page = usenix security '21 | usenix
url = https://www.usenix.org/conference/usenixsecurity21
This site uses cookies
If you use this site, cookies will be stored on your device. Please see our cookie statement for more information.
View Cookie Statement
Got it
Program

Summer Accepted Papers

Fall Accepted Papers

Participate

Call for Papers

Submission Policies and Instructions

Call for Artifacts

Artifact Evaluation Information

Instructions for Presenters

Sponsors

About

Symposium Organizers

Past Symposia

Conference Policies

Code of Conduct

Questions

Sign In

usenix_logo_notag_white

Conferences

30th USENIX Security Symposium
August 11–13, 2021
Please join us for the 30th USENIX Security Symposium , which will be held as a virtual event on August 11–13, 2021. USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.
Hack@Sec is returning for 2021! Teams in this competition try to mimic the practices of a team that is responsible for the security assurance of the hardware and firmware of the system under test. Their objective is to identify the security vulnerabilities, assess their security impact, propose a mitigation, and report them. They are free to use any tools and techniques of their choosing. There are opportunities for student-only teams and mixed teams. Register your team by May 10, 2021.
About USENIX Security '21
Conference Policies Code of Conduct View Past Symposia
Questions?
Send direct queries via email:
Registration: [email protected] Membership: [email protected] Sponsorship: [email protected] Student Grants: [email protected] Proceedings Papers: [email protected]
Symposium Organizers
Michael Bailey
University of Illinois at Urbana–Champaign
Program Co-Chair
Rachel Greenstadt
New York University
+ Show All - Hide List

Program Committee
Yousra Aafer, University of Waterloo
Ruba Abu-Salma, University College London and Inria
Gunes Acar, Katholieke Universiteit Leuven
David Adrian, Censys
Sadia Afroz, International Computer Science Institute (ICSI), University of California, Berkeley, and Avast
Devdatta Akhawe, Figma
Ardalan Amiri Sani, University of California, Irvine
Benjamin Andow, Google
Sebastian Angel, University of Pennsylvania
Pauline Anthonysamy, Google
Manos Antonakakis, Georgia Institute of Technology
Daniele Antonioli, EPFL
Elias Athanasopoulos, University of Cyprus
Mohammad Atiqul Islam, The University of Texas at Arlington
David Barrera, Carleton University
Jethro G. Beekman, Fortanix
Matthew Bernhard, University of Michigan
Antonio Bianchi, Purdue University
Battista Biggio, University of Cagliari, Italy
Leyla Bilge, NortonLifeLock Research Group
Vincent Bindschaedler, University of Florida
Tamara Bonaci, Northeastern University
Joseph C Bonneau, New York University
Sven Bugiel, CISPA Helmholtz Center for Information Security
Nathan Burow, MIT Lincoln Laboratory
Kevin Butler, University of Florida
Joseph Calandrino, Federal Trade Commission
Aylin Caliskan, George Washington University
Stefano Calzavara, Università Ca' Foscari Venezia
Yinzhi Cao, Johns Hopkins University
Alvaro A. Cardenas, University of California, Santa Cruz
Michael Carl Tschantz, International Computer Science Institute (ICSI)
Nicholas Carlini, Google
Lorenzo Cavallaro, King's College London
Z. Berkay Celik, Purdue University
Sang Kil Cha, Korea Advanced Institute of Science and Technology (KAIST)
Rahul Chatterjee, University of Wisconsin—Madison
Sze Yiu Chau, The Chinese University of Hong Kong
Kai Chen, IIE, Chinese Academy of Sciences
Qi Alfred Chen, University of California, Irvine
Marshini Chetty, University of Chicago
Sherman S. M. Chow, The Chinese University of Hong Kong
Omar Haider Chowdhury, The University of Iowa
Mihai Christodorescu, Visa Research
Erinn Clark, Google
Camille Cobb, Carnegie Mellon University
Shaanan Cohney, Princeton University and University of Melbourne
Andrea Continella, University of Twente
Scott Coull, FireEye
Cas Cremers, CISPA Helmholtz Center for Information Security
Bruno Crispo, University of Trento
Michel Cukier, University of Maryland
George Danezis, University College London and Facebook Calibra
Anupam Das, North Carolina State University
Sanchari Das, Indiana University Bloomington
Sauvik Das, Georgia Institute of Technology
Nathan Dautenhahn, Rice University
Lucas Davi, University of Duisburg-Essen
Roger Dingledine, The Tor Project
Alexandra Dmitrienko, University of Wuerzburg
Brendan Dolan-Gavitt, New York University
Adam Doupé, Arizona State University
Zakir Durumeric, Stanford University
Manuel Egele, Boston University
Serge Egelman, International Computer Science Institute (ICSI), University of California, Berkeley, and AppCensus, Inc.
Thomas Eisenbarth, University of Lübeck
Mohamed Elsabagh, Kryptowire
Pardis Emami-Naeini, University of Washington
William Enck, North Carolina State University
Roya Ensafi, University of Michigan
Sascha Fahl, Leibniz University Hannover
Giulia Fanti, Carnegie Mellon University
Kassem Fawaz, University of Wisconsin—Madison
Nick Feamster, University of Chicago
Ariel J. Feldman, Google
Wu-chang Feng, Portland State University
Earlence Fernandes, University of Wisconsin—Madison
Tobias Fiebig, TU Delft
David Fifield, Unaffiliated
Simone Fischer-Hubner, Karlstad University
Christopher Wardlaw Fletcher, University of Illinois at Urbana–Champaign
Michael Franz, University of California, Irvine
Yanick Fratantonio, Cisco Talos
Matt Fredrikson, Carnegie Mellon University
David Freeman, Facebook Inc.
Patrick Gage Kelley, Google
Flavio Garcia, University of Birmingham, UK
Siddarth Garg, New York University
Christina Garman, Purdue University
Carrie Gates, Bank of America
Gennie Gebhart, Electronic Frontier Foundation
Daniel Genkin, University of Michigan
Arthur Gervais, Imperial College London
Irene Giacomelli, Protocol Labs
Yossi Gilad, Hebrew University of Jerusalem
Ian Goldberg, University of Waterloo
Neil Gong, Duke University
Daniel Gruss, Graz University of Technology
Guofei Gu, Texas A&M University
J. Alex Halderman, University of Michigan
Mike Hamburg, Rambus
Hamza Harkous, Google
Wajih Ul Hassan, University of Illinois at Urbana–Champaign
Marcella Hastings, University of Pennsylvania
Xiali (Sharon) Hei, University of Louisiana at Lafayette
Nadia Heninger, University of California, San Diego
Ryan Henry, University of Calgary
Alejandro Hevia, University of Chile
Matthew Hicks, Virginia Tech
Avesta Hojjati, Digicert Inc
Thorsten Holz, Ruhr-Universität Bochum
Nicholas Hopper, University of Minnesota
Amir Houmansadr, University of Massachusetts Amherst
Danny Yuxing Huang, New York University
Mathias Humbert, Cyber-Defence Campus, armasuisse S+T
Sotiris Ioannidis, Technical University of Crete
Cynthia Irvine, Naval Postgraduate School
Suman Jana, Columbia University
Yeongjin Jang, Oregon State University
Rob Jansen, U.S. Naval Research Laboratory
Ramya Jayaram Masti, Intel Corporation
Yuseok Jeon, UNIST
Somesh Jha, University of Wisconsin—Madison
Anthony D Joseph, University of California, Berkeley
Brent ByungHoon Kang, Korea Advanced Institute of Science and Technology (KAIST)
Chris Kanich, University of Illinois at Chicago
Apu Kapadia, Indiana University Bloomington
Alexandros Kapravelos, North Carolina State University
Gabriel Kaptchuk, Boston University
Aniket Kate, Purdue University
Vasileios Kemerlis, Brown University
Florian Kerschbaum, University of Waterloo
Yongdae Kim, Korea Advanced Institute of Science and Technology (KAIST)
Sam King, University of California, Davis
Engin Kirda, Northeastern University
Tadayoshi Kohno, University of Washington
Kevin T. Kornegay, Morgan State University
Katharina Krombholz, CISPA Helmholtz Center for Information Security
Christopher Kruegel, University of California, Santa Barbara
Deepak Kumar, Stanford University
Anil Kurmus, IBM Research Europe
Negar Kyavash, École Polytechnique Fédérale de Lausanne (EPFL)
Andrea Lanzi, University of Milan
Pierre Laperdrix, University of Lille, CNRS, and Inria
Pavel Laskov, University of Liechtenstein
Mathias Lécuyer, Microsoft Research
Byoungyoung Lee, Seoul National University
Sangho Lee, Microsoft Research
Wenke Lee, Georgia Institute of Technology
Anja Lehmann, Hasso-Plattner-Institute, University of Potsdam
Corrado Leita, VMWare
Tancrède Lepoint, Google
Dave Levin, University of Maryland
Frank Li, Georgia Institute of Technology
Qi Li, Tsinghua University
David Lie, University of Toronto
Zhiqiang Lin, The Ohio State University
Fangfei Liu, Intel Corporation
Mingyan Liu, University of Michigan
Kangjie Lu, University of Minnesota
Wouter Lueks, École Polytechnique Fédérale de Lausanne (EPFL)
Shiqing Ma, Rutgers University
Mateo Maffei, Technische Universität Wien
Stefan Mangard, Graz University of Technology
Michail Maniatakos, New York University Abu Dhabi
Shri Mare, Western Washington University
Ivan Martinovic, University of Oxford
Clémentine Maurice, CNRS, IRISA
Michelle Mazurek, University of Maryland
Stephen McCamant, University of Minnesota
Jon McCune, Google
Patrick McDaniel, The Pennsylvania State University
Susan E. McGregor, Columbia University
Nele Mentens, Leiden University and KU Leuven
Andrew Miller, University of Illinois at Urbana–Champaign
Brad Miller, Google
Jiang Ming, The University of Texas at Arlington
Esfandiar Mohammadi, University of Lübeck
Veelasha Moonsamy, Radboud University and Ruhr-University Bochum
Tyler Moore, The University of Tulsa
Takao Murakami, AIST
Toby Murray, University of Melbourne
Adwait Nadkarni, College of William & Mary
Nick Nikiforakis, Stony Brook University
Shirin Nilizadeh, The University of Texas at Arlington
Rishab Nithyanand, The University of Iowa
Guevara Noubir, Northeastern University
Hamed Okhravi, MIT Lincoln Laboratory
Cristina Onete, University of Limoges/XLIM/CNRS 7252
Yossi Oren, Ben-Gurion University of the Negev
Rebekah Overdorf, École Polytechnique Fédérale de Lausanne (EPFL)
Chris Palmer, Google
Dimitrios Papadopoulos, Hong Kong University of Science and Technology
Nicholas Papernot, University of Toronto and Vector Institute
Aleatha Parker-Wood, Unaffiliated
Mathias Payer, École Polytechnique Fédérale de Lausanne (EPFL)
Paul Pearce, Georgia Institute of Technology and International Computer Science Institute (ICSI)
Giancarlo Pellegrino, CISPA Helmholtz Center for Information Security
Roberto Perdisci, University of Georgia
Radia Perlman, Dell Technologies
Peter A. H. Peterson, University of Minnesota Duluth
Zachary Peterson, California Polytechnic State University
Van-Thuan Pham, University of Melbourne
Stjepan Picek, TU Delft
Jason Polakis, University of Illinois at Chicago
Christina Pöpper, New York University Abu Dhabi
Niels Provos, Stripe
Zhiyun Qian, University of California, Riverside
Syed Rafiul Hussain, The Pennsylvania State University
Amir Rahmati, Stony Brook University
Sara Rampazzi, University of Michigan and University of Florida
Damith Ranasinghe, The University of Adelaide
Aanjhan Ranghanathan, Northeastern University
Bradley Reaves, North Carolina State University
Elissa M. Redmiles, Microsoft Research
Konrad Rieck, Technische Universität Braunschweig
Thomas Ristenpart, Cornell Tech
William Robertson, Northeastern University
Eyal Ronen, Tel Aviv University
Stefanie Roos, Delft University of Technology
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Merve Sahin, SAP Security Research
Brendan Saltaformaggio, Georgia Institute of Technology
Nolen Scaife, University of Colorado Boulder
Bruce Schneier, Harvard Kennedy School
Michael Schwarz, CISPA Helmholtz Center for Information Security
Jörg Schwenk, Ruhr University Bochum
Kent Seamons, Brigham Young University
Vyas Sekar, Carnegie Mellon University
Wendy Seltzer, W3C and Massachusetts Institute of Technology
Srinath Setty, Microsoft Research
Fatemeh Shirazi, Web3 Foundation
Haya Shulman, Fraunhofer SIT
Juraj Somorovsky, Paderborn University
Sooel Son, Korea Advanced Institute of Science and Technology (KAIST)
Chengyu Song, University of California, Riverside
Drew Springall, Auburn University
Angelos Stavrou, Virginia Tech
Deian Stefan, University of California, San Diego
Ben Stock, CISPA Helmholtz Center for Information Security
Gianluca Stringhini, Boston University
Cynthia Sturton, The University of North Carolina at Chapel Hill
Nick Sullivan, Cloudflare
Yixin Sun, University of Virginia
Paul Syverson, U.S. Naval Research Laboratory
Patrick Tague, Carnegie Mellon University
Qiang Tang, New Jersey Institute of Technology
Juan Tapiador, Universidad Carlos III de Madrid
Kurt Thomas, Google
Dave (Jing) Tian, Purdue University
Yuan Tian, University of Virginia
Laura Tinnel, SRI International
Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Jacob Torrey, DARPA
Florian Tramèr, Stanford University
Patrick Traynor, University of Florida
Blase Ur, University of Chicago
Anjo Vahldiek-Oberwagner, Intel Labs
Mayank Varia, Boston University
Ingrid Verbauwhede, Katholieke Universiteit Leuven
Bimal Viswanath, Virginia Tech
Daniel Votipka, Tufts University
David Wagner, University of California, Berkeley
Ryan Wails, Georgetown University and U.S. Naval Research Laboratory
Gang Wang, University of Illinois at Urbana–Champaign
Ruoyu Wang, Arizona State University
Ting Wang, The Pennsylvania State University
Byron Williams, University of Florida
Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
Matthew Wright, Rochester Institute of Technology
Eric Wustrow, University of Colorado Boulder
Xusheng Xiao, Case Western Reserve University
Xinyu Xing, The Pennsylvania State University
Dongyan Xu, Purdue University
Wenyuan Xu, Zhejiang University
Jason Minhui Xue, The University of Adelaide
Yuval Yarom, The University of Adelaide and Data61
Tuba Yavuz, University of Florida
Heng Yin, University of California, Riverside
Daniel Zappala, Brigham Young University
Qiang Zeng, University of South Carolina
Fengwei Zhang, Southern University of Science and Technology (SUSTech)
Xiangyu Zhang, Purdue University
Yang Zhang, CISPA Helmholtz Center for Information Security
Mary Ellen Zurko, MIT Lincoln Laboratory
Invited Talks Chair
Steering Committee
Matt Blaze, University of Pennsylvania
Dan Boneh, Stanford University
Srdjan Capkun, ETH Zurich
Kevin Fu, University of Michigan
Casey Henderson, USENIX Association
Franziska Roesner, University of Washington
Gold Sponsors
Bronze Sponsors
Industry Partners and Media Sponsors
Conference Sponsorship
Become a Sponsor: Sponsorship exposes your brand to highly qualified attendees, funds our diversity and student grants, supports open access to our conference content, and keeps USENIX conferences affordable. USENIX is a 501(c)(3) non-profit organization that relies on sponsor support to fulfill its mission. To learn more, please contact the Sponsorship Department with the conference name in your subject line.
The acceptance of any organization as a sponsor does not imply explicit or implicit approval by USENIX of the donor organization’s values or actions. In addition, sponsorship does not provide any control over conference program content. Questions? Contact the Sponsorship Department .
Twitter Facebook Youtube
Privacy Policy

Contact Us

© USENIX 2021