MAY 18-21, 2026 AT THE HILTON SAN FRANCISCO UNION SQUARE, SAN FRANCISCO, CA

47th IEEE Symposium on
Security and Privacy

Call for Papers

Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice.

Topics of interest include:

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers

As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io.

Submission Deadlines & Decisions

Similar to 2025, for each submission, one of the following decisions will be made:

Public Meta-Reviews: Similar to 2025, all accepted papers will be published with a meta-review (< 500 words) in the final PDF that lists: (a) the reasons the PC decided to accept the paper and (b) concerns the PC has with the paper. Authors will be given the option to write a response to the meta-review (< 500 words) which will be published as part of the meta-review. Authors will be given a draft meta-review at the time of acceptance. Authors will be given the option of addressing some or all of the concerns within one review cycle. A shepherd will remove concerns from the meta-review if they are sufficiently addressed by the revisions.

The goal of this process is to provide greater transparency and to better scope change requests made by reviewers. More information about the reasons behind this change can be found on the 2024 IEEE S&P website.

Symposium Event (Important Changes)

The number of papers accepted to IEEE S&P continues to grow substantially each year. Due to conference venue limitations and costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes, length determined based on the number of accepted papers) and (b) a poster presentation immediately following the talk session containing the paper. All accepted papers are required to present both a short talk and a poster.

Important Dates

All deadlines are 23:59:59 AoE (UTC-12).

First deadline

Second deadline

Rebuttal Period

Papers reaching the second round of reviewing will be given an opportunity to write a rebuttal to reviewer questions. The rebuttal period will be interactive, and is separate from the meta-review rebuttal given to accepted papers.

Authors have the opportunity to exchange messages with the reviewers and respond to questions asked. To this end, we will use HotCRP’s anonymous communication feature to enable a communication channel between authors and reviewers. The authors should mainly focus on factual errors in the reviews and concrete questions posed by the reviewers. New research results can also be discussed if they help to clarify open questions. More instructions will be sent out to the authors at the beginning of the rebuttal period.

Resubmission of Rejected Papers

As with previous IEEE S&P symposia with multiple submission cycles, rejected papers must wait one year before resubmission to IEEE S&P.

Instructions for Paper Submission

These instructions apply to both the research papers and systematization of knowledge (SoK) papers. All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy.

Anonymous Submission

Papers must be submitted in a form suitable for anonymous review: no author names or affiliations (whether they are real or the default fake names included in the IEEE template) may appear on the title page, and papers should avoid revealing authors’ identity in the text. Authors should also take care in not including acknowledgments that help identify them (e.g., funding information, names of colleagues who gave feedback on the paper). When referring to their previous work, authors are required to cite their papers in the third person, without identifying themselves. In the unusual case in which a third-person reference is infeasible, authors can blind the reference itself.

When preparing the artifacts repository authors should take extra care to not include authors’ information in the repository or artifacts content, so as not to break the anonymity of the paper submission. Authors may want to consider using services such as GitFront or Anonymous GitHub. Additionally, authors should make sure to use account names and repository names that do not identify the authors, and should remove any comments/text in the repository that may directly identify the authors or the authors’ institution.

Papers that are not properly anonymized may be rejected without review. PC members who have a genuine conflict of interest with a paper, including the PC Co-Chairs and the Associate Chairs, will be excluded from evaluation and discussion of that paper.

While a paper is under submission to the IEEE Security & Privacy Symposium, authors may choose to give talks about their work, post a preprint of the paper to an archival repository such as arXiv, and disclose security vulnerabilities to vendors. Authors should refrain from widely advertising their results, but in special circumstances they should contact the PC chairs to discuss exceptions. Authors are not allowed to directly contact PC members to discuss their submission.

The submissions will be treated confidentially by the PC chairs and the program committee members. Program committee members are not allowed to share the submitted papers with anyone, with the exception of qualified external reviewers approved by the program committee chairs. Please contact the PC chairs if you have any questions or concerns.

Conflicts of Interest

During submission of a research paper, the submission site will request information about conflicts of interest of the paper’s authors with program committee (PC) members. It is the full responsibility of all authors of a paper to identify all and only their potential conflict-of-interest PC members, according to the following definition. A paper author has a conflict of interest with a PC member when and only when one or more of the following conditions holds:

  1. The PC member is a co-author of the paper.

  2. The PC member has been a co-worker in the same company or university within the past two years.
    • For student interns, the student is conflicted with their supervisors and with members of the same research group. If the student no longer works for the organization, then they are not conflicted with a PC member from the larger organization.
  3. The PC member has been a collaborator within the past two years.
  4. The PC member is or was the author’s primary thesis advisor, no matter how long ago.
  5. The author is or was the PC member’s primary thesis advisor, no matter how long ago.
  6. The PC member is a relative or close personal friend of the author.

For any other situation where the authors feel they have a conflict with a PC member, they must explain the nature of the conflict to the PC chairs, who will mark the conflict if appropriate. The program chairs will review declared conflicts. Papers with incorrect or incomplete conflict of interest information as of the submission closing time are subject to immediate rejection. Because it would not be possible to handle conflicts of interest retroactively, changes to the author list are not permitted after submission (see section on Authorship below).

Research Ethics Committee

Similar to 2025, IEEE S&P 2026 has a research ethics committee (REC) that will check papers flagged by reviewers as potentially including ethically fraught research. The REC will review flagged papers and may suggest to the PC Chairs rejection of a paper on ethical grounds. The REC consists of members of the PC. Authors are encouraged to review the Menlo Report for general ethical guidelines for computer and information security research.

Ethical Considerations for Vulnerability Disclosure

Where research identifies a vulnerability (e.g., software vulnerabilities in a given program, design weaknesses in a hardware system, or any other kind of vulnerability in deployed systems), we expect that researchers act in a way that avoids gratuitous harm to affected users and, where possible, affirmatively protects those users. In nearly every case, disclosing the vulnerability to vendors of affected systems, and other stakeholders, will help protect users. It is the committee’s sense that a disclosure window of 45 days https://vuls.cert.org/confluence/display/Wiki/Vulnerability+Disclosure+Policy to 90 days https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html ahead of publication is consistent with authors’ ethical obligations.

Longer disclosure windows (which may keep vulnerabilities from the public for extended periods of time) should only be considered in exceptional situations, e.g., if the affected parties have provided convincing evidence the vulnerabilities were previously unknown and the full rollout of mitigations requires additional time. The authors are encouraged to consult with the PC chairs in case of questions or concerns.

The version of the paper submitted for review must discuss in detail the steps the authors have taken or plan to take to address these vulnerabilities; but, consistent with the timelines above, the authors do not have to disclose vulnerabilities ahead of submission. If a paper raises significant ethical and/or legal concerns, it will be checked by the REC and it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions.

Note: Submitted papers should not include full CVE identifiers in order to preserve the anonymity of the submission.

Ethical Considerations for Human Subjects Research

Submissions that describe experiments that could be viewed as involving human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:

  1. Disclose whether the research received an approval or waiver from each of the authors’ institutional ethics review boards (IRB) if applicable.
  2. Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.

If a submission deals with any kind of personal identifiable information (PII) or other kinds of sensitive data, the version of the paper submitted for review must discuss in detail the steps the authors have taken to mitigate harms to the persons identified. If a paper raises significant ethical and/or legal concerns, it will be checked by the REC and it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions.

Financial and Non-financial competing interests

In the interests of transparency and to help readers form their own judgements of potential bias, the IEEE Symposium on Security & Privacy requires authors and PC members to declare any competing financial and/or non-financial interests in relation to the work described. Authors need to include a disclosure of relevant financial interests in the camera-ready versions of their papers. This includes not just the standard funding lines, but should also include disclosures of any financial interest related to the research described. For example, “Author X is on the Technical Advisory Board of the ByteCoin Foundation,” or “Professor Y is the CTO of DoubleDefense, which specializes in malware analysis.” More information regarding this policy is available here.

Page Limit and Formatting (Important Changes)

Submitted papers may include up to 13 pages of text and up to 5 pages for references and appendices, totaling no more than 18 pages. All text and figures past page 13 must be clearly marked as part of the appendix. The final camera-ready paper must be no more than 18 pages, although, at the PC chairs’ discretion, additional pages may be allowed. Reviewers are not required to read appendices.

Papers must be formatted for US letter (not A4) size paper. All submissions must use the IEEE “compsoc” conference proceedings template. LaTeX submissions using the IEEE templates must use IEEEtran.cls version 1.8b with options “conference,compsoc.” (That is, begin your LaTeX document with the line \documentclass[conference,compsoc]{IEEEtran}.). See the “IEEE Demo Template for Computer Society Conferences” Overleaf template for an example. We are not aware of an MS Word template that matches this style.

Papers that fail to use the “compsoc” template (including using the non-compsoc IEEE conference template), modify margins, font, or line spacing, or use egregious space scrunching are subject to rejection without review. Authors are responsible for verifying the paper format (e.g., compare with the above linked Overleaf template). While HotCRP provides some automated checking, the checks are limited. Note that some LaTeX packages (e.g., \usepackage{usenix}) override the compsoc formatting and must be removed.

Withdrawing Policy

A paper can be withdrawn at any point before the reviews have been sent to the authors. Once the reviews have been sent to the authors the paper can not be withdrawn.

Authorship Policy

Changes to the authorship list (adding, removing, reordering authors) are not permitted while the paper is under submission. Once the paper is accepted, the authors can request approval from the TPC Chairs to make changes to the ordering or affiliation in justified circumstances. If authors anticipate that they might change affiliation during the time the paper is under submission it is recommended to mark both the current and future institution as COI.

ORCID requirement: All authors are required to submit an ORCID number at paper submission time. Papers that do not submit ORCID numbers for all authors will be desk rejected. You can obtain an ORCID number here.

Conference Submission Server

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers.

Submission servers:
TBA

Publication and Presentation

Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to register and present the paper at the conference.

Program Committee

PC Chairs

Cristina Nita-Rotaru Northeastern University
Nicolas Papernot University of Toronto and Vector Institute and Google DeepMind

Associate Chairs

Adwait Nadkarni William & Mary
Amir Houmansadr University of Massachusetts Amherst
Andrew Paverd Microsoft
Catalin Hritcu MPI-SP
Christina Garman Purdue University
Daniele Cono D'Elia Sapienza University of Rome
David Barrera Carleton University
Florian Tramer ETH Zurich
Katerina Mitrokotsa University of St Gallen
Mathias Lecuyer University of British Columbia
Sara Rampazzi University of Florida
Sascha Fahl CISPA
Stephanie Roos University of Kaiserslautern-Landau
Varun Chandrasekaran UIUC
William Robertson Northeastern University
Ziming Zhao Northeastern University

REC Chairs

Blase Ur University of Chicago
Sofia Celi Brave

PC Members

Aaron Johnson U.S. Naval Research Laboratory
Aarushi Goel Purdue University
Aashish Kolluri Microsoft Research
AbdelRahman Abdou Carleton University
Abhiram Kothapalli University of California, Berkeley
Adam Oest Amazon
Adam Dziedzic CISPA
Adil Ahmad Arizona State University
Adrien Koutsos Inria
Ahmad-Reza Sadeghi Technical University Darmstadt
Alejandro Russo Chalmers University of Technology, Göteborg University, DPella AB
Alesia Chernikova Northeastern University
Alessandro Brighente University of Padova
Alexander Viand Intel Labs
Alexander Hoover Stevens Institute of Technology
Alexandre Debant Inria Nancy
Alexios Voulimeneas TU Delft
Ali Abbasi CISPA Helmholtz Center for Information Security
Alin Tomescu Aptos Labs
Alvaro Cardenas University of California, Santa Cruz
Amit Kumar Sikder Iowa State University
Amrita Roy Chowdhury University of Michigan, Ann Arbor
Anca Jurcut University College Dublin
Andrei Sabelfeld Chalmers University of Technology
Andrew Cullen University of Melbourne
Andrew Kwong UNC Chapel Hill
Ang Chen University of Michigan
Angelos Stavrou Virginia Tech & A2Labs
Anshuman Suri Northeastern University
Antonio Bianchi Purdue University
Anwar Hithnawi University of Toronto
Aravind Machiry Purdue University
Arslan Khan Pennsylvania State University
Arthur Gervais UCL
Arthur Azevedo de Amorim Rochester Institute of Technology
Ashwinee Panda Postdoctoral Fellow, UMD College Park
Atul Prakash University of Michigan, Ann Arbor
Aviv Yaish Yale University
Awais Rashid University of Bristol, UK
Aysajan Abidin COSIC KU Leuven
Bailey Kacsmar University of Alberta
Bart Coppens Ghent University
Ben Zhao University of Chicago
Ben Weintraub Northeastern University
Benjamin Beurdouche Mozilla
Benny Pinkas Apple and Bar-Ilan University
Bijeeta Pal Snap Inc.
Bimal Viswanath Virginia Tech
Binghui Wang Illinois Institute of Technology
Bo Chen Michigan Technological University
Bogdan Carbunar Florida International University
Boris Köpf Azure Research, Microsoft
Brendan Saltaformaggio Georgia Tech
Byoungyoung Lee Seoul National University
Carrie Gates FS-ISAC
Cas Cremers CISPA Helmholtz Center for Information Security
Chaowei Xiao University of Wisconsin, Madison
Chengyu Song UC Riverside
Christian Wressnegger Karlsruhe Institute of Technology (KIT)
Christof Ferreira Torres INESC-ID / Instituto Superior Técnico (IST), University of Lisbon
Christopher A. Choquette-Choo Google DeepMind
Clara Schneidewind MPI-SP
Claudio Soriente NEC Labs Europe
Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security
Dana Drachsler-Cohen Technion
Daniel Genkin Georgia Tech
Daniel Jost Blanqet
Daniele Antonioli EURECOM
Dario Pasquini RSAC Labs
Dave (Jing) Tian Purdue University
David Heath University of Illinois Urbana-Champaign
David Zage Intel Corporation
Deepak Garg Max Planck Institute for Software Systems
Dimitris Kolonelos UC Berkeley
Dominik Wermke North Carolina State University
Doreen Riepel CISPA Helmholtz Center for Information Security
Eleonora Losiouk University of Padua
Elisa Bertino Purdue University
Elisaweta Masserova Carnegie Mellon University
Emiliano De Cristofaro UC Riverside
Emily Wenger Duke University
Emma Dauterman Stanford University
Eric Pauley University of Wisconsin–Madison
Eugene Bagdasarian University of Massachusetts Amherst, Google Research
Evgenios Kornaropoulos George Mason University
Eyal Ronen Tel Aviv University
Eysa Lee Barnard College
Fabian Monrose Georgia Institute of Technology
Fabio De Gaspari Sapienza University of Rome
Fabio Pierazzi University College London
Faysal Hossain Shezan University of Texas at Arlington
Feargus Pendlebury Meta
Florian Kerschbaum University of Waterloo
Fnu Suya University of Tennessee, Knoxville
Frank Piessens KU Leuven
Frank Li Georgia Institute of Technology
Franziska Boenisch CISPA
Gary Tan Penn State University
Ghada Almashaqbeh University of Connecticut
Ghassan Karame Ruhr University Bochum
Giorgio Severi Microsoft
Giovanni Camurati ETH Zurich
Grant Ho University of Chicago
Guanhong Tao University of Utah
Habiba Farrukh University of California, Irvine
Haipeng Cai University at Buffalo, SUNY
Hans Hanley Meta
Hanshen Xiao Purdue University/NVIDIA
Haya Schulmann Goethe-Universität Frankfurt
Heather Zheng University of Chicago
Heng Yin UC Riverside
Hervé Debar Télécom SudParis
Hieu Le Independent Researcher
Hiraku Morita Aarhus University
Hongxin Hu University at Buffalo
Hugo Lefeuvre The University of British Columbia
Hyungsub Kim Indiana University Bloomington
Ian Miers University of Maryland
Ilia Shumailov Google DeepMind
Imtiaz Karim Purdue University
Insu Yun KAIST
Ioana Boureanu Surrey Centre for Cyber Security
Ioannis Demertzis UCSC
Ivan De Oliveira Nunes University of Zurich
Ivan Evtimov Meta
Jamie Hayes Google DeepMind
Jana Hofmann Max Planck Institute for Security and Privacy (MPI-SP)
Jason Nieh Columbia University
Javier Carnerero-Cano IBM Research Europe/Imperial College London
Jay Bosamiya Microsoft Research
Jean-Luc Watson NVIDIA
Jean-Philippe Monteuuis Qualcomm
Jeremiah Blocki Purdue University
Jian Liu Zhejiang University
Jianliang Wu Simon Fraser University
Jingxuan He UC Berkeley
Jinyuan Jia The Pennsylvania State University
Jiska Classen Hasso Plattner Institute, University of Potsdam
John Mitchell Stanford University
Jon McCune Google
Jonas Hielscher CISPA Helmholtz Center for Information Security
Jonathan Katz Google
Joseph Lallemand CNRS, IRISA, Univ. Rennes
Joshua Gancher Northeastern University
Julia Len UNC Chapel Hill
Kari Kostiainen ETH Zurich
Karthikeyan Bhargavan Cryspen
Kartik Nayak Duke University
Kasper Rasmussen University of Oxford
Kassem Fawaz University of Wisconsin-Madison
Kathrin Grosse IBM Research
Kaushal Kafle University of South Florida
Keewoo Lee UC Berkeley
Kelsey Fulton Colorado School of Mines
Kentrell Owens University of Washington
Kexin Pei The University of Chicago
Klaus v. Gleissenthall VU Amsterdam
Konrad Rieck BIFOLD & TU Berlin
Lachlan Gunn Aalto University
Lea Schönherr CISPA Helmholtz Center for Information Security
Lenka Mareková ETH Zurich
Lesly-Ann Daniel KU Leuven
Lianying Zhao Carleton University
Limin Jia Carnegie Mellon University
Lorenzo Cavallaro University College London
Lorenzo De Carli University of Calgary
Lucianna Kiffer IMDEA Networks
Lujo Bauer Carnegie Mellon University
Lydia Zakynthinou UC Berkeley
Mahak Pancholi IMDEA Software Institute
Mahmood Sharif Tel Aviv University
Man-Ki Yoon North Carolina State University
Marco Squarcina TU Wien
Marco Guarnieri IMDEA Software Institute
Marcus Botacin Texas A&M University
Mario D'Onghia University College London
Martin Henze RWTH Aachen University & Fraunhofer FKIE
Marzieh Bitaab Amazon
Matthew Lentz Duke University
Matthew Jones Google
Matthew Jagielski Google DeepMind
Maura Pintor University of Cagliari
Mauro Conti University of Padova
Meera Sridhar University of North Carolina Charlotte
Michael Hicks Amazon Web Services and University of Maryland
Michelle Mazurek University of Maryland
Milad Nasr Google Deepmind
Miuyin Yong Wong University of Maryland
Mohannad Alhanahnah Chalmers University
Moritz Schloegel Arizona State University
Mridula Singh CISPA Helmholtz Center for Information Security
Mu Zhang University of Utah
Muhammad Ikram Macquarie University
Muoi Tran Chalmers University of Technology
Murtuza Jadliwala University of Texas at San Antonio
Muslum Ozgur Ozmen Arizona State University
Nader Sehatbakhsh UCLA
Natalia Stakhanova University of Saskathchewan, Canada
Nathan Malkin New Jersey Institute of Technology
Neil Gong Duke University
Nguyen Phong Hoang University of British Columbia
Nidhi Hegde University of Alberta
Nikita Borisov University of Illinois at Urbana-Champaign
Nils Lukas MBZUAI
Ning Zhang Washington University in St. Louis
Ning Luo University of Illinois Urbana-Champaign
Ninghui Li Purdue University
Nuno Santos INESC-ID / Instituto Superior Técnico, University of Lisbon
Olya Ohrimenko The University of Melbourne
Om Thakkar OpenAI
Omar Chowdhury Stony Brook University
Orfeas Stefanos Thyfronitis Litos Imperial College London
Pedro Moreno-Sanchez IMDEA Software Institute
Peng Gao Virginia Tech
Phani Vadrevu Louisiana State University
Piyush Kumar University of Michigan
Pramod Bhatotia TU Munich
Pratik Sarkar Supra Research
Pratyush Mishra University of Pennsylvania
Priyanka Nanayakkara Harvard University
Qiben Yan Michigan State University
Raouf Kerkouche CISPA Helmholtz Center for Information Security
Ravishankar Borgaonkar University of Stavanger and SINTEF AS
Reethika Ramesh Palo Alto Networks
Reihaneh Safavi-Naini University of Calgary
Rex Fernando Aptos Labs
Rohit Sinha Hashgraph
Ryan Sheatsley University of Wisconsin–Madison
Saeed Mahloujifar Meta
Sahar Abdelnabi Microsoft
Saikrishna Badrinarayanan LinkedIn
Sajin Sasy CISPA Helmholtz Center for Information Security
Sam Kumar University of California, Los Angeles
Saman Zonouz Georgia Tech
Samuel Marchal VTT Technical Research Centre of Finland
Sandra Siby New York University Abu Dhabi
Sanghyun Hong Oregon State University
Santiago Zanella-Beguelin Microsoft
Santiago Torres-Arias Purdue University
Sarbartha Banerjee University of Texas at Austin
Sathvik Prasad North Carolina State University
Sebastian Angel University of Pennsylvania
Sebastian Szyller Intel
Sébastien Gambs Université du Québec à Montréal
Sébastien Bardin CEA List & Université Paris Saclay
Shagufta Mehnaz The Pennsylvania State University
Shih-Wei Li National Taiwan University
Shimaa Ahmed Visa Research
Shuang Song Google
Shweta Shinde ETH Zurich
Siddharth Garg New York University
Simon Oya The University of British Columbia (UBC)
Soteris Demetriou Imperial College London
Sourav Das University of Illinois at Urbana Champaign
Srdjan Capkun ETH Zurich
Stéphanie Delaune Univ Rennes, CNRS, IRISA, France
Stephen Herwig William & Mary
Steve Kremer Inria, Nancy, France
Sunil Manandhar IBM Research
Sven Bugiel CISPA Helmholtz Center for Information Security
Swarn Priya Virginia Tech
Syed Rafiul Hussain Pennsylvania State University
Sze Yiu Chau The Chinese University of Hong Kong
Tahina Ramananandro Microsoft Research
Tapti Palit UC Davis
Teodora Baluta Georgia Institute of Technology
Thang Hoang Virginia Tech
Thomas Pasquier University of British Columbia
Thomas Ristenpart Cornell Tech
Thomas Nyman Ericsson
Thorsten Eisenhofer BIFOLD & TU Berlin
Thorsten Holz CISPA Helmholtz Center for Information Security
Tiago Heinrich max planck institute for informatics
Tianhao Wang University of Virginia
Tiantian Gong Yale University
Ting Wang Stony Brook University
Tobias Fiebig Max-Planck-Institut für Informatik
Ulfar Erlingsson Google Cloud
Urs Hengartner University of Waterloo
Varun Madathil Yale University
Vincent Laporte Inria Nancy
Vinu Joseph Nvidia Research
Vladimir Kolesnikov Georgia Tech
Wajih Ul Hassan University of Virginia
Wanrong Zhang TikTok Inc.
Weilin Xu Intel
Wenbo Guo UCSB
Wenhai Sun Purdue University
Wenjing Lou Virginia Tech
Wenke Lee Georgia Institute of Technology
Xavier de Carné de Carnavalet Radboud University
Xiao Wang Northwestern University
Yigitcan Kaya UC Santa Barbara
Yiling He University College London
Yinzhi Cao Johns Hopkins University
Yizheng Chen University of Maryland
Yongdae Kim KAIST
Yossi Oren Ben-Gurion University of the Negev, Israel
Yousra Aafer University of Waterloo
Yu Ding Google Deepmind
Yuan Tian University of California, Los Angeles
Yuan Hong University of Connecticut
Yuchen Yang Johns Hopkins University
Yunang Chen Google
Yunming Xiao University of Michigan
Yupeng Zhang UIUC
Yuzhe Tang Syracuse University
Z. Berkay Celik Purdue University
Zahra Ghodsi Purdue University
Zhiqiang Lin Ohio State University
Zhuoqing Mao University of Michigan
Zimo Chai Stanford University & UC Berkeley