MAY 18-21, 2026 AT THE HILTON SAN FRANCISCO UNION SQUARE, SAN FRANCISCO, CA
47th IEEE Symposium on
Security and Privacy
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice.
Topics of interest include:
This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io.
Similar to 2025, for each submission, one of the following decisions will be made:
Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference. Within one month of acceptance, all accepted papers must submit a camera-ready copy incorporating reviewer feedback. The papers will immediately be published, open access, in the Computer Society’s Digital Library, and they may be cited as “To appear in the IEEE Symposium on Security & Privacy, May 2026”.
Reject: Papers in this category are declined for inclusion in the conference. Rejected papers must wait for one year, from the date of original submission, to resubmit to IEEE S&P. A paper will be judged to be a resubmit (as opposed to a new submission) if the paper is from the same or similar authors, and a reviewer could write a substantially similar summary of the paper compared with the original submission. As a rule of thumb, if there is more than 40% overlap between the original submission and the new paper, it will be considered a resubmission.
Public Meta-Reviews: Similar to 2025, all accepted papers will be
published with a meta-review (< 500 words) in the final PDF that
lists: (a) the reasons the PC decided to accept the paper and (b)
concerns the PC has with the paper. Authors will be given the option
to write a response to the meta-review (< 500 words) which will be
published as part of the meta-review. Authors will be given a draft
meta-review at the time of acceptance. Authors will be given the
option of addressing some or all of the concerns within one review cycle. A shepherd will remove concerns from the meta-review if they are sufficiently addressed by the revisions.
The goal of this process is to provide greater transparency and to better scope change requests made by reviewers. More information about the reasons behind this change can be found on the 2024 IEEE S&P website.
The number of papers accepted to IEEE S&P continues to grow substantially each year. Due to conference venue limitations and costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes, length determined based on the number of accepted papers) and (b) a poster presentation immediately following the talk session containing the paper. All accepted papers are required to present both a short talk and a poster.
All deadlines are 23:59:59 AoE (UTC-12).
Papers reaching the second round of reviewing will be given an opportunity to write a rebuttal to reviewer questions. The rebuttal period will be interactive, and is separate from the meta-review rebuttal given to accepted papers.
Authors have the opportunity to exchange messages with the reviewers and respond to questions asked. To this end, we will use HotCRP’s anonymous communication feature to enable a communication channel between authors and reviewers. The authors should mainly focus on factual errors in the reviews and concrete questions posed by the reviewers. New research results can also be discussed if they help to clarify open questions. More instructions will be sent out to the authors at the beginning of the rebuttal period.
As with previous IEEE S&P symposia with multiple submission cycles, rejected papers must wait one year before resubmission to IEEE S&P.
These instructions apply to both the research papers and systematization of knowledge (SoK) papers. All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy.
Papers must be submitted in a form suitable for anonymous review: no author names or affiliations (whether they are real or the default fake names included in the IEEE template) may appear on the title page, and papers should avoid revealing authors’ identity in the text. Authors should also take care in not including acknowledgments that help identify them (e.g., funding information, names of colleagues who gave feedback on the paper). When referring to their previous work, authors are required to cite their papers in the third person, without identifying themselves. In the unusual case in which a third-person reference is infeasible, authors can blind the reference itself.
When preparing the artifacts repository authors should take extra care to not include authors’ information in the repository or artifacts content, so as not to break the anonymity of the paper submission. Authors may want to consider using services such as GitFront or Anonymous GitHub. Additionally, authors should make sure to use account names and repository names that do not identify the authors, and should remove any comments/text in the repository that may directly identify the authors or the authors’ institution.
Papers that are not properly anonymized may be rejected without review. PC members who have a genuine conflict of interest with a paper, including the PC Co-Chairs and the Associate Chairs, will be excluded from evaluation and discussion of that paper.
While a paper is under submission to the IEEE Security & Privacy Symposium, authors may choose to give talks about their work, post a preprint of the paper to an archival repository such as arXiv, and disclose security vulnerabilities to vendors. Authors should refrain from widely advertising their results, but in special circumstances they should contact the PC chairs to discuss exceptions. Authors are not allowed to directly contact PC members to discuss their submission.
The submissions will be treated confidentially by the PC chairs and the program committee members. Program committee members are not allowed to share the submitted papers with anyone, with the exception of qualified external reviewers approved by the program committee chairs. Please contact the PC chairs if you have any questions or concerns.
During submission of a research paper, the submission site will request information about conflicts of interest of the paper’s authors with program committee (PC) members. It is the full responsibility of all authors of a paper to identify all and only their potential conflict-of-interest PC members, according to the following definition. A paper author has a conflict of interest with a PC member when and only when one or more of the following conditions holds:
The PC member is a co-author of the paper.
For any other situation where the authors feel they have a conflict with a PC member, they must explain the nature of the conflict to the PC chairs, who will mark the conflict if appropriate. The program chairs will review declared conflicts. Papers with incorrect or incomplete conflict of interest information as of the submission closing time are subject to immediate rejection. Because it would not be possible to handle conflicts of interest retroactively, changes to the author list are not permitted after submission (see section on Authorship below).
Similar to 2025, IEEE S&P 2026 has a research ethics committee (REC) that will check papers flagged by reviewers as potentially including ethically fraught research. The REC will review flagged papers and may suggest to the PC Chairs rejection of a paper on ethical grounds. The REC consists of members of the PC. Authors are encouraged to review the Menlo Report for general ethical guidelines for computer and information security research.
Where research identifies a vulnerability (e.g., software vulnerabilities in a given program, design weaknesses in a hardware system, or any other kind of vulnerability in deployed systems), we expect that researchers act in a way that avoids gratuitous harm to affected users and, where possible, affirmatively protects those users. In nearly every case, disclosing the vulnerability to vendors of affected systems, and other stakeholders, will help protect users. It is the committee’s sense that a disclosure window of 45 days https://vuls.cert.org/confluence/display/Wiki/Vulnerability+Disclosure+Policy to 90 days https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html ahead of publication is consistent with authors’ ethical obligations.
Longer disclosure windows (which may keep vulnerabilities from the public for extended periods of time) should only be considered in exceptional situations, e.g., if the affected parties have provided convincing evidence the vulnerabilities were previously unknown and the full rollout of mitigations requires additional time. The authors are encouraged to consult with the PC chairs in case of questions or concerns.
The version of the paper submitted for review must discuss in detail the steps the authors have taken or plan to take to address these vulnerabilities; but, consistent with the timelines above, the authors do not have to disclose vulnerabilities ahead of submission. If a paper raises significant ethical and/or legal concerns, it will be checked by the REC and it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions.
Note: Submitted papers should not include full CVE identifiers in order to preserve the anonymity of the submission.
Submissions that describe experiments that could be viewed as involving human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:
If a submission deals with any kind of personal identifiable information (PII) or other kinds of sensitive data, the version of the paper submitted for review must discuss in detail the steps the authors have taken to mitigate harms to the persons identified. If a paper raises significant ethical and/or legal concerns, it will be checked by the REC and it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions.
In the interests of transparency and to help readers form their own judgements of potential bias, the IEEE Symposium on Security & Privacy requires authors and PC members to declare any competing financial and/or non-financial interests in relation to the work described. Authors need to include a disclosure of relevant financial interests in the camera-ready versions of their papers. This includes not just the standard funding lines, but should also include disclosures of any financial interest related to the research described. For example, “Author X is on the Technical Advisory Board of the ByteCoin Foundation,” or “Professor Y is the CTO of DoubleDefense, which specializes in malware analysis.” More information regarding this policy is available here.
Submitted papers may include up to 13 pages of text and up to 5 pages for references and appendices, totaling no more than 18 pages. All text and figures past page 13 must be clearly marked as part of the appendix. The final camera-ready paper must be no more than 18 pages, although, at the PC chairs’ discretion, additional pages may be allowed. Reviewers are not required to read appendices.
Papers must be formatted for US letter (not A4) size paper. All submissions must use the IEEE “compsoc” conference proceedings template. LaTeX submissions using the IEEE templates must use IEEEtran.cls version 1.8b with options “conference,compsoc.” (That is, begin your LaTeX document with the line \documentclass[conference,compsoc]{IEEEtran}.). See the “IEEE Demo Template for Computer Society Conferences” Overleaf template for an example. We are not aware of an MS Word template that matches this style.
Papers that fail to use the “compsoc” template (including using the non-compsoc IEEE conference template), modify margins, font, or line spacing, or use egregious space scrunching are subject to rejection without review. Authors are responsible for verifying the paper format (e.g., compare with the above linked Overleaf template). While HotCRP provides some automated checking, the checks are limited. Note that some LaTeX packages (e.g., \usepackage{usenix}) override the compsoc formatting and must be removed.
A paper can be withdrawn at any point before the reviews have been sent to the authors. Once the reviews have been sent to the authors the paper can not be withdrawn.
Changes to the authorship list (adding, removing, reordering authors) are not permitted while the paper is under submission. Once the paper is accepted, the authors can request approval from the TPC Chairs to make changes to the ordering or affiliation in justified circumstances. If authors anticipate that they might change affiliation during the time the paper is under submission it is recommended to mark both the current and future institution as COI.
ORCID requirement: All authors are required to submit an ORCID number at paper submission time. Papers that do not submit ORCID numbers for all authors will be desk rejected. You can obtain an ORCID number here.
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers.
Submission servers:
TBA
Authors are responsible for obtaining appropriate publication clearances. One of the authors of the accepted paper is expected to register and present the paper at the conference.
Cristina Nita-Rotaru | Northeastern University |
Nicolas Papernot | University of Toronto and Vector Institute and Google DeepMind |
Adwait Nadkarni | William & Mary |
Amir Houmansadr | University of Massachusetts Amherst |
Andrew Paverd | Microsoft |
Catalin Hritcu | MPI-SP |
Christina Garman | Purdue University |
Daniele Cono D'Elia | Sapienza University of Rome |
David Barrera | Carleton University |
Florian Tramer | ETH Zurich |
Katerina Mitrokotsa | University of St Gallen |
Mathias Lecuyer | University of British Columbia |
Sara Rampazzi | University of Florida |
Sascha Fahl | CISPA |
Stephanie Roos | University of Kaiserslautern-Landau |
Varun Chandrasekaran | UIUC |
William Robertson | Northeastern University |
Ziming Zhao | Northeastern University |
Blase Ur | University of Chicago |
Sofia Celi | Brave |
Aaron Johnson | U.S. Naval Research Laboratory |
Aarushi Goel | Purdue University |
Aashish Kolluri | Microsoft Research |
AbdelRahman Abdou | Carleton University |
Abhiram Kothapalli | University of California, Berkeley |
Adam Oest | Amazon |
Adam Dziedzic | CISPA |
Adil Ahmad | Arizona State University |
Adrien Koutsos | Inria |
Ahmad-Reza Sadeghi | Technical University Darmstadt |
Alejandro Russo | Chalmers University of Technology, Göteborg University, DPella AB |
Alesia Chernikova | Northeastern University |
Alessandro Brighente | University of Padova |
Alexander Viand | Intel Labs |
Alexander Hoover | Stevens Institute of Technology |
Alexandre Debant | Inria Nancy |
Alexios Voulimeneas | TU Delft |
Ali Abbasi | CISPA Helmholtz Center for Information Security |
Alin Tomescu | Aptos Labs |
Alvaro Cardenas | University of California, Santa Cruz |
Amit Kumar Sikder | Iowa State University |
Amrita Roy Chowdhury | University of Michigan, Ann Arbor |
Anca Jurcut | University College Dublin |
Andrei Sabelfeld | Chalmers University of Technology |
Andrew Cullen | University of Melbourne |
Andrew Kwong | UNC Chapel Hill |
Ang Chen | University of Michigan |
Angelos Stavrou | Virginia Tech & A2Labs |
Anshuman Suri | Northeastern University |
Antonio Bianchi | Purdue University |
Anwar Hithnawi | University of Toronto |
Aravind Machiry | Purdue University |
Arslan Khan | Pennsylvania State University |
Arthur Gervais | UCL |
Arthur Azevedo de Amorim | Rochester Institute of Technology |
Ashwinee Panda | Postdoctoral Fellow, UMD College Park |
Atul Prakash | University of Michigan, Ann Arbor |
Aviv Yaish | Yale University |
Awais Rashid | University of Bristol, UK |
Aysajan Abidin | COSIC KU Leuven |
Bailey Kacsmar | University of Alberta |
Bart Coppens | Ghent University |
Ben Zhao | University of Chicago |
Ben Weintraub | Northeastern University |
Benjamin Beurdouche | Mozilla |
Benny Pinkas | Apple and Bar-Ilan University |
Bijeeta Pal | Snap Inc. |
Bimal Viswanath | Virginia Tech |
Binghui Wang | Illinois Institute of Technology |
Bo Chen | Michigan Technological University |
Bogdan Carbunar | Florida International University |
Boris Köpf | Azure Research, Microsoft |
Brendan Saltaformaggio | Georgia Tech |
Byoungyoung Lee | Seoul National University |
Carrie Gates | FS-ISAC |
Cas Cremers | CISPA Helmholtz Center for Information Security |
Chaowei Xiao | University of Wisconsin, Madison |
Chengyu Song | UC Riverside |
Christian Wressnegger | Karlsruhe Institute of Technology (KIT) |
Christof Ferreira Torres | INESC-ID / Instituto Superior Técnico (IST), University of Lisbon |
Christopher A. Choquette-Choo | Google DeepMind |
Clara Schneidewind | MPI-SP |
Claudio Soriente | NEC Labs Europe |
Cristian-Alexandru Staicu | CISPA Helmholtz Center for Information Security |
Dana Drachsler-Cohen | Technion |
Daniel Genkin | Georgia Tech |
Daniel Jost | Blanqet |
Daniele Antonioli | EURECOM |
Dario Pasquini | RSAC Labs |
Dave (Jing) Tian | Purdue University |
David Heath | University of Illinois Urbana-Champaign |
David Zage | Intel Corporation |
Deepak Garg | Max Planck Institute for Software Systems |
Dimitris Kolonelos | UC Berkeley |
Dominik Wermke | North Carolina State University |
Doreen Riepel | CISPA Helmholtz Center for Information Security |
Eleonora Losiouk | University of Padua |
Elisa Bertino | Purdue University |
Elisaweta Masserova | Carnegie Mellon University |
Emiliano De Cristofaro | UC Riverside |
Emily Wenger | Duke University |
Emma Dauterman | Stanford University |
Eric Pauley | University of Wisconsin–Madison |
Eugene Bagdasarian | University of Massachusetts Amherst, Google Research |
Evgenios Kornaropoulos | George Mason University |
Eyal Ronen | Tel Aviv University |
Eysa Lee | Barnard College |
Fabian Monrose | Georgia Institute of Technology |
Fabio De Gaspari | Sapienza University of Rome |
Fabio Pierazzi | University College London |
Faysal Hossain Shezan | University of Texas at Arlington |
Feargus Pendlebury | Meta |
Florian Kerschbaum | University of Waterloo |
Fnu Suya | University of Tennessee, Knoxville |
Frank Piessens | KU Leuven |
Frank Li | Georgia Institute of Technology |
Franziska Boenisch | CISPA |
Gary Tan | Penn State University |
Ghada Almashaqbeh | University of Connecticut |
Ghassan Karame | Ruhr University Bochum |
Giorgio Severi | Microsoft |
Giovanni Camurati | ETH Zurich |
Grant Ho | University of Chicago |
Guanhong Tao | University of Utah |
Habiba Farrukh | University of California, Irvine |
Haipeng Cai | University at Buffalo, SUNY |
Hans Hanley | Meta |
Hanshen Xiao | Purdue University/NVIDIA |
Haya Schulmann | Goethe-Universität Frankfurt |
Heather Zheng | University of Chicago |
Heng Yin | UC Riverside |
Hervé Debar | Télécom SudParis |
Hieu Le | Independent Researcher |
Hiraku Morita | Aarhus University |
Hongxin Hu | University at Buffalo |
Hugo Lefeuvre | The University of British Columbia |
Hyungsub Kim | Indiana University Bloomington |
Ian Miers | University of Maryland |
Ilia Shumailov | Google DeepMind |
Imtiaz Karim | Purdue University |
Insu Yun | KAIST |
Ioana Boureanu | Surrey Centre for Cyber Security |
Ioannis Demertzis | UCSC |
Ivan De Oliveira Nunes | University of Zurich |
Ivan Evtimov | Meta |
Jamie Hayes | Google DeepMind |
Jana Hofmann | Max Planck Institute for Security and Privacy (MPI-SP) |
Jason Nieh | Columbia University |
Javier Carnerero-Cano | IBM Research Europe/Imperial College London |
Jay Bosamiya | Microsoft Research |
Jean-Luc Watson | NVIDIA |
Jean-Philippe Monteuuis | Qualcomm |
Jeremiah Blocki | Purdue University |
Jian Liu | Zhejiang University |
Jianliang Wu | Simon Fraser University |
Jingxuan He | UC Berkeley |
Jinyuan Jia | The Pennsylvania State University |
Jiska Classen | Hasso Plattner Institute, University of Potsdam |
John Mitchell | Stanford University |
Jon McCune | |
Jonas Hielscher | CISPA Helmholtz Center for Information Security |
Jonathan Katz | |
Joseph Lallemand | CNRS, IRISA, Univ. Rennes |
Joshua Gancher | Northeastern University |
Julia Len | UNC Chapel Hill |
Kari Kostiainen | ETH Zurich |
Karthikeyan Bhargavan | Cryspen |
Kartik Nayak | Duke University |
Kasper Rasmussen | University of Oxford |
Kassem Fawaz | University of Wisconsin-Madison |
Kathrin Grosse | IBM Research |
Kaushal Kafle | University of South Florida |
Keewoo Lee | UC Berkeley |
Kelsey Fulton | Colorado School of Mines |
Kentrell Owens | University of Washington |
Kexin Pei | The University of Chicago |
Klaus v. Gleissenthall | VU Amsterdam |
Konrad Rieck | BIFOLD & TU Berlin |
Lachlan Gunn | Aalto University |
Lea Schönherr | CISPA Helmholtz Center for Information Security |
Lenka Mareková | ETH Zurich |
Lesly-Ann Daniel | KU Leuven |
Lianying Zhao | Carleton University |
Limin Jia | Carnegie Mellon University |
Lorenzo Cavallaro | University College London |
Lorenzo De Carli | University of Calgary |
Lucianna Kiffer | IMDEA Networks |
Lujo Bauer | Carnegie Mellon University |
Lydia Zakynthinou | UC Berkeley |
Mahak Pancholi | IMDEA Software Institute |
Mahmood Sharif | Tel Aviv University |
Man-Ki Yoon | North Carolina State University |
Marco Squarcina | TU Wien |
Marco Guarnieri | IMDEA Software Institute |
Marcus Botacin | Texas A&M University |
Mario D'Onghia | University College London |
Martin Henze | RWTH Aachen University & Fraunhofer FKIE |
Marzieh Bitaab | Amazon |
Matthew Lentz | Duke University |
Matthew Jones | |
Matthew Jagielski | Google DeepMind |
Maura Pintor | University of Cagliari |
Mauro Conti | University of Padova |
Meera Sridhar | University of North Carolina Charlotte |
Michael Hicks | Amazon Web Services and University of Maryland |
Michelle Mazurek | University of Maryland |
Milad Nasr | Google Deepmind |
Miuyin Yong Wong | University of Maryland |
Mohannad Alhanahnah | Chalmers University |
Moritz Schloegel | Arizona State University |
Mridula Singh | CISPA Helmholtz Center for Information Security |
Mu Zhang | University of Utah |
Muhammad Ikram | Macquarie University |
Muoi Tran | Chalmers University of Technology |
Murtuza Jadliwala | University of Texas at San Antonio |
Muslum Ozgur Ozmen | Arizona State University |
Nader Sehatbakhsh | UCLA |
Natalia Stakhanova | University of Saskathchewan, Canada |
Nathan Malkin | New Jersey Institute of Technology |
Neil Gong | Duke University |
Nguyen Phong Hoang | University of British Columbia |
Nidhi Hegde | University of Alberta |
Nikita Borisov | University of Illinois at Urbana-Champaign |
Nils Lukas | MBZUAI |
Ning Zhang | Washington University in St. Louis |
Ning Luo | University of Illinois Urbana-Champaign |
Ninghui Li | Purdue University |
Nuno Santos | INESC-ID / Instituto Superior Técnico, University of Lisbon |
Olya Ohrimenko | The University of Melbourne |
Om Thakkar | OpenAI |
Omar Chowdhury | Stony Brook University |
Orfeas Stefanos Thyfronitis Litos | Imperial College London |
Pedro Moreno-Sanchez | IMDEA Software Institute |
Peng Gao | Virginia Tech |
Phani Vadrevu | Louisiana State University |
Piyush Kumar | University of Michigan |
Pramod Bhatotia | TU Munich |
Pratik Sarkar | Supra Research |
Pratyush Mishra | University of Pennsylvania |
Priyanka Nanayakkara | Harvard University |
Qiben Yan | Michigan State University |
Raouf Kerkouche | CISPA Helmholtz Center for Information Security |
Ravishankar Borgaonkar | University of Stavanger and SINTEF AS |
Reethika Ramesh | Palo Alto Networks |
Reihaneh Safavi-Naini | University of Calgary |
Rex Fernando | Aptos Labs |
Rohit Sinha | Hashgraph |
Ryan Sheatsley | University of Wisconsin–Madison |
Saeed Mahloujifar | Meta |
Sahar Abdelnabi | Microsoft |
Saikrishna Badrinarayanan | |
Sajin Sasy | CISPA Helmholtz Center for Information Security |
Sam Kumar | University of California, Los Angeles |
Saman Zonouz | Georgia Tech |
Samuel Marchal | VTT Technical Research Centre of Finland |
Sandra Siby | New York University Abu Dhabi |
Sanghyun Hong | Oregon State University |
Santiago Zanella-Beguelin | Microsoft |
Santiago Torres-Arias | Purdue University |
Sarbartha Banerjee | University of Texas at Austin |
Sathvik Prasad | North Carolina State University |
Sebastian Angel | University of Pennsylvania |
Sebastian Szyller | Intel |
Sébastien Gambs | Université du Québec à Montréal |
Sébastien Bardin | CEA List & Université Paris Saclay |
Shagufta Mehnaz | The Pennsylvania State University |
Shih-Wei Li | National Taiwan University |
Shimaa Ahmed | Visa Research |
Shuang Song | |
Shweta Shinde | ETH Zurich |
Siddharth Garg | New York University |
Simon Oya | The University of British Columbia (UBC) |
Soteris Demetriou | Imperial College London |
Sourav Das | University of Illinois at Urbana Champaign |
Srdjan Capkun | ETH Zurich |
Stéphanie Delaune | Univ Rennes, CNRS, IRISA, France |
Stephen Herwig | William & Mary |
Steve Kremer | Inria, Nancy, France |
Sunil Manandhar | IBM Research |
Sven Bugiel | CISPA Helmholtz Center for Information Security |
Swarn Priya | Virginia Tech |
Syed Rafiul Hussain | Pennsylvania State University |
Sze Yiu Chau | The Chinese University of Hong Kong |
Tahina Ramananandro | Microsoft Research |
Tapti Palit | UC Davis |
Teodora Baluta | Georgia Institute of Technology |
Thang Hoang | Virginia Tech |
Thomas Pasquier | University of British Columbia |
Thomas Ristenpart | Cornell Tech |
Thomas Nyman | Ericsson |
Thorsten Eisenhofer | BIFOLD & TU Berlin |
Thorsten Holz | CISPA Helmholtz Center for Information Security |
Tiago Heinrich | max planck institute for informatics |
Tianhao Wang | University of Virginia |
Tiantian Gong | Yale University |
Ting Wang | Stony Brook University |
Tobias Fiebig | Max-Planck-Institut für Informatik |
Ulfar Erlingsson | Google Cloud |
Urs Hengartner | University of Waterloo |
Varun Madathil | Yale University |
Vincent Laporte | Inria Nancy |
Vinu Joseph | Nvidia Research |
Vladimir Kolesnikov | Georgia Tech |
Wajih Ul Hassan | University of Virginia |
Wanrong Zhang | TikTok Inc. |
Weilin Xu | Intel |
Wenbo Guo | UCSB |
Wenhai Sun | Purdue University |
Wenjing Lou | Virginia Tech |
Wenke Lee | Georgia Institute of Technology |
Xavier de Carné de Carnavalet | Radboud University |
Xiao Wang | Northwestern University |
Yigitcan Kaya | UC Santa Barbara |
Yiling He | University College London |
Yinzhi Cao | Johns Hopkins University |
Yizheng Chen | University of Maryland |
Yongdae Kim | KAIST |
Yossi Oren | Ben-Gurion University of the Negev, Israel |
Yousra Aafer | University of Waterloo |
Yu Ding | Google Deepmind |
Yuan Tian | University of California, Los Angeles |
Yuan Hong | University of Connecticut |
Yuchen Yang | Johns Hopkins University |
Yunang Chen | |
Yunming Xiao | University of Michigan |
Yupeng Zhang | UIUC |
Yuzhe Tang | Syracuse University |
Z. Berkay Celik | Purdue University |
Zahra Ghodsi | Purdue University |
Zhiqiang Lin | Ohio State University |
Zhuoqing Mao | University of Michigan |
Zimo Chai | Stanford University & UC Berkeley |