31st USENIX Security Symposium
August 10–12, 2022
Boston, MA, USA
Thanks to those who joined us for the 31st USENIX Security Symposium. We hope you enjoyed the event.
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
As part of our commitment to open access to research, the full proceedings and presentation slides are free and open to the public on the technical sessions page. Videos are posted within a few weeks of the end of the event.
In-Person Registration SOLD OUT. Virtual spots still available.
Registration Information
See the Registration Information page for details.
Authors and Speakers
Please contact the Conference Department for registration information.
Discounts
In addition to our member discounts, USENIX offers several discounts to help you to attend USENIX Security '22 in person.
Terms and Conditions
All USENIX Security '22 attendees must abide by the event's Terms and Conditions and USENIX's Coronavirus/COVID-19 Health and Safety Plan. Please review this information prior to registering for the event.
USENIX Conference Policies
We encourage you to learn more about USENIX's values and how we put them into practice at our conferences.
ADA Requests
USENIX is committed to ensuring that our meetings are fully accessible to all attendees. Visit our ADA information page to find out about options and how to make a request. To ensure that we meet your needs, please make your request by Monday, July 18,2022. We cannot guarantee that we can meet requests received after this date, although we will make every reasonable effort to do so.
Refunds and Cancellations
The cancellation deadline is Friday, August 5,2022. Please review the USENIX Registration Substitution and Cancellation Policy for more information.
Venue
Boston Marriott Copley Place
110 Huntington Ave
Boston, MA 02116
USA
+1 617.236.5800
Hotel Discount Deadline: Monday, July 18, 2022
Special Attendee Room Rate
USENIX has negotiated a special conference attendee room rate of US$259 plus tax for single/double occupancy, including in-room wireless internet. To receive this rate, book your room online or call the hotel and mention USENIX or Security '22.
The group rate is available until Monday, July 18, 2022, or until the block sells out, whichever occurs first. After this date, contact the hotel directly to inquire about room availability.
For more information, see the Venue, Hotel, and Travel page.
About USENIX Security '22
Questions?
Review our Conference FAQs, and send direct queries via email:
Registration: conference@usenix.org
Membership: membership@usenix.org
Sponsorship: sponsorship@usenix.org
Student Grants: students@usenix.org
Proceedings Papers: production@usenix.org
Symposium Organizers
Kevin Butler University of Florida Program Co-Chair
Kurt Thomas Google Program Co-Chair
Program Committee
YousraAafer, University of Waterloo
RubaAbu-Salma, King's College London
GunesAcar, Katholieke Universiteit Leuven
SadiaAfroz, International Computer Science Institute (ICSI), Avast
DevdattaAkhawe, Dropbox
DanielAlexander Zappala, Brigham Young University
ArdalanAmiri Sani, University of California, Irvine
OlabodeAnise, Google
DanieleAntonioli, EPFL, EURECOM
MariaApostolaki, ETH Zurich
EliasAthanasopoulos, University of Cyprus
DavideBalzarotti, EURECOM
TiffanyBao, Arizona State University
DavidBarrera, Carleton Univeristy
AdamBates, University of Illinois at Urbana–Champaign
LejlaBatina, Radboud University
LujoBauer, Carnegie Mellon University
JethroBeekman, Fortanix
AntonioBianchi, Purdue University
BattistaBiggio, University of Cagliari
LeylaBilge, NortonLifeLock Research Group
VincentBindschaedler, University of Florida
PriyamBiswas, Intel
MarinaBlanton, University at Buffalo
Erik-OliverBlass, Airbus
TamaraBonaci, Northeastern University
JosephBonneau, New York University
GlencoraBorradaile, Oregon State University
MarcusBotacin, Federal University of Paraná
IoanaBoureanu, University of Surrey
NathanBurow, MIT Lincoln Laboratory
JosephCalandrino, Federal Trade Commission
StefanoCalzavara, Università Ca' Foscari Venezia
YinzhiCao, Johns Hopkins University
SrdjanCapkun, ETH Zurich
AlvaroCardenas, University of California, Santa Cruz
NicholasCarlini, Google
LorenzoCavallaro, University College London
Z. BerkayCelik, Purdue University
Sang KilCha, Korea Advanced Institute of Science and Technology (KAIST)
NehaChachra, Facebook
RahulChatterjee, University of Wisconsin—Madison
Sze YiuChau, The Chinese University of Hong Kong
KaiChen, Institute of Information Engineering, Chinese Academy of Sciences
Qi AlfredChen, University of California, Irvine
YizhengChen, Columbia University
Sherman S. M.Chow, The Chinese University of Hong Kong
Amrita RoyChowdhury, University of Wisconsin—Madison
NicolasChristin, Carnegie Mellon University
ChitchanokChuengsatiansup, The University of Adelaide
CamilleCobb, Carnegie Mellon University
ShaananCohney, Princeton University and University of Melbourne
AndreaContinella, University of Twente
CasCremers, CISPA Helmholtz Center for Information Security
BrunoCrispo, University of Trento
WeidongCui, Microsoft Research
AnupamDas, North Carolina State University
PubaliDatta, University of Illinois at Urbana–Champaign
NathanDautenhahn, Rice University
AlexandraDmitrienko, University of Wuerzburg
AdamDoupe, Arizona State University
TudorDumitras, University of Maryland
ZakirDurumeric, Stanford University
ManuelEgele, Boston University
ThomasEisenbarth, University of Lübeck
MaryEllen Zurko, MIT Lincoln Laboratory
MohamedElsabagh, Kryptowire
PardisEmami-Naeini, University of Washington
WilliamEnck, North Carolina State University
RoyaEnsafi, University of Michigan
BirhanuEshete, University of Michigan
SabaEskandarian, The University of North Carolina at Chapel Hill
SaschaFahl, CISPA Helmholtz Center for Information Security
KassemFawaz, University of Wisconsin—Madison
YunsiFei, Northeastern University
EarlenceFernandes, University of Wisconsin—Madison
DomenicForte, University of Florida
AurélienFrancillon, EURECOM
MichaelFranz, University of California, Irvine
YanickFratantonio, Cisco Talos
DavidFreeman, Facebook
AymericFromherz, Inria
PatrickGage Kelley, Google
EvaGalperin, Electronic Frontier Foundation
VinodGanapathy, Indian Institute of Science (IISc)
ChristinaGarman, Purdue University
CarrieGates, Bank of America
GenevieveGebhart, University of Washington Information School
DanielGenkin, Georgia Institute of Technology
RyanGerdes, Virginia Tech
ArthurGervais, Imperial College London
IreneGiacomelli, Protocol Labs
YossiGilad, The Hebrew University of Jerusalem
NeilGong, Duke University
TyroneGrandison, The Data-Driven Institute
DanielGruss, Graz University of Technology
GuofeiGu, Texas A&M University
LeGuan, University of Georgia
ShuangHao, The University of Texas at Dallas
Wajih UlHassan, University of Illinois at Urbana–Champaign
ChristopheHauser, USC/Information Sciences Institute
XialiHei, University of Louisiana at Lafayette
GrantHernandez, Qualcomm
MatthewHicks, Virginia Tech
RalphHolz, University of Twente
ThorstenHolz, Ruhr University Bochum
NickHopper, University of Minnesota
DianeHosfelt, Apple
Syed RafiulHussain, The Pennsylvania State University
LucaInvernizzi, Google
SotirisIoannidis, Technical University of Crete
CynthiaIrvine, Naval Postgraduate School
SumanJana, Columbia University
RamyaJayaram Masti, Intel
YuseokJeon, UNIST (Ulsan National Institute of Science and Technology)
YierJin, University of Florida
Brent ByunghoonKang, Korea Advanced Institute of Science and Technology (KAIST)
ChrisKanich, University of Illinois at Chicago
ApuKapadia, Indiana University Bloomington
AlexandrosKapravelos, North Carolina State University
VasileiosKemerlis, Brown University
FlorianKerschbaum, University of Waterloo
TaesooKim, Georgia Institute of Technology
YongdaeKim, Korea Advanced Institute of Science and Technology (KAIST)
SamKing, University of California, Davis and Bouncer Technologies
MichelKinsy, TAMU
EnginKirda, Northeastern University
KatharinaKohls, Radboud University
TadayoshiKohno, University of Washington
KariKostiainen, ETH Zurich
SrikanthKrishnamurthy, University of California, Riverside
Joshua AKroll, Naval Postgraduate School
KatharinaKrombholz, CISPA Helmholtz Center for Information Security
ChristopherKruegel, University of California, Santa Barbara
DeepakKumar, Stanford University
AnilKurmus, IBM Research Europe
AndreaLanzi, University of Milan
PavelLaskov, University of Liechtenstein
ByoungyoungLee, Seoul National University
Kyu HyungLee, University of Georgia
SanghoLee, Microsoft Research
WenkeLee, Georgia Institute of Technology
TancrèdeLepoint, Google
AdaLerner, Wellesley College
FrankLi, Georgia Institute of Technology
QiLi, Tsinghua University
TianshiLi, Carnegie Mellon University
DavidLie, University of Toronto
ZhiqiangLin, Ohio State University
MartinaLindorfer, TU Wien
GuyueLiu, Carnegie Mellon University
KangjieLu, University of Minnesota
WouterLueks, EPFL
XiapuLuo, The Hong Kong Polytechnic University
MatteoMaffei, TU Wien
StefanMangard, Graz University of Technology
MohammadMannan, Concordia University
IvanMartinovic, Oxford University
MichelleMazurek, University of Maryland
PatrickMcDaniel, The Pennsylvania State University
ShaguftaMehnaz, Dartmouth College
AasthaMehta, University of British Columbia, Vancouver
SarahMeiklejohn, University College London and Google
MarcelaMelara, Intel Labs
NeleMentens, Leiden University and Katholieke Universiteit Leuven
JiangMing, The University of Texas at Arlington
ArianaMirian, University of California, San Diego
JelenaMirkovic, University of Southern California
DanielMoghimi, University of California, San Diego
EsfandiarMohammadi, University of Lübeck
MainackMondal, Indian Institute of Technology, Kharagpur
Soo-JinMoon, Google
VeelashaMoonsamy, Ruhr University Bochum
ThomasMoyer, University of North Carolina
MariusMuench, Vrije Universiteit Amsterdam
TakaoMurakami, AIST
TobyMurray, University of Melbourne
NickNikiforakis, Stony Brook University
AnitaNikolich, University of Illinois at Urbana–Champaign
ShirinNilizadeh, The University of Texas at Arlington
AdamOest, PayPal
HamedOkhravi, MIT Lincoln Laboratory
MelekÖnen, EURECOM
CristinaOnete, University of Limoges/XLIM/CNRS 7252
YossiOren, Ben-Gurion University of the Negev
RebekahOverdorf, EPFL
MiroslavPajic, Duke University
DimitriosPapadopoulos, The Hong Kong University of Science and Technology
BryanParno, Carnegie Mellon University
MathiasPayer, EPFL
PaulPearce, Georgia Institute of Technology, International Computer Science Institute (ICSI)
GiancarloPellegrino, CISPA Helmholtz Center for Information Security
RobertoPerdisci, University of Georgia and Georgia Institute of Technology
RadiaPerlman, Dell EMC
PeterPeterson, University of Minnesota
FabioPierazzi, King's College London
ChristinaPoepper, New York University Abu Dhabi
NielsProvos, Stripe
AmirRahmati, Stony Brook University
JeyavijayanRajendran, Texas A&M University
SaraRampazzi, University of Florida
MarianaRaykova, Google
JoelReardon, University of Calgary
BradleyReaves, North Carolina State University
ElissaRedmiles, Max Planck Institute for Software Systems (MPI-SWS)
Michael K.Reiter, Duke University
KonradRieck, Technische Universität Braunschweig
WilliamRobertson, Northeastern University
FranziskaRoesner, University of Washington
EyalRonen, Tel Aviv University
StefanieRoos, TU Delft
Ahmad-RezaSadeghi, Technische Universität Darmstadt
BrendanSaltaformaggio, Georgia Institute of Technology
NiteshSaxena, University of Alabama at Birmingham
SebastianSchinzel, Münster University of Applied Sciences
MichaelSchwarz, CISPA Helmholtz Center for Information Security
JörgSchwenk, Ruhr University Bochum
WendySeltzer, W3C and Massachusetts Institute of Technology
JohannaSepulveda, Airbus
MahmoodSharif, Tel Aviv University and VMware
Imani N.Sherman, University of Florida
ShwetaShinde, ETH Zurich
FatemehShirazi, Web3 Foundation
MalihehShirvanian, Visa Research
YanShosh*taishvili, Arizona State University
HayaShulman, Fraunhofer SIT
PeterSnyder, Brave Browser
SooelSon, Korea Advanced Institute of Science and Technology (KAIST)
ChengyuSong, University of California, Riverside
AlessandroSorniotti, IBM Research Europe
KyleSoska, University of Illinois at Urbana–Champaign
MichaelSpecter, Massachusetts Institute of Technology
DrewSpringall, Auburn University
JessicaStaddon, JPMorgan Chase
EmilyStark, Google
AngelosStavrou, Virginia Tech
DeianStefan, University of California, San Diego
BenStock, CISPA Helmholtz Center for Information Security
GianlucaStringhini, Boston University
YixinSun, University of Virginia
YuqiongSun, Facebook
QiangTang, The University of Sydney
Dave (Jing)Tian, Purdue University
YuanTian, University of Virginia
Nils OleTippenhauer, CISPA Helmholtz Center for Information Security
AlinTomescu, VMware Research
ShrutiTople, Microsoft Research
SantiagoTorres-Arias, Purdue University
FlorianTramèr, Stanford University
PatrickTraynor, University of Florida
CarmelaTroncoso, EPFL
Güliz SerayTuncay, Google
SelcukUluagac, Florida International University
BlaseUr, University of Chicago
AnjoVahldiek-Oberwagner, Intel Labs
Michelvan Eeten, Delft University of Technology
MayankVaria, Boston University
IngridVerbauwhede, Katholieke Universiteit Leuven
LucaViganò, King's College London
HayawardhVijayakumar, Samsung Research America
BimalViswanath, Virginia Tech
DanielVotipka, Tufts University
DavidWagner, University of California, Berkeley
MichaelWaidner, Technische Universität Darmstadt
GangWang, University of Illinois at Urbana–Champaign
TingWang, The Pennsylvania State University
XiaoFengWang, Indiana University Bloomington
MichaelWeissbacher, Block, Inc.
TaraWhalen, Carleton University
ChristianWressnegger, Karlsruhe Institute of Technology (KIT)
MatthewWright, Rochester Institute of Technology
EricWustrow, University of Colorado Boulder
Jason (Minhui)Xue, The University of Adelaide
DaphneYao, Virginia Tech
YuvalYarom, The University of Adelaide and Data61
TubaYavuz, University of Florida
Yanfang (Fanny)Ye, Case Western Reserve University
HengYin, University of California, Riverside
QiangZeng, University of South Carolina
SarahZennou, Airbus
FengweiZhang, Southern University of Science and Technology (SUSTech)
XiangyuZhang, Purdue University
YangZhang, CISPA Helmholtz Center for Information Security
YuanZhang, Fudan University
WentingZheng, Carnegie Mellon University
YajinZhou, Zhejiang University
HaojinZhu, Shanghai Jiao Tong University
Poster Session Chair
SaraRampazzi, University of Florida
Test of Time Awards Committee
DanBoneh, Stanford University
SrdjanCapkun, ETH Zurich
LorrieCranor, Carnegie Mellon University
NickFeamster, University of Chicago
KevinFu, University of Michigan
FabianMonrose, The University of North Carolina at Chapel Hill
PaulVan Oorschot, Carleton University
DavidWagner, University of California, Berkeley
DanWallach, Rice University
WenyuanXu, Zhejiang University
Steering Committee
MichaelBailey, University of Illinois at Urbana–Champaign
MattBlaze, Georgetown University
DanBoneh, Stanford University
SrdjanCapkun, ETH Zurich
WilliamEnck, North Carolina State University
KevinFu, University of Michigan
RachelGreenstadt, New York University
CaseyHenderson, USENIX Association
NadiaHeninger, University of California, San Diego
ThorstenHolz, Ruhr-Universität Bochum
EnginKirda, Northeastern University
TadayoshiKohno, University of Washington
ThomasRistenpart, Cornell Tech
FranziskaRoesner, University of Washington
PatrickTraynor, University of Florida
DavidWagner, University of California, Berkeley
Conference Sponsorship
Become a Sponsor: Sponsorship exposes your brand to highly qualified attendees, funds our diversity and student grants, supports open access to our conference content, and keeps USENIX conferences affordable. USENIX is a 501(c)(3) non-profit organization that relies on sponsor support to fulfill its mission. To learn more, please contact the Sponsorship Department with the conference name in your subject line.
The acceptance of any organization as a sponsor does not imply explicit or implicit approval by USENIX of the donor organization’s values or actions. In addition, sponsorship does not provide any control over conference program content. Questions? Contact the Sponsorship Department.