USENIX Security '22 (2024)

USENIX Security '22 (1)

31st USENIX Security Symposium

August 10–12, 2022

Boston, MA, USA

Thanks to those who joined us for the 31st USENIX Security Symposium. We hope you enjoyed the event.

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.

As part of our commitment to open access to research, the full proceedings and presentation slides are free and open to the public on the technical sessions page. Videos are posted within a few weeks of the end of the event.

In-Person Registration SOLD OUT. Virtual spots still available.

Registration Information

See the Registration Information page for details.

Authors and Speakers

Please contact the Conference Department for registration information.

Discounts

In addition to our member discounts, USENIX offers several discounts to help you to attend USENIX Security '22 in person.

Terms and Conditions

All USENIX Security '22 attendees must abide by the event's Terms and Conditions and USENIX's Coronavirus/COVID-19 Health and Safety Plan. Please review this information prior to registering for the event.

USENIX Conference Policies

We encourage you to learn more about USENIX's values and how we put them into practice at our conferences.

ADA Requests

USENIX is committed to ensuring that our meetings are fully accessible to all attendees. Visit our ADA information page to find out about options and how to make a request. To ensure that we meet your needs, please make your request by Monday, July 18,2022. We cannot guarantee that we can meet requests received after this date, although we will make every reasonable effort to do so.

Refunds and Cancellations

The cancellation deadline is Friday, August 5,2022. Please review the USENIX Registration Substitution and Cancellation Policy for more information.

Venue

Boston Marriott Copley Place
110 Huntington Ave
Boston, MA 02116
USA
+1 617.236.5800

Hotel Discount Deadline: Monday, July 18, 2022

Special Attendee Room Rate

USENIX has negotiated a special conference attendee room rate of US$259 plus tax for single/double occupancy, including in-room wireless internet. To receive this rate, book your room online or call the hotel and mention USENIX or Security '22.

The group rate is available until Monday, July 18, 2022, or until the block sells out, whichever occurs first. After this date, contact the hotel directly to inquire about room availability.

For more information, see the Venue, Hotel, and Travel page.

USENIX Security '22 (2)

Questions?

Review our Conference FAQs, and send direct queries via email:

Registration: conference@usenix.org
Membership: membership@usenix.org
Sponsorship: sponsorship@usenix.org
Student Grants: students@usenix.org
Proceedings Papers: production@usenix.org

Symposium Organizers

USENIX Security '22 (3)

Kevin Butler

University of Florida

Program Co-Chair

USENIX Security '22 (4)

Kurt Thomas

Google

Program Co-Chair

Program Committee

YousraAafer, University of Waterloo

RubaAbu-Salma, King's College London

GunesAcar, Katholieke Universiteit Leuven

SadiaAfroz, International Computer Science Institute (ICSI), Avast

DevdattaAkhawe, Dropbox

DanielAlexander Zappala, Brigham Young University

ArdalanAmiri Sani, University of California, Irvine

OlabodeAnise, Google

DanieleAntonioli, EPFL, EURECOM

MariaApostolaki, ETH Zurich

EliasAthanasopoulos, University of Cyprus

DavideBalzarotti, EURECOM

TiffanyBao, Arizona State University

DavidBarrera, Carleton Univeristy

AdamBates, University of Illinois at Urbana–Champaign

LejlaBatina, Radboud University

LujoBauer, Carnegie Mellon University

JethroBeekman, Fortanix

AntonioBianchi, Purdue University

BattistaBiggio, University of Cagliari

LeylaBilge, NortonLifeLock Research Group

VincentBindschaedler, University of Florida

PriyamBiswas, Intel

MarinaBlanton, University at Buffalo

Erik-OliverBlass, Airbus

TamaraBonaci, Northeastern University

JosephBonneau, New York University

GlencoraBorradaile, Oregon State University

MarcusBotacin, Federal University of Paraná

IoanaBoureanu, University of Surrey

NathanBurow, MIT Lincoln Laboratory

JosephCalandrino, Federal Trade Commission

StefanoCalzavara, Università Ca' Foscari Venezia

YinzhiCao, Johns Hopkins University

SrdjanCapkun, ETH Zurich

AlvaroCardenas, University of California, Santa Cruz

NicholasCarlini, Google

LorenzoCavallaro, University College London

Z. BerkayCelik, Purdue University

Sang KilCha, Korea Advanced Institute of Science and Technology (KAIST)

NehaChachra, Facebook

RahulChatterjee, University of Wisconsin—Madison

Sze YiuChau, The Chinese University of Hong Kong

KaiChen, Institute of Information Engineering, Chinese Academy of Sciences

Qi AlfredChen, University of California, Irvine

YizhengChen, Columbia University

Sherman S. M.Chow, The Chinese University of Hong Kong

Amrita RoyChowdhury, University of Wisconsin—Madison

NicolasChristin, Carnegie Mellon University

ChitchanokChuengsatiansup, The University of Adelaide

CamilleCobb, Carnegie Mellon University

ShaananCohney, Princeton University and University of Melbourne

AndreaContinella, University of Twente

CasCremers, CISPA Helmholtz Center for Information Security

WeidongCui, Microsoft Research

AnupamDas, North Carolina State University

PubaliDatta, University of Illinois at Urbana–Champaign

NathanDautenhahn, Rice University

AlexandraDmitrienko, University of Wuerzburg

AdamDoupe, Arizona State University

TudorDumitras, University of Maryland

ZakirDurumeric, Stanford University

ManuelEgele, Boston University

ThomasEisenbarth, University of Lübeck

MaryEllen Zurko, MIT Lincoln Laboratory

MohamedElsabagh, Kryptowire

PardisEmami-Naeini, University of Washington

WilliamEnck, North Carolina State University

RoyaEnsafi, University of Michigan

BirhanuEshete, University of Michigan

SabaEskandarian, The University of North Carolina at Chapel Hill

SaschaFahl, CISPA Helmholtz Center for Information Security

KassemFawaz, University of Wisconsin—Madison

YunsiFei, Northeastern University

EarlenceFernandes, University of Wisconsin—Madison

DomenicForte, University of Florida

AurélienFrancillon, EURECOM

MichaelFranz, University of California, Irvine

YanickFratantonio, Cisco Talos

DavidFreeman, Facebook

AymericFromherz, Inria

PatrickGage Kelley, Google

EvaGalperin, Electronic Frontier Foundation

VinodGanapathy, Indian Institute of Science (IISc)

ChristinaGarman, Purdue University

CarrieGates, Bank of America

GenevieveGebhart, University of Washington Information School

DanielGenkin, Georgia Institute of Technology

RyanGerdes, Virginia Tech

ArthurGervais, Imperial College London

IreneGiacomelli, Protocol Labs

YossiGilad, The Hebrew University of Jerusalem

NeilGong, Duke University

TyroneGrandison, The Data-Driven Institute

DanielGruss, Graz University of Technology

GuofeiGu, Texas A&M University

LeGuan, University of Georgia

ShuangHao, The University of Texas at Dallas

Wajih UlHassan, University of Illinois at Urbana–Champaign

ChristopheHauser, USC/Information Sciences Institute

XialiHei, University of Louisiana at Lafayette

GrantHernandez, Qualcomm

MatthewHicks, Virginia Tech

RalphHolz, University of Twente

ThorstenHolz, Ruhr University Bochum

NickHopper, University of Minnesota

DianeHosfelt, Apple

Syed RafiulHussain, The Pennsylvania State University

LucaInvernizzi, Google

SotirisIoannidis, Technical University of Crete

CynthiaIrvine, Naval Postgraduate School

SumanJana, Columbia University

RamyaJayaram Masti, Intel

YuseokJeon, UNIST (Ulsan National Institute of Science and Technology)

YierJin, University of Florida

Brent ByunghoonKang, Korea Advanced Institute of Science and Technology (KAIST)

ChrisKanich, University of Illinois at Chicago

ApuKapadia, Indiana University Bloomington

AlexandrosKapravelos, North Carolina State University

VasileiosKemerlis, Brown University

FlorianKerschbaum, University of Waterloo

TaesooKim, Georgia Institute of Technology

YongdaeKim, Korea Advanced Institute of Science and Technology (KAIST)

SamKing, University of California, Davis and Bouncer Technologies

MichelKinsy, TAMU

EnginKirda, Northeastern University

KatharinaKohls, Radboud University

TadayoshiKohno, University of Washington

KariKostiainen, ETH Zurich

SrikanthKrishnamurthy, University of California, Riverside

Joshua AKroll, Naval Postgraduate School

KatharinaKrombholz, CISPA Helmholtz Center for Information Security

ChristopherKruegel, University of California, Santa Barbara

DeepakKumar, Stanford University

AnilKurmus, IBM Research Europe

AndreaLanzi, University of Milan

PavelLaskov, University of Liechtenstein

ByoungyoungLee, Seoul National University

Kyu HyungLee, University of Georgia

SanghoLee, Microsoft Research

WenkeLee, Georgia Institute of Technology

TancrèdeLepoint, Google

AdaLerner, Wellesley College

FrankLi, Georgia Institute of Technology

QiLi, Tsinghua University

TianshiLi, Carnegie Mellon University

DavidLie, University of Toronto

ZhiqiangLin, Ohio State University

MartinaLindorfer, TU Wien

GuyueLiu, Carnegie Mellon University

KangjieLu, University of Minnesota

WouterLueks, EPFL

XiapuLuo, The Hong Kong Polytechnic University

MatteoMaffei, TU Wien

StefanMangard, Graz University of Technology

MohammadMannan, Concordia University

IvanMartinovic, Oxford University

MichelleMazurek, University of Maryland

PatrickMcDaniel, The Pennsylvania State University

ShaguftaMehnaz, Dartmouth College

AasthaMehta, University of British Columbia, Vancouver

SarahMeiklejohn, University College London and Google

MarcelaMelara, Intel Labs

NeleMentens, Leiden University and Katholieke Universiteit Leuven

JiangMing, The University of Texas at Arlington

ArianaMirian, University of California, San Diego

JelenaMirkovic, University of Southern California

DanielMoghimi, University of California, San Diego

EsfandiarMohammadi, University of Lübeck

MainackMondal, Indian Institute of Technology, Kharagpur

Soo-JinMoon, Google

VeelashaMoonsamy, Ruhr University Bochum

ThomasMoyer, University of North Carolina

MariusMuench, Vrije Universiteit Amsterdam

TakaoMurakami, AIST

TobyMurray, University of Melbourne

NickNikiforakis, Stony Brook University

AnitaNikolich, University of Illinois at Urbana–Champaign

ShirinNilizadeh, The University of Texas at Arlington

AdamOest, PayPal

HamedOkhravi, MIT Lincoln Laboratory

MelekÖnen, EURECOM

CristinaOnete, University of Limoges/XLIM/CNRS 7252

YossiOren, Ben-Gurion University of the Negev

RebekahOverdorf, EPFL

MiroslavPajic, Duke University

DimitriosPapadopoulos, The Hong Kong University of Science and Technology

BryanParno, Carnegie Mellon University

MathiasPayer, EPFL

PaulPearce, Georgia Institute of Technology, International Computer Science Institute (ICSI)

GiancarloPellegrino, CISPA Helmholtz Center for Information Security

RobertoPerdisci, University of Georgia and Georgia Institute of Technology

RadiaPerlman, Dell EMC

PeterPeterson, University of Minnesota

FabioPierazzi, King's College London

ChristinaPoepper, New York University Abu Dhabi

NielsProvos, Stripe

AmirRahmati, Stony Brook University

JeyavijayanRajendran, Texas A&M University

SaraRampazzi, University of Florida

MarianaRaykova, Google

JoelReardon, University of Calgary

BradleyReaves, North Carolina State University

ElissaRedmiles, Max Planck Institute for Software Systems (MPI-SWS)

Michael K.Reiter, Duke University

KonradRieck, Technische Universität Braunschweig

WilliamRobertson, Northeastern University

FranziskaRoesner, University of Washington

EyalRonen, Tel Aviv University

StefanieRoos, TU Delft

Ahmad-RezaSadeghi, Technische Universität Darmstadt

BrendanSaltaformaggio, Georgia Institute of Technology

NiteshSaxena, University of Alabama at Birmingham

SebastianSchinzel, Münster University of Applied Sciences

MichaelSchwarz, CISPA Helmholtz Center for Information Security

JörgSchwenk, Ruhr University Bochum

WendySeltzer, W3C and Massachusetts Institute of Technology

JohannaSepulveda, Airbus

MahmoodSharif, Tel Aviv University and VMware

Imani N.Sherman, University of Florida

ShwetaShinde, ETH Zurich

FatemehShirazi, Web3 Foundation

MalihehShirvanian, Visa Research

YanShosh*taishvili, Arizona State University

HayaShulman, Fraunhofer SIT

PeterSnyder, Brave Browser

SooelSon, Korea Advanced Institute of Science and Technology (KAIST)

ChengyuSong, University of California, Riverside

AlessandroSorniotti, IBM Research Europe

KyleSoska, University of Illinois at Urbana–Champaign

MichaelSpecter, Massachusetts Institute of Technology

DrewSpringall, Auburn University

JessicaStaddon, JPMorgan Chase

EmilyStark, Google

AngelosStavrou, Virginia Tech

DeianStefan, University of California, San Diego

BenStock, CISPA Helmholtz Center for Information Security

GianlucaStringhini, Boston University

YixinSun, University of Virginia

YuqiongSun, Facebook

QiangTang, The University of Sydney

Dave (Jing)Tian, Purdue University

YuanTian, University of Virginia

Nils OleTippenhauer, CISPA Helmholtz Center for Information Security

AlinTomescu, VMware Research

ShrutiTople, Microsoft Research

SantiagoTorres-Arias, Purdue University

FlorianTramèr, Stanford University

PatrickTraynor, University of Florida

CarmelaTroncoso, EPFL

Güliz SerayTuncay, Google

SelcukUluagac, Florida International University

BlaseUr, University of Chicago

AnjoVahldiek-Oberwagner, Intel Labs

Michelvan Eeten, Delft University of Technology

MayankVaria, Boston University

IngridVerbauwhede, Katholieke Universiteit Leuven

LucaViganò, King's College London

HayawardhVijayakumar, Samsung Research America

BimalViswanath, Virginia Tech

DanielVotipka, Tufts University

DavidWagner, University of California, Berkeley

MichaelWaidner, Technische Universität Darmstadt

GangWang, University of Illinois at Urbana–Champaign

TingWang, The Pennsylvania State University

XiaoFengWang, Indiana University Bloomington

MichaelWeissbacher, Block, Inc.

TaraWhalen, Carleton University

ChristianWressnegger, Karlsruhe Institute of Technology (KIT)

MatthewWright, Rochester Institute of Technology

EricWustrow, University of Colorado Boulder

Jason (Minhui)Xue, The University of Adelaide

DaphneYao, Virginia Tech

YuvalYarom, The University of Adelaide and Data61

TubaYavuz, University of Florida

Yanfang (Fanny)Ye, Case Western Reserve University

HengYin, University of California, Riverside

QiangZeng, University of South Carolina

SarahZennou, Airbus

FengweiZhang, Southern University of Science and Technology (SUSTech)

XiangyuZhang, Purdue University

YangZhang, CISPA Helmholtz Center for Information Security

YuanZhang, Fudan University

WentingZheng, Carnegie Mellon University

YajinZhou, Zhejiang University

HaojinZhu, Shanghai Jiao Tong University

Poster Session Chair

SaraRampazzi, University of Florida

Test of Time Awards Committee

DanBoneh, Stanford University

SrdjanCapkun, ETH Zurich

LorrieCranor, Carnegie Mellon University

NickFeamster, University of Chicago

KevinFu, University of Michigan

FabianMonrose, The University of North Carolina at Chapel Hill

PaulVan Oorschot, Carleton University

DavidWagner, University of California, Berkeley

DanWallach, Rice University

WenyuanXu, Zhejiang University

Steering Committee

MichaelBailey, University of Illinois at Urbana–Champaign

MattBlaze, Georgetown University

DanBoneh, Stanford University

SrdjanCapkun, ETH Zurich

WilliamEnck, North Carolina State University

KevinFu, University of Michigan

RachelGreenstadt, New York University

CaseyHenderson, USENIX Association

NadiaHeninger, University of California, San Diego

ThorstenHolz, Ruhr-Universität Bochum

EnginKirda, Northeastern University

TadayoshiKohno, University of Washington

ThomasRistenpart, Cornell Tech

FranziskaRoesner, University of Washington

PatrickTraynor, University of Florida

DavidWagner, University of California, Berkeley

USENIX Security '22 (5)

Platinum Sponsor

USENIX Security '22 (6)

Gold Sponsors

USENIX Security '22 (7)

USENIX Security '22 (8)

Silver Sponsors

USENIX Security '22 (9)

USENIX Security '22 (10)

USENIX Security '22 (11)

USENIX Security '22 (12)

USENIX Security '22 (13)

Bronze Sponsors

USENIX Security '22 (14)

USENIX Security '22 (15)

USENIX Security '22 (16)

Industry Partner and Media Sponsor

USENIX Security '22 (17)

USENIX Security '22 (18)

Conference Sponsorship

Become a Sponsor: Sponsorship exposes your brand to highly qualified attendees, funds our diversity and student grants, supports open access to our conference content, and keeps USENIX conferences affordable. USENIX is a 501(c)(3) non-profit organization that relies on sponsor support to fulfill its mission. To learn more, please contact the Sponsorship Department with the conference name in your subject line.

The acceptance of any organization as a sponsor does not imply explicit or implicit approval by USENIX of the donor organization’s values or actions. In addition, sponsorship does not provide any control over conference program content. Questions? Contact the Sponsorship Department.

USENIX Security '22 (2024)
Top Articles
Packers confían que Jordan Love vale el gran contrato
3 reasons the Bears would -- or wouldn't -- deal Justin Fields if they land the No. 1 pick
Funny Roblox Id Codes 2023
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Joi Databas
DPhil Research - List of thesis titles
Shs Games 1V1 Lol
Evil Dead Rise Showtimes Near Massena Movieplex
Steamy Afternoon With Handsome Fernando
Which aspects are important in sales |#1 Prospection
Detroit Lions 50 50
18443168434
Newgate Honda
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Grace Caroline Deepfake
978-0137606801
Nwi Arrests Lake County
Justified Official Series Trailer
London Ups Store
Committees Of Correspondence | Encyclopedia.com
Pizza Hut In Dinuba
Jinx Chapter 24: Release Date, Spoilers & Where To Read - OtakuKart
How Much You Should Be Tipping For Beauty Services - American Beauty Institute
Free Online Games on CrazyGames | Play Now!
Mccain Agportal
Amih Stocktwits
Fort Mccoy Fire Map
Uta Kinesiology Advising
Kcwi Tv Schedule
What Time Does Walmart Auto Center Open
Nesb Routing Number
Olivia Maeday
Random Bibleizer
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Black Lion Backpack And Glider Voucher
Gopher Carts Pensacola Beach
Duke University Transcript Request
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Jambus - Definition, Beispiele, Merkmale, Wirkung
Ark Unlock All Skins Command
Craigslist Red Wing Mn
D3 Boards
Jail View Sumter
Nancy Pazelt Obituary
Birmingham City Schools Clever Login
Thotsbook Com
Funkin' on the Heights
Vci Classified Paducah
Www Pig11 Net
Ty Glass Sentenced
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 6084

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.