USENIX Best Papers

Filter List View By:

USENIX Security '23

Alexandra Nisenoff, University of Chicago and Carnegie Mellon University; Maximilian Golla, University of Chicago / Max Planck Institute for Security and Privacy; Miranda Wei, University of Chicago / University of Washington; Juliette Hainline, University of Chicago; Hayley Szymanek, University of Chicago; Annika Braun, University of Chicago; Annika Hildebrandt, University of Chicago; Blair Christensen, University of Chicago; David Langenberg, University of Chicago; Blase Ur, University of Chicago
Nils Bars, CISPA Helmholtz Center for Information Security; Moritz Schloegel, CISPA Helmholtz Center for Information Security; Tobias Scharnowski, CISPA Helmholtz Center for Information Security; Nico Schiller, Ruhr-Universität Bochum; Thorsten Holz, CISPA Helmholtz Center for Information Security
Hongyi Liu, Rice University; Jiarong Xing, Rice University; Yibo Huang, Rice University; Danyang Zhuo, Duke University; Srinivas Devadas, Massachusetts Institute of Technology; Ang Chen, Rice University
Gertjan Franken, imec-DistriNet, KU Leuven; Tom Van Goethem, imec-DistriNet, KU Leuven; Lieven Desmet, imec-DistriNet, KU Leuven; Wouter Joosen, imec-DistriNet, KU Leuven
Minyeop Choi, KAIST; Gihyuk Ko, Cyber Security Research Center at KAIST and Carnegie Mellon University; Sang Kil Cha, KAIST
Tadayoshi Kohno, University of Washington; Yasemin Acar, Paderborn University and George Washington University; Wulf Loh, Universität Tübingen
Shawn Shan, University of Chicago; Jenna Cryan, University of Chicago; Emily Wenger, University of Chicago; Haitao Zheng, University of Chicago; Rana Hanocka, University of Chicago; Ben Y. Zhao, University of Chicago
Guangmeng Zhou, Tsinghua University; Zhuotao Liu, Tsinghua University and Zhongguancun Laboratory; Chuanpu Fu, Tsinghua University; Qi Li, Tsinghua University and Zhongguancun Laboratory; Ke Xu, Tsinghua University and Zhongguancun Laboratory
Sarvar Patel, Google; Joon Young Seo, Google; Kevin Yeo, Google and Columbia University
Théophile Wallez, Inria Paris; Jonathan Protzenko, Microsoft Research; Benjamin Beurdouche, Mozilla; Karthikeyan Bhargavan, Inria Paris
Vincent Cheval, Inria Paris; Cas Cremers, CISPA Helmholtz Center for Information Security; Alexander Dax, CISPA Helmholtz Center for Information Security and Saarland University; Lucca Hirschi, Université de Lorraine, Inria, CNRS, France; Charlie Jacomme, Inria Paris; Steve Kremer, Université de Lorraine, LORIA, Inria Nancy Grand-Est
Omer Akgul, University of Maryland; Taha Eghtesad, Pennsylvania State University; Amit Elazari, University of California, Berkeley; Omprakash Gnawali, University of Houston; Jens Grossklags, Technical University of Munich; Michelle L. Mazurek, University of Maryland; Daniel Votipka, Tufts University; Aron Laszka, Pennsylvania State University
Wael Albayaydh, University of Oxford; Ivan Flechais, University of Oxford
Milad Nasr, Google DeepMind; Jamie Hayes, Google DeepMind; Thomas Steinke, Google DeepMind; Borja Balle, DeepMind; Florian Tramèr, ETH Zurich; Matthew Jagielski, Google DeepMind; Nicholas Carlini, Google DeepMind; Andreas Terzis, Google DeepMind
Cas Cremers, CISPA Helmholtz Center for Information Security; Alexander Dax, CISPA Helmholtz Center for Information Security and Saarland University; Charlie Jacomme, Inria Paris; Mang Zhao, CISPA Helmholtz Center for Information Security and Saarland University
Alaa Daffalla, Cornell University; Marina Bohuk, Cornell University; Nicola Dell, Jacobs Institute Cornell Tech; Rosanna Bellini, Cornell University; Thomas Ristenpart, Cornell Tech