Program committee



NameAffiliation
Aastha MehtaUniversity of British Columbia, Vancouver
Abhishek Vasisht BhaskarGeorgia Institute of Technology
Adam BatesUniversity of Illinois at Urbana-Champaign
Adam DoupeArizona State University
Adam J. AvivThe George Washington University
Adithya BhatVisa Research
Adwait NadkarniWilliam & Mary
Akira TakahashiJPMorgan AI Research & AlgoCRYPT CoE
Alberto SonninoMysten Labs & University College London (UCL)
Alessandro ErbaKarlsruhe Institute of Technology (KIT)
Alessandro SorniottiIBM Research Europe
Alex OzdemirStanford University
Alexander ViandIntel Labs
Alexandra DmitrienkoUniversity of Wuerzburg
Alexios VoulimeneasTU Delft
Ali AbbasiCISPA Helmholtz Center for Information Security
Alin TomescuAptos Labs
[No name]
Aloni CohenUniversity of Chicago
Alvaro CardenasUniversity of California, Santa Cruz
Amin SakzadMonash University
Amit Seal AmiUniversity of South Florida
Andre GregioFederal University of Parana (UFPR)
Andrea ContinellaUniversity of Twente
Andreas KoglerIndependent
Andrei SabelfeldChalmers University of Technology
Andrew ParkMongoDB Research / CMU
Andy RuppUniversity of Luxembourg and KASTEL Security Research Labs
Ang LiThe University of Michigan-Dearborn
Anil KurmusIBM Research Europe
Anirban ChakrabortyMax Planck Institute for Security and Privacy
Anrin ChakrabortiUniversity of Illinois at Chicago
Anshuman SuriNortheastern University
Antonio NappaZimperium Inc
Anupam DasNorth Carolina State University
Aravind MachiryPurdue University
Arjun ArunasalamFlorida International University
Arslan KhanPennsylvania State University
Arthur GervaisUniversity College London (UCL) & Berkeley RDI
Athina MarkopoulouUniversity of California, Irvine
Atri BhattacharyyaOracle
Attila A YavuzUniversity of South Florida
Audra McMillanApple
Avital ShafranThe Hebrew University of Jerusalem
Aydin AbadiNewcastle University
Babak AminAzadCloudflare
Balaji PalanisamyUniversity of Pittsburgh
Behnaz HassanshahiOracle Labs
Ben FischYale University
Ben Stock chairCISPA Helmholtz Center for Information Security
Ben WeintraubNortheastern University
Benedikt BünzNYU
Benjamin FullerUniversity of Connecticut
Berk GulmezogluIowa State University
Bhupendra AcharyaUniversity of Louisiana, Lafayette
Binghui WangIllinois Institute of Technology
Bingsheng ZhangZhejiang University
Blaine HoakUniversity of Wisconsin-Madison
Blase UrUniversity of Chicago
Bo LuoThe University of Kansas
Boris KöpfAzure Research, Microsoft
Brad ReavesNC State
Brent Byunghoon KangKAIST
Camille CobbUniversity of Illinois at Urbana-Champaign
Carlo MazzoccaUniversity of Salerno
Carmela TroncosoMPI & EPFL
Carter YagemannOhio State University
Changjiang LiPalo Alto Networks
Changyu DongGuangzhou University
Charalampos PapamanthouYale University
Chen-Da Liu-ZhangLucerne University of Applied Sciences and Arts & Web3 Foundation
Cheng HongAnt Group
Cheng-Long WangKing Abdullah University of Science and Technology
Chenkai WengArizona State University
Chia-Mu YuNational Yang Ming Chiao Tung University
Chong XiangNVIDIA
Chris KanichUniversity of Illinois Chicago
Christian MouchetHasso-Plattner-Institute, University of Potsdam
Christian RossowCISPA Helmholtz Center for Information Security
Christian WeinertRoyal Holloway, University of London
Christina PöpperNew York University Abu Dhabi
Christof Ferreira TorresINESC-ID / Instituto Superior Técnico (IST), University of Lisbon
Christopher KruegelUC Santa Barbara
Chuan MaChongqing University
Chung Hwan KimUniversity of Texas at Dallas
Clémentine MauriceUniv. Lille, Inria, CNRS
Collins MunyendoThe George Washington University
Cormac HerleyMicrosoft Research
Cristina OneteUniversity of Limoges, XLIM, CNRS UMR 7252
Danfeng ZhangDuke University
Daniel ArpTU Wien
Daniel CollinsTexas A&M University
Daniel GrussGraz University of Technology
Daniel MoghimiGoogle
Daniel OlszewskiUniversity of Florida
Daniel ZappalaBrigham Young University
Daniele Cono D'EliaSapienza University of Rome
Danilo FrancatiSapienza University of Rome
Daoyuan WuLingnan University, Hong Kong
Daphne YaoVirginia Tech, Dept of Computer Science
Dario StabiliUniversity of Modena and Reggio Emilia
David AdrianIndependent
David KleinTechnische Universität Braunschweig
David KohlbrennerUniversity of Washington
David MohaisenUniversity of Central Florida
David OswaldUniversity of Birmingham
David WagnerUniversity of California, Berkeley
Davide BalzarottiEURECOM
Dennis JacksonMozilla
Devashish GosainIIT Bombay
Dianqi HanUniversity of Texas at Arlington
Dimitris KolonelosUC Berkeley
Divya GuptaMicrosoft Research India
Diwen XueUniversity of Michigan
Dokyung SongYonsei University
Dominik WermkeNorth Carolina State University
Dongrui ZengPalo Alto Networks, Inc.
Dongyan XuPurdue University
Doowon KimUniversity of Tennessee, Knoxville
Eleanor Birrell chairPomona College
Elias AthanasopoulosUniversity of Cyprus
Elissa M. Redmiles chairGeorgetown University
Engin KirdaNortheastern University
Eric PauleyVirginia Tech/Terrace Networks
Eric WustrowUniversity of Colorado Boulder
Erik-Oliver BlassAirbus
Erman AydayCWRU
Euijin ChooUniversity of Alberta
Evangelia Anna MarkatouTU Delft
Evgenios KornaropoulosGeorge Mason University
Eyal RonenTel Aviv University
Fabian IsingFraunhofer SIT, National Research Center for Applied Cybersecurity ATHENE
Fabio PierazziUniversity College London
Fan ZhangYale University, IC3
Faysal Hossain ShezanUniversity of Texas at Arlington
Feargus PendleburyMeta
Fengjun LiUniversity of Kansas
Fengyuan XuNanjing University
Filipo SharevskiDePaul University
Flavien SoltUC Berkeley
Flavio ToffaliniRuhr University Bochum
Fnu SuyaUniversity of Tennessee
Francesca FalzonETH Zürich
Frank PiessensKU Leuven
Frederik ArmknechtUniversity of Mannheim
Gabriel KaptchukUniversity of Maryland, College Park
Gang WangUniversity of Illinois Urbana-Champaign
Gennaro AvitabileIMDEA Software Institute, Madrid, Spain
Ghada AlmashaqbehUniversity of Connecticut
Ghassan KarameRuhr University Bochum
Giancarlo PellegrinoCISPA Helmholtz Center for Information Security
Giorgio PirasUniversity of Cagliari
Giovanni ApruzzeseUniversity of Liechtenstein
Giuseppe BianchiUniversity of Rome Tor Vergata
Guangliang YangFudan University
Guangsheng ZhangUniversity of Technology Sydney
Guanhong TaoUniversity of Utah
Guannan LiuColorado School of Mines
Guillermo Suarez-TangilIMDEA Networks
Guofei GuTexas A&M University
Guowen XuUniversity of Electronic Science and Technology of China
Guoxing ChenShanghai Jiao Tong University
Gururaj SaileshwarUniversity of Toronto
Habiba FarrukhUniversity of California, Irvine
Haipeng CaiUniversity at Buffalo, SUNY
Haitao ZhengUniversity of Chicago
Hamed OkhraviMIT Lincoln Laboratory
Han QiuTsinghua University
Hang ZhangIndiana University
Hanwen FengThe University of Sydney
Hao ChenUC Davis
Haojin ZhuShanghai Jiao Tong University
Haoyu WangHuazhong University of Science and Technology
Harjasleen MalvaiUniversity of Illinois, Urbana-Champaign
Harm GriffioenDelft University of Technology
Herbert BosVrije Universiteit Amsterdam
Hong HuThe Pennsylvania State University
Hong-Sheng ZhouVirginia Commonwealth University
Hongxin HuUniversity at Buffalo
Hossein FereidooniKOBIL GmbH
Hossein YalameBosch Research
Hyoungshick KimSungkyunkwan University
Hyungon MoonUlsan National Institute of Science and Technology (UNIST)
Ilya MironovMeta
Imtiaz KarimThe University of Texas at Dallas
Ioannis DemertzisUniversity of California, Santa Cruz
Isabel WagnerUniversity of Basel
Iskander Sanchez-RolaNorton
Jacob TorreyThinkst Applied Research
Jaewoo LeeUniversity of Georgia
James DavisPurdue University
James Hsin-yu ChiangETH Zurich / Aarhus University
Jan PennekampRWTH Aachen University
Jaron MinkArizona State University
Jason KimGeorgia Institute of Technology
Jason PolakisUniversity of Illinois Chicago
Jay BosamiyaMicrosoft Research
Jedidiah R. CrandallArizona State University
Jeremy ClarkConcordia University
Jeyavijayan RajendranTAMU
Jiahao YuNorthwestern University
Jiaheng ZhangNational University of Singapore
Jian LiuUniversity of Georgia
Jiang MingTulane University
Jiangshan YuThe University of Sydney
Jianliang WuSimon Fraser University
Jianyu NiuCity University of Hong Kong
Jie ZhouThe George Washington University
Jingjie LiUniversity of Edinburgh
Jingxuan HeUC Berkeley
Jinyuan JiaPenn State University
Jo Van BulckDistriNet, KU Leuven
Joann ChenSan Diego State University
Joel ReardonUniversity of Calgary
Jonathan FullerUnited States Military Academy
Jonathan KatzGoogle
Jose SuchINGENIO (CSIC-UPV)
Jose Maria de FuentesUniversidad Carlos III de Madrid
Joseph BonneauNew York University
Joseph CalandrinoCarnegie Mellon University
Joseph NearUniversity of Vermont
Josephine WolffTufts University
Juan CaballeroIMDEA Software Institute
Jun HanKAIST
Jun SunSingapore Management University
Jun Ho HuhSamsung Research
Juraj SomorovskyPaderborn University
Kai LiStevens Institute of Technology
Kaitai LiangTU Delft
Kaiyuan ZhangPurdue University
Kang YangState Key Laboratory of Cryptology
Kangkook JeeThe University of Texas at Dallas
Karl WüstMysten Labs
Karola MarkyRuhr University Bochum
Katherine IzhikevichUC San Diego
Kaveh RazaviETH Zurich
Keita XagawaTechnology Innovation Institute
Kelsey FultonColorado School of Mines
Kent SeamonsBrigham Young University
Kevin ButlerUniversity of Florida
Kévin HugueninUniversity of Lausanne (UNIL)
Kevin LeachVanderbilt University
Kevin Alejandro RoundyAndromeda Security
Kexin PeiThe University of Chicago
Kirill NikitinColumbia University & New York Genome Center
Konrad RieckBIFOLD & TU Berlin
Kopo Marvin RamokapaneUniversity of Bristol (UK)
Krishna GummadiMPI-SWS
Kunal MukherjeeVirginia Polytechnic Institute and State University (Virginia Tech)
Kunal TalwarApple
Kurt ThomasGoogle
Laura EdelsonNortheastern University
Lea GröberLahore University of Management Sciences (LUMS)
Lea KissnerLinkedIn
Lea SchönherrCISPA Helmholtz Center for Information Security
Leonie TanczerUniversity College London (UCL)
Li LuZhejiang University
Lichao WuTU Darmstadt
Limin JiaCarnegie Mellon University
Linyi LiSimon Fraser University
Lisa MasserovaCMU
Liyi ZhouUniversity of Sydney
Liz IzhikevichUniversity of California, Los Angeles
Lorenzo CavallaroUniversity College London
Lorenzo CazzaroCa’ Foscari University Venice
Luca DemetrioUniversity of Genoa
Luca InvernizziGoogle
Luca MelisMeta
Luca WilkeMicrosoft Research
Lucas DaviUniversity of Duisburg-Essen
Lucca HirschiInria
Lucy QinGeorgetown University
Lukas AumayrUniversity of Edinburgh and Common Prefix
Lun WangGoogle
Luyi XingUIUC
Madelyne XiaoPrinceton University
Magnus AlmgrenChalmers University of Technology
Mahmoud AmmarHuawei Research
Man Ho AuThe Hong Kong Polytechnic University
Mang ZhaoWuhan University
Marc JuarezUniversity of Edinburgh
Marcus BotacinTexas A&M University
Marina BohukMetaCTF
Mario LarangeiraInstitute of Science Tokyo/IOG
Marius FleischerNVIDIA
Marius MuenchUniversity of Birmingham
Markus DürmuthLeibniz University Hannover
Martin HenzeRWTH Aachen University & Fraunhofer FKIE
Marton BognarDistriNet, KU Leuven
Mary Ellen ZurkoMIT Lincoln Laboratory
Maryna VekslerVirginia Commonwealth University
Mathias HumbertUniversity of Lausanne
Mathias PayerEPFL
Matteo CampanelliOffchain Labs
Matthias FasslGeorge Washington University
Mattijs JonkerUniversity of Twente
Maximilian GollaCISPA Helmholtz Center for Information Security
Maximilian NoppelKarlsruhe Institute of Technology
Mazharul IslamUniversity of Wisconsin--Madison
McKenna McCallColorado State University
Meng LuoZhejiang University
Michael BaileyGeorgia Institute of Technology
Michael HeinzlUnaffiliated
Michael ReiterDuke University
Michael SchwarzCISPA Helmholtz Center for Information Security
Michael SpecterGeorgia Institute of Technology
Michael WaidnerATHENE, TU Darmstadt, Fraunhofer SIT
Michail ManiatakosNew York University Abu Dhabi
Michel Van EetenDelft University of Technology
Mikaela BroughRoyal Holloway, University of London
Milad NasrOpenAI
Min Suk KangKAIST
Ming LiUniversity Of Arizona
Minghui XuShandong University
Mingming ZhaIndiana University Bloomington
Mingxuan YaoGeorgia Institute of Technology
Minxin DuThe Hong Kong Polytechnic University
Mir Masood AliUniversity of Illinois Chicago
Mitsuaki AkiyamaNTT
Miuyin Yong WongUniversity of Maryland
Mohamed ElsabaghQuokka
Moritz SchloegelArizona State University
Mu ZhangUniversity of Utah
Muhammed F. EsginMonash University
Murat KantarciogluVirginia Polytechnic Institute and State University
Musard BalliuKTH Royal Institute of Technology
Nan WuCSIRO's Data61
Nathan BurowMIT Lincoln Laboratory
Neil GongDuke University
Nektarios Georgios TsoutsosUniversity of Delaware
Nguyen Phong HoangUniversity of British Columbia
Ni TrieuArizona State University
Nick HopperUniversity of Minnesota
Nicola RuaroUniversity of California, Santa Barbara
Nidhi RastogiRochester Institute of Technology
Niels ProvosLacework
Nils Ole TippenhauerCISPA Helmholtz Center for Information Security
Ning LuoUIUC
Ning ZhangWashington University in St. Louis
Ningfei WangIndependent Researcher
Ninghui LiPurdue University
Ningyu HeThe Hong Kong Polytechnic University
Nirvan TyagiUniversity of Washington
Noel WarfordOberlin College
Norrathep RattanavipanonPrince of Songkla University, Phuket Campus Thailand
Octavian SuciuGoogle Research
Oleksii OleksenkoAzure Research, Microsoft
Olivier BlazyEcole Polytechnique
Olya OhrimenkoThe University of Melbourne
Omer AkgulRSAC Labs
Omid MirzaeiCisco Talos
Orr DunkelmanUniversity of Haifa
Pablo PiantanidaILLS - MILA, CNRS Paris-Saclay University
Pardis Emami-NaeiniDuke University
Pascal BerrangUniversity of Birmingham
Pascal ReisertUniversity of Stuttgart
Patricia Arias-CabarcosEU Joint Research Centre (JRC), Paderborn University and KASTEL Research Labs (KIT)
Patrick TraynorUniversity of Florida
Paul PearceGeorgia Tech
Paul RöslerFAU Erlangen-Nürnberg
Paul StaatMax Planck Institute for Security and Privacy
Pedro Moreno-SanchezIMDEA Software Institute, MPI-SP
Peng GaoVirginia Tech
Penghui LiColumbia University
Peter PetersonUniversity of Minnesota Duluth
Pierre LaperdrixCNRS, Inria Lille
Piotr MardzielRealmLabsAI
Piyush KumarIIT Delhi
Platon KotziasBforeAI
Pratik SarkarSupra Research
Pratyay MukherjeeSupra Research
Qingchuan ZhaoCity University of Hong Kong
Qingying HaoShanghaiTech University
Qinhong JiangThe Hong Kong Polytechnic University
Qinying WangEPFL
Quinn BurkeUniversity of Wisconsin-Madison
Rahmadi TrimanandaComcast Cybersecurity & Privacy Research
Rahul ChatterjeeUniversity of Wisconsin--Madison
Rahul KandeTexas A&M University
Ramya Jayaram MastiAmpere Computing
Rebekah OverdorfRuhr University Bochum
Reham Mohamed AburasAmerican University of Sharjah
Ren ZhangCryptape and Nervos
Rikke Bjerg JensenRoyal Holloway, University of London
Robert MergetTechnology Innovation Institute
Rohit SinhaSwirlds Labs
Rongmao ChenNational University of Defense Technology
Ruba Abu-SalmaKing's College London
Ruimin SunFlorida International University
Rujia LiTsinghua University
Saba IqbalBrigham Young University
Sai Teja PeddintiGoogle
Saman ZonouzGeorgia Tech
Sanchari DasGeorge Mason University
Sanchuan ChenAuburn University
Sandro PintoUniversidade do Minho
Sang Kil ChaKAIST
Sangho LeeMicrosoft Research
Sarah SchefflerCarnegie Mellon University
Sashidhar JakkamsettiAmazon
Sauvik DasCarnegie Mellon University
Savino DambraGendigital
Sayandeep SahaIndian Institute of Technology Bombay
Sayanton DibboUniversity of Alabama
Sazzadur RahamanUniversity of Arizona
Scott ConstableIntel Labs
Scott CoullGoogle
Scott MooreGalois, Inc.
Scott RuotiThe University of Tennessee, Knoxville
Sebastian RothUniversity of Bayreuth
Sebastian SchinzelFH Münster, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE
Sébastien BardinCEA List & Université Paris Saclay
Sen ChenNankai University
Seunghoon WooKorea University
Shagufta MehnazPennsylvania State University
Shahram RasoolzadehRuhr University Bochum
Shawn ShanDartmouth College
Shengwei AnVirginia Tech
Shi-Feng SunShanghai Jiao Tong University
Shiqing MaUniversity of Massachusetts Amherst
Shiyi WeiThe University of Texas at Dallas
Shravan SrinivasanLagrange Labs
Shu WangPalo Alto Networks, Inc.
Shuang HaoUniversity of Texas at Dallas
Shujaat MirzaMicrosoft AI Red Team
Sihang PuCNRS, IRIF
Sikhar PatranabisIBM Research India
Simson GarfinkelU.S. Census Bureau
Sofia CeliBrave
Soheil SalehiThe University of Arizona
Song BianBeihang University
Song LiZhejiang University
Sophie StephensonUniversity of Wisconsin - Madison
Srdjan CapkunETH Zurich
Srdjan MaticIMDEA Software Institute
Srikanth V. KrishnamurthyUniversity of California, Riverside
Srinivasan RaghuramanVisa Research and MIT
Stefan MangardGraz University of Technology
Stefano CalzavaraUniversità Ca' Foscari Venezia
Sudipta ChattopadhyayUniversity of Missouri, Kansas City (UMKC)
Susan McGregorColumbia University
Syed Rafiul HussainPennsylvania State University
Sylvain ChatelCISPA Helmholtz Center for Information Security
Tadayoshi Kohno chairUniversity of Washington
Taegyu KimThe Pennsylvania State University
Tamara RezkInria
Tao HouUniversity of North Texas
Tao NiCity University of Hong Kong
Tariq ElahiUniversity of Edinburgh
Teryl TaylorIBM Research
Thijs van EdeUniversity of Twente
Thomas EisenbarthUniversity of Luebeck
Thomas PasquierUniversity of British Columbia
Thomas SchneiderTU Darmstadt
Tianchang YangThe Pennsylvania State University
Tianqing ZhuCity University of Macau
Tianshi LiNortheastern University
Tianshuo CongShandong University
Tijay ChungVirginia Tech
Ting WangStony Brook University
Tobias FiebigMax-Planck Institute for Informatics
Tobias PullsKarlstad University
Torsten KraußUniversity of Würzburg
Tuba YavuzUniversity of Florida
Umar IqbalWashington University in St. Louis
Varun MadathilYale University
Vasileios KemerlisBrown University
Vasudev GohilSiemens EDA
Veronica RiveraMax Planck Institute for Security and Privacy
Viet VoSwinburne University of Technology
Vladislav MladenovRuhr University Bochum
Wajih Ul HassanUniversity of Virginia
Warda UsmanBrigham Young University
Wei DongNanyang Technological University
Wei SunWright State University
Weiran LinCarnegie Mellon University / Gray Swan AI
Weitong LiVirginia Tech
Wenbo GuoUC Santa Barbara
Wendy SeltzerIndependent
Wenke LeeGeorgia Institute of Technology
Wenrui DiaoShandong University
Wouter LueksCISPA
Xiangfu SongNanyang Technological University
Xiangkun JiaInstitute of Software Chinese Academy of Sciences
Xiangyu ZhangPurdue University
Xiaogang ZhuThe University of Adelaide
Xiaokuan ZhangGeorge Mason University
Xiaoning LiuRMIT University, Australia
Xiaoyong (Brian) YuanClemson University
Xinda WangUniversity of Texas at Dallas
Xing GaoUniversity of Delaware
Xingliang YuanThe University of Melbourne
Xinwen FuUniversity of Massachusetts Lowell
Xinyu XingNorthwestern University
Xuandong ZhaoUC Berkeley
Xudong PanFudan University
Xuechao WangThe Hong Kong University of Science and Technology (Guangzhou)
Xueqiang WangUniversity of Central Florida
Yan LongHong Kong University of Science and Technology (Guangzhou)
Yan MengShanghai Jiao Tong University
Yanan GuoUniversity of Rochester
Yang XiangSwinburne University of Technology
Yanjiao ChenZhejiang University
Yanju ChenUniversity of California, San Diego
Yanxue JiaIllinois Institute of Technology
Yanzhao WuFlorida International University
Yaxing YaoVirginia Tech
Yi ChenThe University of Hong Kong
Yibin YangNTT Research and Georgia Institute of Technology
Yifeng ZhengThe Hong Kong Polytechnic University
Ying YuanSapienza University of Rome
Yingying (Jennifer) ChenRutgers University
Yinzhi CaoJohns Hopkins University
Yongdae KimKAIST
Youqian ZhangThe Hong Kong Polytechnic University
Yousra AaferUniversity of Waterloo
Yuan HongUniversity of Connecticut
Yuan TianUCLA
Yuan ZhangFudan University
Yuanyuan YuanETH Zurich
Yuchen YangThe Pennsylvania State University
Yue ZhangDrexel University
Yufei HanINRIA Rennes-Bretagne-Atlantique
Yuhong NanSun Yat-sen University
Yun LinShanghai Jiao Tong University
Yupei LiuThe Pennsylvania State University
Yuqi JiaDuke University
Yuseok JeonKorea University
Yuzhe TangSyracuse University
Zane MaOregon State University
Zeta AvarikiotiTU Wien
Zhen LingSoutheast University
Zheng LiShandong University
Zheng YangGeorgia Institute of Technology and Microsoft
Zhenkai ZhangClemson University
Zhibo Eric SunDrexel University
Zhiyuan YuTexas A&M University
Zhiyuan ZhangMax Planck Institute for Security and Privacy
Zhou LiUniversity of California, Irvine
Zhuo LuUniversity of South Florida
Zhuotao LiuTsinghua University
Zichen GuiUniversity of Georgia
Ziming ZhaoNortheastern University
Zimo ChaiStanford Univeristy & UC Berkeley