33rd USENIX Security Symposium
August 14–16, 2024
Philadelphia, PA, USA
Co-located with
Grant applications due Monday, July 8
The 33rd USENIX Security Symposium will take place on August 14–16, 2024, at the Philadelphia Marriott Downtown in Philadelphia, PA, USA. The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.
The full symposium program will be available soon; view the fall accepted papers and summer accepted papers. The Early Bird registration deadline is Monday, July 22, 2024. Register today and save!
Apply for a Grant
See the USENIX Security '24 grant opportunities page for more information. The application deadline is Monday, July 8, 2024.
2024 USENIX Security Test of Time Award: Call for Nominations
Please suggest significant USENIX Security papers published at least 10 years ago to be considered for the 2024 USENIX Security Test of Time Award. Nominations are due by Saturday, June 1, 2024.
Registration Information
Early Bird Registration Deadline: Monday, July 22, 2024
See the Registration Information page for details, including fees, discount information, and other deadlines.
Discounts
In addition to our member discounts, USENIX offers several discounts to help you to attend USENIX Security '24, including a hardship discount for USENIX members who are unemployed or retired, in between jobs, or lack employer support.
USENIX Conference Policies
We encourage you to learn more about USENIX's values and how we put them into practice at our conferences.
Accessibility Information
USENIX is committed to ensuring that our meetings are fully accessible to all attendees. Visit our accessibility information page for details on mothers' rooms, ADA accessibility accommodation options, and how to make a request.
Venue
Philadelphia Marriott Downtown
1201 Market Street
Philadelphia, PA 19107
USA
+1 215.625.2900
Hotel Reservation Deadline: Monday, July 22, 2024
USENIX has negotiated a special conference attendee room rate of US$219 plus tax for single/double occupancy for conference attendees, including in-room wireless internet. To receive this rate, book your room online or call the hotel and mention USENIX or USENIX Security '24 when making your reservation.
The group rate is available through July 22, 2024, or until the block sells out, whichever occurs first. After this date, contact the hotel directly to inquire about room availability.
Room and Ride Sharing
USENIX maintains a Google Group to facilitate communication among attendees seeking roommates and ride sharing. You can sign up for free to find attendees with whom you can share a hotel room, taxi, shuttle, or other ride-share service. Please include "USENIXSecurity'24" in the subject line when posting a new request.
Parking
See the hotel's website for up-to-date parking information and rates.
About USENIX Security '24
Questions?
Review our Conference FAQs, and send direct queries via email:
Registration: conference@usenix.org
Membership: membership@usenix.org
Sponsorship: sponsorship@usenix.org
Student Grants: students@usenix.org
Proceedings Papers: production@usenix.org
Symposium Organizers
Davide Balzarotti Eurecom Program Co-Chair
Wenyuan Xu Zhejiang University Program Co-Chair
Program Vice Co-Chairs
TiffanyBao, Arizona State University
AlexandraDmitrienko, University of Wuerzburg
QiLi, Tsinghua University
GiancarloPellegrino, CISPA Helmholtz Center for Information Security
ChenYan, Zhejiang University
YupengZhang, University of Illinois at Urbana–Champaign and Texas A&M University
Program Committee
YousraAafer, University of Waterloo
AysajanAbidin, imec-COSIC KU Leuven
RubaAbu-Salma, King's College London
AbbasAcar, Florida International University
AdilAhmad, Arizona State University
CristinaAlcaraz, University of Malaga
MagnusAlmgren, Chalmers University of Technology
Mário S.Alvim, Universidade Federal de Minas Gerais
AbdelrahamanAly, Technology Innovation Institute (TII)
MahmoudAmmar, Huawei Research
ElenaAndreeva, Vienna University of Technology
ManosAntonakakis, Georgia Tech
DanieleAntonioli, EURECOM
SimoneAonzo, EURECOM
Diego F.Aranha, Aarhus University
FredericoAraujo, IBM Research
AhmadAtamli, NVIDIA
GiuseppeAteniese, George Mason University
EliasAthanasopoulos, University of Cyprus
ErmanAyday, Case Western Reserve University
GuangdongBai, The University of Queensland
LucaBaldesi, University of California, Irvine
MusardBalliu, KTH Royal Institute of Technology
SébastienBardin, CEA LIST, Université Paris-Saclay
LejlaBatina, Radboud University
LujoBauer, Carnegie Mellon University
SebastianBerndt, University of Lübeck
Konstantin (Kosta)Beznosov, University of British Columbia
GiuseppeBianchi, University of Roma Tor Vergata
BattistaBiggio, University of Cagliari
TamaraBonaci, Northeastern University
JosephBonneau, New York University
MarcusBotacin, Texas A&M University
SvenBugiel, CISPA Helmholtz Center for Information Security
NathanBurow, MIT Lincoln Laboratory
JuanCaballero, IMDEA Software Institute
Patricia AriasCabarcos, Paderborn University
StefanoCalzavara, Università Ca' Foscari Venezia
YinzhiCao, Johns Hopkins University
SrdjanCapkun, ETH Zurich
Alvaro A.Cardenas, University of California, Santa Cruz
NicholasCarlini, Google
LorenzoCavallaro, University College London
Z. BerkayCelik, Purdue University
Sang KilCha, Korea Advanced Institute of Science and Technology (KAIST)
VarunChandrasekaran, University of Illinois at Urbana–Champaign and Microsoft Research
RahulChatterjee, University of Wisconsin—Madison
Sze YiuChau, The Chinese University of Hong Kong
AlfredChen, University of California, Irvine
GuoxingChen, Shanghai Jiao Tong University
HaoChen, University of California, Davis
KaiChen, Institute of Information Engineering, Chinese Academy of Sciences
LongChen, Institute of Software Chinese Academy of Sciences
SanchuanChen, Auburn University
YanjiaoChen, Zhejiang University
YizhengChen, University of Maryland
YushiCheng, Tsinghua University
GiovanniCherubin, Microsoft
EuijinChoo, University of Alberta
Sherman S. M.Chow, The Chinese University of Hong Kong
NicolasChristin, Carnegie Mellon University
MihaiChristodorescu, Google
ShaananCohney, University of Melbourne
MauroConti, University of Padova
AndreaContinella, University of Twente
ManuelCosta, Azure Research, Microsoft
Daniele ConoD'Elia, Sapienza University of Rome
SavinoDambra, Norton Research Group
LucasDavi, University of Duisburg-Essen
LorenzoDe Carli, University of Calgary
FabioDe Gaspari, Sapienza University of Rome
LucaDemetrio, Università degli Studi di Genova
AmbraDemontis, University of Cagliari
GhadaDessouky, Google
ChangyuDong, Guangzhou University
AdamDoupé, Arizona State University
MinxinDu, The Chinese University of Hong Kong
TudorDumitras, University of Maryland, College Park
ZakirDurumeric, Stanford University
LauraEdelson, New York University
ChangEe-Chien, National University of Singapore
ManuelEgele, Boston University
ThomasEisenbarth, University of Lübeck
ThorstenEisenhofer, Technische Universität Berlin
MohamedElsabagh, Quokka
PardisEmami-Naeini, Duke University
WilliamEnck, North Carolina State University
SaschaFahl, CISPA Helmholtz Center for Information Security
HabibaFarrukh, University of California, Irvine
AuroreFass, CISPA Helmholtz Center for Information Security
BoFeng, Zhejiang University
HosseinFereidooni, KOBIL GmbH
TobiasFiebig, Max Planck Institute for Software Systems (MPI-SWS)
BryanFord, EPFL
AlisaFrik, International Computer Science Institute (ICSI)
AymericFromherz, Inria
KevinFu, Northeastern University
XinwenFu, University of Massachusetts Lowell
KelseyFulton, Colorado School of Mines
CarlosGañán, ICANN
TalGarfinkel, University of California, San Deigo
CarrieGates, Bank of America
GennieGebhart, Electronic Frontier Foundation and University of Washington
ZahraGhodsi, Purdue University
EshaGhosh, Microsoft Research
YossiGilad, The Hebrew University of Jerusalem
DevashishGosain, Birla Institute of Technology and Science and Max Planck Institute for Informatics
AndreGregio, Federal University of Parana (UFPR)
IlyaGrishchenko, University of California, Santa Barbara
DanielGruss, Graz University of Technology
GuofeiGu, Texas A&M University
MarcoGuarnieri, IMDEA Software Institute
WenboGuo, Purdue University
ArielHamlin, Northeastern University
JunHan, Yonsei University
WeiliHan, Fudan University
ShuangHao, The University of Texas at Dallas
HamzaHarkous, Google
BehnazHassanshahi, Oracle Labs
Nguyen PhongHoang, University of Chicago
ThorstenHolz, CISPA Helmholtz Center for Information Security
HoumanHomayoun, University of California, Davis
NicholasHopper, University of Minnesota
TaoHou, University of North Texas
YuncongHu, Shanghai Jiao Tong University
Danny YuxingHuang, New York University
Jun HoHuh, Samsung Research
Syed RafiulHussain, The Pennsylvania State University
AliceHutchings, University of Cambridge
LucaInvernizzi, Google
CynthiaIrvine, Naval Postgraduate School
FabianIsing, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE
DennisJackson, Mozilla
CharlieJacomme, Inria Paris
JosephJaeger, Georgia Institute of Technology
SashidharJakkamsetti, Bosch Research
RobJansen, U.S. Naval Research Laboratory
KangkookJee, The University Texas at Dallas
Rikke BjergJensen, Royal Holloway, University of London
YuseokJeon, UNIST (Ulsan National Institute of Science and Technology)
ShoulingJi, Zhejiang University
XiaoyuJi, Zhejiang University
XiangkunJia, Institute of Software Chinese Academy of Sciences
AaronJohnson, U.S. Naval Research Laboratory
GabrielKaptchuk, Boston University
YigitcanKaya, University of California, Santa Barbara
MarcelKeller, CSIRO's Data61
VasileiosKemerlis, Brown University
DmitryKhovratovich, Ethereum Foundation
KyungtaeKim, Dartmouth College
TaegyuKim, The Pennsylvania State University
TaesooKim, Georgia Institute of Technology and Samsung Research
YongdaeKim, Korea Advanced Institute of Science and Technology (KAIST)
DavidKohlbrenner, University of Washington
SebastianKöhler, University of Oxford
TadayoshiKohno, University of Washington
KariKostiainen, ETH Zurich
PlatonKotzias, Norton Research Group
SteveKremer, Inria
KatharinaKrombholz, CISPA Helmholtz Center for Information Security
ChristopherKruegel, University of California, Santa Barbara
KavitaKumari, Technical University of Darmstadt
AndrewKwong, The University of North Carolina at Chapel Hill
GiovanniLagorio, University of Genoa
AndreaLanzi, University of Milan
PierreLaperdrix, CNRS
RiccardoLazzeretti, Sapienza University of Rome
KevinLeach, Vanderbilt University
TancrèdeLepoint, Amazon Web Services
FrankLi, Georgia Institute of Technology
MingLi, University of Arizona
SongLi, Zhejiang University
KaitaiLiang, Delft University of Technology
ChristopherLiebchen, Google
YunLin, Shanghai Jiao Tong University
ZhiqiangLin, The Ohio State University
ZhenLing, Southeast University
TingLiu, Xi'an Jiaotong University
YaoLiu, University of South Florida
ZhuotaoLiu, Tsinghua University
YanLong, University of Michigan
WouterLueks, CISPA Helmholtz Center for Information Security
Lannan LisaLuo, George Mason University
MulongLuo, Cornell University
XiapuLuo, The Hong Kong Polytechnic University
SiqiMa, The University of New South Wales
AravindMachiry, Purdue University
MatteoMaffei, Technische Universität Wien
ChristianMainka, Ruhr University Bochum
NathanMalkin, University of Maryland
StefanMangard, Graz University of Technology
MichailManiatakos, New York University Abu Dhabi
AntonioMarcedone, Zoom Video Communications, Inc.
IvanMartinovic, University of Oxford
SaharMazloom, JPMorgan Chase
JonMcCune, Google
AllisonMcDonald, Boston University
DerrickMcKee, MIT Lincoln Laboratory
CatherineMeadows, U.S. Naval Research Laboratory
ShaguftaMehnaz, The Pennsylvania State University
SarahMeiklejohn, Google and University College London
MarcelaMelara, Intel Labs
YanMeng, Shanghai Jiao Tong University
MarkusMiettinen, Technische Universität Darmstadt
JiangMing, Tulane University
VladislavMladenov, Ruhr University Bochum
EsfandiarMohammadi, University of Lübeck
MainackMondal, Indian Institute of Technology, Kharagpur
HyungonMoon, UNIST (Ulsan National Institute of Science and Technology)
VeelashaMoonsamy, Ruhr University Bochum
MariusMuench, University of Birmingham
TakaoMurakami, ISM
Shravan RaviNarayan, The University of Texas at Austin
Ivan De OliveiraNunes, Rochester Institute of Technology
AdamOest, Paypal
HamedOkhravi, MIT Lincoln Laboratory
GabrieleOligeri, Hamad Bin Khalifa University
CristinaOnete, Université de Limoges, XLIM, and CNRS 7252
SimonOya, The University of British Columbia
ErcanOzturk, Meta
FabioPagani, Binarly
PanosPapadimitratos, KTH Royal Institute of Technology
DimitriosPapadopoulos, The Hong Kong University of Science and Technology
ThomasPasquier, University of British Columbia
AndrewPaverd, Microsoft
MathiasPayer, EPFL
PaulPearce, Georgia Institute of Technology
Sai TejaPeddinti, Google
AmreeshPhokeer, Internet Society
PabloPicazo-Sanchez, Halmstad University
StjepanPicek, Radboud University
FabioPierazzi, King's College London
MauraPintor, University of Cagliari
GeorgiosPortokalidis, Stevens Institute of Technology
NielsProvos, Lacework
ChenxiongQian, The University of Hong Kong
HanQiu, Tsinghua University
GangQu, University of Maryland
JVRajendran, Texas A&M University
Kopo MarvinRamokapane, University of Bristol
SaraRampazzi, University of Florida
AanjhanRanganathan, Northeastern University
KasperRasmussen, University of Oxford
MarianaRaykova, Google
ElissaRedmiles, Max Planck Institute for Software Systems (MPI-SWS)
OscarReparaz, Block, Inc.
TamaraRezk, Inria
KonradRieck, Technische Universität Berlin
FlorentinRochet, UNamur
FranziskaRoesner, University of Washington
EyalRonen, Tel Aviv University
StefanieRoos, RPTU Kaiserslautern-Landau
ChristianRossow, CISPA Helmholtz Center for Information Security
Kevin AlejandroRoundy, Gen Digital
ScottRuoti, University of Tennessee, Knoxville
AndreiSabelfeld, Chalmers University of Technology
Ahmad-RezaSadeghi, Technische Universität Darmstadt
SayandeepSaha, Université catholique de Louvain
MerveSahin, SAP Security Research
KazueSako, Waseda University
JunSakuma, Tokyo Institute of Technology
SoheilSalehi, University of Arizona
IskanderSanchez-Rola, Norton Research Group
NunoSantos, INESC-ID and Instituto Superior Técnico, University of Lisbon
SebastianSchinzel, Münster University of Applied Sciences, Fraunhofer SIT, and ATHENE
MichaelSchwarz, CISPA Helmholtz Center for Information Security
WendySeltzer, Tucows
JohannaSepúlveda, Airbus Defence and Space
BingyuShen, Meta Platforms, Inc.
ChaoShen, Xi'an Jiaotong University
EmilyShen, MIT Lincoln Laboratory
ShwetaShinde, ETH Zurich
MalihehShirvanian, Netflix
AliShokri, Virginia Tech
HayaShulman, Goethe-Universität Frankfurt, Fraunhofer SIT, and ATHENE
ManyaSleeper, Google
PeterSnyder, Brave Software
DokyungSong, Yonsei University
YongsooSong, Seoul National University
AlessandroSorniotti, IBM Research Europe
DarioStabili, Alma Mater Studiorum - Università di Bologna
BenStock, CISPA Helmholtz Center for Information Security
GianlucaStringhini, Boston University
MartinStrohmeier, armasuisse Science and Technology, Cyber-Defence Campus
GuillermoSuarez-Tangil, IMDEA Networks Institute
TakeshiSugawara, The University of Electro-Communications
KunSun, George Mason University
WeiSun, University of California, San Diego
YiSun, Beijing University of Posts and Telecommunications
ZhiboSun, Drexel University
QiangTang, The University of Sydney
JuanTapiador, UC3M
TerylTaylor, IBM Research
YuanTian, University of California, Los Angeles
Nils OleTippenhauer, CISPA Helmholtz Center for Information Security
RahmadiTrimananda, Comcast
Chia-CheTsai, Texas A&M University
Güliz SerayTuncay, Google
SelcukUluagac, Florida International University
BlaseUr, University of Chicago
AnjoVahldiek-Oberwagner, Intel Labs
JoVan Bulck, imec-DistriNet, KU Leuven
Michelvan Eeten, Delft University of Technology
MayankVaria, Boston University
VenkatVenkatakrishnan, University of Illinois Chicago
LucaViganò, King's College London
GiovanniVigna, University of California, Santa Barbara
DanielVotipka, Tufts University
AlexiosVoulimeneas, Delft University of Technology
DavidWagner, University of California, Berkeley
CongWang, City University of Hong Kong
FishWang, Arizona State University
GangWang, University of Illinois at Urbana–Champaign
QianWang, Wuhan University
ShuaiWang, The Hong Kong University of Science and Technology
TingWang, The Pennsylvania State University
XiangyuWang, Xidian University
XiaoWang, Northwestern University
ZhiboWang, Zhejiang University
EdgarWeippl, University of Vienna, SBA Research
JosephineWolff, Tufts University
ChristianWressnegger, Karlsruhe Institute of Technology (KIT)
NanWu, CSIRO's Data61
YangXiang, Swinburne University of Technology
LiangXiao, Xiamen University
ChenrenXu, Peking University
FengyuanXu, Nanjing University
Jason (Minhui)Xue, CSIRO's Data61
CarterYagemann, The Ohio State University
GuangliangYang, Fudan University
YuvalYarom, Ruhr University Bochum
Attila AYavuz, University of South Florida
Chia-MuYu, National Yang Ming Chiao Tung University
YuYu, Shanghai Jiao Tong University
XingliangYuan, Monash University
XuYuan, University of Louisiana at Lafayette
SavvasZannettou, Delft University of Technology
DanielZappala, Brigham Young University
SarahZennou, Airbus
BingshengZhang, Zhejiang University
FanZhang, Yale University
FengweiZhang, Southern University of Science and Technology (SUSTech)
KehuanZhang, The Chinese University of Hong Kong
MuZhang, University Of Utah
NingZhang, Washington University
XiaokuanZhang, George Mason University
YouqianZhang, The Hong Kong Polytechnic University
YuanZhang, Fudan University
YueZhang, The Ohio State University
ZhikunZhang, Stanford University and CISPA Helmholtz Center for Information Security
QingchuanZhao, City University of Hong Kong
ZimingZhao, University at Buffalo
HaoZhou, The Hong Kong Polytechnic University
HaojinZhu, Shanghai Jiao Tong University
SamanZonouz, Georgia Tech
Mary EllenZurko, MIT Lincoln Laboratory
Poster Session Co-Chairs
AndreaContinella, University of Twente
YuanTian, University of California, Los Angeles
Steering Committee
MichaelBailey, Georgia Institute of Technology
KevinButler, University of Florida
JoeCalandrino, Federal Trade Commission
SrdjanCapkun, ETH Zurich
WilliamEnck, North Carolina State University
RachelGreenstadt, New York University
CaseyHenderson-Ross, USENIX Association
NadiaHeninger, University of California, San Diego
ThorstenHolz, Ruhr-Universität Bochum
TadayoshiKohno, University of Washington
FranziskaRoesner, University of Washington
KurtThomas, Google
PatrickTraynor, University of Florida
CarmelaTroncoso, EPFL
Conference Sponsorship
Become a Sponsor: Sponsorship exposes your brand to highly qualified attendees, funds our diversity and student grants, supports open access to our conference content, and keeps USENIX conferences affordable. USENIX is a 501(c)(3) non-profit organization that relies on sponsor support to fulfill its mission. To learn more, please contact the Sponsorship Department with the conference name in your subject line.
The acceptance of any organization as a sponsor does not imply explicit or implicit approval by USENIX of the donor organization’s values or actions. In addition, sponsorship does not provide any control over conference program content. Questions? Contact the Sponsorship Department.