History of the Security and Privacy Symposium
Conference Chairs and Technical Committee Officers | |||||||
Year | Program Chairs | General Chair | Vice Chair | TC Chair | TC VC | est | est attendance |
2023 | Ristenpart and Traynor | Takabi | Jaeger | Ciocarlie | Holz | ||
2022 | Holz and Ristenpart | Bobba | Takabi | Parno | Ciocarlie | 796 (hybrid) | |
2021 | Oprea and Holz | Cárdenas | Bobba | Erlingsson | Parno | 1129 (virtual) | |
2020 | Shacham and Oprea | Ciocarlie | Cárdenas | Erlingsson | Parno | 1963 (virtual) | |
2019 | Kruegel and Shacham | Gondree | Ciocarlie | Peisert | Erlingsson | 739 | |
2018 | Parno and Kruegel | Li | Gondree | Peisert | Erlingsson | 591 | |
2017 | Erlingsson and Parno | Butler | Li | Lindqvist | Peisert | 587 | |
2016 | Shmatikov and Erlingsson | Locasto | Butler | Lindqvist | Peisert | 578 | |
2015 | Bauer and Shmatikov | Peisert | Locasto | McDaniel | Lindqvist | 571 | |
2014 | Backes and Perrig and Wang | Shannon | Peisert | McDaniel | Lindqvist | 484 | |
2013 | W. Lee and Perrig and Backes | Sommer | Shannon | Dietrich | McDaniel | 476 | |
2012 | Jha and W. Lee | Cunningham | Sommer | Dietrich | McDaniel | ~420 | |
2011 | Vigna and Jha | Frincke | Cunningham | Orman | Dietrich | 350 | |
2010 | Evans and Vigna | Lindqvist | Frincke | Orman | Dietrich | 345 | |
2009 | Myer and Evans | Du | Lindqvist | Irvine | Orman | 270? | |
2008 | McDaniel and Rubin | Guan | Du | Irvine | Orman | 315? | |
2007 | Pfitzmann and McDaniel | Shands | Guan | Millen | Irvine | 350? | |
2006 | Paxson and Pfitzmann | Orman | Shands | Millen | Irvine | 210? | |
2005 | Waidner and Paxson | Tate | Orman | Hinton | Millen | ||
2004 | Wagner and Waidner | Badger | Tate | Hinton | Millen | ||
2003 | Bellovin and Wagner | Blakley | Badger | Reiter | Hinton | ||
2002 | Abadi and Bellovin | Hinton | Blakley | Reiter | Hinton | ||
2001 | Needham and Abadi | Gong | Hinton | Berson | Reiter | ||
2000 | Reiter and Needham | Millen | Gong | Berson | Reiter | ||
1999 | Gong and Reiter | McLean | Millen | Pfleeger | Berson | ||
1998 | Karger and Gong | Reiter | McLean | Pfleeger | Berson | 200? | |
1997 | Dinolt and Karger | Kent | Reiter | Cooper | Pfleeger | 260? | |
1996 | McHugh and Dinolt | Johnson | Kent | Cooper | Pfleeger | 200? | |
1995 | Meadows and McHugh | Landwehr | Johnson | Benzel | Cooper | 210? | |
1994 | Rushby and Meadows | C.Garvey | Landwehr | Benzel | Cooper | 200 | |
1993 | Kemmerer and Rushby | Lunt | C.Garvey | McHugh | Benzel | 262 | |
1992 | McLean and Kemmerer | Cooper | Lunt | McHugh | Benzel | 299? | |
1991 | Lunt and McLean | Schnackenberg | Cooper | Hinke | McHugh | 340? | |
1990 | Cooper and Lunt | Downs | Schnackenberg | Hinke | McHugh | 340? | |
1989 | Berson and Cooper | Benzel | Downs | Landwehr | Hinke | 1100 | 340? |
1988 | Lipner and Berson | Bailey | Benzel | Landwehr | Hinke | 750 | 345* |
1987 | Bailey and Lipner | Gligor | - | Kemmerer | Landwehr | 700 | 300 |
1986 | Gligor and Bailey | Weissman | - | Kemmerer | Landwehr | ||
1985 | Millen and Gligor | Morris | - | Kemmerer | Landwehr | ||
1984 | Denning and Millen | Tasker | - | Lipner | Kemmerer | ||
1983 | Blakely and Denning | Schaefer | - | Lipner | Kemmerer | ||
1982 | Neumann | Schell | - | Ames | Lipner | 120 | 100 |
1981 | Davida, Blakely, Schaefer, Turn | Ames | - | Turn | |||
1980 | no proceedings produced, but the symposium was held | ||||||
Other Technical Committee and Conference Volunteers | ||||||||
Year |
Conf. Treasurer |
Newsletter Editor |
Standards Subcom Chair |
TC Treasurer |
Conf. Pubs Chair |
Conf. Workshops Chair |
Conf. Website Chair |
Others |
2013 | Sommer | Hilarie Orman | Shannon | Butler | Camp | Akhawe | Peisert, Cardenas, Switzer, Lindqvist, Benzel, Engle | |
2012 | Shannon | Hilarie Orman | Benzel | Butler | Dietrich | ? | Molnar, Talbott, Lindqvist | |
2011 | Sommer | Hilarie Orman | Benzel | Butler | Gagnon | K. Gates, Lindqvist, Greenstadt | ||
2010 | Shaffer | Hilarie Orman | Benzel | McNeill | Gates | Felt | ||
2009 | Shambroom | Hilarie Orman | Benzel | Gates | ||||
2008 | Shambroom | Hilarie Orman | Orman | |||||
2007 | Benzel | Hilarie Orman | Orman | |||||
2006 | Benzel | Hilarie Orman | ||||||
2005 | Chen | Hilarie Orman | ||||||
2004 | Chen | Hilarie Orman | ||||||
2003 | Hall | Jim Davis | ||||||
2002 | Blakley | Jim Davis | ||||||
2001 | Brian Loe | Jim Davis | ||||||
2000 | Brian Loe | Jim Davis | ? | Brian Loe | ||||
1999 | Brian Loe | Paul Syverson & Avi Rubin | ||||||
1998 | Brian Loe | Paul Syverson & Avi Rubin | ||||||
1997 | Brian Loe | Carl Landwehr | ||||||
1996 | Charles Payne | Carl Landwehr | ||||||
1995 | Charles Payne | Carl Landwehr | ?? | ?? | ||||
1994 | Jeff Thomas | ? | ||||||
1993 | Jeff Thomas | ? | ||||||
1992 | Jeff Thomas | |||||||
1991 | Jerzy Rub | |||||||
1990 | Jerzy Rub | |||||||
1989 | Jerzy Rub | David Bailey | Stan Ames | Steve Crocker | ||||
1989 | Jerzy Rub | David Bailey | Stan Ames | Steve Crocker | ||||
1988 | Marty Hurley | David Bailey | - | - | ||||
1987 | Paul Woodie | - | - | |||||
1986 | Paul Woodie | - | - | |||||
1985 | Paul Woodie | - | - | |||||
1984 | Paul Woodie | - | - | |||||
1983 | Anne-Marie Claybrook | - | - | |||||
1982 | Anne-Marie Claybrook | - | - |
Newsletter staff: CFP editor, Yong Guan. Assistant Editor, Sven Dietrich. Book Review Editor: Robert Bruen, Richard Austin.
S&P Outstanding Paper Awards | |||
Year | Authors | Title | Award |
2013 | Bryan Parno, Craig Gentry, Jon Howell, and Mariana Raykova | Pinocchio: Nearly Practical Verifiable Computation | Best Paper |
Amir Houmansadr, Chad Brubaker, and Vitaly Shmatikov; | The Parrot is Dead: Observing Unobservable Network Communications | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine | |
Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi | Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained ASLR | Best Student Paper | |
2012 | Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, and Thorsten Holz | Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | Best Paper |
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, and Crispin Cowan | User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine | |
Suman Jana and Vitaly Shmatikov | Memento: Learning Secrets from Process Footprints | Best Student Paper (sponsored by Google) | |
2011 | Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer | How to Shop for Free Online | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine: |
Andrew M. White, Kevin Snow, Austin Matthews, Fabian Monrose | Hookt on fon-iks: Phonotactic Reconstruction of Encrypted VoIP Conversations | Best Paper | |
Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh | OpenConflict: Preventing Real Time Map Hacks in Online Games | Best Student Paper | |
2010 | Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond | Chip and PIN is Broken | Best Practical Paper, sponsored by IEEE Security and Privacy Magazine: |
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou | TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection | Best Student Paper | |
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich | SCiFI - A System for Secure Face Identification | Best Paper | |
2009 | Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur | Wirelessly Pickpocketing a Mifare Classic Card | Best Practical Paper Award(from IEEE Security & Privacy Magazine) |
Monirul Sharif, Andrea Lanzi, Jonathon Giffin, Wenke Lee | Automatic Reverse Engineering of Malware Emulators | Best Student Paper Award | |
Bennet Yee, David Sehr, Gregory Dardyk, Brad Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | Best paper | |
2008 | Daniel Halperinm Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan and Kevin Fu, Tadayoshi Kohno, William H. Maisel | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | Outstanding paper |
Saar Drimer, Steven Murdoch, and Ross Anderson | Thinking Inside the Box: System-level Failures of Tamper Proofing | IEEE Security and Privacy Magazine Award | |
Francis David, Ellick Chan, Jeffrey Carlyle, and Roy Campbell | Cloaker: Hardware Supported Rootkit Concealment | Best Student Paper | |
1996-2007 | (None given) | ||
1995 | Olin Sibert, Philip A. Porras, Mark Heckman | The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems | |
1994 | Martin Abadi and Roger Needham | Prudent Engineering Practice for Cryptographic Protocols | |
Michael K. Reiter | A Secure Group Membership Protocol | ||
1993 | (None given) | ||
1992 | Jonathan Millen | A Resource Allocation Model for Denial of Service | Certificate awarded |
1991 | Catherine Meadows | A System for the Specification and Analysis of Key Management Protocols | Certificate awarded |
Wei-Ming Hu | Reducing Timing Channels with Fuzzy Time | Certificate awarded | |
1990 | John McLean | Security Models and Information Flow | |
Karger, Zurko, Bonin, Mason, Kahn | A VMM Security Kernel for the VAX Architecture | Certificates received OK (McLean, at least, and probably Karger) | |
1989 | Li Gong | A Secure Identity-Based Capability System | |
Lee Badger | A Model for Specifying Multi-Granularity Integrity Policies | ||
1988 | Clark Weissman | Blacker: Security for the DDN, Examples of A1 Security Engineering Trades | |
Yu and Gligor | A Formal Specification and Verification Method for the Prevention of Denial of Service | ||
1987 | Denning, Lunt, Schell, Heckman, Shockley | A Multilevel Relational Data Model | Certificates awarded |
1986 | Kain and Landwehr | On Access Checking in Capability-Based Systems | |
Haigh and Young | Extending the Non-Interference Version of MLS for SAT | Cash | |
certificates arranged for all prior years in spring '94 |
A brief note about the founding of the conference.