History of the Security and Privacy Symposium
| Conference Chairs and Technical Committee Officers | |||||||
| Year | Program Chairs | General Chair | Vice Chair | TC Chair | TC VC | est | est attendance |
| 2025 | Enck and Nita-Rotaru | Blanton | Oprea | Holz | Cardenas | ||
| 2024 | Traynor and Enck | Jaeger | Blanton | Ciocarlie | Holz | 746 | |
| 2023 | Ristenpart and Traynor | Takabi | Jaeger | Ciocarlie | Holz | 820 (hybrid) | |
| 2022 | Holz and Ristenpart | Bobba | Takabi | Parno | Ciocarlie | 796 (hybrid) | |
| 2021 | Oprea and Holz | Cárdenas | Bobba | Erlingsson | Parno | 1129 (virtual) | |
| 2020 | Shacham and Oprea | Ciocarlie | Cárdenas | Erlingsson | Parno | 1963 (virtual) | |
| 2019 | Kruegel and Shacham | Gondree | Ciocarlie | Peisert | Erlingsson | 739 | |
| 2018 | Parno and Kruegel | Li | Gondree | Peisert | Erlingsson | 591 | |
| 2017 | Erlingsson and Parno | Butler | Li | Lindqvist | Peisert | 587 | |
| 2016 | Shmatikov and Erlingsson | Locasto | Butler | Lindqvist | Peisert | 578 | |
| 2015 | Bauer and Shmatikov | Peisert | Locasto | McDaniel | Lindqvist | 571 | |
| 2014 | Backes and Perrig and Wang | Shannon | Peisert | McDaniel | Lindqvist | 484 | |
| 2013 | W. Lee and Perrig and Backes | Sommer | Shannon | Dietrich | McDaniel | 476 | |
| 2012 | Jha and W. Lee | Cunningham | Sommer | Dietrich | McDaniel | ~420 | |
| 2011 | Vigna and Jha | Frincke | Cunningham | Orman | Dietrich | 350 | |
| 2010 | Evans and Vigna | Lindqvist | Frincke | Orman | Dietrich | 345 | |
| 2009 | Myer and Evans | Du | Lindqvist | Irvine | Orman | 270? | |
| 2008 | McDaniel and Rubin | Guan | Du | Irvine | Orman | 315? | |
| 2007 | Pfitzmann and McDaniel | Shands | Guan | Millen | Irvine | 350? | |
| 2006 | Paxson and Pfitzmann | Orman | Shands | Millen | Irvine | 210? | |
| 2005 | Waidner and Paxson | Tate | Orman | Hinton | Millen | ||
| 2004 | Wagner and Waidner | Badger | Tate | Hinton | Millen | ||
| 2003 | Bellovin and Wagner | Blakley | Badger | Reiter | Hinton | ||
| 2002 | Abadi and Bellovin | Hinton | Blakley | Reiter | Hinton | ||
| 2001 | Needham and Abadi | Gong | Hinton | Berson | Reiter | ||
| 2000 | Reiter and Needham | Millen | Gong | Berson | Reiter | ||
| 1999 | Gong and Reiter | McLean | Millen | Pfleeger | Berson | ||
| 1998 | Karger and Gong | Reiter | McLean | Pfleeger | Berson | 200? | |
| 1997 | Dinolt and Karger | Kent | Reiter | Cooper | Pfleeger | 260? | |
| 1996 | McHugh and Dinolt | Johnson | Kent | Cooper | Pfleeger | 200? | |
| 1995 | Meadows and McHugh | Landwehr | Johnson | Benzel | Cooper | 210? | |
| 1994 | Rushby and Meadows | C.Garvey | Landwehr | Benzel | Cooper | 200 | |
| 1993 | Kemmerer and Rushby | Lunt | C.Garvey | McHugh | Benzel | 262 | |
| 1992 | McLean and Kemmerer | Cooper | Lunt | McHugh | Benzel | 299? | |
| 1991 | Lunt and McLean | Schnackenberg | Cooper | Hinke | McHugh | 340? | |
| 1990 | Cooper and Lunt | Downs | Schnackenberg | Hinke | McHugh | 340? | |
| 1989 | Berson and Cooper | Benzel | Downs | Landwehr | Hinke | 1100 | 340? |
| 1988 | Lipner and Berson | Bailey | Benzel | Landwehr | Hinke | 750 | 345* |
| 1987 | Bailey and Lipner | Gligor | - | Kemmerer | Landwehr | 700 | 300 |
| 1986 | Gligor and Bailey | Weissman | - | Kemmerer | Landwehr | ||
| 1985 | Millen and Gligor | Morris | - | Kemmerer | Landwehr | ||
| 1984 | Denning and Millen | Tasker | - | Lipner | Kemmerer | ||
| 1983 | Blakely and Denning | Schaefer | - | Lipner | Kemmerer | ||
| 1982 | Neumann | Schell | - | Ames | Lipner | 120 | 100 |
| 1981 | Davida, Blakely, Schaefer, Turn | Ames | - | Turn | |||
| 1980 | no proceedings produced, but the symposium was held | ||||||
| Other Technical Committee and Conference Volunteers | ||||||||
| Year |
Conf. Treasurer |
Newsletter Editor |
Standards Subcom Chair |
TC Treasurer |
Conf. Pubs Chair |
Conf. Workshops Chair |
Conf. Website Chair |
Others |
| 2013 | Sommer | Hilarie Orman | Shannon | Butler | Camp | Akhawe | Peisert, Cardenas, Switzer, Lindqvist, Benzel, Engle | |
| 2012 | Shannon | Hilarie Orman | Benzel | Butler | Dietrich | ? | Molnar, Talbott, Lindqvist | |
| 2011 | Sommer | Hilarie Orman | Benzel | Butler | Gagnon | K. Gates, Lindqvist, Greenstadt | ||
| 2010 | Shaffer | Hilarie Orman | Benzel | McNeill | Gates | Felt | ||
| 2009 | Shambroom | Hilarie Orman | Benzel | Gates | ||||
| 2008 | Shambroom | Hilarie Orman | Orman | |||||
| 2007 | Benzel | Hilarie Orman | Orman | |||||
| 2006 | Benzel | Hilarie Orman | ||||||
| 2005 | Chen | Hilarie Orman | ||||||
| 2004 | Chen | Hilarie Orman | ||||||
| 2003 | Hall | Jim Davis | ||||||
| 2002 | Blakley | Jim Davis | ||||||
| 2001 | Brian Loe | Jim Davis | ||||||
| 2000 | Brian Loe | Jim Davis | ? | Brian Loe | ||||
| 1999 | Brian Loe | Paul Syverson & Avi Rubin | ||||||
| 1998 | Brian Loe | Paul Syverson & Avi Rubin | ||||||
| 1997 | Brian Loe | Carl Landwehr | ||||||
| 1996 | Charles Payne | Carl Landwehr | ||||||
| 1995 | Charles Payne | Carl Landwehr | ?? | ?? | ||||
| 1994 | Jeff Thomas | ? | ||||||
| 1993 | Jeff Thomas | ? | ||||||
| 1992 | Jeff Thomas | |||||||
| 1991 | Jerzy Rub | |||||||
| 1990 | Jerzy Rub | |||||||
| 1989 | Jerzy Rub | David Bailey | Stan Ames | Steve Crocker | ||||
| 1989 | Jerzy Rub | David Bailey | Stan Ames | Steve Crocker | ||||
| 1988 | Marty Hurley | David Bailey | - | - | ||||
| 1987 | Paul Woodie | - | - | |||||
| 1986 | Paul Woodie | - | - | |||||
| 1985 | Paul Woodie | - | - | |||||
| 1984 | Paul Woodie | - | - | |||||
| 1983 | Anne-Marie Claybrook | - | - | |||||
| 1982 | Anne-Marie Claybrook | - | - | |||||
Newsletter staff: CFP editor, Yong Guan. Assistant Editor, Sven Dietrich. Book Review Editor: Robert Bruen, Richard Austin.
| S&P Outstanding Paper Awards | |||
| Year | Authors | Title | Award |
| 2013 | Bryan Parno, Craig Gentry, Jon Howell, and Mariana Raykova | Pinocchio: Nearly Practical Verifiable Computation | Best Paper |
| Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov; | The Parrot is Dead: Observing Unobservable Network Communications | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine | |
| Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi | Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained ASLR | Best Student Paper | |
| 2012 | Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, and Thorsten Holz | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Best Paper |
| Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, and Crispin Cowan | User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine | |
| Suman Jana and Vitaly Shmatikov | Memento: Learning Secrets from Process Footprints | Best Student Paper (sponsored by Google) | |
| 2011 | Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer | How to Shop for Free Online | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine: |
| Andrew M. White, Kevin Snow, Austin Matthews, Fabian Monrose | Hookt on fon-iks: Phonotactic Reconstruction of Encrypted VoIP Conversations | Best Paper | |
| Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh | OpenConflict: Preventing Real Time Map Hacks in Online Games | Best Student Paper | |
| 2010 | Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond | Chip and PIN is Broken | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine: |
| Tielei Wang, Tao Wei, Guofei Gu, Wei Zou | TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection | Best Student Paper | |
| Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich | SCiFI - A System for Secure Face Identification | Best Paper | |
| 2009 | Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur | Wirelessly Pickpocketing a Mifare Classic Card | Best Practical Paper Award(from IEEE Security & Privacy Magazine) |
| Monirul Sharif, Andrea Lanzi, Jonathon Giffin, Wenke Lee | Automatic Reverse Engineering of Malware Emulators | Best Student Paper Award | |
| Bennet Yee, David Sehr, Gregory Dardyk, Brad Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | Best paper | |
| 2008 | Daniel Halperinm Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan and Kevin Fu, Tadayoshi Kohno, William H. Maisel | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Outstanding paper |
| Saar Drimer, Steven Murdoch, and Ross Anderson | Thinking Inside the Box: System-level Failures of Tamper Proofing | IEEE Security and Privacy Magazine Award | |
| Francis David, Ellick Chan, Jeffrey Carlyle, and Roy Campbell | Cloaker: Hardware Supported Rootkit Concealment | Best Student Paper | |
| 1996-2007 | (None given) | ||
| 1995 | Olin Sibert, Philip A. Porras, Mark Heckman | The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems | |
| 1994 | Martin Abadi and Roger Needham | Prudent Engineering Practice for Cryptographic Protocols | |
| Michael K. Reiter | A Secure Group Membership Protocol | ||
| 1993 | (None given) | ||
| 1992 | Jonathan Millen | A Resource Allocation Model for Denial of Service | Certificate awarded |
| 1991 | Catherine Meadows | A System for the Specification and Analysis of Key Management Protocols | Certificate awarded |
| Wei-Ming Hu | Reducing Timing Channels with Fuzzy Time | Certificate awarded | |
| 1990 | John McLean | Security Models and Information Flow | |
| Karger, Zurko, Bonin, Mason, Kahn | A VMM Security Kernel for the VAX Architecture | Certificates received OK (McLean, at least, and probably Karger) | |
| 1989 | Li Gong | A Secure Identity-Based Capability System | |
| Lee Badger | A Model for Specifying Multi-Granularity Integrity Policies | ||
| 1988 | Clark Weissman | Blacker: Security for the DDN, Examples of A1 Security Engineering Trades | |
| Yu and Gligor | A Formal Specification and Verification Method for the Prevention of Denial of Service | ||
| 1987 | Denning, Lunt, Schell, Heckman, Shockley | A Multilevel Relational Data Model | Certificates awarded |
| 1986 | Kain and Landwehr | On Access Checking in Capability-Based Systems | |
| Haigh and Young | Extending the Non-Interference Version of MLS for SAT | Cash | |
| certificates arranged for all prior years in spring '94 | |||
A brief note about the founding of the conference.