MAY 20-22, 2019 AT THE HYATT REGENCY, SAN FRANCISCO, CA

40th IEEE Symposium on
Security and Privacy

Distinguished Paper Award


Spectre Attacks: Exploiting Speculative Execution Paul Kocher (Independent (www.paulkocher.com)), Jann Horn (Google Project Zero), Anders Fogh (G DATA Advanced Analytics), Daniel Genkin (University of Pennsylvania and University of Maryland), Daniel Gruss (Graz University of Technology), Werner Haas (Cyberus Technology), Mike Hamburg (Rambus, Cryptography Research Division), Moritz Lipp (Graz University of Technology), Stefan Mangard (Graz University of Technology), Thomas Prescher (Cyberus Technology), Michael Schwarz (Graz University of Technology), Yuval Yarom (University of Adelaide and Data61)


Distinguished Practical Paper Award

Sponsored by Microsoft


Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks Lucian Cojocar (Vrije Universiteit Amsterdam), Kaveh Razavi (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam)


Test of Time Award (The First Fifteen Years)


Ralph Merkle: Protocols for Public Key Cryptosystems, 1980

Richard Kemmerer, A Practical Approach to Identifying Storage and Timing Channels, 1982

Joseph Goguen and Jose Meseguer, Security Policies and Security Models, 1982

Gustavus J. Simmons: Verification of Treaty Compliance Revisited, 1983

Jonathan K. Millen: The Interrogator: A Tool for Cryptographic Protocol Security, 1984

Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder: A Global Authentication Service without Global Trust, 1986

Dorothy E. Denning: An Intrusion-Detection Model, 1987

John McLean: Reasoning About Security Models. IEEE Symposium on Security and Privacy 1987

Steven M. Bellovin, Michael Merritt: Encrypted key exchange: password-based protocols secure against dictionary attacks, 1992

Martín Abadi, Roger M. Needham: Prudent engineering practice for cryptographic protocols, 1994


Test of Time Award (2019)


Arvind Narayanan and Vitaly Shmatikov. "Robust De-anonymization of Large Sparse Datasets" (2008)

Daniel Halperin, Thomas S. Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno and William H. Maisel. "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses" (2008)