USENIX Security '24 (original) (raw)

33rd USENIX Security Symposium
Thanks to those who joined us for the 33rd USENIX Security Symposium. We hope you enjoyed the event.
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
As part of our commitment to open access to research, the full proceedings and presentation slides are free and open to the public on the technical sessions page. Videos are posted within a few weeks of the end of the event.
Registration Information
Early Bird Registration Deadline: Monday, July 22, 2024
See the Registration Information page for details, including fees, discount information, and other deadlines.
Discounts
In addition to our member discounts, USENIX offers several discounts to help you to attend USENIX Security '24, including a hardship discount for USENIX members who are unemployed or retired, in between jobs, or lack employer support.
Accessibility Information
USENIX is committed to ensuring that our meetings are fully accessible to all attendees. Visit our accessibility information page for details on mothers' rooms, ADA accessibility accommodation options, and how to make a request.
Venue
Philadelphia Marriott Downtown
1201 Market Street
Philadelphia, PA 19107
USA
+1 215.625.2900
Hotel Reservation Deadline: Monday, July 22, 2024
USENIX has negotiated a special conference attendee room rate of US$219 plus tax for single/double occupancy for conference attendees, including in-room wireless internet. To receive this rate, book your room online or call the hotel and mention USENIX or USENIX Security '24 when making your reservation.
The group rate is available through July 22, 2024, or until the block sells out, whichever occurs first. After this date, contact the hotel directly to inquire about room availability.
Room and Ride Sharing
USENIX maintains a Google Group to facilitate communication among attendees seeking roommates and ride sharing. You can sign up for free to find attendees with whom you can share a hotel room, taxi, shuttle, or other ride-share service. Please include "USENIX Security '24" in the subject line when posting a new request.
Parking
See the hotel's website for up-to-date parking information and rates.

Co-located Events
SOUPS 2024: Twentieth Symposium on Usable Privacy and Security (August 11–13, 2024)
WOOT '24: 18th USENIX Workshop on Offensive Technologies (August 12–13, 2024)
Symposium Organizers

Davide Balzarotti
Eurecom
Program Co-Chair

Wenyuan Xu
Zhejiang University
Program Co-Chair
Program Co-Chairs
Davide Balzarotti, Eurecom
Wenyuan Xu, Zhejiang University
Program Vice Co-Chairs
Tiffany Bao, Arizona State University
Alexandra Dmitrienko, University of Wuerzburg
Qi Li, Tsinghua University
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
Chen Yan, Zhejiang University
Yupeng Zhang, University of Illinois at Urbana–Champaign and Texas A&M University
Program Committee
Yousra Aafer, University of Waterloo
Aysajan Abidin, imec-COSIC KU Leuven
Ruba Abu-Salma, King's College London
Abbas Acar, Florida International University
Adil Ahmad, Arizona State University
Cristina Alcaraz, University of Malaga
Magnus Almgren, Chalmers University of Technology
Mário S. Alvim, Universidade Federal de Minas Gerais
Abdelrahaman Aly, Technology Innovation Institute (TII)
Mahmoud Ammar, Huawei Research
Elena Andreeva, Vienna University of Technology
Manos Antonakakis, Georgia Tech
Daniele Antonioli, EURECOM
Diego F. Aranha, Aarhus University
Frederico Araujo, IBM Research
Giuseppe Ateniese, George Mason University
Elias Athanasopoulos, University of Cyprus
Erman Ayday, Case Western Reserve University
Guangdong Bai, The University of Queensland
Luca Baldesi, University of California, Irvine
Musard Balliu, KTH Royal Institute of Technology
Sébastien Bardin, CEA LIST, Université Paris-Saclay
Lejla Batina, Radboud University
Lujo Bauer, Carnegie Mellon University
Sebastian Berndt, University of Lübeck
Konstantin (Kosta) Beznosov, University of British Columbia
Giuseppe Bianchi, University of Roma Tor Vergata
Battista Biggio, University of Cagliari
Tamara Bonaci, Northeastern University
Joseph Bonneau, New York University
Marcus Botacin, Texas A&M University
Sven Bugiel, CISPA Helmholtz Center for Information Security
Nathan Burow, MIT Lincoln Laboratory
Juan Caballero, IMDEA Software Institute
Patricia Arias Cabarcos, Paderborn University
Stefano Calzavara, Università Ca' Foscari Venezia
Yinzhi Cao, Johns Hopkins University
Srdjan Capkun, ETH Zurich
Alvaro A. Cardenas, University of California, Santa Cruz
Lorenzo Cavallaro, University College London
Z. Berkay Celik, Purdue University
Sang Kil Cha, Korea Advanced Institute of Science and Technology (KAIST)
Varun Chandrasekaran, University of Illinois at Urbana–Champaign and Microsoft Research
Rahul Chatterjee, University of Wisconsin—Madison
Sze Yiu Chau, The Chinese University of Hong Kong
Alfred Chen, University of California, Irvine
Guoxing Chen, Shanghai Jiao Tong University
Hao Chen, University of California, Davis
Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences
Long Chen, Institute of Software Chinese Academy of Sciences
Sanchuan Chen, Auburn University
Yanjiao Chen, Zhejiang University
Yizheng Chen, University of Maryland
Yushi Cheng, Tsinghua University
Giovanni Cherubin, Microsoft
Euijin Choo, University of Alberta
Sherman S. M. Chow, The Chinese University of Hong Kong
Nicolas Christin, Carnegie Mellon University
Mihai Christodorescu, Google
Shaanan Cohney, University of Melbourne
Mauro Conti, University of Padova
Andrea Continella, University of Twente
Manuel Costa, Azure Research, Microsoft
Daniele Cono D'Elia, Sapienza University of Rome
Savino Dambra, Norton Research Group
Lucas Davi, University of Duisburg-Essen
Lorenzo De Carli, University of Calgary
Fabio De Gaspari, Sapienza University of Rome
Luca Demetrio, Università degli Studi di Genova
Ambra Demontis, University of Cagliari
Changyu Dong, Guangzhou University
Adam Doupé, Arizona State University
Minxin Du, The Chinese University of Hong Kong
Tudor Dumitras, University of Maryland, College Park
Zakir Durumeric, Stanford University
Laura Edelson, New York University
Chang Ee-Chien, National University of Singapore
Manuel Egele, Boston University
Thomas Eisenbarth, University of Lübeck
Thorsten Eisenhofer, Technische Universität Berlin
Pardis Emami-Naeini, Duke University
William Enck, North Carolina State University
Sascha Fahl, CISPA Helmholtz Center for Information Security
Habiba Farrukh, University of California, Irvine
Aurore Fass, CISPA Helmholtz Center for Information Security
Bo Feng, Zhejiang University
Hossein Fereidooni, KOBIL GmbH
Tobias Fiebig, Max Planck Institute for Software Systems (MPI-SWS)
Alisa Frik, International Computer Science Institute (ICSI)
Kevin Fu, Northeastern University
Xinwen Fu, University of Massachusetts Lowell
Kelsey Fulton, Colorado School of Mines
Tal Garfinkel, University of California, San Diego
Carrie Gates, Bank of America
Gennie Gebhart, Electronic Frontier Foundation and University of Washington
Zahra Ghodsi, Purdue University
Esha Ghosh, Microsoft Research
Yossi Gilad, The Hebrew University of Jerusalem
Devashish Gosain, Birla Institute of Technology and Science and Max Planck Institute for Informatics
Andre Gregio, Federal University of Parana (UFPR)
Ilya Grishchenko, University of California, Santa Barbara
Daniel Gruss, Graz University of Technology
Guofei Gu, Texas A&M University
Marco Guarnieri, IMDEA Software Institute
Wenbo Guo, Purdue University
Ariel Hamlin, Northeastern University
Jun Han, Yonsei University
Weili Han, Fudan University
Shuang Hao, The University of Texas at Dallas
Behnaz Hassanshahi, Oracle Labs
Nguyen Phong Hoang, University of Chicago
Thorsten Holz, CISPA Helmholtz Center for Information Security
Houman Homayoun, University of California, Davis
Nicholas Hopper, University of Minnesota
Tao Hou, University of North Texas
Yuncong Hu, Shanghai Jiao Tong University
Danny Yuxing Huang, New York University
Jun Ho Huh, Samsung Research
Syed Rafiul Hussain, The Pennsylvania State University
Alice Hutchings, University of Cambridge
Cynthia Irvine, Naval Postgraduate School
Fabian Ising, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE
Charlie Jacomme, Inria Paris
Joseph Jaeger, Georgia Institute of Technology
Sashidhar Jakkamsetti, Bosch Research
Rob Jansen, U.S. Naval Research Laboratory
Kangkook Jee, The University Texas at Dallas
Rikke Bjerg Jensen, Royal Holloway, University of London
Yuseok Jeon, UNIST (Ulsan National Institute of Science and Technology)
Shouling Ji, Zhejiang University
Xiaoyu Ji, Zhejiang University
Xiangkun Jia, Institute of Software Chinese Academy of Sciences
Aaron Johnson, U.S. Naval Research Laboratory
Gabriel Kaptchuk, Boston University
Yigitcan Kaya, University of California, Santa Barbara
Marcel Keller, CSIRO's Data61
Vasileios Kemerlis, Brown University
Dmitry Khovratovich, Ethereum Foundation
Kyungtae Kim, Dartmouth College
Taegyu Kim, The Pennsylvania State University
Taesoo Kim, Georgia Institute of Technology and Samsung Research
Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
David Kohlbrenner, University of Washington
Sebastian Köhler, University of Oxford
Tadayoshi Kohno, University of Washington
Kari Kostiainen, ETH Zurich
Platon Kotzias, Norton Research Group
Katharina Krombholz, CISPA Helmholtz Center for Information Security
Christopher Kruegel, University of California, Santa Barbara
Kavita Kumari, Technical University of Darmstadt
Andrew Kwong, The University of North Carolina at Chapel Hill
Giovanni Lagorio, University of Genoa
Andrea Lanzi, University of Milan
Riccardo Lazzeretti, Sapienza University of Rome
Kevin Leach, Vanderbilt University
Tancrède Lepoint, Amazon Web Services
Frank Li, Georgia Institute of Technology
Ming Li, University of Arizona
Song Li, Zhejiang University
Kaitai Liang, Delft University of Technology
Christopher Liebchen, Google
Yun Lin, Shanghai Jiao Tong University
Zhiqiang Lin, The Ohio State University
Zhen Ling, Southeast University
Ting Liu, Xi'an Jiaotong University
Yao Liu, University of South Florida
Zhuotao Liu, Tsinghua University
Yan Long, University of Michigan
Wouter Lueks, CISPA Helmholtz Center for Information Security
Lannan Lisa Luo, George Mason University
Mulong Luo, Cornell University
Xiapu Luo, The Hong Kong Polytechnic University
Siqi Ma, The University of New South Wales
Aravind Machiry, Purdue University
Matteo Maffei, Technische Universität Wien
Christian Mainka, Ruhr University Bochum
Nathan Malkin, University of Maryland
Stefan Mangard, Graz University of Technology
Michail Maniatakos, New York University Abu Dhabi
Antonio Marcedone, Zoom Video Communications, Inc.
Ivan Martinovic, University of Oxford
Sahar Mazloom, JPMorgan Chase
Allison McDonald, Boston University
Derrick McKee, MIT Lincoln Laboratory
Catherine Meadows, U.S. Naval Research Laboratory
Shagufta Mehnaz, The Pennsylvania State University
Sarah Meiklejohn, Google and University College London
Marcela Melara, Intel Labs
Yan Meng, Shanghai Jiao Tong University
Markus Miettinen, Technische Universität Darmstadt
Jiang Ming, Tulane University
Vladislav Mladenov, Ruhr University Bochum
Esfandiar Mohammadi, University of Lübeck
Mainack Mondal, Indian Institute of Technology, Kharagpur
Hyungon Moon, UNIST (Ulsan National Institute of Science and Technology)
Veelasha Moonsamy, Ruhr University Bochum
Marius Muench, University of Birmingham
Shravan Ravi Narayan, The University of Texas at Austin
Ivan De Oliveira Nunes, Rochester Institute of Technology
Hamed Okhravi, MIT Lincoln Laboratory
Gabriele Oligeri, Hamad Bin Khalifa University
Cristina Onete, Université de Limoges, XLIM, and CNRS 7252
Simon Oya, The University of British Columbia
Panos Papadimitratos, KTH Royal Institute of Technology
Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
Thomas Pasquier, University of British Columbia
Paul Pearce, Georgia Institute of Technology
Sai Teja Peddinti, Google
Amreesh Phokeer, Internet Society
Pablo Picazo-Sanchez, Halmstad University
Stjepan Picek, Radboud University
Fabio Pierazzi, King's College London
Maura Pintor, University of Cagliari
Georgios Portokalidis, Stevens Institute of Technology
Chenxiong Qian, The University of Hong Kong
Han Qiu, Tsinghua University
Gang Qu, University of Maryland
JV Rajendran, Texas A&M University
Kopo Marvin Ramokapane, University of Bristol
Sara Rampazzi, University of Florida
Aanjhan Ranganathan, Northeastern University
Kasper Rasmussen, University of Oxford
Elissa Redmiles, Max Planck Institute for Software Systems (MPI-SWS)
Oscar Reparaz, Block, Inc.
Konrad Rieck, Technische Universität Berlin
Franziska Roesner, University of Washington
Eyal Ronen, Tel Aviv University
Stefanie Roos, RPTU Kaiserslautern-Landau
Christian Rossow, CISPA Helmholtz Center for Information Security
Kevin Alejandro Roundy, Gen Digital
Scott Ruoti, University of Tennessee, Knoxville
Andrei Sabelfeld, Chalmers University of Technology
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Sayandeep Saha, Université catholique de Louvain
Merve Sahin, SAP Security Research
Kazue Sako, Waseda University
Jun Sakuma, Tokyo Institute of Technology
Soheil Salehi, University of Arizona
Iskander Sanchez-Rola, Norton Research Group
Nuno Santos, INESC-ID and Instituto Superior Técnico, University of Lisbon
Sebastian Schinzel, Münster University of Applied Sciences, Fraunhofer SIT, and ATHENE
Michael Schwarz, CISPA Helmholtz Center for Information Security
Johanna Sepúlveda, Airbus Defence and Space
Bingyu Shen, Meta Platforms, Inc.
Chao Shen, Xi'an Jiaotong University
Emily Shen, MIT Lincoln Laboratory
Shweta Shinde, ETH Zurich
Maliheh Shirvanian, Netflix
Ali Shokri, Virginia Tech
Haya Shulman, Goethe-Universität Frankfurt, Fraunhofer SIT, and ATHENE
Peter Snyder, Brave Software
Dokyung Song, Yonsei University
Yongsoo Song, Seoul National University
Alessandro Sorniotti, IBM Research Europe
Dario Stabili, Alma Mater Studiorum - Università di Bologna
Ben Stock, CISPA Helmholtz Center for Information Security
Gianluca Stringhini, Boston University
Martin Strohmeier, armasuisse Science and Technology, Cyber-Defence Campus
Guillermo Suarez-Tangil, IMDEA Networks Institute
Takeshi Sugawara, The University of Electro-Communications
Kun Sun, George Mason University
Wei Sun, University of California, San Diego
Yi Sun, Beijing University of Posts and Telecommunications
Zhibo Sun, Drexel University
Qiang Tang, The University of Sydney
Teryl Taylor, IBM Research
Yuan Tian, University of California, Los Angeles
Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Rahmadi Trimananda, Comcast
Chia-Che Tsai, Texas A&M University
Güliz Seray Tuncay, Google
Selcuk Uluagac, Florida International University
Blase Ur, University of Chicago
Anjo Vahldiek-Oberwagner, Intel Labs
Jo Van Bulck, imec-DistriNet, KU Leuven
Michel van Eeten, Delft University of Technology
Mayank Varia, Boston University
Venkat Venkatakrishnan, University of Illinois Chicago
Luca Viganò, King's College London
Giovanni Vigna, University of California, Santa Barbara
Daniel Votipka, Tufts University
Alexios Voulimeneas, Delft University of Technology
David Wagner, University of California, Berkeley
Cong Wang, City University of Hong Kong
Fish Wang, Arizona State University
Gang Wang, University of Illinois at Urbana–Champaign
Qian Wang, Wuhan University
Shuai Wang, The Hong Kong University of Science and Technology
Ting Wang, The Pennsylvania State University
Xiangyu Wang, Xidian University
Xiao Wang, Northwestern University
Zhibo Wang, Zhejiang University
Edgar Weippl, University of Vienna, SBA Research
Josephine Wolff, Tufts University
Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
Yang Xiang, Swinburne University of Technology
Liang Xiao, Xiamen University
Chenren Xu, Peking University
Fengyuan Xu, Nanjing University
Jason (Minhui) Xue, CSIRO's Data61
Carter Yagemann, The Ohio State University
Guangliang Yang, Fudan University
Yuval Yarom, Ruhr University Bochum
Attila A Yavuz, University of South Florida
Chia-Mu Yu, National Yang Ming Chiao Tung University
Yu Yu, Shanghai Jiao Tong University
Xingliang Yuan, Monash University
Xu Yuan, University of Louisiana at Lafayette
Savvas Zannettou, Delft University of Technology
Daniel Zappala, Brigham Young University
Bingsheng Zhang, Zhejiang University
Fan Zhang, Yale University
Fengwei Zhang, Southern University of Science and Technology (SUSTech)
Kehuan Zhang, The Chinese University of Hong Kong
Mu Zhang, University Of Utah
Ning Zhang, Washington University
Xiaokuan Zhang, George Mason University
Youqian Zhang, The Hong Kong Polytechnic University
Yuan Zhang, Fudan University
Yue Zhang, The Ohio State University
Zhikun Zhang, Stanford University and CISPA Helmholtz Center for Information Security
Qingchuan Zhao, City University of Hong Kong
Ziming Zhao, University at Buffalo
Hao Zhou, The Hong Kong Polytechnic University
Haojin Zhu, Shanghai Jiao Tong University
Saman Zonouz, Georgia Tech
Mary Ellen Zurko, MIT Lincoln Laboratory
Poster Session Co-Chairs
Andrea Continella, University of Twente
Yuan Tian, University of California, Los Angeles
Test of Time Awards Committee
Dan Boneh, Stanford University
Joe Calandrino, Federal Trade Commission
Srdjan Capkun, ETH Zurich
Lorrie Cranor, Carnegie Mellon University
Nick Feamster, University of Chicago
Kevin Fu, Northeastern University
Fabian Monrose, The University of North Carolina at Chapel Hill
David Wagner, University of California, Berkeley
Wenyuan Xu, Zhejiang University
Mentoring Co-Chairs
Christina Garman, Purdue University
Michelle Mazurek, University of Maryland
Yuan Tian, University of California, Los Angeles
Steering Committee
Michael Bailey, Georgia Institute of Technology
Kevin Butler, University of Florida
Joe Calandrino, Federal Trade Commission
Srdjan Capkun, ETH Zurich
William Enck, North Carolina State University
Rachel Greenstadt, New York University
Casey Henderson-Ross, USENIX Association
Nadia Heninger, University of California, San Diego
Thorsten Holz, Ruhr-Universität Bochum
Tadayoshi Kohno, University of Washington
Franziska Roesner, University of Washington
Patrick Traynor, University of Florida
Gold Sponsors
Silver Sponsors
Bronze Sponsors
Industry Partner and Media Sponsor
Become a Sponsor
Request the sponsorship prospectus by emailing [email protected] with the conference name in your subject line to learn more.
The acceptance of any organization as a sponsor does not imply explicit or implicit approval by USENIX of the sponsoring organization’s values or actions. In addition, sponsorship does not provide any control over conference program content. Questions? Email [email protected].



