USENIX Security '24 (2024)

USENIX Security '24 (1)

33rd USENIX Security Symposium

August 14–16, 2024

Philadelphia, PA, USA

Co-located with

Grant applications due Monday, July 8

The 33rd USENIX Security Symposium will take place on August 14–16, 2024, at the Philadelphia Marriott Downtown in Philadelphia, PA, USA. The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.

The full symposium program will be available soon; view the fall accepted papers and summer accepted papers. The Early Bird registration deadline is Monday, July 22, 2024. Register today and save!

Apply for a Grant

See the USENIX Security '24 grant opportunities page for more information. The application deadline is Monday, July 8, 2024.

2024 USENIX Security Test of Time Award: Call for Nominations

Please suggest significant USENIX Security papers published at least 10 years ago to be considered for the 2024 USENIX Security Test of Time Award. Nominations are due by Saturday, June 1, 2024.

Registration Information

Early Bird Registration Deadline: Monday, July 22, 2024

See the Registration Information page for details, including fees, discount information, and other deadlines.

Discounts

In addition to our member discounts, USENIX offers several discounts to help you to attend USENIX Security '24, including a hardship discount for USENIX members who are unemployed or retired, in between jobs, or lack employer support.

USENIX Conference Policies

We encourage you to learn more about USENIX's values and how we put them into practice at our conferences.

Accessibility Information

USENIX is committed to ensuring that our meetings are fully accessible to all attendees. Visit our accessibility information page for details on mothers' rooms, ADA accessibility accommodation options, and how to make a request.

Venue

Philadelphia Marriott Downtown
1201 Market Street
Philadelphia, PA 19107
USA
+1 215.625.2900

Hotel Reservation Deadline: Monday, July 22, 2024

USENIX has negotiated a special conference attendee room rate of US$219 plus tax for single/double occupancy for conference attendees, including in-room wireless internet. To receive this rate, book your room online or call the hotel and mention USENIX or USENIX Security '24 when making your reservation.

The group rate is available through July 22, 2024, or until the block sells out, whichever occurs first. After this date, contact the hotel directly to inquire about room availability.

Room and Ride Sharing

USENIX maintains a Google Group to facilitate communication among attendees seeking roommates and ride sharing. You can sign up for free to find attendees with whom you can share a hotel room, taxi, shuttle, or other ride-share service. Please include "USENIXSecurity'24" in the subject line when posting a new request.

Parking

See the hotel's website for up-to-date parking information and rates.

USENIX Security '24 (2)

Questions?

Review our Conference FAQs, and send direct queries via email:

Registration: conference@usenix.org
Membership: membership@usenix.org
Sponsorship: sponsorship@usenix.org
Student Grants: students@usenix.org
Proceedings Papers: production@usenix.org

Symposium Organizers

USENIX Security '24 (3)

Davide Balzarotti

Eurecom

Program Co-Chair

USENIX Security '24 (4)

Wenyuan Xu

Zhejiang University

Program Co-Chair

Program Vice Co-Chairs

TiffanyBao, Arizona State University

AlexandraDmitrienko, University of Wuerzburg

QiLi, Tsinghua University

GiancarloPellegrino, CISPA Helmholtz Center for Information Security

ChenYan, Zhejiang University

YupengZhang, University of Illinois at Urbana–Champaign and Texas A&M University

Program Committee

YousraAafer, University of Waterloo

AysajanAbidin, imec-COSIC KU Leuven

RubaAbu-Salma, King's College London

AbbasAcar, Florida International University

AdilAhmad, Arizona State University

CristinaAlcaraz, University of Malaga

MagnusAlmgren, Chalmers University of Technology

Mário S.Alvim, Universidade Federal de Minas Gerais

AbdelrahamanAly, Technology Innovation Institute (TII)

MahmoudAmmar, Huawei Research

ElenaAndreeva, Vienna University of Technology

ManosAntonakakis, Georgia Tech

DanieleAntonioli, EURECOM

SimoneAonzo, EURECOM

Diego F.Aranha, Aarhus University

FredericoAraujo, IBM Research

AhmadAtamli, NVIDIA

GiuseppeAteniese, George Mason University

EliasAthanasopoulos, University of Cyprus

ErmanAyday, Case Western Reserve University

GuangdongBai, The University of Queensland

LucaBaldesi, University of California, Irvine

MusardBalliu, KTH Royal Institute of Technology

SébastienBardin, CEA LIST, Université Paris-Saclay

LejlaBatina, Radboud University

LujoBauer, Carnegie Mellon University

SebastianBerndt, University of Lübeck

Konstantin (Kosta)Beznosov, University of British Columbia

GiuseppeBianchi, University of Roma Tor Vergata

BattistaBiggio, University of Cagliari

TamaraBonaci, Northeastern University

JosephBonneau, New York University

MarcusBotacin, Texas A&M University

SvenBugiel, CISPA Helmholtz Center for Information Security

NathanBurow, MIT Lincoln Laboratory

JuanCaballero, IMDEA Software Institute

Patricia AriasCabarcos, Paderborn University

StefanoCalzavara, Università Ca' Foscari Venezia

YinzhiCao, Johns Hopkins University

SrdjanCapkun, ETH Zurich

Alvaro A.Cardenas, University of California, Santa Cruz

NicholasCarlini, Google

LorenzoCavallaro, University College London

Z. BerkayCelik, Purdue University

Sang KilCha, Korea Advanced Institute of Science and Technology (KAIST)

VarunChandrasekaran, University of Illinois at Urbana–Champaign and Microsoft Research

RahulChatterjee, University of Wisconsin—Madison

Sze YiuChau, The Chinese University of Hong Kong

AlfredChen, University of California, Irvine

GuoxingChen, Shanghai Jiao Tong University

HaoChen, University of California, Davis

KaiChen, Institute of Information Engineering, Chinese Academy of Sciences

LongChen, Institute of Software Chinese Academy of Sciences

SanchuanChen, Auburn University

YanjiaoChen, Zhejiang University

YizhengChen, University of Maryland

YushiCheng, Tsinghua University

GiovanniCherubin, Microsoft

EuijinChoo, University of Alberta

Sherman S. M.Chow, The Chinese University of Hong Kong

NicolasChristin, Carnegie Mellon University

MihaiChristodorescu, Google

ShaananCohney, University of Melbourne

MauroConti, University of Padova

AndreaContinella, University of Twente

ManuelCosta, Azure Research, Microsoft

Daniele ConoD'Elia, Sapienza University of Rome

SavinoDambra, Norton Research Group

LucasDavi, University of Duisburg-Essen

LorenzoDe Carli, University of Calgary

FabioDe Gaspari, Sapienza University of Rome

LucaDemetrio, Università degli Studi di Genova

AmbraDemontis, University of Cagliari

GhadaDessouky, Google

ChangyuDong, Guangzhou University

AdamDoupé, Arizona State University

MinxinDu, The Chinese University of Hong Kong

TudorDumitras, University of Maryland, College Park

ZakirDurumeric, Stanford University

LauraEdelson, New York University

ChangEe-Chien, National University of Singapore

ManuelEgele, Boston University

ThomasEisenbarth, University of Lübeck

ThorstenEisenhofer, Technische Universität Berlin

MohamedElsabagh, Quokka

PardisEmami-Naeini, Duke University

WilliamEnck, North Carolina State University

SaschaFahl, CISPA Helmholtz Center for Information Security

HabibaFarrukh, University of California, Irvine

AuroreFass, CISPA Helmholtz Center for Information Security

BoFeng, Zhejiang University

HosseinFereidooni, KOBIL GmbH

TobiasFiebig, Max Planck Institute for Software Systems (MPI-SWS)

BryanFord, EPFL

AlisaFrik, International Computer Science Institute (ICSI)

AymericFromherz, Inria

KevinFu, Northeastern University

XinwenFu, University of Massachusetts Lowell

KelseyFulton, Colorado School of Mines

CarlosGañán, ICANN

TalGarfinkel, University of California, San Deigo

CarrieGates, Bank of America

GennieGebhart, Electronic Frontier Foundation and University of Washington

ZahraGhodsi, Purdue University

EshaGhosh, Microsoft Research

YossiGilad, The Hebrew University of Jerusalem

DevashishGosain, Birla Institute of Technology and Science and Max Planck Institute for Informatics

AndreGregio, Federal University of Parana (UFPR)

IlyaGrishchenko, University of California, Santa Barbara

DanielGruss, Graz University of Technology

GuofeiGu, Texas A&M University

MarcoGuarnieri, IMDEA Software Institute

WenboGuo, Purdue University

ArielHamlin, Northeastern University

JunHan, Yonsei University

WeiliHan, Fudan University

ShuangHao, The University of Texas at Dallas

HamzaHarkous, Google

BehnazHassanshahi, Oracle Labs

Nguyen PhongHoang, University of Chicago

ThorstenHolz, CISPA Helmholtz Center for Information Security

HoumanHomayoun, University of California, Davis

NicholasHopper, University of Minnesota

TaoHou, University of North Texas

YuncongHu, Shanghai Jiao Tong University

Danny YuxingHuang, New York University

Jun HoHuh, Samsung Research

Syed RafiulHussain, The Pennsylvania State University

AliceHutchings, University of Cambridge

LucaInvernizzi, Google

CynthiaIrvine, Naval Postgraduate School

FabianIsing, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE

DennisJackson, Mozilla

CharlieJacomme, Inria Paris

JosephJaeger, Georgia Institute of Technology

SashidharJakkamsetti, Bosch Research

RobJansen, U.S. Naval Research Laboratory

KangkookJee, The University Texas at Dallas

Rikke BjergJensen, Royal Holloway, University of London

YuseokJeon, UNIST (Ulsan National Institute of Science and Technology)

ShoulingJi, Zhejiang University

XiaoyuJi, Zhejiang University

XiangkunJia, Institute of Software Chinese Academy of Sciences

AaronJohnson, U.S. Naval Research Laboratory

GabrielKaptchuk, Boston University

YigitcanKaya, University of California, Santa Barbara

MarcelKeller, CSIRO's Data61

VasileiosKemerlis, Brown University

DmitryKhovratovich, Ethereum Foundation

KyungtaeKim, Dartmouth College

TaegyuKim, The Pennsylvania State University

TaesooKim, Georgia Institute of Technology and Samsung Research

YongdaeKim, Korea Advanced Institute of Science and Technology (KAIST)

DavidKohlbrenner, University of Washington

SebastianKöhler, University of Oxford

TadayoshiKohno, University of Washington

KariKostiainen, ETH Zurich

PlatonKotzias, Norton Research Group

SteveKremer, Inria

KatharinaKrombholz, CISPA Helmholtz Center for Information Security

ChristopherKruegel, University of California, Santa Barbara

KavitaKumari, Technical University of Darmstadt

AndrewKwong, The University of North Carolina at Chapel Hill

GiovanniLagorio, University of Genoa

AndreaLanzi, University of Milan

PierreLaperdrix, CNRS

RiccardoLazzeretti, Sapienza University of Rome

KevinLeach, Vanderbilt University

TancrèdeLepoint, Amazon Web Services

FrankLi, Georgia Institute of Technology

MingLi, University of Arizona

SongLi, Zhejiang University

KaitaiLiang, Delft University of Technology

ChristopherLiebchen, Google

YunLin, Shanghai Jiao Tong University

ZhiqiangLin, The Ohio State University

ZhenLing, Southeast University

TingLiu, Xi'an Jiaotong University

YaoLiu, University of South Florida

ZhuotaoLiu, Tsinghua University

YanLong, University of Michigan

WouterLueks, CISPA Helmholtz Center for Information Security

Lannan LisaLuo, George Mason University

MulongLuo, Cornell University

XiapuLuo, The Hong Kong Polytechnic University

SiqiMa, The University of New South Wales

AravindMachiry, Purdue University

MatteoMaffei, Technische Universität Wien

ChristianMainka, Ruhr University Bochum

NathanMalkin, University of Maryland

StefanMangard, Graz University of Technology

MichailManiatakos, New York University Abu Dhabi

AntonioMarcedone, Zoom Video Communications, Inc.

IvanMartinovic, University of Oxford

SaharMazloom, JPMorgan Chase

JonMcCune, Google

AllisonMcDonald, Boston University

DerrickMcKee, MIT Lincoln Laboratory

CatherineMeadows, U.S. Naval Research Laboratory

ShaguftaMehnaz, The Pennsylvania State University

SarahMeiklejohn, Google and University College London

MarcelaMelara, Intel Labs

YanMeng, Shanghai Jiao Tong University

MarkusMiettinen, Technische Universität Darmstadt

JiangMing, Tulane University

VladislavMladenov, Ruhr University Bochum

EsfandiarMohammadi, University of Lübeck

MainackMondal, Indian Institute of Technology, Kharagpur

HyungonMoon, UNIST (Ulsan National Institute of Science and Technology)

VeelashaMoonsamy, Ruhr University Bochum

MariusMuench, University of Birmingham

TakaoMurakami, ISM

Shravan RaviNarayan, The University of Texas at Austin

Ivan De OliveiraNunes, Rochester Institute of Technology

AdamOest, Paypal

HamedOkhravi, MIT Lincoln Laboratory

GabrieleOligeri, Hamad Bin Khalifa University

CristinaOnete, Université de Limoges, XLIM, and CNRS 7252

SimonOya, The University of British Columbia

ErcanOzturk, Meta

FabioPagani, Binarly

PanosPapadimitratos, KTH Royal Institute of Technology

DimitriosPapadopoulos, The Hong Kong University of Science and Technology

ThomasPasquier, University of British Columbia

AndrewPaverd, Microsoft

MathiasPayer, EPFL

PaulPearce, Georgia Institute of Technology

Sai TejaPeddinti, Google

AmreeshPhokeer, Internet Society

PabloPicazo-Sanchez, Halmstad University

StjepanPicek, Radboud University

FabioPierazzi, King's College London

MauraPintor, University of Cagliari

GeorgiosPortokalidis, Stevens Institute of Technology

NielsProvos, Lacework

ChenxiongQian, The University of Hong Kong

HanQiu, Tsinghua University

GangQu, University of Maryland

JVRajendran, Texas A&M University

Kopo MarvinRamokapane, University of Bristol

SaraRampazzi, University of Florida

AanjhanRanganathan, Northeastern University

KasperRasmussen, University of Oxford

MarianaRaykova, Google

ElissaRedmiles, Max Planck Institute for Software Systems (MPI-SWS)

OscarReparaz, Block, Inc.

TamaraRezk, Inria

KonradRieck, Technische Universität Berlin

FlorentinRochet, UNamur

FranziskaRoesner, University of Washington

EyalRonen, Tel Aviv University

StefanieRoos, RPTU Kaiserslautern-Landau

ChristianRossow, CISPA Helmholtz Center for Information Security

Kevin AlejandroRoundy, Gen Digital

ScottRuoti, University of Tennessee, Knoxville

AndreiSabelfeld, Chalmers University of Technology

Ahmad-RezaSadeghi, Technische Universität Darmstadt

SayandeepSaha, Université catholique de Louvain

MerveSahin, SAP Security Research

KazueSako, Waseda University

JunSakuma, Tokyo Institute of Technology

SoheilSalehi, University of Arizona

IskanderSanchez-Rola, Norton Research Group

NunoSantos, INESC-ID and Instituto Superior Técnico, University of Lisbon

SebastianSchinzel, Münster University of Applied Sciences, Fraunhofer SIT, and ATHENE

MichaelSchwarz, CISPA Helmholtz Center for Information Security

WendySeltzer, Tucows

JohannaSepúlveda, Airbus Defence and Space

BingyuShen, Meta Platforms, Inc.

ChaoShen, Xi'an Jiaotong University

EmilyShen, MIT Lincoln Laboratory

ShwetaShinde, ETH Zurich

MalihehShirvanian, Netflix

AliShokri, Virginia Tech

HayaShulman, Goethe-Universität Frankfurt, Fraunhofer SIT, and ATHENE

ManyaSleeper, Google

PeterSnyder, Brave Software

DokyungSong, Yonsei University

YongsooSong, Seoul National University

AlessandroSorniotti, IBM Research Europe

DarioStabili, Alma Mater Studiorum - Università di Bologna

BenStock, CISPA Helmholtz Center for Information Security

GianlucaStringhini, Boston University

MartinStrohmeier, armasuisse Science and Technology, Cyber-Defence Campus

GuillermoSuarez-Tangil, IMDEA Networks Institute

TakeshiSugawara, The University of Electro-Communications

KunSun, George Mason University

WeiSun, University of California, San Diego

YiSun, Beijing University of Posts and Telecommunications

ZhiboSun, Drexel University

QiangTang, The University of Sydney

JuanTapiador, UC3M

TerylTaylor, IBM Research

YuanTian, University of California, Los Angeles

Nils OleTippenhauer, CISPA Helmholtz Center for Information Security

RahmadiTrimananda, Comcast

Chia-CheTsai, Texas A&M University

Güliz SerayTuncay, Google

SelcukUluagac, Florida International University

BlaseUr, University of Chicago

AnjoVahldiek-Oberwagner, Intel Labs

JoVan Bulck, imec-DistriNet, KU Leuven

Michelvan Eeten, Delft University of Technology

MayankVaria, Boston University

VenkatVenkatakrishnan, University of Illinois Chicago

LucaViganò, King's College London

GiovanniVigna, University of California, Santa Barbara

DanielVotipka, Tufts University

AlexiosVoulimeneas, Delft University of Technology

DavidWagner, University of California, Berkeley

CongWang, City University of Hong Kong

FishWang, Arizona State University

GangWang, University of Illinois at Urbana–Champaign

QianWang, Wuhan University

ShuaiWang, The Hong Kong University of Science and Technology

TingWang, The Pennsylvania State University

XiangyuWang, Xidian University

XiaoWang, Northwestern University

ZhiboWang, Zhejiang University

EdgarWeippl, University of Vienna, SBA Research

JosephineWolff, Tufts University

ChristianWressnegger, Karlsruhe Institute of Technology (KIT)

NanWu, CSIRO's Data61

YangXiang, Swinburne University of Technology

LiangXiao, Xiamen University

ChenrenXu, Peking University

FengyuanXu, Nanjing University

Jason (Minhui)Xue, CSIRO's Data61

CarterYagemann, The Ohio State University

GuangliangYang, Fudan University

YuvalYarom, Ruhr University Bochum

Attila AYavuz, University of South Florida

Chia-MuYu, National Yang Ming Chiao Tung University

YuYu, Shanghai Jiao Tong University

XingliangYuan, Monash University

XuYuan, University of Louisiana at Lafayette

SavvasZannettou, Delft University of Technology

DanielZappala, Brigham Young University

SarahZennou, Airbus

BingshengZhang, Zhejiang University

FanZhang, Yale University

FengweiZhang, Southern University of Science and Technology (SUSTech)

KehuanZhang, The Chinese University of Hong Kong

MuZhang, University Of Utah

NingZhang, Washington University

XiaokuanZhang, George Mason University

YouqianZhang, The Hong Kong Polytechnic University

YuanZhang, Fudan University

YueZhang, The Ohio State University

ZhikunZhang, Stanford University and CISPA Helmholtz Center for Information Security

QingchuanZhao, City University of Hong Kong

ZimingZhao, University at Buffalo

HaoZhou, The Hong Kong Polytechnic University

HaojinZhu, Shanghai Jiao Tong University

SamanZonouz, Georgia Tech

Mary EllenZurko, MIT Lincoln Laboratory

Poster Session Co-Chairs

AndreaContinella, University of Twente

YuanTian, University of California, Los Angeles

Steering Committee

MichaelBailey, Georgia Institute of Technology

KevinButler, University of Florida

JoeCalandrino, Federal Trade Commission

SrdjanCapkun, ETH Zurich

WilliamEnck, North Carolina State University

RachelGreenstadt, New York University

CaseyHenderson-Ross, USENIX Association

NadiaHeninger, University of California, San Diego

ThorstenHolz, Ruhr-Universität Bochum

TadayoshiKohno, University of Washington

FranziskaRoesner, University of Washington

KurtThomas, Google

PatrickTraynor, University of Florida

CarmelaTroncoso, EPFL

USENIX Security '24 (5)

Gold Sponsors

USENIX Security '24 (6)

USENIX Security '24 (7)

USENIX Security '24 (8)

USENIX Security '24 (9)

Silver Sponsors

USENIX Security '24 (10)

USENIX Security '24 (11)

USENIX Security '24 (12)

USENIX Security '24 (13)

Bronze Sponsor

USENIX Security '24 (14)

Industry Partner and Media Sponsor

USENIX Security '24 (15)

USENIX Security '24 (16)

Conference Sponsorship

Become a Sponsor: Sponsorship exposes your brand to highly qualified attendees, funds our diversity and student grants, supports open access to our conference content, and keeps USENIX conferences affordable. USENIX is a 501(c)(3) non-profit organization that relies on sponsor support to fulfill its mission. To learn more, please contact the Sponsorship Department with the conference name in your subject line.

The acceptance of any organization as a sponsor does not imply explicit or implicit approval by USENIX of the donor organization’s values or actions. In addition, sponsorship does not provide any control over conference program content. Questions? Contact the Sponsorship Department.

USENIX Security '24 (2024)

FAQs

What is the acceptance rate for Usenix? ›

For major revisions from USENIX Security '22 cycles, the acceptance rate was 86%. While the Winter '23 cycle shepherding process is ongoing, shepherds approved 96% of papers receiving major revision decisions for the Summer '23 and Fall '23 cycles.

What is the page limit for Usenix security? ›

Once accepted, papers must be reformatted to fit in 18 pages, including bibliography and any appendices.

Where is Usenix security 2024? ›

The 33rd USENIX Security Symposium will take place on August 14–16, 2024, at the Philadelphia Marriott Downtown in Philadelphia, PA, USA.

What is the Usenix security Test of Time Award? ›

The USENIX Test of Time Awards recognize papers that have had a lasting impact on their fields. To qualify, a paper must have been presented at its respective conference at least 10 years ago. Steering committees and past program chairs from USENIX conferences determine the award winners.

Is Usenix a good conference? ›

It is considered one of the most prestigious venues for computer systems research and has an 'A' rating from the Australian CORE Conference Ranking system. From 2021 onward, this is co-located with another premier conference, USENIX OSDI.

What acceptance rate is considered prestigious? ›

According to the latest data by Research.com, the average acceptance rate for American universities and colleges is around 67% or higher. An acceptance rate of 50% or higher is considered a high admission rate, while a 10% or lower is considered low, typically seen among Ivy League acceptance rates.

Is Usenix free? ›

All free. Brought to you by USENIX, thanks to our open access policy.

What is the Usenix security Symposium? ›

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.

What is the maximum number of users in a security group? ›

Re: Limit of users a security group can have in Microsoft 365. There's no such limit. Only if the group is synced from on-premises, you're limited to 50k members. Documentation is here: https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-service-limits-...

Where is usenix located? ›

USENIX is an American 501(c)(3) nonprofit membership organization based in Berkeley, California and founded in 1975 that supports advanced computing systems, operating system (OS), and computer networking research.

What are the three types of security test? ›

The goal of the process is to discover potential security breaches, misconfigurations, and malicious code which could compromise the system. Security testing methods include penetration testing, vulnerability scanning, and code reviewss.

What is the fast test of time award? ›

Submit a nomination for the FAST Test of Time Award!

The award honors FAST papers published 10+ years ago that have had a significant impact within our community of storage-system researchers and practitioners and beyond.

What is the test of time award? ›

The SIGIR Test of Time Award recognizes research that has had long-lasting influence, including impact on a subarea of information retrieval research, across subareas of information retrieval research, and outside of the information retrieval research community (e.g. non-information retrieval research or industry).

What is the acceptance rate for Usenix OSDI? ›

This year, OSDI received 255 submissions. We accepted 50 submissions, which is a 19.6% acceptance rate. This is inline with the 253 submissions and 19.4% acceptance rate from last year. In addition to the 50 papers accepted this year, 5 additional papers were accepted from the OSDI '22 Revise and Resubmit process.

What is the acceptance rate for NIH diversity supplements? ›

The success rate of @NIH diversity supplements is > 80%. Yet, many institutions with multi-million dollar training grants and the responsibility of training future biomedical scientist have not activated diversity supplements.

What is Xavier acceptance rate? ›

Xavier University has an acceptance rate of 84%.

What is the acceptance rate for Harvard Religious Studies? ›

The program is highly competitive – we can accept only 5-7% of applicants to the PhD. For that reason, we look for the most capable applicants, with excellent credentials in all areas. A writing sample of no more than 20 pages in length.

Top Articles
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 6411

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.