12

【ACM CCS 2021】May. 6 @Seoul, Korea

 3 years ago
source link: https://www.chainnews.com/articles/149557297138.htm
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client
【ACM CCS 2021】May. 6 @Seoul, Korea

点击“ 阅读原文”即可进入【ACM CCS 2021】官网。

【ACM CCS 2021】May. 6 @Seoul, Korea

【ACM CCS 2021】

Important dates

Second Review Cycle

  • Paper submission deadline: May 6, 2021

  • Rebuttal period: June 29-July 20, 2021

  • Author notification: July 20, 2021

  • Resubmission of revised papers: August 20, 2021

  • Decisions on revised papers: September 4, 2021

  • Camera-ready deadline: September 20, 2021

  • Conference: November 14-19, 2021

  • CCF: A

Topics of interest include but are not limited to

  • Software Security

  • Web Security

  • Network Security

  • Formal Methods and Programming Languages

  • Hardware, Side Channels, and CyberPhysical Systems

  • Applied Cryptography

  • Machine Learning and Security

  • Security Usability and Measurement

  • Blockchain and Distributed Systems

  • Privacy and Anonymity

The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results.

Program Chairs

  • Giovanni Vigna, UC Santa Barbara / VMware

  • Elaine Shi, Carnegie Mellon University

Track Chairs

  • Software Security: Herbert Bos, Vrije Universiteit Amsterdam

  • Web Security: Adam Doupe, Arizona State University

  • Network Security: Phillipa Gill, University of Massachusetts, Amherst

  • Formal Methods and Programming Languages: Limin Jia, Carnegie Mellon University

  • Hardware, Side Channels, and CyberPhysicalSystems: Wenyuan Xu, Zhejiang University

  • Applied Cryptography: Muthuramakrishnan Venkitasubramaniam, University of Rochester

  • Machine Learning and Security: Prateek Saxena, National University of Singapore

  • Security Usability and Measurement: Jelena Mirkovic, University of Southern California

  • Blockchain and Distributed Systems: Sarah Meiklejohn, University College London

  • Privacy and Anonymity: Jonathan Ullman, Northeastern University

Program Committee by Track

Software Security

  • Alexandra Dimitrienko, U. Wuerzburg

  • Andrea Continella, U. Twente

  • Andreas Zeller, CISPA

  • Andrew Baumann, Microsoft

  • Asia Slowinska, IBM Security

  • David Chisnall, Microsoft Research

  • Deian Stefan, UCSD

  • Erik Van der Kouwe, Vrije Universiteit Amsterdam

  • Frank Piessens, KU Leuven

  • George Portokalidis, Stevens Institute of Technology

  • Güliz Seray Tuncay, Google

  • Johannes Kinder, U. der Bundeswehr

  • Jun Xu, Stevens Institute of Technology

  • Kangjie Lu, U. Minnesota

  • Long Lu, Ant Group / Northeastern University

  • Lorenzo Cavallaro, King's College London

  • Marcel Böhme, Monash University, Australia

  • Martina Lindorfer, TU Wien

  • Mathy Van Hoef, NYU Abu Dhabi

  • Nuno Santos, INESC-ID

  • Ruoyu Wang, Arizona State University

  • Vasileios Kemerlis, Brown University

  • Yajin Zhou, Zhejiang University, China

Web Security

  • Adam Oest, PayPal

  • Alexandros Kapravelos, NCSU

  • Andrei Sabelfeld, Chalmers

  • Aurore Fass, CISPA

  • Ben Livshits, ICL

  • Ben Stock, CISPA

  • Christopher Kruegel, UCSB

  • Engin Kirda, Northwestern

  • Giancarlo Pellegrino, CISPA

  • Jason Polakis, UIC

  • Luca Invernizzi, Google

  • Nick Nikiforakis, Stony Brook

  • Peter Snyder, Brave

  • Sadia Afroz, ICSI

  • Sooel Son, KAIST

  • Stefano Calzavara, Università Ca’ Foscari Venezia

  • Tamara Rezk, Inria

  • Veelasha Moonsamy, Bochum

  • Venkat Venkatakrishnan, UIC

  • Wei Meng, CUHK

  • Yousra Aafer, University of Waterloo

Network Security

  • Yongdae Kim, Kaist

  • Ben Zhao, U. Chicago

  • David Barrera, Carleton U.

  • David Choffnes, Northeastern

  • Frank Li, Georgia Tech

  • Frederico Araujo, IBM

  • Katharina Kohls, Radboud U.

  • Mobin Javed, LUMS

  • Narseo Vallina-Rodriguez, IMDEA

  • Patricia Cabarcos, KIT

  • Rishab Nithyanand, U. Iowa

  • Sajjad (JJ) Arshad, Google

  • Soo-jin Moon, Google

  • Sophia Yakoubov, Aarhus U.

  • Tobias Fiebig, TU Delft

  • Yanick Fratantonio, Eurecom

  • Z. Morley Mao, U. Michigan

  • Paul Pearce, Georgia Tech

  • Mattijs Jonker, University of Twente

  • Eric Wustrow, University of Colorado

Formal Methods and Programming Languages

  • Chris Hawblitzel, Microsoft Research

  • Dana Drachsler-Cohen, Technion

  • Danfeng Zhang, Penn State

  • Deepak Garg, MPI-SWS

  • Dominique Devriese, Vrije Universiteit Brussel

  • Klaus v. Gleissenthall, Vrije Universiteit Amsterdam

  • Marco Guarnieri, IMDEA Software Institute

  • Marco Patrignani, Stanford University & CISPA

  • Musard Balliu, KTH Royal Institute of Technology

  • Ralf Sasse, ETH Zurich

  • Stephanie Delaune, Univ Rennes, CNRS, IRISA

  • Timos Antonopoulos, Yale University

  • Toby Murray, University of Melbourne

  • Vincent Cheval, Inria Paris

  • Catherine Meadows, US Naval Research Lab

  • Alley Stoughton, Boston University

  • Ioana Boureanu, University of Surrey

  • Ruben Martins, Carnegie Mellon University

  • Alejandro Russo, Chalmers University of Technology

Hardware, Side Channels, and CyberPhysical Systems

  • Anil Kurmus, IBM Research

  • Aurélien Francillon, EURECOM

  • Berkay Celik, Purdue Univ.

  • Chao Shen, Xi'An JiaoTong University

  • Daniel Genkin, University of Michigan

  • Daniel Gruss, Graz University of Technology

  • Daniel Holcomb, Umass Amherst

  • Jonathan McCune, Google

  • Kaveh Razavi, ETH Zürich

  • Kun Sun, George Mason University

  • Neetesh Saxena, Cardiff University, UK

  • Qi Alfred Chen, University of California, Irvine

  • Ryan Gerdes, Virginia Tech

  • Srdjan Capkun, ETH Zürich

  • Xiaoyu Ji, Zhejiang University

  • Ziming Zhao, University at Buffalo

  • Qi Li, Tsinghua

  • Alvaro A. Cardenas, UCSC

  • Lejla Batina, Radboud University

  • Yier Jin, University of Florida

Applied Cryptography

  • Antigoni Polychroniadou, JP Morgan AI Research

  • Arkady Yerukhimovich, George Washington University

  • Arpita Patra, IISc

  • Avishay Yanay, VMware Research

  • Ben Fisch, Stanford University

  • Carsten Baum, Aarhus University

  • Charalampos Papamanthou, University of Maryland

  • Emmanuela Orsini, KU Leuven

  • Mayank Varia, Boston University

  • Ni Trieu, Arizona State University

  • Nishanth Chandran, Microsoft

  • Peter Scholl, Aarhus University

  • Thomas Schneider, TU Darmstadt

  • Xiao Wang, Northwestern University

  • Yupeng Zhang, Texas A&M; University

  • Esha Ghosh, Microsoft

  • Benedikt Bünz, Stanford University

  • Irene Giacomelli, Protocol Labs.

  • Mark Simkin, Aarhus University

  • Antonio Marcedone, Zoom

Machine Learning and Security

  • Ting Wang, Penn State

  • Konrad Rieck, TU Braunschweig

  • Bo Li, UIUC

  • Daniel Kifer, Penn State

  • Yang Zhang, CISPA

  • Suman Jana, Columbia

  • Patrick McDaniel, Penn State

  • Jason Xue, University of Adelaide

  • Yinzhi Cao, Johns Hopkins University

  • Ben Zhao, University of Chicago

  • Shruti Tople, Microsoft Research

  • Michael Backes, CISPA

  • Shiqing Ma, Rutgers university

  • Xinyu Xing, Penn State

  • Reza Shokri, NUS

  • Xiaofeng Wang, Indiana University Bloomington

  • Niel Gong, Duke University

  • Gagandeep Singh, VMWare Research

  • Lujo Bauer, CMU

Security Usability and Measurement

  • Sanchari Das, University of Denver

  • Abbas Razaghpanah, ICSI

  • Alexandru Bardas, University of Kansas

  • Amir Rahmati, Stonybrook University

  • Daniel Votipka, Tufts University

  • Gang Wang, University of Illionis at Urbana-Champaign

  • Jeremiah Onaolapo, University of Vermont

  • Kelsey Fulton, University of Maryland

  • Merve Sahin, SAP

  • Michael Coblenz, University of Maryland

  • Michael Van Eeten, TU Delft

  • Patricia Arias Cabarcos, KIT

  • Rakesh Verma, University of Houston

  • Siamak F. Shahandashti, University of York

  • Tobias Fiebig, TU Delft

  • Wenbo Guo, Pennsilvania State University

  • Yanchao Zhang, Arizona State University

  • Ziming Zhao, University at Buffalo

  • Blase Ur, University of Chicago

  • Doowon Kim, University of Tennessee, Knoxville

Blockchain and Distributed Systems

  • Stefan Dziembowski, University of Warsaw

  • Alessandra Scafuro, NCSU

  • Alin Tomescu, VMware Research

  • Ania Piotrowska, Nym Technologies

  • Arthur Gervais, Imperial College London

  • Fan Zhang, Duke University

  • Giulio Malavolta, Max Planck Institute for Security and Privacy (MPI-SP)

  • Ittai Abraham, VMware Research

  • Julian Loss, University of Maryland College Park

  • Valeria Nikolaenko, Novi Research / Facebook

  • Mariana Raykova, Google

  • Matteo Maffei, TU Wien

  • Pedro Moreno-Sanchez, IMDEA Software Institute

  • Pramod Viswanath, University of Illinois at Urbana-Champaign

  • Roger Wattenhofer, ETH Zurich

  • Stefanie Roos, TU Delft

  • Bryan Ford, EPFL

  • Kartik Nayak, Duke University

  • Aniket Kate, Purdue University

  • Ewa Syta, Trinity College

Privacy and Anonymity

  • Gautam Kamath, University of Waterloo

  • Xi He, University of Waterloo

  • Tianhao Wang, Purdue University

  • Ashwin Machanavajjhala, Duke University

  • Ian Goldberg, University of Waterloo

  • Micah Sherr, Georgetown University

  • Albert Cheu, Northeastern University

  • Simon Oya, University of Waterloo

  • Ulfar Erlingsson, Apple

  • George Danezis, University College London

  • Oana Goga, CNRS

  • Christina Ilvento, Harvard University

  • Anna Maria Mandalari, Imperial College London

  • Umar Iqbal, University of Iowa

  • Nikita Borisov, UIUC

  • Muhammad Ahmad Bashir, ICSI

  • Shuang Song, Google

  • Milad Nasr, UMass Amherst

  • Daniel Dubois, Northeastern University

  • Michael Karl Tschantz, ICSI

【ACM CCS 2021】May. 6 @Seoul, Korea

【ACM CCS 2021】May. 6 @Seoul, Korea

【ACM CCS 2021】May. 6 @Seoul, Korea


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK