, Florida State University
  • Neil Gong, Duke University
  • Nicola Paoletti, King's College London
  • Nidhi Rastogi, Rochester Institute of Technology
  • Nik Kale, Cisco Systems
  • Ning Zhang, Washington University in St. Louis
  • Nirupam Gupta, University of Copenhagen
  • Ozan Özdenizci, Graz University of Technology
  • Pablo Piantanida, ILLS - MILA, CNRS Paris-Saclay University
  • Pavel Laskov, University of Liechtenstein
  • Peizhuo Lv, Nanyang Technological University
  • Peng Gao, Virginia Tech
  • Qian Lou, University of Central Florida
  • Qingzhao Zhang, University of Arizona
  • Qiuye He, University of Missouri–Kansas City
  • Raouf Kerkouche, INRIA
  • Riccardo Lazzeretti, Sapienza University of Rome, Italy
  • Ruimin Sun, Florida International University
  • Ruixuan Liu, Emory University
  • Ruoxi Sun, CSIRO's Data61
  • Sahar Abdelnabi, CISPA Helmholtz Center for Information Security
  • Sanghyun Hong, Oregon State University
  • Sayan Biswas, EPFL
  • Sayanton Dibbo, University of Alabama
  • Sazzadur Rahaman, University of Arizona
  • Scott Coull, Google
  • Shae McFadden, King's College London & The Alan Turing Institute & University College London
  • Shagufta Mehnaz, Pennsylvania State University
  • Shaoor Munir, University of California, Davis
  • Shawn Shan, Dartmouth College
  • Shengwei An, Virginia Tech
  • Shouling Ji, Zhejiang University
  • Shuai Wang, Hong Kong University of Science and Technology
  • Shuang Hao, University of Texas at Dallas
  • Shuya Feng, University of Alabama at Birmingham
  • Sijia Liu, Michigan State University
  • Sinem Sav, Bilkent University
  • Siyuan Cheng, Purdue University
  • Sizhe Chen, UC Berkeley
  • Stjepan Picek, University of Zagreb & Radboud University
  • Tamalika Mukherjee, Max Planck Institute for Security and Privacy
  • Theo Chow, King's College London
  • Thorsten Eisenhofer, CISPA Helmholtz Center for Information Security
  • Tianlin Li, Beihang University
  • Tianqing Zhu, City University of Macau
  • Tianwei Zhang, Nanyang Technological University
  • Ting Wang, Stony Brook University
  • Vasudev Gohil, Siemens EDA
  • Viet Vo, Swinburne University of Technology
  • Weiran Lin, Gray Swan AI
  • Wenbo Guo, UC Santa Barbara
  • Wenhai Sun, Purdue University
  • Wenjie Qu, NUS
  • Wenxin Ding, University of Chicago
  • Wenxin Jiang, Socket Inc.
  • Xi Li, University of Alabama at Birmingham
  • Xiangyu Zhang, Purdue University
  • Xiao Zhang, CISPA Helmholtz Center for Information Security
  • Xiaoyong (Brian) Yuan, Clemson University
  • Xiaoyun Xu, Radboud University
  • Xin Fan Guo, Imperial College London & King's College London & University College London
  • Xinfeng Li, Nanyang Technological University
  • Xingshuo Han, Nanjing University of Aeronautics and Astronautics
  • Xinyu Xing, Northwestern University
  • Xu Yuan, University of Delaware
  • Xuero Zhang, Ohio State University
  • Yan Meng, Shanghai Jiao Tong University
  • Yang Cao, Institute of Science Tokyo
  • Yansong Gao, The University of Western Australia
  • Yedi Zhang, National University of Singapore
  • Yevgeniy Vorobeychik, Washington University in St. Louis
  • Yigitcan Kaya, UC Santa Barbara
  • Yiling He, University College London
  • Yiming Li, Nanyang Technological University
  • Yingying Chen, Rutgers University
  • Yu (Jennie) Zheng, UC Irvine
  • Yuan Hong, University of Connecticut
  • Yuanyuan Yuan, Tsinghua University
  • Yuchen Yang, The Pennsylvania State University
  • Yufei Han, INRIA Rennes-Bretagne-Atlantique
  • Yujin Huang, The University of Melbourne
  • Yun Lin, Shanghai Jiao Tong University
  • Yunlong Mao, Nanjing University
  • Yupei Liu, The Pennsylvania State University
  • Yuqi Jia, Duke University
  • Yuxin Yang, College of Computer Science and Technology, Jilin University & Department of Computer Science, Illinois Institute of Technology
  • Z. Morley Mao, University of Michigan
  • Zhenlan Ji, HKUST
  • Zhibo Liu, The Hong Kong University of Science and Technology
  • Zhiyuan Yu, Texas A&M University
  • Zhou Li, University of California, Irvine
  • Zhuoran Liu, Radboud University
  • Zied Ben Houidi, Huawei Technologies Co. Ltd
  • Zilong Lin, University of Missouri-Kansas City
  • Ziqi Yang, Zhejiang University
  • Zitao Chen, University of Kansas
Security Usability and Measurement
  • Adwait Nadkarni, William & Mary
  • Aiping Xiong, Penn State University
  • Alena Naiakshina, University of Cologne
  • Alexandra Nisenoff, Carnegie Mellon University
  • Alexandru Bardas, University of Kansas
  • Ananta Soneji, Arizona State University
  • Bart Knijnenburg, Clemson University
  • Bhupendra Acharya, University of Louisiana, Lafayette
  • Camille Cobb, University of Illinois at Urbana-Champaign
  • Carrie Gates, FS-ISAC
  • Christine Utz, Radboud University
  • Danny Yuxing Huang, New York University
  • Devashish Gosain, IIT Bombay
  • Dhruv Kuchhal, Amazon
  • Eleanor Birrell, Pomona College
  • Elijah Bouma-Sims, Carnegie Mellon University
  • Elizabeth Stobert, Carleton University
  • Enze Liu, Carnegie Mellon University
  • Eric Zeng, Georgetown University
  • Erik Rye, Johns Hopkins University
  • Filipo Sharevski, DePaul University
  • Ha Dao, Max-Planck-Institute for Informatics
  • Hana Habib, Carnegie Mellon University
  • Haojian Jin, University of California, San Diego
  • Harshini Sri Ramulu, Paderborn University
  • Igor Bilogrevic, Google
  • Jan Tolsdorf, Max Planck Institute for Security and Privacy (MPI-SP)
  • Jingjie Li, University of Edinburgh
  • Jose Such, INGENIO (CSIC-UPV)
  • Juliane Schmüser, CISPA Helmholtz Center for Information Security
  • Jun Ho Huh, Samsung Research, Republic of Korea
  • Karola Marky, Ruhr University Bochum
  • Kent Seamons, Brigham Young University
  • Kevin Bock, University of Maryland
  • Kimberly Ruth, Stanford University
  • Lucy Simko, Barnard College
  • Markus Duermuth, Leibniz University Hannover
  • Maryam Mehrnezhad, Royal Holloway, University of London
  • Matthias Fassl, The George Washington University
  • Monica Kodwani, The George Washington University
  • Nina Taft, Google Inc.
  • Noah Apthorpe, Colgate University
  • Omer Akgul, RSAC Labs
  • Rakibul Hasan, Arizona State University
  • Richard Roberts, University of Maryland, College Park
  • Rob Reeder, Google
  • Rosanna Bellini, New York University
  • Sai Teja Peddinti, Google
  • Sascha Fahl, CISPA Helmholtz Center for Information Security
  • Sayak Saha Roy, Louisiana State University
  • Sepideh Ghanavati, University of Maine
  • Shrirang Mare, Western Washington University
  • Sophie Stephenson, University of Wisconsin-Madison
  • Steffen Becker, Ruhr University Bochum
  • Tanusree Sharma, Penn State University
  • Theodor Schnitzler, Maastricht University
  • Tianshi Li, Northeastern University
  • Victor Morel, Chalmers University of Technology
  • Weijia He, University of Southampton
  • Yuanyuan Feng, University of Vermont
  • Zhuolin Yang, University of Arizona
  • Zinaida Benenson, University of Erlangen-Nuremberg
Blockchain and Distributed Systems
  • Adithya Bhat, Visa Research
  • Alberto Sonnino, Mysten Labs & University College London (UCL)
  • Alysson Bessani, Universidade de Lisboa
  • Andrew Lewis-Pye, London School of Economics
  • Arthur Gervais, University College London (UCL) & Berkeley RDI
  • Atsuki Momose, Almure Inc.
  • Aviv Yaish, Yale University, IC3, Complexity Science Hub
  • Aviv Zohar, Hebrew University of Jerusalem
  • Balaji Palanisamy, University of Pittsburgh
  • Benedikt Bunz, NYU
  • Chen-Da Liu-Zhang, Lucerne University of Applied Sciences and Arts
  • Chenglu Jin, Centrum Wiskunde & Informatica
  • Christian Cachin, University of Bern
  • Christof Ferreira Torres, INESC-ID / Instituto Superior Técnico (IST), University of Lisbon
  • Clara Schneidewind, MPI-SP
  • Dahlia Malkhi, UCSB
  • Daoyuan Wu, Lingnan University
  • Duc Le, Visa Research
  • Ertem Nusret Tas, a16z Crypto Research
  • Fan Zhang, Yale University, IC3
  • Fuchen Ma, Tsinghua University
  • Ghada Almashaqbeh, University of Connecticut
  • Ghassan Karame, Ruhr University Bochum
  • Haibin Zhang, Yangtze Delta Region Institute of Tsinghua University, Zhejiang
  • Haoyu Wang, Huazhong University of Science and Technology
  • Hong-Sheng Zhou, Virginia Commonwealth University
  • Ittai Abraham, A16Z
  • Jérémie Decouchant, Delft University of Technology
  • Jeremy Clark, Concordia University
  • Jian Liu, Zhejiang University
  • Jiangshan Yu, The University of Sydney
  • Jianting Zhang, Purdue University
  • Jianyu Niu, City University of Hong Kong
  • Joachim Neu, a16z Crypto Research
  • Kai Li, Stevens Institute of Technology
  • Kaihua Qin, University of Warwick
  • Kang Li, CertiK
  • Karl Wüst, Mysten Labs
  • Kushal Babel, Category Labs
  • Lefteris Kokoris-Kogias, MystenLabs
  • Lioba Heimbach, Category Labs
  • Liyi Zhou, University of Sydney
  • Mahimna Kelkar, Columbia University
  • Man Ho Au, The Hong Kong Polytechnic University
  • Mario Larangeira, Institute of Science Tokyo/IOG
  • Matteo Maffei, TU Wien
  • Minghui Xu, Shandong University
  • Mohammad Sadoghi, University of California, Davis
  • Neil Giridharan, UC Berkeley
  • Nicolas Alhaddad, Boston University
  • Pedro Moreno-Sanchez, IMDEA Software Institute, MPI-SP
  • Peter Gaži, IOG
  • Puwen Wei, Shandong University
  • Qiang Tang, The University of Sydney
  • Qin Wang, CSIRO Data61
  • Ren Zhang, Cryptape and Nervos
  • Roberto Saltini, Ethereum Foundation
  • Roi Bar-Zur, Technion
  • Roopa Viswanathan, New Mexico State University
  • Sarisht Wadhwa, Duke University
  • Shinichiro Matsuo, Virginia Tech
  • Simon Holmgaard Kamp, Ruhr University Bochum
  • Sisi Duan, Tsinghua University
  • Sravya Yandamuri, Common Prefix and University of Luxembourg
  • Stefanie Roos, University of Kaiserslautern-Landau
  • Suyash Gupta, University of Oregon
  • Tim Roughgarden, Columbia University & a16z crypto
  • Wei Wang, Xi'an Jiaotong University
  • Xiao Sui, Tsinghua University
  • Xuechao Wang, HKUST(GZ)
  • Yu Feng, University of California, Santa Barbara
  • Yu Shen, Unaffiliated
  • Yuan Lu, A*STAR Institute for Infocomm Research
  • Yuval Efron, Columbia University
  • Yuzhe Tang, Syracuse University
  • Zeta Avarikioti, TU Wien and Common Prefix
  • Zhipeng Wang, The University of Manchester
  • Zhuolun Xiang, Aptos Labs
  • Zihao Li, University of Electronic Science and Technology of China
Privacy and Anonymity
  • Abhishek Kumar Mishra, Inria
  • Adam D. Groce, Reed College
  • Albert Cheu, Google Research
  • Àlex Miranda-Pascual, Karlsruhe Institute of Technology, Universitat Politècnica de Catalunya
  • Ana-Maria Cretu, CISPA
  • Andreas Athanasiou, Tu Delft
  • Antti Koskela, Nokia Bell Labs
  • Asia Biega, Max Planck Institute for Security and Privacy
  • Ayse Ünsal, EURECOM
  • Catuscia Palamidessi, Inria
  • Christiane Weis, HTWG Konstanz
  • Christina Garman, Purdue University
  • Christoph Coijanovic, Karlsruhe Institute of Technology
  • Cristina Onete, University of Limoges/XLIM/CNRS 7252
  • Daniel Hugenroth, University of Cambridge
  • Daniel Kifer, Penn State University
  • Daniel Schadt, Karlsruhe Institute of Technology
  • Daniele Gorla, University of Rome
  • David Evans, University of Virginia
  • David Wu, University of Texas at Austin
  • Debajyoti Das, Lund University
  • Didem Demirag, UQAM
  • Ehab ElSalamouny, INRIA CENTRE DE SACLAY
  • Ellis Fenske, U.S. Naval Academy
  • Emiliano De Cristofaro, UC Riverside
  • Emre Gürsoy, Koç University
  • Erik Buchholz, University of New South Wales
  • Erik-Oliver Blass, Airbus
  • Erman Ayday, CWRU
  • Esfandiar Mohammadi, Universität zu Lübeck
  • Eugene Vasserman, Kansas State University
  • Felix Morsbach, Karlsruhe Institute of Technology
  • Ferdinando Fioretto, University of Virgnia
  • Florian Tschorsch, TU Dresden
  • Frederik Armknecht, University of Mannheim, Germany
  • Gavin Brown, University of Wisconsin–Madison
  • Gergely Biczok, CrySyS Lab, Budapest University. of Technology and Economics
  • Heather Richter Lipford, University of North Carolina at Charlotte
  • Héber Arcolezi, ÉTS Montréal
  • Imane Fouad, Mohammed VI Polytechnic University
  • Iness Ben Guirat, Université Libre de Bruxelles (ULB)
  • Isabel Wagner, University of Basel
  • Jaap-Henk Hoepman, Radboud University, Nijmegen
  • Jian Lou, Sun Yat-sen University
  • Joel Reardon, University of Calgary
  • Johanna Gunawan, Maastricht University
  • Jordi Forné, Universitat Politecnica de Catalunya
  • Josep Domingo Ferrer, Universitat Rovira i Virgili
  • Joseph Near, University of Vermont
  • Julian Todt, Karlsruhe Institute of Technology
  • Jun Sakuma, Institute of Science Tokyo
  • Liang Wang, Independent Researcher
  • Makulf Kohlweiss, University of Edinburgh, IOHK
  • Marc Juarez, University of Edinburgh
  • Marc Langheinrich, Università della svizzera italiana (USI)
  • Marc-Olivier Killijian, Université du Québec à Montréal
  • Mariana Gama, COSIC, KU Leuven
  • Mario Alvim, UFMG
  • Mathias Humbert, University of Lausanne
  • Megumi Ando, Tufts University
  • Meisam Mohammady, Iowa State University of Science and Technology, Iowa, The USA
  • Minxin Du, The Hong Kong Polytechnic University
  • Mohamed Maouche, INRIA
  • Mona Wang, UC Berkeley
  • Nadim Kobeissi, Cure53, Symbolic Software
  • Natasha Fernandes, Macquarie University
  • Nathan Reitinger
  • Nicholas Hopper, University of Minnesota
  • Nikita Borisov, U. of Illinois at Urbana
  • Pasin Manurangsi, Google Research
  • Patricia Arias, Paderborn University
  • Patricia Guerra-Balboa, Karlsruhe Institute of Technology
  • Paul Syverson, U.S. Naval Research Laboratory
  • Pierangela Samarati, Universita' degli Studi di Milano
  • Ryan Henry, University of Calgary
  • Ryan McKenna, Google
  • Saba Eskandarian, University of North Carolina at Chapel Hill
  • Sebastian Meiser, Universität zu Lübeck
  • Sébastien Gambs, Université du Québec à Montréal
  • Seda Gürses, TU Delft/KU Leuven
  • Shirin Nilizadeh, The University of Texas at Arlington
  • Simon Hanisch, Technical University Dresden
  • Soeren Preibusch, German Federal Institute for Risk Assessment
  • Sofia Celi, Brave & University of Bristol
  • Stefan Köpsell, Dresden University of Technology
  • Takao Murakami, The Institute of Statistical Mathematics (ISM)
  • Tapas Pal, Karlsruhe Institute of Technology
  • Thomas Humphries, University of Waterloo
  • Thomas Schneider, TU Darmstadt
  • Tianhao Wang, University of Virginia
  • Tushar Jois, City College of New York
  • Vanessa Teague, Thinking Cybersecurity
  • Varun Chandrasekaran, University of Illinois Urbana-Champaign
  • Xin Wang, National Institute of Informatics
  • Yossi Gilad, Hebrew University of Jerusalem
  • Yuhong Nan, Sun Yat-sen University
  • Zekeriya Erkin, Delft University of Technology

Technical Assistants

  • Pierrick Gaudry, CNRS, Loria, France

Cloud Storage Assistants

  • Simon Hanisch, TUD Dresden University of Technology