Program Committee

Program Chairs

Area Chairs

  • Software and Web Security: Manuel Egele, Boston University
  • Network Security: Guofei Gu, Texas A&M University
  • Formal Methods and PL: Michael Hicks, University of Maryland
  • System Security: Zhiqiang Lin, Ohio State University
  • Applied Cryptography: Mike Rosulek, Oregon State University
  • Privacy: Adam Smith, Boston University
  • Authentication/Authorization and ML: Ninghui Li, Purdue University
  • Blockchain, Smart Contract and Distributed System Security: Andrew Miller, UIUC

Other Committee Members

  • Gail-Joon Ahn, Arizona State University and SAMSUNG Research
  • Sumayah Alrwais, King Saud University
  • Owen Arden, UC Santa Cruz
  • Adam Aviv, United States Naval Academy
  • Erman Ayday, Case Western Reserve University/Bilkent University
  • Michael Backes, CISPA Helmholtz Center for Information Security
  • Gilles Barthe, IMDEA Software Institute
  • Raef Bassily, Ohio State University
  • Lujo Bauer, Carnegie Mellon University
  • Mihir Bellare, UC San Diego
  • Karthikeyan Bhargavan, INRIA
  • Leyla Bilge, Symantec
  • Vincent Bindschaedler, University of Florida
  • Jeremiah Blocki, Purdue University
  • Rakesh Bobba, Oregon State University
  • Sven Bugiel, CISPA Helmholtz Center for Information Security
  • Christian Cachin, IBM Research/University of Bern
  • Jean Camp, Indiana University
  • Yinzhi Cao, Johns Hopkins University
  • Alvaro Cardenas, UC Santa Cruz
  • David Cash, University of Chicago
  • Hao Chen, UC Davis
  • Shuo Chen, Microsoft Research
  • Yan Chen, Northwestern University
  • Kai Chen, IIE CAS
  • Haibo Chen, Shanghai Jiao Tong University
  • Hao Chen, Microsoft Research
  • Yingying Chen, Rutgers University
  • Omar Chowdhury, The University of Iowa
  • Nicolas Christin, Carnegie Mellon University
  • Weidong Cui, Microsoft Research
  • Lucas Davi, University of Duisburg-Essen
  • Lorenzo De Carli, Worcester Polytechnic Institute
  • Emiliano De Cristofaro, University College London
  • Soteris Demetriou, Imperial College London
  • Wenrui Diao, Jinan University
  • Adam Doupe, Arizona State University
  • Haixin Duan, Tsinghua University
  • Tudor Dumitras, University of Maryland
  • Manuel Egele, Boston University
  • Ittay Eyal, Technion
  • Sascha Fahl, Leibniz University Hannover
  • Kassem Fawaz, University of Wisconsin-Madison
  • Dario Fiore, IMDEA Software Institute
  • Marc Fischlin, TU Darmstadt
  • Sara Foresti, Università degli Studi di Milano
  • Michael Franz, UC Irvine
  • Xinyang Ge, Microsoft Research
  • Daniel Genkin, University of Michigan
  • Rosario Gennaro, The City College of New York
  • Irene Giacomelli, Protocol Labs
  • Neil Gong, Iowa State University
  • Guofei Gu, Texas A&M University
  • Yong Guan, Iowa State University
  • Carl Gunter, University of Illinois at Urbana-Champaign
  • Weili Han, Fudan University
  • Carmit Hazay, Bar-Ilan University
  • Ryan Henry, University of Calgary
  • Michael Hicks, University of Maryland
  • Thorsten Holz, Ruhr-University Bochum
  • Nick Hopper, University of Minnesota
  • Amir Houmansadr, University of Massachusetts Amherst
  • Yan Huang, Indiana University
  • Trent Jaeger, Penn State University
  • Tibor Jager, Paderborn University
  • Rob Jansen, U.S. Naval Research Laboratory
  • Somesh Jha, University of Wisconsin–Madison
  • Shouling Ji, Zhejiang University
  • Yier Jin, University of Florida
  • Brent Byunghoon Kang, KAIST
  • Murat Kantarcioglu, UT Dallas
  • Alexandros Kapravelos, North Carolina State University
  • Aniket Kate, Purdue University
  • Aggelos Kiayias, University of Edinburgh and IOHK
  • Yongdae Kim, KAIST
  • Taesoo Kim, Georgia Tech
  • Engin Kirda, Northeastern University
  • Ralf Kuesters, University of Stuttgart
  • BumJun Kwon, National Security Research Institute
  • Wenke Lee, Georgia Tech
  • Ruby Lee, Princeton
  • Kirill Levchenko, University of Illinois at Urbana-Champaign
  • Zhou Li, UC Irvine
  • Bo Li, University of Illinois at Urbana-Champaign
  • Ninghui Li, Purdue University
  • Zhenkai Liang, National University of Singapore
  • Xiaojing Liao, Indiana University
  • David Lie, University of Toronto
  • Zhiqiang Lin, Ohio State University
  • Yang Liu, Nanyang Technological University
  • Peng Liu, Penn State University
  • Wenjing  Lou, Virginia Tech
  • Kangjie Lu, University of Minnesota
  • Vadim Lyubashevsky, IBM Research – Zurich
  • Ashwin Machanavajjhala, Duke University
  • Matteo Maffei, TU Wien
  • Mohammad Mannan, Concordia University
  • Damon McCoy, New York University
  • Patrick McDaniel, Penn State University
  • Ian Miers, Cornell Tech
  • Andrew Miller, University of Illinois at Urbana-Champaign
  • Jiang Ming, UT Arlington
  • Ilya Mironov, Google
  • Esfandiar Mohammadi, ETH Zurich
  • Payman Mohassel, Visa Research
  • Muhammad Naveed, University of Southern California
  • Olga Ohrimenko, Microsoft Research
  • Claudio Orlandi, Aarhus University
  • Nicolas Papernot, Google Brain
  • Kenneth Paterson, RHUL/ETH Zurich
  • Mathias Payer, EPFL
  • Paul Pearce, Georgia Tech/Facebook
  • Adrian Perrig, ETH
  • Frank Piessens, KU Leuven
  • Zhiyun Qian, UC Riverside
  • Feng Qian, University of Minnesota
  • William Robertson, Northeastern University
  • Mike Rosulek, Oregon State University
  • Andrew Ruef, Self
  • Ulrich Rührmair, LMU Munich
  • Andrei Sabelfeld, Chalmers University of Technology
  • Ahmad-Reza Sadeghi, TU Darmstadt
  • Stefan Nuernberger, CISPA Helmholtz Center for Information Security
  • Michael Reiter, University of North Carolina at Chapel Hill
  • Nitesh Saxena, University of Alabama at Birmingham
  • Joshua Schiffman, HP Inc.
  • Benedikt Schmidt, Google
  • Dominique Schroder, University of Erlangen-Nuremberg
  • Abhi Shelat, Northeastern University
  • Seungwon Shin, KAIST
  • Reza Shokri, National University of Singapore
  • Adam Smith, Boston University
  • Chengyu Song, UC Riverside
  • Ben Stock, CISPA Helmholtz Center for Information Security
  • Gianluca Stringhini, Boston University
  • Kun Sun, George Mason University
  • Paul Syverson, U.S. Naval Research Laboratory (NRL)
  • Kunal Talwar, Google
  • Yuan Tian, University of Virginia
  • Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
  • Mohit Tiwari, UT Austin
  • Blase Ur, University of Chicago
  • Venkat Venkatakrishnan, University of Illinois at Chicago
  • Giovanni Vigna, UC Santa Barbara
  • Hayawardh Vijayakumar, Samsung Research America
  • Haining Wang, University of Delaware
  • Xiao Wang, MIT and Boston University
  • Wenhao Wang, IIE CAS
  • Ruoyu (Fish) Wang, Arizona State University
  • Rebecca Wright, Rutgers and Barnard
  • Dinghao Wu, Penn State University
  • Tao Xie, University of Illinois at Urbana-Champaign
  • Luyi Xing, Indiana University
  • Xinyu Xing, Penn State University
  • Li  Xiong, Emory University
  • Wenyuan Xu, Zhejiang University
  • Min Yang, Fudan University
  • Danfeng (Daphne) Yao, Virginia Tech
  • Yuval Yarom, University of Adelaide
  • Arkady Yerukhimovich, George Washington University
  • Heng Yin, UC Riverside
  • Ting Yu, Qatar Computing Research Institute
  • Yu Yu, Shanghai Jiao Tong University
  • Danfeng Zhang, Penn State University
  • Yinqian Zhang, Ohio State University
  • Xiangyu Zhang, Purdue University
  • Kehuan Zhang, The Chinese University of Hong Kong
  • Yang Zhang, CISPA Helmholtz Center for Information Security
  • Fengwei Zhang, Wayne State University
  • Chao Zhang, Tsinghua University
  • Yajin Zhou, Zhejiang University
  • Jianying Zhou, SUTD
  • Yupeng Zhang, UC Berkeley
  • Zhe Zhou, Fudan University