【ACM CCS 2021】May. 6 @Seoul, Korea
source link: https://www.chainnews.com/articles/149557297138.htm
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
点击“ 阅读原文”即可进入【ACM CCS 2021】官网。
【ACM CCS 2021】
Important dates
Second Review Cycle
Paper submission deadline: May 6, 2021
Rebuttal period: June 29-July 20, 2021
Author notification: July 20, 2021
Resubmission of revised papers: August 20, 2021
Decisions on revised papers: September 4, 2021
Camera-ready deadline: September 20, 2021
Conference: November 14-19, 2021
CCF: A
Topics of interest include but are not limited to
Software Security
Web Security
Network Security
Formal Methods and Programming Languages
Hardware, Side Channels, and CyberPhysical Systems
Applied Cryptography
Machine Learning and Security
Security Usability and Measurement
Blockchain and Distributed Systems
Privacy and Anonymity
The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results.
Program Chairs
Giovanni Vigna, UC Santa Barbara / VMware
Elaine Shi, Carnegie Mellon University
Track Chairs
Software Security: Herbert Bos, Vrije Universiteit Amsterdam
Web Security: Adam Doupe, Arizona State University
Network Security: Phillipa Gill, University of Massachusetts, Amherst
Formal Methods and Programming Languages: Limin Jia, Carnegie Mellon University
Hardware, Side Channels, and CyberPhysicalSystems: Wenyuan Xu, Zhejiang University
Applied Cryptography: Muthuramakrishnan Venkitasubramaniam, University of Rochester
Machine Learning and Security: Prateek Saxena, National University of Singapore
Security Usability and Measurement: Jelena Mirkovic, University of Southern California
Blockchain and Distributed Systems: Sarah Meiklejohn, University College London
Privacy and Anonymity: Jonathan Ullman, Northeastern University
Program Committee by Track
Software Security
Alexandra Dimitrienko, U. Wuerzburg
Andrea Continella, U. Twente
Andreas Zeller, CISPA
Andrew Baumann, Microsoft
Asia Slowinska, IBM Security
David Chisnall, Microsoft Research
Deian Stefan, UCSD
Erik Van der Kouwe, Vrije Universiteit Amsterdam
Frank Piessens, KU Leuven
George Portokalidis, Stevens Institute of Technology
Güliz Seray Tuncay, Google
Johannes Kinder, U. der Bundeswehr
Jun Xu, Stevens Institute of Technology
Kangjie Lu, U. Minnesota
Long Lu, Ant Group / Northeastern University
Lorenzo Cavallaro, King's College London
Marcel Böhme, Monash University, Australia
Martina Lindorfer, TU Wien
Mathy Van Hoef, NYU Abu Dhabi
Nuno Santos, INESC-ID
Ruoyu Wang, Arizona State University
Vasileios Kemerlis, Brown University
Yajin Zhou, Zhejiang University, China
Web Security
Adam Oest, PayPal
Alexandros Kapravelos, NCSU
Andrei Sabelfeld, Chalmers
Aurore Fass, CISPA
Ben Livshits, ICL
Ben Stock, CISPA
Christopher Kruegel, UCSB
Engin Kirda, Northwestern
Giancarlo Pellegrino, CISPA
Jason Polakis, UIC
Luca Invernizzi, Google
Nick Nikiforakis, Stony Brook
Peter Snyder, Brave
Sadia Afroz, ICSI
Sooel Son, KAIST
Stefano Calzavara, Università Ca’ Foscari Venezia
Tamara Rezk, Inria
Veelasha Moonsamy, Bochum
Venkat Venkatakrishnan, UIC
Wei Meng, CUHK
Yousra Aafer, University of Waterloo
Network Security
Yongdae Kim, Kaist
Ben Zhao, U. Chicago
David Barrera, Carleton U.
David Choffnes, Northeastern
Frank Li, Georgia Tech
Frederico Araujo, IBM
Katharina Kohls, Radboud U.
Mobin Javed, LUMS
Narseo Vallina-Rodriguez, IMDEA
Patricia Cabarcos, KIT
Rishab Nithyanand, U. Iowa
Sajjad (JJ) Arshad, Google
Soo-jin Moon, Google
Sophia Yakoubov, Aarhus U.
Tobias Fiebig, TU Delft
Yanick Fratantonio, Eurecom
Z. Morley Mao, U. Michigan
Paul Pearce, Georgia Tech
Mattijs Jonker, University of Twente
Eric Wustrow, University of Colorado
Formal Methods and Programming Languages
Chris Hawblitzel, Microsoft Research
Dana Drachsler-Cohen, Technion
Danfeng Zhang, Penn State
Deepak Garg, MPI-SWS
Dominique Devriese, Vrije Universiteit Brussel
Klaus v. Gleissenthall, Vrije Universiteit Amsterdam
Marco Guarnieri, IMDEA Software Institute
Marco Patrignani, Stanford University & CISPA
Musard Balliu, KTH Royal Institute of Technology
Ralf Sasse, ETH Zurich
Stephanie Delaune, Univ Rennes, CNRS, IRISA
Timos Antonopoulos, Yale University
Toby Murray, University of Melbourne
Vincent Cheval, Inria Paris
Catherine Meadows, US Naval Research Lab
Alley Stoughton, Boston University
Ioana Boureanu, University of Surrey
Ruben Martins, Carnegie Mellon University
Alejandro Russo, Chalmers University of Technology
Hardware, Side Channels, and CyberPhysical Systems
Anil Kurmus, IBM Research
Aurélien Francillon, EURECOM
Berkay Celik, Purdue Univ.
Chao Shen, Xi'An JiaoTong University
Daniel Genkin, University of Michigan
Daniel Gruss, Graz University of Technology
Daniel Holcomb, Umass Amherst
Jonathan McCune, Google
Kaveh Razavi, ETH Zürich
Kun Sun, George Mason University
Neetesh Saxena, Cardiff University, UK
Qi Alfred Chen, University of California, Irvine
Ryan Gerdes, Virginia Tech
Srdjan Capkun, ETH Zürich
Xiaoyu Ji, Zhejiang University
Ziming Zhao, University at Buffalo
Qi Li, Tsinghua
Alvaro A. Cardenas, UCSC
Lejla Batina, Radboud University
Yier Jin, University of Florida
Applied Cryptography
Antigoni Polychroniadou, JP Morgan AI Research
Arkady Yerukhimovich, George Washington University
Arpita Patra, IISc
Avishay Yanay, VMware Research
Ben Fisch, Stanford University
Carsten Baum, Aarhus University
Charalampos Papamanthou, University of Maryland
Emmanuela Orsini, KU Leuven
Mayank Varia, Boston University
Ni Trieu, Arizona State University
Nishanth Chandran, Microsoft
Peter Scholl, Aarhus University
Thomas Schneider, TU Darmstadt
Xiao Wang, Northwestern University
Yupeng Zhang, Texas A&M; University
Esha Ghosh, Microsoft
Benedikt Bünz, Stanford University
Irene Giacomelli, Protocol Labs.
Mark Simkin, Aarhus University
Antonio Marcedone, Zoom
Machine Learning and Security
Ting Wang, Penn State
Konrad Rieck, TU Braunschweig
Bo Li, UIUC
Daniel Kifer, Penn State
Yang Zhang, CISPA
Suman Jana, Columbia
Patrick McDaniel, Penn State
Jason Xue, University of Adelaide
Yinzhi Cao, Johns Hopkins University
Ben Zhao, University of Chicago
Shruti Tople, Microsoft Research
Michael Backes, CISPA
Shiqing Ma, Rutgers university
Xinyu Xing, Penn State
Reza Shokri, NUS
Xiaofeng Wang, Indiana University Bloomington
Niel Gong, Duke University
Gagandeep Singh, VMWare Research
Lujo Bauer, CMU
Security Usability and Measurement
Sanchari Das, University of Denver
Abbas Razaghpanah, ICSI
Alexandru Bardas, University of Kansas
Amir Rahmati, Stonybrook University
Daniel Votipka, Tufts University
Gang Wang, University of Illionis at Urbana-Champaign
Jeremiah Onaolapo, University of Vermont
Kelsey Fulton, University of Maryland
Merve Sahin, SAP
Michael Coblenz, University of Maryland
Michael Van Eeten, TU Delft
Patricia Arias Cabarcos, KIT
Rakesh Verma, University of Houston
Siamak F. Shahandashti, University of York
Tobias Fiebig, TU Delft
Wenbo Guo, Pennsilvania State University
Yanchao Zhang, Arizona State University
Ziming Zhao, University at Buffalo
Blase Ur, University of Chicago
Doowon Kim, University of Tennessee, Knoxville
Blockchain and Distributed Systems
Stefan Dziembowski, University of Warsaw
Alessandra Scafuro, NCSU
Alin Tomescu, VMware Research
Ania Piotrowska, Nym Technologies
Arthur Gervais, Imperial College London
Fan Zhang, Duke University
Giulio Malavolta, Max Planck Institute for Security and Privacy (MPI-SP)
Ittai Abraham, VMware Research
Julian Loss, University of Maryland College Park
Valeria Nikolaenko, Novi Research / Facebook
Mariana Raykova, Google
Matteo Maffei, TU Wien
Pedro Moreno-Sanchez, IMDEA Software Institute
Pramod Viswanath, University of Illinois at Urbana-Champaign
Roger Wattenhofer, ETH Zurich
Stefanie Roos, TU Delft
Bryan Ford, EPFL
Kartik Nayak, Duke University
Aniket Kate, Purdue University
Ewa Syta, Trinity College
Privacy and Anonymity
Gautam Kamath, University of Waterloo
Xi He, University of Waterloo
Tianhao Wang, Purdue University
Ashwin Machanavajjhala, Duke University
Ian Goldberg, University of Waterloo
Micah Sherr, Georgetown University
Albert Cheu, Northeastern University
Simon Oya, University of Waterloo
Ulfar Erlingsson, Apple
George Danezis, University College London
Oana Goga, CNRS
Christina Ilvento, Harvard University
Anna Maria Mandalari, Imperial College London
Umar Iqbal, University of Iowa
Nikita Borisov, UIUC
Muhammad Ahmad Bashir, ICSI
Shuang Song, Google
Milad Nasr, UMass Amherst
Daniel Dubois, Northeastern University
Michael Karl Tschantz, ICSI
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK