Skip to content
Program Chairs
Area Chairs
- Software and Web Security: Manuel Egele, Boston University
- Network Security: Guofei Gu, Texas A&M University
- Formal Methods and PL: Michael Hicks, University of Maryland
- System Security: Zhiqiang Lin, Ohio State University
- Applied Cryptography: Mike Rosulek, Oregon State University
- Privacy: Adam Smith, Boston University
- Authentication/Authorization and ML: Ninghui Li, Purdue University
- Blockchain, Smart Contract and Distributed System Security: Andrew Miller, UIUC
Other Committee Members
- Gail-Joon Ahn, Arizona State University and SAMSUNG Research
- Sumayah Alrwais, King Saud University
- Owen Arden, UC Santa Cruz
- Adam Aviv, United States Naval Academy
- Erman Ayday, Case Western Reserve University/Bilkent University
- Michael Backes, CISPA Helmholtz Center for Information Security
- Gilles Barthe, IMDEA Software Institute
- Raef Bassily, Ohio State University
- Lujo Bauer, Carnegie Mellon University
- Mihir Bellare, UC San Diego
- Karthikeyan Bhargavan, INRIA
- Leyla Bilge, Symantec
- Vincent Bindschaedler, University of Florida
- Jeremiah Blocki, Purdue University
- Rakesh Bobba, Oregon State University
- Sven Bugiel, CISPA Helmholtz Center for Information Security
- Christian Cachin, IBM Research/University of Bern
- Jean Camp, Indiana University
- Yinzhi Cao, Johns Hopkins University
- Alvaro Cardenas, UC Santa Cruz
- David Cash, University of Chicago
- Hao Chen, UC Davis
- Shuo Chen, Microsoft Research
- Yan Chen, Northwestern University
- Kai Chen, IIE CAS
- Haibo Chen, Shanghai Jiao Tong University
- Hao Chen, Microsoft Research
- Yingying Chen, Rutgers University
- Omar Chowdhury, The University of Iowa
- Nicolas Christin, Carnegie Mellon University
- Weidong Cui, Microsoft Research
- Lucas Davi, University of Duisburg-Essen
- Lorenzo De Carli, Worcester Polytechnic Institute
- Emiliano De Cristofaro, University College London
- Soteris Demetriou, Imperial College London
- Wenrui Diao, Jinan University
- Adam Doupe, Arizona State University
- Haixin Duan, Tsinghua University
- Tudor Dumitras, University of Maryland
- Manuel Egele, Boston University
- Ittay Eyal, Technion
- Sascha Fahl, Leibniz University Hannover
- Kassem Fawaz, University of Wisconsin-Madison
- Dario Fiore, IMDEA Software Institute
- Marc Fischlin, TU Darmstadt
- Sara Foresti, Università degli Studi di Milano
- Michael Franz, UC Irvine
- Xinyang Ge, Microsoft Research
- Daniel Genkin, University of Michigan
- Rosario Gennaro, The City College of New York
- Irene Giacomelli, Protocol Labs
- Neil Gong, Iowa State University
- Guofei Gu, Texas A&M University
- Yong Guan, Iowa State University
- Carl Gunter, University of Illinois at Urbana-Champaign
- Weili Han, Fudan University
- Carmit Hazay, Bar-Ilan University
- Ryan Henry, University of Calgary
- Michael Hicks, University of Maryland
- Thorsten Holz, Ruhr-University Bochum
- Nick Hopper, University of Minnesota
- Amir Houmansadr, University of Massachusetts Amherst
- Yan Huang, Indiana University
- Trent Jaeger, Penn State University
- Tibor Jager, Paderborn University
- Rob Jansen, U.S. Naval Research Laboratory
- Somesh Jha, University of Wisconsin–Madison
- Shouling Ji, Zhejiang University
- Yier Jin, University of Florida
- Brent Byunghoon Kang, KAIST
- Murat Kantarcioglu, UT Dallas
- Alexandros Kapravelos, North Carolina State University
- Aniket Kate, Purdue University
- Aggelos Kiayias, University of Edinburgh and IOHK
- Yongdae Kim, KAIST
- Taesoo Kim, Georgia Tech
- Engin Kirda, Northeastern University
- Ralf Kuesters, University of Stuttgart
- BumJun Kwon, National Security Research Institute
- Wenke Lee, Georgia Tech
- Ruby Lee, Princeton
- Kirill Levchenko, University of Illinois at Urbana-Champaign
- Zhou Li, UC Irvine
- Bo Li, University of Illinois at Urbana-Champaign
- Ninghui Li, Purdue University
- Zhenkai Liang, National University of Singapore
- Xiaojing Liao, Indiana University
- David Lie, University of Toronto
- Zhiqiang Lin, Ohio State University
- Yang Liu, Nanyang Technological University
- Peng Liu, Penn State University
- Wenjing Lou, Virginia Tech
- Kangjie Lu, University of Minnesota
- Vadim Lyubashevsky, IBM Research – Zurich
- Ashwin Machanavajjhala, Duke University
- Matteo Maffei, TU Wien
- Mohammad Mannan, Concordia University
- Damon McCoy, New York University
- Patrick McDaniel, Penn State University
- Ian Miers, Cornell Tech
- Andrew Miller, University of Illinois at Urbana-Champaign
- Jiang Ming, UT Arlington
- Ilya Mironov, Google
- Esfandiar Mohammadi, ETH Zurich
- Payman Mohassel, Visa Research
- Muhammad Naveed, University of Southern California
- Olga Ohrimenko, Microsoft Research
- Claudio Orlandi, Aarhus University
- Nicolas Papernot, Google Brain
- Kenneth Paterson, RHUL/ETH Zurich
- Mathias Payer, EPFL
- Paul Pearce, Georgia Tech/Facebook
- Adrian Perrig, ETH
- Frank Piessens, KU Leuven
- Zhiyun Qian, UC Riverside
- Feng Qian, University of Minnesota
- William Robertson, Northeastern University
- Mike Rosulek, Oregon State University
- Andrew Ruef, Self
- Ulrich Rührmair, LMU Munich
- Andrei Sabelfeld, Chalmers University of Technology
- Ahmad-Reza Sadeghi, TU Darmstadt
- Stefan Nuernberger, CISPA Helmholtz Center for Information Security
- Michael Reiter, University of North Carolina at Chapel Hill
- Nitesh Saxena, University of Alabama at Birmingham
- Joshua Schiffman, HP Inc.
- Benedikt Schmidt, Google
- Dominique Schroder, University of Erlangen-Nuremberg
- Abhi Shelat, Northeastern University
- Seungwon Shin, KAIST
- Reza Shokri, National University of Singapore
- Adam Smith, Boston University
- Chengyu Song, UC Riverside
- Ben Stock, CISPA Helmholtz Center for Information Security
- Gianluca Stringhini, Boston University
- Kun Sun, George Mason University
- Paul Syverson, U.S. Naval Research Laboratory (NRL)
- Kunal Talwar, Google
- Yuan Tian, University of Virginia
- Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
- Mohit Tiwari, UT Austin
- Blase Ur, University of Chicago
- Venkat Venkatakrishnan, University of Illinois at Chicago
- Giovanni Vigna, UC Santa Barbara
- Hayawardh Vijayakumar, Samsung Research America
- Haining Wang, University of Delaware
- Xiao Wang, MIT and Boston University
- Wenhao Wang, IIE CAS
- Ruoyu (Fish) Wang, Arizona State University
- Rebecca Wright, Rutgers and Barnard
- Dinghao Wu, Penn State University
- Tao Xie, University of Illinois at Urbana-Champaign
- Luyi Xing, Indiana University
- Xinyu Xing, Penn State University
- Li Xiong, Emory University
- Wenyuan Xu, Zhejiang University
- Min Yang, Fudan University
- Danfeng (Daphne) Yao, Virginia Tech
- Yuval Yarom, University of Adelaide
- Arkady Yerukhimovich, George Washington University
- Heng Yin, UC Riverside
- Ting Yu, Qatar Computing Research Institute
- Yu Yu, Shanghai Jiao Tong University
- Danfeng Zhang, Penn State University
- Yinqian Zhang, Ohio State University
- Xiangyu Zhang, Purdue University
- Kehuan Zhang, The Chinese University of Hong Kong
- Yang Zhang, CISPA Helmholtz Center for Information Security
- Fengwei Zhang, Wayne State University
- Chao Zhang, Tsinghua University
- Yajin Zhou, Zhejiang University
- Jianying Zhou, SUTD
- Yupeng Zhang, UC Berkeley
- Zhe Zhou, Fudan University