MAY 12-15, 2025 AT THE HYATT REGENCY SAN FRANCISCO, SAN FRANCISCO, CA

46th IEEE Symposium on
Security and Privacy

Agenda


- All times in the program are in Pacific Daylight Time (PDT) zone.

- Participants are on their own for breakfast.


Dates: (May 11)   May 12   May 13   May 14   May 15


(May 11)


Registration

Market Street Foyer

4:00 PM - 7:00 PM

TikTok Networking Reception

Waterfront CDE

4:30 PM - 6:30 PM

May 12


Opening Remarks

Grand Ballroom A+BC

8:15 AM - 8:45 AM

Grand Ballroom A+BC

8:45 AM - 9:45 AM

Picture of Eva Galperin

Eva Galperin (Electronic Frontier Foundation)

"Hey Siri, Find My Ex" Threat Modeling for Domestic Abuse Cases

An abuser who knows you intimately, knows your family and friends, and may have physical access to your home and devices is one of the most difficult attackers to thwart in the world of digital privacy and security. A determined abuser has all of the persistence, ingenuity, and patience of an APT. This talk will discuss some of the tools that abusers use to stalk, spy on, and harass their victims, the ways in which the use of those tools can be detected or stopped, and how we can build better products and platforms that are resistant to being used for abuse.

Break / Networking

9:45 AM - 10:15 AM

Session 2

10:15 AM - 11:45 AM


Tina Marjanov, Alice Hutchings
University of Cambridge

Sathvik Prasad, Aleksandr Nahapetyan, Bradley Reaves
North Carolina State University

Grant Ho1, Ariana Mirian2, Elisa Luo3, Khang Tong3,4, Euyhyun Lee3,4, Lin Liu3,5, Christopher A. Longhurst6, Christian Dameff6, Stefan Savage3, Geoffrey M. Voelker3
1: University of Chicago, 2: Censys, 3: UC San Diego, 4: Altman Clinical and Translational Research Institute, 5: Herbert Wertheim School of Public Health and Human Longevity Science, 6: UC San Diego Health

Justin Petelka1, Benjamin Berens2, Carlo Sugatan3, Melanie Volkamer2, Florian Schaub3
1: University of Washington, 2: Karlsruhe Institute of Technology, 3: University of Michigan

Filipo Sharevski1, Jennifer Vander Loop1, Alexander Ponticello2
1: DePaul University, 2: CISPA Helmholtz Center for Information Security

Runze Zhang1, Ranjita Pai Sridhar2, Mingxuan Yao1, Zheng Yang1, David Oygenblik1, Haichuan Xu1, Vacha Dave2, Cormac Herley2, Paul England2, Brendan Saltaformaggio1
1: Georgia Institute of Technology, 2: Microsoft Corporation

Jason Liu, Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates
University of Illinois at Urbana-Champaign

Sareh Mohammadi1, Hugo Kermabon-Bobinnec1, Azadeh Tabiban2, Lingyu Wang1, Tomás Navarro Múnera1, Yosr Jarraya3
1: CIISE, Concordia University, 2: Department of Computer Science, University of Manitoba, 3: Ericsson Security Research, Ericsson, Canada

Cecilia Boschini1, Darya Kaviani2, Russell W. F. Lai3, Giulio Malavolta4,5, Akira Takahashi6, Mehdi Tibouchi7
1: ETH Zürich, 2: UC Berkeley, 3: Aalto University, 4: Bocconi University, 5: Max Planck Institute for Security and Privacy, 6: J.P. Morgan AI Research & AlgoCRYPT Center of Excellence, 7: NTT Corporation

Ashish Kashinath1, Disha Agarwala1, Gabriel Kulp2, Sourav Das1, Sibin Mohan3, Radha Venkatagiri4
1: University of Illinois at Urbana-Champaign, 2: Oregon State University, 3: The George Washington University, 4: Georgetown University

Guofeng Tang, Haiyang Xue
Singapore Management University

Chuanqi Xu, Jakub Szefer
Yale University

Yibin Yang1, Fabrice Benhamouda2, Shai Halevi2, Hugo Krawczyk2, Tal Rabin2
1: Georgia Institute of Technology, 2: Amazon Web Services

Emily Wenger1, Eshika Saxena2, Mohamed Malhou2,3, Ellie Thieu4, Kristin Lauter2
1: Duke University, Meta AI, 2: Meta AI, 3: Sorbonne Université, 4: University of Wisconsin - Madison

Mutahar Ali1, Arjun Arunasalam2, Habiba Farrukh1
1: University of California, Irvine, 2: Purdue University

Xinyi Hou, Yanjie Zhao, Haoyu Wang
Huazhong University of Science and Technology

Xinyue Shen1, Yun Shen2, Michael Backes1, Yang Zhang1
1: CISPA Helmholtz Center for Information Security, 2: NetApp

Shuofeng Liu1, Mengyao Ma1, Jason (Minhui) Xue2, Guangdong Bai1
1: The University of Queensland, 2: CSIRO's Data61

Yingkai Dong1, Xiangtao Meng2, Ning Yu3, Zheng Li4, Shanqing Guo2
1: Shandong Unversity, 2: Shandong University, 3: Netflix Eyeline Studios, 4: CISPA Helmholtz Center for Information Security

Yicong Tan1, Xinyue Shen1, Yun Shen2, Michael Backes1, Yang Zhang1
1: CISPA Helmholtz Center for Information Security, 2: Netapp

Andrey Labunets1, Nishit V. Pandya1, Ashish Hooda2, Xiaohan Fu1, Earlence Fernandes1
1: UC San Diego, 2: University of Wisconsin Madison

Syed Irfan Ali Meerza1, Lichao Sun2, Jian Liu1
1: University of Tennessee Knoxville, 2: Lehigh University

Lunch

11:45 AM - 1:00 PM

Session 3

1:00 PM - 2:30 PM


Jiawei Zhou1,2, Zidong Zhang2, Lingyun Ying2, Huajun Chai2, Jiuxin Cao1, Haixin Duan3
1: Southeast University, 2: QI-ANXIN Technology Research Institute, 3: Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS

Yuan Chen1, Qinying Wang1, Yong Yang1, Yuanchao Chen2, Yuwei Li2, Shouling Ji1
1: Zhejiang University, 2: National University of Defense Technology

Ruofan Zhu1, Ganhao Chen1, Wenbo Shen1, Xiaofei Xie2, Rui Chang1
1: Zhejiang University, 2: Singapore Management University

Gerbrand ten Napel, Michel van Eeten, Simon Parkin
Delft University of Technology

Jessy Ayala, Steven Ngo, Joshua Garcia
University of California, Irvine

Yangheran Piao1, Temima Hrle1, Daniel W. Woods1, Ross Anderson1,2
1: University of Edinburgh, 2: University of Cambridge

Changzhou Han1, Zehang Deng1, Wanlun Ma1, Xiaogang Zhu2, Jason (Minhui) Xue3, Tianqing Zhu4, Sheng Wen1, Yang Xiang1
1: Swinburne University of Technology, 2: The University of Adelaide, 3: CSIRO's Data61, 4: City University of Macau

Xiao Li1, Yue Li1, Hao Wu1, Yue Zhang2, Kaidi Xu2, Xiuzhen Cheng3, Sheng Zhong1, Fengyuan Xu1
1: National Key Lab for Novel Software Technology, Nanjing University, 2: Drexel University, 3: Shandong University

Benjamin Benčina1,2, Benjamin Dowling3, Varun Maram4, Keita Xagawa5
1: Royal Holloway, 2: University of London, 3: King's College London, 4: SandboxAQ, 5: Technology Innovation Institute

Renas Bacho1, Alireza Kavousi2
1: CISPA - Helmholtz Center for Information Security, 2: University College London (UCL)

Sourav Das1, Zhuolun Xiang2, Alin Tomescu2, Alexander Spiegelman2, Benny Pinkas2,3, Ling Ren1
1: University of Illinois at Urbana Champaign, 2: Aptos Labs, 3: Bar-Ilan University

Munshi Rejwan Ala Muid, Tijay Chung, Thang Hoang
Virginia Tech

Tao Yang, Ding Wang
Nankai University

Eunsoo Kim1, Kiho Lee2, Doowon Kim2, Hyoungshick Kim1
1: Sungkyunkwan University, 2: University of Tennessee, Knoxville

Junwha Hong1, Wonil Jang1, Mijung Kim1, Lei Yu2, Yonghwi Kwon3, Yuseok Jeon1
1: UNIST, 2: Rensselaer Polytechnic Institute, 3: University of Maryland

Md Sakib Anwar, Carter Yagemann, Zhiqiang Lin
The Ohio State University

Emanuel Vintila1, Philipp Zieris2, Julian Horsch2
1: Technical University of Munich, 2: Fraunhofer AISEC

Junho Ahn1, KangHyuk Lee1, Chanyoung Park2, Hyungon Moon2, Youngjin Kwon1
1: KAIST, 2: UNIST

Dongchen Xie1, Dongnan He1, Wei You1, Jianjun Huang1, Bin Liang1, Shuitao Gan2, Wenchang Shi1
1: Renmin University of China, 2: Labortory for Advanced Computing and Intelligence Engineering

Merve Gülmez1,2, Håkan Englund1, Jan Tobias Mühlberg2,3, Thomas Nyman4
1: Ericsson Security Research, 2: KU Leuven, 3: Université Libre de Bruxelles, 4: Ericsson Product Security

Kaiming Huang1, Mathias Payer2, Zhiyun Qian3, Jack Sampson1, Gang Tan1, Trent Jaeger3
1: Penn State University, 2: EPFL, 3: UC Riverside

Marius Momeu1, Alexander J. Gaidis2, Jasper von der Heidt1, Vasileios P. Kemerlis2
1: Technical University of Munich, 2: Brown University

Break / Networking

2:30 PM - 3:00 PM

Session 4

3:00 PM - 4:30 PM

Grand Ballroom BC


Chenlin Wang1, Wei Meng1, Changhua Luo1, Penghui Li2
1: The Chinese University of Hong Kong, 2: Columbia University

Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang
Fudan University

JunYoung Park1, Yunho Kim2, Insu Yun1
1: KAIST, 2: Hanyang University

An Chen1, Yonghwi Kwon2, Kyu Hyung Lee1
1: University of Georgia, 2: University of Maryland

Bo Pang1, Yiheng Zhang1, Mingzhe Gao2, Junzhe Zhang3, Ligeng Chen4, Mingxue Zhang5, Gang Liang1
1: Sichuan University, 2: Alibaba-inc, 3: National University of Singapore, 4: Nanjing University, 5: The State Key Laboratory of Blockchain and Data Security, Zhejiang University

Fengyu Liu1, Yuan Zhang1, Tian Chen1, Youkun Shi1, Guangliang Yang1, Zihan Lin1, Min Yang1, Junyao He2, Qi Li2
1: Fudan University, 2: Alibaba Group

Zifeng Kang1, Muxi Lyu1, Zhengyu Liu1, Jianjia Yu1, Runqi Fan2, Song Li2, Yinzhi Cao1
1: Johns Hopkins University, 2: Zhejiang University

Tommaso Innocenti1, Louis Jannett2, Christian Mainka2, Vladislav Mladenov2, Engin Kirda1
1: Northeastern University, 2: Ruhr University Bochum

Jose Luis Castanon Remy, Ekzhin Ear, Caleb Chang, Antonia Feffer, Shouhuai Xu
University of Colorado Colorado Springs

Johannes Willbold1, Tobias Cloosters2, Moritz Schloegel3, Simon Wörner3, Felix Buchmann1, Lucas Davi2, Thorsten Holz3
1: Ruhr University Bochum, 2: University of Duisburg-Essen, 3: CISPA Helmholtz Center for Information Security

Weisen Liu1, Zeqi Lai1, Qian Wu1, Hewu Li1, Yuxuan Weng1, Wei Liu1, Qi Zhang2, Jihao Li2, Yuanjie Li1, Jun Liu1
1: Tsinghua University, 2: Zhongguancun Laboratory

Mujtahid Akon, Md Toufikuzzaman, Syed Rafiul Hussain
Pennsylvania State University

Daniel Klischies1, Dyon Goos2, David Hirsch1, Alyssa Milburn3, Marius Muench4, Veelasha Moonsamy1
1: Ruhr University Bochum, 2: Vrije Universiteit Amsterdam, 3: None/Intel, 4: University of Birmingham

Ali Ranjbar1, Tianchang Yang1, Kai Tu1, Saaman Khalilollahi2, Syed Rafiul Hussain1
1: Pennsylvania State University, 2: None

Prosanta Gope1, Yang Yang2, Quan Shi2, Behzad Abdolmaleki1, Biplab Sikdar2
1: University of Sheffield, 2: National University of Singapore

Yiming Zhang1, Tao Wan2, Yaru Yang1, Haixin Duan1,3, Yichen Wang1, Jianjun Chen1,3, Zixiang Wei1, Xiang Li4
1: Tsinghua University, 2: CableLabs; Carleton University, 3: Zhongguancun Laboratory, 4: Nankai University

Bayview AB


Kyle Beadle1, Kieron Ivy Turk2, Aliai Eusebi1, Mindy Tran3, Marilyne Ordekian1, Enrico Mariconti1, Yixin Zou3, Marie Vasek1
1: University College London, 2: University of Cambridge, 3: Max Planck Institute of Security and Privacy

Francesco Ciclosi1, Giovanna Varni1, Fabio Massacci1,2
1: University of Trento, 2: Vrije Universiteit Amsterdam

Stefan Albert Horstmann1, Sandy Hong1, David Klein2, Raphael Serafini3, Martin Degeling4, Martin Johns2, Veelasha Moonsamy1, Alena Naiakshina3
1: Ruhr University Bochum, 2: Technische Universität Braunschweig, 3: University of Cologne, 4: Independent

Eva Luvison1, Sylvain Chatel2, Justinas Sukaitis3, Vincent Graf Narbel3, Carmela Troncoso4, Wouter Lueks2
1: CISPA/EPFL, 2: CISPA, 3: ICRC, 4: EPFL

Jinhe Wen1, Yingxi Zhao1, Wenqian Xu1, Yaxing Yao2, Haojian Jin1
1: University of California, San Diego, 2: Virginia Tech

Kevin Bryson1, Arthur Borem1, Phoebe Moh2, Omer Akgul3, Laura Edelson4, Tobias Lauinger5, Michelle L. Mazurek2, Damon McCoy5, Blase Ur1
1: University of Chicago, 2: University of Maryland, 3: Carnegie Mellon University, 4: Northeastern University, 5: New York University

Wirawan Agahari1,2, Alexandra Dirksen3, Martin Johns3, Mark de Reuver1, Tobias Fiebig4
1: TU Delft, 2: Tilburg University, 3: TU Braunschweig, 4: MPI-INF

Break / Networking

4:30 PM - 4:45 PM

Poster Reception

Atrium

4:45 PM - 6:45 PM

Mentoring Session

Pacific Concourse

5:00 PM - 6:00 PM

LGBTQ+ and Allies Networking Reception

Pacific Concourse

6:30 PM - 7:30 PM

May 13


Session 1

8:15 AM - 9:45 AM


Elham Pourabbas Vafa1, Mohit Singhal2, Poojitha Thota1, Sayak Saha Roy1
1: The University of Texas at Arlington, 2: Northeastern University

Niklas Niere1, Felix Lange1, Juraj Somorovsky1, Robert Merget2
1: Paderborn University, 2: Technology Innovation Institute

Mingshi Wu1, Ali Zohaib2, Zakir Durumeric3, Amir Houmansadr2, Eric Wustrow4
1: GFW Report, 2: University of Massachusetts Amherst, 3: Stanford University, 4: University of Colorado Boulder

Sina Kamali, Diogo Barradas
University of Waterloo

Sadia Nourin1,2, Erik Rye1, Kevin Bock1, Nguyen Phong Hoang3, Dave Levin1
1: University of Maryland, 2: MPI-INF, 3: University of British Columbia

Xianwen Deng1, Ruijie Zhao2, Yanhao Wang3, Mingwei Zhan1, Zhi Xue1, Yijun Wang1
1: Shanghai Jiao Tong University, 2: Southeast University, 3: Independent Researcher

Minhao Bai1, Jinshuai Yang1, Kaiyi Pang1, Xin Xu1, Zhen Yang2, Yongfeng Huang1
1: Tsinghua University, 2: Beijing University of Posts and Telecommunications

Kyle Fredrickson, Ioannis Demertzis, James Hughes, Darrell Long
UC Santa Cruz

Grand Ballroom A


Panpan Han1, Zheng Yan1, Laurence T. Yang2, Elisa Bertino3
1: Xidian University, 2: Zhengzhou University, 3: Purdue University

James Austgen1, Mahimna Kelkar1, Andrés Fábrega2, Dani Vilardell1, Sarah Allen3,4, Kushal Babel1,5, Jay Yu6, Ari Juels1
1: Cornell Tech, 2: Cornell University, 3: IC3, 4: Flashbots, 5: Monad Labs, 6: Stanford University

Sen Yang1, Kartik Nayak2, Fan Zhang1
1: Yale University, 2: Duke University

Panagiotis Chatzigiannis, Coby Wang, Sunpreet Arora, Mohsen Minaei
Visa Research

Peifang Ni1, Anqi Tian2, Jing Xu1
1: Institute of Software, Chinese Academy of Sciences; Zhongguancun Laboratory, Beijing, P.R.China, 2: Institute of Software, Chinese Academy of Sciences; School of Computer Science and Technology, University of Chinese Academy of Sciences

Wanning Ding, Yuzhe Tang, Yibo Wang
Syracuse University

Valerio Cini1, Darya Kaviani2, Russell W. F. Lai3, Giulio Malavolta1, Michał Osadnik3
1: Bocconi University, 2: UC Berkeley, 3: Aalto University

Junlin Wu1, Jiongxiao Wang2, Chaowei Xiao2, Chenguang Wang1, Ning Zhang1, Yevgeniy Vorobeychik1
1: Washington University in St. Louis, 2: University of Wisconsin, Madison

Shaofei Li1, Ziqi Zhang2, Haomin Jia3, Yao Guo1, Xiangqun Chen1, Ding Li1
1: Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University, 2: University of Illinois Urbana-Champaign, 3: School of Electronics Engineering and Computer Science, Peking University

Harry Langford1, Ilia Shumailov2, Yiren Zhao3, Robert Mullins1, Nicolas Papernot4
1: University of Cambridge, 2: University of Oxford, 3: Imperial College London, 4: University of Toronto

Guangyu Shen1, Siyuan Cheng1, Zhuo Zhang1, Guanhong Tao2, Kaiyuan Zhang1, Hanxi Guo1, Lu Yan1, Xiaolong Jin1, Shengwei An1, Shiqing Ma3, Xiangyu Zhang1
1: Purdue University, 2: University of Utah, 3: University of Massachusetts at Amherst

Wenjie Qu1, Yuguang Zhou1, Yongji Wu2, Tingsong Xiao3, Binhang Yuan4, Yiming Li5, Jiaheng Zhang1
1: National University of Singapore, 2: Duke University, 3: University of Florida, 4: Hong Kong University of Science and Technology, 5: Nanyang Technological University

Zhen Sun1, Tianshuo Cong2, Yule Liu1, Chenhao Lin3, Xinlei He1, Rongmao Chen4, Xingshuo Han5, Xinyi Huang6
1: The Hong Kong University of Science and Technology (Guangzhou), 2: Tsinghua University, 3: Xi'an Jiaotong University, 4: National University of Defense Technology, 5: Nanyang Technological University, 6: Jinan University

Yechao Zhang1, Yuxuan Zhou1, Tianyu Li1, Minghui Li1, Shengshan Hu1, Wei Luo2, Leo Yu Zhang3
1: Huazhong University of Science and Technology, 2: Deakin University, 3: Griffith University

Viet Vo1, Mengyao Ma2, Guangdong Bai2, Ryan Ko2, Surya Nepal3
1: Swinburne University of Technology, 2: The University of Queensland, 3: Data61 CSIRO

Break / Networking

9:45 AM - 10:15 AM

Session 2

10:15 AM - 11:45 AM

Grand Ballroom BC


Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, Srikanth V. Krishnamurthy
University of California, Riverside

Fatih Deniz1, Mohamed Nabeel2, Ting Yu1, Issa Khalil1
1: Qatar Computing Research Institute, 2: Palo Alto Networks

Nimesha Wickramasinghe1, Arash Shaghaghi1, Gene Tsudik2, Sanjay Jha1
1: University of New South Wales (UNSW Sydney), 2: University of California, Irvine

Guangmeng Zhou1, Xiongwen Guo2, Zhuotao Liu1, Tong Li2, Qi Li1, Ke Xu1
1: Tsinghua University, 2: Renmin University of China

Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin'an Zhou, Yue Cao, Zhiyun Qian
University of California, Riverside

Samuel DeLaughter1,2, Karen Sollins1
1: MIT, 2: UCSD

Marc Wyss, Marc Frei, Jonghoon Kwon, Adrian Perrig
ETH Zurich

Grand Ballroom A


Hans Schmiedel1, Runchao Han2, Qiang Tang1, Ron Steinfeld3, Jiangshan Yu1
1: The University of Sydney, 2: Babylon Labs, 3: Monash University

Nibesh Shrestha1, Rohan Shrothrium2, Aniket Kate1,3, Kartik Nayak2
1: Supra Research, 2: Duke University, 3: Purdue University

Zhongtang Luo1, Yanxue Jia1, Alejandra Victoria Ospina Gracia2, Aniket Kate1,3
1: Purdue University, 2: No Affiliation, 3: Supra Research

Jiaxing Zhao1, Srinath Setty2, Weidong Cui2, Greg Zaverucha2
1: University of Science and Technology of China, 2: Microsoft Research

Ben Fisch1, Arthur Lazzaretti1, Zeyu Liu1, Lei Yang2
1: Yale University, 2: MIT

Aviv Frenkel, Dmitry Kogan
Fordefi

Easwar Vivek Mangipudi1, Sri AravindaKrishnan Thyagarajan2, Pratyay Mukherjee1, Lucjan Hanzlik3, Aniket Kate1,4
1: Supra Research, 2: University of Sydney, 3: CISPA Helmholtz Center for Information Security, 4: Purdue University

Jiajun Xin, Dimitrios Papadopoulos
Hong Kong University of Science and Technology

Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri
Università Ca' Foscari Venezia

Linkang Du1, Xuanru Zhou2, Min Chen3, Chusong Zhang2, Zhou Su1, Peng Cheng2, Jiming Chen2, Zhikun Zhang2
1: Xi'an Jiaotong University, 2: Zhejiang University, 3: Vrije Universiteit Amsterdam

Jiadong Lou1, Xu Yuan1, Rui Zhang1, Xingliang Yuan2, Neil Zhenqiang Gong3, Nian-Feng Tzeng4
1: University of Delaware, 2: The University of Melbourne, 3: Duke University, 4: University of Louisiana at Lafayette

Yu Sun, Gaojian Xiong, Jianhua Liu, Zheng Liu, Jian Cui
Beihang University

Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang
Renmin Universiry of China

Kang Yang1, Guanhong Tao1, Xun Chen2, Jun Xu1
1: University of Utah, 2: Samsung Research America

Yupei Liu1, Yuqi Jia2, Jinyuan Jia1, Dawn Song3, Neil Zhenqiang Gong2
1: The Pennsylvania State University, 2: Duke University, 3: UC Berkerly

Lunch

11:45 AM - 1:00 PM

Session 3

1:00 PM - 2:30 PM


Anna Lena Rotthaler1, Harshini Sri Ramulu1, Lucy Simko2, Sascha Fahl3, Yasemin Acar1,4
1: Paderborn University, 2: Barnard College, 3: CISPA Helmholtz Center for Information Security, 4: The George Washington University

Lisa Geierhaas1, Florin Martius1, Arthi Arumugam1, Matthew Smith1,2
1: University of Bonn, 2: Fraunhofer FKIE

Rachiyta Jain1, Temima Hrle1, Margherita Marinetti2, Adam Jenkins3, Rainer Böhme2, Daniel W Woods1
1: University of Edinburgh, 2: University of Innsbruck, 3: King's College London

Warda Usman1, John Sadik2, Taha3, Ran Elgedawy2, Scott Ruoti2, Daniel Zappala1
1: Brigham Young University, 2: University of Tennessee, Knoxville, 3: Purdue University

Verena Zimmermann1, Adrienn Toth1, Hannah Sievers1, Linda Fanconi1, Yanis Isenring1, Mona Henz2, Alina Stöver2, Nina Gerber2
1: ETH Zurich, 2: TU Darmstadt

Juliane Schmüser, Philip Klostermeyer, Kay Friedrich, Sascha Fahl
CISPA Helmholtz Center for Information Security

Qi HU1, Wei Chen1, Tianxiang Shen1, Xin Yao2, Nicholas Zhang2, Heming Cui1, Siu-Ming Yiu1
1: The University of Hong Kong, 2: Huawei Technologies

Muhammad Husni Santriaji, Jiaqi Xue, Yancheng Zhang, Qian Lou, Yan Solihin
University of Central Florida

Song Bian1, Zian Zhao1, Ruiyu Shen1, Zhou Zhang1, Ran Mao1, Dawei Li1, Yizhong Liu1, Masaki Waga2, Kohei Suenaga2, Zhenyu Guan1, Jiafeng Hua3, Yier Jin4, Jianwei Liu1
1: Beihang University, 2: Kyoto University, 3: Huawei Technology, 4: University of Science and Technology of China

Yaxin Tu1, Matan Hamilis2, Elette Boyle2,3, Yuval Ishai4, Niv Gilboa5
1: Princeton University, 2: Reichman University, 3: NTT Research, 4: Technion, 5: Ben-Gurion University

Elette Boyle1,2, Niv Gilboa3, Matan Hamilis1, Yuval Ishai4, Ariel Nof5
1: Reichman University, 2: NTT Research, 3: Ben-Gurion University, 4: Technion, 5: Bar-Ilan University

HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
Seoul National University

Kanav Gupta1, Nishanth Chandran2, Divya Gupta2, Jonathan Katz1,3, Rahul Sharma2
1: University of Maryland, 2: Microsoft Research, 3: Google

Alexander Kyster1, Frederik Huss Nielsen1, Sabine Oechsner2, Peter Scholl1
1: Aarhus University, 2: Vrije Universiteit Amsterdam

Zihao Wang1, Rui Zhu2, Zhikun Zhang3, Haixu Tang1, XiaoFeng Wang1
1: Indiana University Bloomington, 2: Yale University, School of Medicine, 3: Zhejiang University

Zirui Gong1, Yanjun Zhang2, Leo Yu Zhang1, Zhaoxi Zhang2, Yong Xiang3, Shirui Pan1
1: Griffith University, 2: University of Technology Sydney, 3: Deakin University

Xiaoyu Xia1, Ziqi Wang1, Ruoxi Sun2, Bowen Liu3, Ibrahim Khalil1, Minhui Xue2
1: RMIT University, 2: CSIRO's Data61, 3: Nanjing University

Boheng Li1, Yanhao Wei2, Yankai Fu2, Zhenting Wang3, Yiming Li1, Jie Zhang4,5, Run Wang2, Tianwei Zhang1
1: Nanyang Technological University, 2: Wuhan University, 3: Rutgers University, 4: CFAR and IHPC, 5: A*STAR

Aloni Cohen, Alexander Hoover, Gabe Schoenbach
The University of Chicago

Andre Kassis, Urs Hengartner
University of Waterloo

Xuandong Zhao1, Sam Gunn1, Miranda Christ2, Jaiden Fairoze1, Andres Fabrega3, Nicholas Carlini4, Milad Nasr4, Sanghyun Hong5, Florian Tramer6, Sanjam Garg1, Somesh Jha7, Lei Li8, Yu-Xiang Wang9, Dawn Song1
1: UC Berkeley, 2: Columbia University, 3: Cornell University, 4: Google DeepMind, 5: Oregon State University, 6: ETH Zurich, 7: University of Wisconsin–Madison, 8: Carnegie Mellon University, 9: UC San Diego

Saeed Mahloujifar1, Chuan Guo1, Edward Suh2, Kamalika Chaudhuri1
1: Meta, 2: Nvidia

Break / Networking

2:30 PM - 3:00 PM

Session 4

3:00 PM - 4:30 PM


Jan H. Klemmer1, Juliane Schmüser1, Byron M. Lowens2, Fabian Fischer1, Lea Schmüser1, Florian Schaub2, Sascha Fahl1
1: CISPA Helmholtz Center for Information Security, 2: University of Michigan

Anna Crowder, Kevin Childs, Allison Lu, Carson Stillman, Patrick Traynor, Kevin Butler
University of Florida

Zhihuang Liu, Ling Hu, Tongqing Zhou, Yonghao Tang, Zhiping Cai
National University of Defense Technology

Yaman Yu1, Tanusree Sharma1, Melinda Hu2, Justin Wang2, Yang Wang1
1: University of Illinois Urbana-Champaign, 2: Independent

Maggie Yongqi Guan1, Yaman Yu2, Tanusree Sharma2, Molly Z. Huang1, Kaihua Qin3, Yang Wang2, Kanye Ye Wang1
1: University of Macau, 2: University of Illinois at Urbana Champaign, 3: Yale University

Kurt Thomas, Patrick Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaž Bratanič, Felipe Tiengo Ferreira, Vijay Eranti, Elie Bursztein
Google

Elisa Shioji1, Ani Meliksetyan2, Lucy Simko2,3, Ryan Watkins2, Adam Aviv2, Shaanan Cohney1
1: University of Melbourne, 2: The George Washington University, 3: Barnard College

Guopeng Lin1, Xiaoning Du2, Lushan Song1, Weili Han1, Jin Tan3, Junming Ma3, Wenjing Fang3, Lei Wang3
1: Fudan University, 2: Monash University, 3: Ant Group

Guang Yan1,2,3,4, Yuhui Zhang1,2,3,4, Zimu Guo1,2,3,4, Lutan Zhao1,2,3,4, Xiaojun Chen1,2,3,4, Chen Wang5,6,7, Wenhao Wang1,2,3,4, Dan Meng2,3, Rui Hou1,2,3,4
1: State Key Laboratory of Information Security, 2: Institute of Information Engineering, 3: CAS, 4: University of Chinese Academy of Sciences, 5: EIRI, 6: NELBDRC, 7: Tsinghua University

Yi Liu1, Junzuo Lai1, Peng Yang2, Anjia Yang1, Qi Wang3, Siu-Ming Yiu2, Jian Weng1
1: Jinan University, 2: The University of Hong Kong, 3: Southern University of Science and Technology

Xuanwei Hu1, Rujia Li2, Yi Liu3, Qi Wang1
1: Southern University of Science and Technology, 2: Tsinghua University, 3: Jinan University

Albert Cheu1, Adria Gascon1, Borja Balle2, James Bell-Clark1, Jonathan Katz3, Mariana Raykova3, Phillipp Schoppmann3, Thomas Steinke2
1: Google Research, 2: Google Deepmind, 3: Google

Yingtai Xiao1, Jian Du1, Shikun Zhang1, Wanrong Zhang1, Qiang Yan1, Danfeng Zhang2, Daniel Kifer3
1: TikTok Inc., 2: Duke University, 3: Penn State University

Radhika Garg, Xiao Wang
Northwestern University

Guoren Li, Manu Sridharan, Zhiyun Qian
University of California, Riverside

Joshua Wiedemeier1, Elliot Tarbet1, Max Zheng1, Sangsoo Ko1, Jessica Ouyang1, Sang Kil Cha2, Kangkook Jee1
1: The University of Texas at Dallas, 2: KAIST

Shuangjie Yao, Dongdong She
Hong Kong University of Science and Technology

Yansong Li1, Paula Branco1, Alexander M. Hoole2, Manish Marwah2, Hari Manassery Koduvely2, Guy-Vincent Jourdan1, Stephan Jou2
1: University of Ottawa, 2: OpenText

Antonio Flores-Montoya1, Junghee Lim1, Adam Seitz1, Akshay Sood1, Edward Raff2, James Holt3
1: GrammaTech Inc., 2: Booz Allen Hamilton, 3: Laboratory for Physical Sciences

Naiqian Zhang1, Dongpeng Xu1, Jiang Ming2, Jun Xu3, Qiaoyan Yu1
1: University of New Hampshire, 2: Tulane University, 3: University of Utah

Yanzhong Wang, Ruigang Liang, Yilin Li, Peiwei Hu, Kai Chen, Bolun Zhang
Institute of Information Engineering, Chinese Academy of Sciences

Jiwon Kim1, Dave (Jing) Tian1, Benjamin E. Ujcich2
1: Purdue University, 2: Georgetown University

Break / Networking

4:30 PM - 4:40 PM

Birds of a Feather Session

Grand Ballroom A

4:40 PM - 5:35 PM

Short Talks

Grand Ballroom BC

4:40 PM - 5:25 PM

Break

5:25 PM - 5:35 PM

TC Meeting

Grand Ballroom BC

5:35 PM - 6:20 PM

May 14


Grand Ballroom A+BC

8:15 AM - 9:15 AM

Picture of Stefan Savage

Stefan Savage (UC San Diego)

Why isn’t security research making us more secure?

Over the last 25 years, research in computer security has flourished -- thousands of papers written, systems tested, insights gleaned and proposals made. At the same time, public and private sectors have spent untold hundreds of billions to implement cybersecurity efforts. In spite of these efforts, few would confidently argue that this investment in security has produced a commensurate reduction in real-world security outcomes. Why not?

In this talk I’ll opine on this “why not?” question and, in particular, the role of the security research community in this matter. Where do real-world security failures arise and why hasn’t the research community been effective in addressing these failures? What structural challenges and incentives focus the research community in ways that limit its impact? And, perhaps most importantly, what might the security research community do to improve this situation?

Awards

Grand Ballroom A+BC

9:15 AM - 9:30 AM

Break / Networking

9:30 AM - 10:00 AM

Session 2

10:00 AM - 11:50 AM


Hugo Lefeuvre1, Nathan Dautenhahn2, David Chisnall3,4, Pierre Olivier5
1: The University of British Columbia, 2: Serenitix, 3: University of Cambridge, 4: SCI Semiconductor, 5: The University of Manchester

Zheng Yang, Simon Chung, Jizhou Chen, Runze Zhang, Brendan Saltaformaggio, Wenke Lee
Georgia Institute of Technology

Quinn Burke, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift, Patrick McDaniel
University of Wisconsin-Madison

Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta
University of British Columbia

Soufian El Yadmani1, Olga Gadyatskaya1, Yury Zhauniarovich2
1: Leiden University, 2: TU Delft

Yue Gu, Xin Tan, Yuan Zhang, Siyan Gao, Min Yang
Fudan University

Saiid El Hajj Chehade1, Florian Hantke2, Ben Stock2
1: EPFL, 2: CISPA Helmholtz Center for Information Security

Souradip Nath1, Ananta Soneji1, Jaejong Baek1, Tiffany Bao1, Adam Doupé1, Carlos Rubio-Medrano2, Gail-Joon Ahn1
1: Arizona State University, 2: Texas A&M University - Corpus Christi

Mahmoud Ammar1, Adam Caulfield2, Ivan De Oliveira Nunes2
1: Huawei Research, Germany, 2: Rochester Institute of Technology

Dawei Wang1, Geng Zhou1, Xianglong Li1, Yu Bai1, Li Chen1, Ting Qin1, Jian Sun1, Dan Li2
1: Zhongguancun Laboratory, 2: Tsinghua University

Grand Ballroom A


Anna Pui Yung Woo1, Alex Ozdemir2, Chad Sharp1, Thomas Pornin3, Paul Grubbs1
1: University of Michigan, 2: Stanford University, 3: NCC Group

Alex Ozdemir, Evan Laufer, Dan Boneh
Stanford University

Zhelei Zhou1, Yun Li2, Yuchen Wang2, Zhaomin Yang2, Bingsheng Zhang1, Cheng Hong2, Tao Wei2, Wenguang Chen2
1: Zhejiang University, 2: Ant Group

Kunming Jiang, Fraser Brown, Riad Wahby
Carnegie Mellon University

Jiwon Kim1, Abhiram Kothapalli2, Orestis Chardouvelis3, Riad Wahby3, Paul Grubbs1
1: University of Michigan, 2: University of California, Berkeley, 3: Carnegie Mellon University

Chongrong Li1, Pengfei Zhu2, Yun Li3, Cheng Hong3, Wenjie Qu4, Jiaheng Zhang4
1: Beijing University of Posts and Telecommunications, 2: Tsinghua University, 3: Ant Group, 4: National University of Singapore

Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au
The Hong Kong Polytechnic University

Christodoulos Pappas1, Dimitrios Papadopoulos1, Charalampos Papamanthou2
1: Hong Kong University of Science and Technology, 2: Yale University

Jens Ernstberger1, Chengru Zhang2, Luca Ciprian1, Philipp Jovanovic3, Sebastian Steinhorst1
1: Technical University of Munich, 2: The University of Hong Kong, 3: University College London

Tianyu Zhang1,2, Shen Dong1,2, O. Deniz Kose3, Yanning Shen3, Yupeng Zhang2
1: Shanghai Jiao Tong University, 2: University of Illinois Urbana Champaign, 3: University of California, Irvine

Bradley Morgan1,2, Gal Horowitz3, Sioli O’Connell1, Stephan van Schaik4, Chitchanok Chuengsatiansup5, Daniel Genkin6, Olaf Maennel1, Paul Montague2, Eyal Ronen3, Yuval Yarom7
1: The University of Adelaide, 2: Defence Science and Technology Group, 3: Tel-Aviv University, 4: University of Michigan, 5: The University of Klagenfurt, 6: Georgia Tech, 7: Ruhr University Bochum

Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz
CISPA Helmholtz Center for Information Security

Johannes Wikner, Kaveh Razavi
ETH Zurich

Alan Wang1, Boru Chen2, Yingchen Wang3, Christopher W. Fletcher2, Daniel Genkin4, David Kohlbrenner5, Riccardo Paccagnella6
1: University of Illinois at Urbana-Champaign, 2: University of California, Berkeley, 3: University of Texas at Austin, 4: Georgia Institute of Technology, 5: University of Washington, 6: Carnegie Mellon University

Jason Kim1, Daniel Genkin1, Yuval Yarom2
1: Georgia Institute of Technology, 2: Ruhr University Bochum

Samy Amer1, Yingchen Wang2, Hunter Kippen3, Thinh Dang4, Daniel Genkin1, Andrew Kwong5, Alexander Nelson6, Arkady Yerukhimovich7
1: Georgia Institute of Technology, 2: University of Texas at Austin, 3: Samsung Research America, 4: NIST, 5: University of North Carolina at Chapel Hill, 6: University of Arkansas, 7: George Washington University

Andrea Di Dio, Mathé Hertogh, Cristiano Giuffrida
Vrije Universiteit Amsterdam

Sander Wiebing, Cristiano Giuffrida
Vrije Universiteit Amsterdam

Inwhan Chun, Isabella Siu, Riccardo Paccagnella
Carnegie Mellon University

Cheng Gu, Yicheng Zhang, Nael Abu-Ghazaleh
UC Riverside

Lunch

11:50 AM - 1:05 PM

Session 3

1:05 PM - 2:55 PM


Xiang Zhang1, Jie Zhang2, Zehua Ma1, Jinyang Huang3, Meng Li3, Huan Yan4, Peng Zhao3, Zijian Zhang5, Bin Liu1, Qing Guo2, Tianwei Zhang6, NengHai Yu1
1: University of Science andTechnology of China, 2: CFAR and IHPC, A*STAR, Singapore, 3: Hefei University of Technology, 4: Guizhou Normal University, 5: Beijing Institute of Technology, 6: Nanyang Technological University

Gen Li1, Chun-Chih Lin1, Xiaonan Zhang2, Xiaolong Ma1, Linke Guo1
1: Clemson University, 2: Florida State University

Muhammad Daniyal Pirwani Dar1, Rob Lorch2, Aliakbar Sadeghi1, Vincenzo Sorcigli1, Héloïse Gollier3, Cesare Tinelli2, Mathy Vanhoef3, Omar Chowdhury1
1: Stony Brook University, 2: The University of Iowa, 3: DistriNet, KU Leuven

Lina Pu1, Yu Luo2, Song Han3, Junming Diao2
1: Computer Science, University of Alabama, 2: Electrical and Computer Engineering, Mississippi State University, 3: Computer Science and Engineering, University of Connecticut

Hadjer Benkraouda, Nirav Diwan, Gang Wang
University of Illinois at Urbana-Champaign

Prianka Mandal, Amit Seal Ami, Iria Giuffrida, Daniel Shin, Ella Sullivan, Adwait Nadkarni
William & Mary

Antonio Joia Neto1, Norrathep Rattanavipanon2, Ivan De Oliveira Nunes1
1: Rochester Institute of Technology, 2: Prince of Songkla University

Boyu Chang1, Binbin Zhao2, Qiao Zhang1, Peiyu Liu1, Yuan Tian3, Raheem Beyah2, Shouling Ji1
1: Zhejiang University, 2: Georgia Institute of Technology, 3: UCLA

Haoyu Xiao, Ziqi Wei, Jiarun Dai, Bowen Li, Yuan Zhang, Min Yang
Fudan University

José Bacelar Almeida1,2, Manuel Barbosa1,3,4, Gilles Barthe5,6, Gustavo Xavier Delerue Marinho Alves3,7, Luís Esquível8, Vincent Hwang5, Tiago Oliveira9, Hugo Pacheco3, Peter Schwabe4, Pierre-Yves Strub7
1: INESC, 2: Universidade do Minho, 3: Universidade do Porto, 4: MPI, 5: MPI-SP, 6: IMDEA Software Institute, 7: PQShield, 8: Independent, 9: SandboxAQ

Mayuri Sridhar1, Hanshen Xiao2,3, Srinivas Devadas1
1: MIT, 2: Purdue University, 3: NVIDIA Research

Puning Zhao1, Zhikun Zhang2, Jiawei Dong2, Jiafei Wu1, Shaowei Wang3, Zhe Liu1, Yunjun Gao2
1: Zhejiang Lab, 2: Zhejiang University, 3: Guangzhou University

Qingqing Ye1, Liantong Yu1, Kai Huang2, Xiaokui Xiao3, Weiran Liu4, Haibo Hu1
1: The Hong Kong Polytechnic University, 2: Macau University of Science and Technology, 3: National University of Singapore, 4: Alibaba Group

Takao Murakami1,2, Yuichi Sei3, Reo Eriguchi2
1: The Institute of Statistical Mathematics (ISM), 2: National Institute of Advanced Industrial Science and Technology (AIST), 3: University of Electro-Communications

Bo Jiang, Wanrong Zhang, Jian Du, Donghang Lu, Sagar Sharma, Qiang Yan

Nicolas Küchler1, Alexander Viand2, Hidde Lycklama1, Anwar Hithnawi3
1: ETH Zürich, 2: Intel Labs, 3: ETH Zürich & University of Toronto

Iago C. Chaves1, Victor A. E. Farias1, Amanda Perez2, Diego Mesquita2, Javam C. Machado1
1: Universidade Federal do Ceará, 2: Fundação Getúlio Vargas

Kecen Li1, Chen Gong1, Xiaochen Li1, Yuzhong Zhao2, Xinwen Hou2, Tianhao Wang1
1: University of Virginia, 2: Chinese Academy of Sciences

Georgi Ganev1, Emiliano De Cristofaro2
1: University College London, 2: UC Riverside

Thomas Roche
NinjaLab

Amin Abdulrahman1, Hoang Nguyen Hien Pham2, Tobias Stelzer3, Felix Oberhansl3, Andreas Zankl3,4, Jade Philipoom5, Peter Schwabe1,6
1: Max Planck Institute for Security and Privacy (MPI-SP), 2: BULL SAS, Université Grenoble Alpes, 3: Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany, 4: Technical University of Munich (TUM), Munich, Germany, 5: zeroRISC, Boston, USA, 6: Radboud University

Juhee Kim1, Jinbum Park2, Sihyeon Roh1, Jaeyoung Chung1, Youngjoo Lee1, Taesoo Kim2,3, Byoungyoung Lee1
1: Seoul National University, 2: Samsung Research, 3: Georgia Institute of Technology

Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali, Ashish Venkat
University of Virginia

Fan Sang1, Jaehyuk Lee1, Xiaokuan Zhang2, Taesoo Kim1
1: Georgia Institute of Technology, 2: George Mason University

Jesse De Meulemeester1, Luca Wilke2, David Oswald3, Thomas Eisenbarth2, Ingrid Verbauwhede1, Jo Van Bulck4
1: COSIC, KU Leuven, 2: University of Lübeck, 3: University of Birmingham, 4: DistriNet, KU Leuven

Yuanyuan Yuan1, Zhibo Liu1, Sen Deng1, Yanzuo Chen1, Shuai Wang2, Yinqian Zhang3, Zhendong Su4
1: HKUST, 2: Hong Kong University of Science and Technology, 3: Southern University of Science and Technology, 4: ETH Zurich

Aritra Dhar1, Clément Thorens2, Lara Magdalena Lazier1, Lukas Cavigelli1
1: Huawei Zurich Research Center, 2: ETH Zurich

Cas Cremers1, Gal Horowitz2, Charlie Jacomme3, Eyal Ronen2
1: CISPA Helmholtz Center for Information Security, 2: Tel Aviv University, 3: Inria Nancy

Kha Dinh Duy, Jaeyoon Kim, Hajeong Lim, Hojoon Lee
Sungkyunkwan University

Break / Networking

2:55 PM - 3:25 PM

Session 4

3:25 PM - 5:15 PM


Liu Wang1, Dong Wang1, Shidong Pan2, Zheng Jiang1, Haoyu Wang3, Yi Wang1
1: Beijing University of Posts and Telecommunications, 2: Columbia University, 3: Huazhong University of Science and Technology

David Schmidt1, Alexander Ponticello2, Magdalena Steinboeck1, Katharina Krombholz2, Martina Lindorfer1
1: TU Wien, 2: CISPA

Mona Wang1, Jeffrey Knockel2, Zoë Reichert2, Prateek Mittal1, Jonathan Mayer1
1: Princeton University, 2: The Citizen Lab

Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu Wang
Huazhong University of Science and Technology

Jiawei Guo1, Yu Nong1, Zhiqiang Lin2, Haipeng Cai1
1: University at Buffalo, 2: The Ohio State University

Hongcheng Zhu1, Zongkun Sun1, Yanzhen Ren1,2, Kun He1,2, Yongpeng Yan1, Zixuan Wang1, Wuyang Liu1, Yuhong Yang3,4, Weiping Tu3,4
1: School of Cyber Science and Engineering, Wuhan University, 2: Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, 3: National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, 4: Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan

Aafaq Sabir, Abhinaya S.B., Dilawer Ahmed, Anupam Das
North Carolina State University

Sunwoo Lee1, Wonsuk Choi2
1: Seoul Women's University, 2: Korea University

Zhengkun Ye1, Ahmed Tanvir Mahdad2, Yan Wang1, Cong Shi3, Yingying Chen4, Nitesh Saxena2
1: Temple University, 2: Texas A&M University, College Station, 3: New Jersey Institute of Technology, 4: Rutgers University

Théophile Wallez1, Jonathan Protzenko2, Karthikeyan Bhargavan3
1: Inria Paris, 2: Microsoft Azure Research, 3: Cryspen

Aurora Naska, Cas Cremers, Niklas Medinger
CISPA Helmholtz Center for Information Security

Liron David1,2, Omer Berkman1,3, Avinatan Hassidim1,4, David Lazarov1, Yossi Matias1,5, Moti Yung1,6
1: Google, 2: Weizmann Institute of Science, 3: The Academic College of Tel-Aviv Yaffo, 4: Bar-Ilan University, 5: Tel-Aviv University, 6: Columbia University

Darya Kaviani1, Deevashwer Rathee1, Bhargav Annem2, Raluca Ada Popa1
1: UC Berkeley, 2: California Institute of Technology

Miti Mazmudar1, Shannon Veitch2, Rasoul Akhavan Mahdavi1
1: University of Waterloo, 2: ETH Zurich

Sebastian Meiser1, Debajyoti Das2, Moritz Kirschte1, Esfandiar Mohammadi1, Aniket Kate3
1: University of Luebeck, 2: KU Leuven, 3: Purdue University

Quang Cao1, Son Hoang Dau1, Rinaldo Gagiano1, Duy Huynh1, Xun Yi1, Phuc Lu Le2, Quang-Hung Luu3, Emanuele Viterbo4, Yu-Chih Huang5, Jingge Zhu6, Mohammad M. Jalalza7, Chen Feng7
1: RMIT University, 2: University of Science, Vietnam National University, Ho Chi Minh City, 3: Swinburne University of Technology, 4: Monash University, 5: National Chiao Tung University, 6: The University of Melbourne, 7: The University of British Columbia (Okanagan Campus)

Joel Samper, Bernardo Ferreira
LASIGE, Faculdade de Ciências, Universidade de Lisboa

Collins W. Munyendo1, Kentrell Owens2, Faith Strong3, Shaoqi Wang2, Adam J. Aviv1, Tadayoshi Kohno2, Franziska Roesner2
1: The George Washington University, 2: University of Washington, 3: Austin College

Jung-Woo Chang1, Ke Sun2, David Xia3, Xinyu Zhang1, Farinaz Koushanfar1
1: University of California, San Diego, 2: University of California, San Diego, University of Michigan, Ann Arbor, 3: University of Illinois Urbana-Champaign

Zhambyl Shaikhanov1, Mahmoud Al-Madi2, Hou-Tong Chen3, Chun-Chieh Chang3, Sadhvikas Addamane4, Daniel M. Mittleman5, Edward Knightly2
1: University of Maryland, 2: Rice University, 3: Los Alamos National Laboratory, 4: Sandia National Laboratories, 5: Brown University

Xuejing Yuan1,2,3, Jiangshan Zhang2,3, Feng Guo4, Kai Chen3,5, XiaoFeng Wang6, Shengzhi Zhang7, Yuxuan Chen4, Dun Liu7, Pan Li2, Zihao Wang8, Runnan Zhu9
1: Beijing University of Posts and Telecommunications, 2: SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, 3: School of Cyber Security, University of Chinese Academy of Sciences, China, 4: School of Cyber Science and Technology, Shandong University, 5: Institute of Information Engineering, Chinese Academy of Sciences, China, 6: Indiana University Bloomington, USA, 7: Department of Computer Science, Metropolitan College, Boston University, USA, 8: Indiana University Bloomington, 9: School of Cyberspace Security, Beijing University of Posts and Telecommunications

Raymond Muller1, Ruoyu Song1, Chenyi Wang2, Yuxia Zhan3, Jean-Philippe Monteuuis4, Yanmao Man5, Ming Li2, Ryan Gerdes6, Jonathan Petit4, Z. Berkay Celik1
1: Purdue University, 2: University of Arizona, 3: New York University, 4: Qualcomm Technologies Inc., 5: HERE Technologies, Inc., 6: Virginia Tech

Trisha Datta, Binyi Chen, Dan Boneh
Stanford University

Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini
Sapienza University of Rome

Chengru Zhang1, Xiao Yang2, David Oswald2, Mark Ryan2, Philipp Jovanovic3
1: The University of Hong Kong, 2: University of Birmingham, 3: University College London

Kun Wang, Meng Chen, Li Lu, Jingwen Feng, Qianniu Chen, Zhongjie Ba, Kui Ren, Chun Chen
Zhejiang University

Long Huang1, Chen Wang2
1: Louisiana State University, 2: Southern Methodist University

May 15