45th IEEE Symposium on
Security and Privacy

Sponsored by the IEEE Computer Society Technical Committee on Security
and Privacy in cooperation with the International Association for
Cryptologic Research 

Call For Papers

Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has
been the premier forum for computer security research, presenting the
latest developments and bringing together researchers and
practitioners. We solicit previously unpublished papers offering novel
research contributions in any aspect of security or privacy. Papers
may present advances in the theory, design, implementation, analysis,
verification, or empirical evaluation and measurement of secure
systems. Theoretical papers must make a convincing case for the
relevance of their results to practice.

Topics of interest include:

    Applied cryptography
    Attacks with novel insights, techniques, or results
    Authentication, access control, and authorization
    Blockchains and distributed ledger security
    Cloud computing security
    Cyber physical systems security
    Distributed systems security
    Economics of security and privacy
    Embedded systems security
    Formal methods and verification
    Hardware security
    Hate, Harassment, and Online Abuse
    Human-centered security and privacy
    Intrusion detection and prevention
    Machine learning and computer security
    Malware and unwanted software
    Network security and measurement
    Operating systems security
    Privacy-enhancing technologies, anonymity, and censorship
    Program and binary analysis
    Protocol security
    Security and privacy metrics
    Security and privacy policies
    Security architectures
    Security for at-risk populations
    Software supply chain security
    Systems security
    User studies for security and privacy
    Web security and privacy
    Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in
all aspects of computer security and privacy. Papers without a clear
application to security or privacy, however, will be considered out of
scope and may be rejected without full review.  Systematization of
Knowledge Papers

As in past years, we solicit systematization of knowledge (SoK) papers
that evaluate, systematize, and contextualize existing knowledge, as
such papers can provide a high value to our community. Suitable papers
are those that provide an important new viewpoint on an established,
major research area, support or challenge long-held beliefs in such an
area with compelling evidence, or present a convincing, comprehensive
new taxonomy of such an area. Survey papers without such insights are
not appropriate and may be rejected without full review. Submissions
will be distinguished by the prefix “SoK:” in the title and a checkbox
on the submission form. They will be reviewed by the full PC and held
to the same standards as traditional research papers, but they will be
accepted based on their treatment of existing work and value to the
community, and not based on any new research results they may
contain. Accepted papers will be presented at the symposium and
included in the proceedings. You can find an overview of recent SoK
papers at  Submission Deadlines &
Decisions (Important Updates)

Similar to 2023, there will be three submission deadlines this
year. For each submission, one of the following decisions will be

Accept : Papers in this category will be accepted for publication in
the proceedings and presentation at the conference. Within one month
of acceptance, all accepted papers must submit a camera-ready copy
incorporating reviewer feedback. The papers will immediately be
published, open access, in the Computer Society's Digital Library, and
they may be cited as "To appear in the IEEE Symposium on Security &
Privacy, May 2024".

Reject : Papers in this category are declined for inclusion in the
conference. Rejected papers must wait for one year, from the date of
original submission, to resubmit to IEEE S&P. A paper will be judged
to be a resubmit (as opposed to a new submission) if the paper is from
the same or similar authors, and a reviewer could write a
substantially similar summary of the paper compared with the original
submission. As a rule of thumb, if there is more than 40% overlap
between the original submission and the new paper, it will be
considered a resubmission.

Public Meta-Reviews: All accepted papers will be published alongside a
meta-review (< 500 words) that lists (a) the reasons the PC decided to
accept the paper and (b) concerns the PC has with the paper. Authors
will be given the option to write a response to the meta-review (< 500
words) which will be published as part of the meta-review. Authors
will be given a draft meta-review at the time of acceptance. Authors
will be given the option of addressing some or all of the concerns
within one review cycle. A shepherd will remove concerns from the
meta-review if they are sufficiently addressed by the
revisions. Authors of papers accepted to the third submission cycle
will be given the option to have their paper appear in the 2025
proceedings if they are not able to complete revisions in time for the
final camera ready deadline.

The goal of this process is to provide greater transparency and to
better scope change requests made by reviewers. More information about
the reasons behind this change can be found here.

Re-Submission of Major Revisions from Prior Years: Authors
resubmitting papers that received Major Revision decisions in 2023
will also be published with the public meta-reviews as described

More information about the reasons behind the above changes can be found here:

Important Dates

All deadlines are 23:59:59 AoE (UTC-12).
First deadline

    Paper submission deadline: April 13, 2023
    Early-reject notification: May 22, 2023
    Rebuttal period (interactive): June 19 - June 30, 2023
    Rebuttal text due: June 26, 2023
    Acceptance notification: July 10, 2023
    Camera-ready deadline: August 18, 2023

Second deadline

    Paper submission deadline: August 3, 2023
    Early-reject notification: September 11, 2023
    Rebuttal period (interactive): October 9 - October 20, 2023
    Rebuttal text due: October 16, 2023
    Acceptance notification: October 27, 2023
    Camera-ready deadline: December 8, 2023

Third deadline

    Paper submission deadline: December 6, 2023
    Early-reject notification: January 22, 2024
    Rebuttal period (interactive): February 19 - March 1, 2024
    Rebuttal text due: February 26, 2024
    Acceptance notification: March 8, 2024
    Camera-ready deadline: April 19, 2024

(see for all requirements
and caveats for paper submittion)

Program Committee

PC Chairs
Patrick Traynor 	University of Florida
William Enck 	North Carolina State University

Associate Chairs
Aanjhan Ranganathan	Northeastern University
Adam Bates	University of Illinois Urbana-Champaign
Andrew Paverd	Microsoft
Hamed Okhravi	MIT Lincoln Laboratory
Matt Fredrikson	Carnegie Mellon University
Matteo Maffei	TU Wein
Micah Sherr	Georgetown University
Sascha Fahl	CISPA
Tiffany Bao	Arizona State University
Yuan Tian	University of California, Los Angelos

REC Chair
René Mayrhofer 	Johannes Kepler University Linz

PC Members
Abbas Acar	Florida International University
AbdelRahman Abdou	Carleton University
Abhishek Jain	Johns Hopkins University
Adam Oest	Paypal, Inc.
Adam Doupé	Arizona State University
Adam Bates	University of Illinois at Urbana-Champaign
Adwait Nadkarni	William & Mary
Ajith Suresh	Technology Innovation Institute (TII)
Alena Naiakshina	Ruhr University Bochum
Alessandra Scafuro	NCSU
Alexander Block	Georgetown University & University of Maryland, College Park
Alfred Chen	University of California, Irvine
Alina Oprea	Northeastern University
Allison McDonald	Boston University
Amit Kumar Sikder	Georgia Institute of Technology
Andrei Sabelfeld	Chalmers University of Technology
Ang Chen	Rice University
Angelos Stavrou	Virginia Tech
Aniket Kate	Purdue University / Supra
Anindya Maiti	University of Oklahoma
Anupam Das	North Carolina State University
Apu Kapadia	Indiana University Bloomington
Aravind Machiry	Purdue University
Aurélien Francillon	EURECOM
Ben Stock	CISPA Helmholtz Center for Information Security
Benjamin Ujcich	Georgetown University
Benjamin Dowling	The University of Sheffield
Blaine Hoak	University of Wisconsin-Madison
Blase Ur	University of Chicago
Bogdan Groza	Universitatea Politehnica Timisoara
Brad Reaves	North Carolina State University
Brendan Saltaformaggio	Georgia Tech
Byoungyoung Lee	Seoul National University
Carrie Gates	Bank of America
Carter Yagemann	The Ohio State University
Casey Meehan	Vector Institute
Chaowei Xiao	Arizona State University
Chengyu Song	UC Riverside
Christian Wressnegger	Karlsruhe Institute of Technology (KIT)
Christian Peeters	Harbor Labs
Christina Garman	Purdue University
Christina Pöpper	New York University Abu Dhabi
Christopher A. Choquette-Choo	Google Research, Brain Team
Claudio Soriente	NEC laboratories Europe
Cristian-Alexandru Staicu	CISPA Helmholtz Center for Information Security
Daniel Genkin	Georgia Tech
Daniel Votipka	Tufts University
Dave (Jing) Tian	Purdue University
David Barrera	Carleton University
David Cash	University of Chicago
Debajyoti Das	KU Leuven
Deepak Kumar	Stanford University
Derrick McKee	MIT Lincoln Laboratory
Dimitrios Papadopoulos	The Hong Kong University of Science and Technology
Dominik Wermke	CISPA
Drew Davidson	University of Kansas
Earlence Fernandes	UC San Diego
Eleonora Losiouk	University of Padua
Emily Wenger	University of Chicago and Meta AI
Eric Pauley	University of Wisconsin-Madison
Ethan Cecchetti	University of Maryland / University of Wisconsin - Madison
Evgenios Kornaropoulos	George Mason University
Eyal Ronen	Tel Aviv University
Eyal Ronen	Tel Aviv University
Fabio Pierazzi	King's College London
Faysal Shezan	University of Texas at Arlington
Fengwei Zhang	Southern University of Science and Technology (SUStech)
Florian Schaub	University of Michigan
Florian Kerschbaum	University of Waterloo
Florian Tramèr	ETH Zürich
Fnu Suya	University of Maryland
Frank Li	Georgia Institute of Technology
Frank Piessens	KU Leuven
Franziska Boenisch	Vector Institute
Furkan Alaca	Queen's University
Gang Wang	University of Illinois at Urbana-Champaign
Gary Tan	The Pennsylvania State University
Georgios Portokalidis	IMDEA Software Institute
Ghassan Karame	Ruhr-University Bochum
Giancarlo Pellegrino	CISPA Helmholtz Center for Information Security
Giovanni Camurati	ETH Zurich
Grant Ho	UCSD and UChicago
Guevara Noubir	Northeastern University
Guillermo Suarez-Tangil	IMDEA Networks Institute
Habiba Farrukh	Purdue University
Hang Zhang	Georgia Institute of Technology
Haya Shulman	Goethe-Universität Frankfurt | Fraunhofer SIT | ATHENE
Heather Zheng	University of Chicago
Heng Yin	University of California Riverside
Hovav Shacham	The University of Texas at Austin
Hyungjoon Koo	Sungkyunkwan University
Insu Yun	KAIST
Ioana Boureanu	Univ. of Surrey, Surrey Centre for Cybersecurity
Jason Nieh	Columbia University
Jeremiah Blocki	Purdue University
Jianjun Chen	Tsinghua University
Jiarong Xing	Rice University
Jiska Classen	TU Darmstadt, SEEMOO
Johanna Ullrich	SBA Research/University of Vienna
Jon McCune	Google LLC
Jun Han	Yonsei University
Kangjie Lu	University of Minnesota
Karen Sowon	Postdoctoral research associate, Carnegie Mellon University
Kartik Nayak	Duke University
Kassem Fawaz	University of Wisconsin-Madison
Kavita Kumari	Technical University of Darmstadt
Kelsey Fulton	Colorado School of Mines
Kevin Borgolte	Ruhr University Bochum
Kevin Butler	University of Florida
Kexin Pei	Columbia University
Kovila P.L. Coopamootoo	King's College London
Lejla Batina	Radboud University
Leonardo Babun	Johns Hopkins Applied Physics Laboratory
Liang Wang	Princeton University
Lianying Zhao	Carleton University
Liqun Chen	University of Surrey
Liz Izhikevich	Stanford University
Luis Vargas	Harbor Labs
Lujo Bauer	Carnegie Mellon University
Mahmood Sharif	Tel Aviv University
Marco Squarcina	TU Wien
Mariana Raykova	Google
Markus Miettinen	Technical University of Darmstadt
Marshini Chetty	University of Chicago
Mathy Vanhoef	KU Leuven
Matthew Lentz	Duke University
Mauro Conti	University of Padua
Michael Reiter	Duke University
Michael Waidner	Technische Universität Darmstadt
Michail Maniatakos	NYU Abu Dhabi
Michalis Polychronakis	Stony Brook University
Mridula Singh	CISPA Helmholtz Center for Information Security
Murtuza Jadliwala	University of Texas at San Antonio
Nick Nikiforakis	Stony Brook University
Nicolas Papernot	University of Toronto and Vector Institute and Google
Nikita Borisov	University of Illinois at Urbana-Champaign
Nikos Vasilakis	Brown University
Ning Zhang	Washington University in St. Louis
Noel Warford	University of Maryland
Olivier Levillain	Télécom SudParis
Olya Ohrimenko	The University of Melbourne
Omar Chowdhury	Stony Brook University
Omer Akgul	University of Maryland
Panos Papadimitratos	KTH Royal Institute of Technology
Pardis Emami-Naeini	Duke University
Patrick McDaniel	University of Wisconsin-Madison
Paul Pearce	Georgia Institute of Technology
Paul Martin	Harbor Labs
Peter Snyder	Brave Software
Pratyush Mishra	University of Pennsylvania
Qiushi Wu	University of Minnesota
Quinn Burke	University of Wisconsin-Madison
Rahul Chatterjee	University of Wisconsin-Madison
Rakibul Hasan	Arizona State University
Ramakrishnan Sundara Raman	University of Michigan
Ramya Jayaram Masti	Ampere Computing
Reza Shokri	National University of Singapore
Ruoyu “Fish” Wang	Arizona State University
Ryan Wails	Georgetown University & U.S. Naval Research Laboratory
Ryan Sheatsley	University of Wisconsin-Madison
Saba Eskandarian	University of North Carolina at Chapel Hill
Saman Zonouz	Georgia Tech
Santiago Torres-Arias	Purdue University
Sara Rampazzi	University of Florida
Sathvik Prasad	North Carolina State University
Sazzadur Rahaman	University of Arizona
Sebastian Roth	TU Wien
Selcuk Uluagac	Florida International University
Serge Egelman	UC Berkeley / ICSI / AppCensus, Inc.
Shamaria Engram	MIT Lincoln Laboratory
Shitong Zhu	Meta Platforms, Inc.
Shruti Tople	Microsoft
Shuai Wang	HKUST
Sisi Duan	Tsinghua University
Sofia Celi	Brave Software
Soheil Khodayari	CISPA Helmholtz Center for Information Security
Srdjan Capkun	ETH Zurich
Suman Jana	Columbia University
Sunil Manandhar	IBM Research
Sven Bugiel	CISPA Helmholtz Center for Information Security
Sze Yiu Chau	The Chinese University of Hong Kong
Takeshi Sugawara	The University of Electro-Communications
Tianhao Wang	University of Virginia
Tobias Fiebig	Max-Planck-Institut für Informatik
Tushar Jois	Johns Hopkins University
Tyler Kaczmarek	MIT Lincoln Laboratory
Vasileios Kemerlis	Brown University
Vincent Bindschaedler	University of Florida
Vipul Goyal	NTT Research and CMU
Wajih Ul Hassan	University of Virginia
Wei Meng	The Chinese University of Hong Kong
Weiteng Chen	Microsoft Research, Redmond
Wenjing Lou	Virginia Tech
William Robertson	Northeastern University
Xiaojing Liao	Indiana University Bloomington
Xiapu Luo	The Hong Kong Polytechnic University
Xinlei He	CISPA Helmholtz Center for Information Security
Xusheng Xiao	Arizona State University
Yan Chen	Northwestern University
Yang Zhang	CISPA Helmholtz Center for Information Security
Yanick Fratantonio	Google
Yasemin Acar	Paderborn University & George Washington University
Yasemin Acar	Paderborn University
Yinzhi Cao	Johns Hopkins University
Yixin Sun	University of Virginia
Yongdae Kim	KAIST
Yuval Yarom	University of Adelaide
Z. Berkay Celik	Purdue University
Zakir Durumeric	Stanford University
Zane Ma	Georgia Institute of Technology
Zhen Huang	DePaul University
Zhiqiang Lin	Ohio State University
Zhiyun Qian	University of California, Riverside
Ziqiao Zhou	Microsoft Research