Organizers

Artifact Evaluation co-Chairs

Contact the AEC chairs at sec25aec@usenix.org.

Artifact Evaluation Publication Chair

Artifact Evaluation Committee

  • Abdullah Al Ishtiaq, The Pennsylvania State University
  • Abdulrahman Diaa, University of Waterloo
  • Abhinaya S.B., North Carolina State University
  • Adrian Herrera, Interrupt Labs
  • Ahmed Lekssays, Qatar Computing Research Institute
  • Aleksei Stafeev, CISPA Helmholtz Center for Information Security
  • Alexander Gaidis, Brown University
  • Alexander Hart, CISPA Helmholtz Center for Information Security
  • Alexandra Nisenoff, Carnegie Mellon University
  • Andrea Di Dio, Vrije Universiteit Amsterdam
  • Annika Wilde, Ruhr-Universität Bochum
  • Antonio Muñoz, University of Malaga
  • Aoyang Fang, The Chinese University of Hong Kong
  • Atefeh Mohseni, University of California
  • Ayomide Akinsanya, Stevens Institute of Technology
  • Baodong Chen, The Ohio State University
  • Billy Tsouvalas, Stony Brook University
  • Bocheng Chen, Michigan State University
  • Boheng Li, Nanyang Technological University
  • Boru Chen, University of California, Berkeley
  • Bowen Zhang, The Hong Kong University of Science and Technology
  • Cen Zhang, Nanyang Technological University
  • Chakshu Gupta, University of Twente
  • Changming Liu, Northeastern University
  • Chaoyuan Peng, Zhejiang University
  • Christoph Sendner, University of Würzburg
  • Chuanpu Fu, Tsinghua University
  • Cong Wu, The University of Hong Kong
  • Cristian Assaiante, Sapienza University of Rome
  • David Balash, University of Richmond
  • Devon Tuma, University of Minnesota
  • Di Cao, Swinburne University of Technology
  • Di Tang, Indiana University Bloomington
  • Diksha Goel, CSIRO’s Data61
  • Dongnan He, Renmin University of China
  • Dongwei Xiao, Hong Kong University of Science and Technology
  • Elias Suvanto, University of Luxembourg & CryptoLab Inc.
  • Eric Ackermann, CISPA
  • Evangelos Bitsikas, Northeastern University
  • Fabian Bäumer Ruhr, University Bochum
  • Fabian Fleischer, Georgia Institute of Technology
  • Feiyang Yu, Duke University
  • Felix Weissberg, TU Berlin
  • Feng Wei, University at Buffalo
  • Gabriel Zaid, Thales Group
  • Ganxiang Yang, Columbia University
  • Gertjan Franken, DistriNet, KU Leuven
  • Grigoris Ntousakis, Brown University
  • Guangsheng Zhang, University of Technology Sydney
  • Guillaume DIDIER, Saarland University
  • Gustavo Sánchez, Karlsruhe Institute of Technology (KIT)
  • Gwihwan Go, Tsinghua University
  • Haichuan Xu, Georgia Institute of Technology
  • Halima Bouzidi, University of California Irvine
  • Hanqing Zhao, Tsinghua University
  • Hao Yu, National University of Defense Technology
  • Haobin Hiroki Chen, Indiana University Bloomington
  • He Zhang, RMIT University
  • Hongbo Wen, University of Santa Barbara
  • Hongrui Cui, Shanghai Jiao Tong University
  • Hongsheng Hu, The University of Newcastle
  • Hongyan Chang, National University of Singapore
  • Hosein Yavarzadeh, UC San Diego
  • Huanqi Yang, City University of Hong Kong
  • Huanyao Rong, Indiana University Bloomington
  • Huayi Duan, ETH Zürich
  • Hugo Kermabon-Bobinnec, Concordia University
  • Ismat Jarin, UC Irvine
  • Jaeho Lee, Yonsei University
  • Jake Ginesin, Northeastern University
  • Jean-Charles Noirot Ferrand, University of Wisconsin-Madison
  • Jessy Ayala, University of California, Irvine
  • Jiacheng Xu, Zhejiang University
  • Jiahao Yu, Northwestern University
  • Jialuo Du, Tsinghua University
  • Jian Cui, Indiana University Bloomington
  • Jianjia Yu, Johns Hopkins University
  • Jing Liu, UC Irvine & MPI-SP
  • Jiongchi Yu, Singapore Management University
  • Jiwon Kim, Purdue University
  • Johnny So, Stony Brook University
  • Jonas Kaspereit, FH Münster
  • Jonas Möller, TU Berlin
  • Joseph Khoury, Louisiana State University
  • Jost Rossel, Paderborn University
  • Jung-Woo Chang, UC San Diego
  • Junming Liu, Zhejiang University
  • Junpeng Wan, Purdue University
  • Junqi Zhang, University of Science and Technology of China
  • Kaixuan Luo, The Chinese University of Hong Kong
  • Kaiyi Zhang, Shanghai Jiao Tong University
  • Kelly Kaoudis, Trail of Bits
  • Keno Hassler, CISPA Helmholtz Center for Information Security
  • Keyan Guo, University at Buffalo
  • Kha Dinh, Sungkyunkwan University
  • Kiho Lee, ETRI
  • Kun Wang, Zhejiang University
  • Kunyang Li, University of Wisconsin-Madison
  • Kyle Fredrickson, UCSC
  • Kyle Zeng, Arizona State University
  • Leonhard Balduf, TU Darmstadt
  • Linard Arquint, ETH Zurich
  • Lingzhi Wang, Northwestern University
  • Liron David, Tel Aviv University
  • Long Huang, Louisiana State University
  • Luca Baldesi, University of California, Irvine
  • Lukas Lamster, Graz University of Technology
  • Marton Bognar, DistriNet, KU Leuven
  • Maxime Puys, University Clermont Auvergne
  • MD Armanuzzaman, Northeastern University
  • Md. Ishtiaq Ashiq Khan, Virginia Tech
  • Mengyao Ma The, University of Queensland
  • Mert Yassi, Monash University
  • Michael Brown, Trail of Bits
  • Michael Clark, Brigham Young University
  • Min Chen, Vrije Universiteit Amsterdam
  • Mingda Han, Shandong University
  • Mingfei Cheng, Singapore Management University
  • Minghui Xu, Shandong University
  • Mingming Chen, The Pennsylvania State University
  • Mingming Zhang, Zhongguancun Laboratory
  • Mingxi Ye, Sun Yat-sen University
  • Mingyi Liu, Georgia Institute of Technology
  • Mir Masood Ali, University of Illinois Chicago
  • Mohammad Hammas Saeed, George Washington University
  • Muhammad Ibrahim, Purdue University
  • Muhammad Muzammil, Stony Brook University
  • Muhammad Abu Bakar Aziz, Northeastern University
  • Muhammad Hammad Mazhar, University of Northern Colorado
  • Nan Wang, CSIRO’s Data61
  • Nils Bars, CISPA Helmholtz Center for Information Security
  • Nimish Mishra, Indian Institute of Technology, Kharagpur
  • Ningyu He, The Hong Kong Polytechnic University
  • Noah Mauthe, CISPA Helmholtz Center for Information Security
  • Pankaj Niroula, William & Mary
  • Pascal Cotret, Lab-STICC / ENSTA Bretagne
  • Pathum Chamikara Mahawaga Arachchige, CSIRO’s Data61
  • Patrick Jattke, ETH Zurich
  • Paul L. R. OLIVIER
  • Pedro Bernardo, TU Wien
  • Peng Jiang, Southeast University
  • Pierrick Gaudry, CNRS
  • Priscilla Danso, Stony Brook University
  • Qiming Guo, Texas A&M University-Corpus Christi
  • Qinge Xie, Georgia Institute of Technology
  • Qisheng Jiang, Duke University
  • Rahul George, UC Riverside
  • Rahul Kande, Texas A&M University
  • Ruichen Li, Ohio State University
  • Runze Zhang, Georgia Institute of Technology
  • Ryan Vrecenar, Sandia National Laboratories
  • Sander Huyghebaert, Vrije Universiteit Brussel & KU Leuven
  • Sanket Goutam, Stony Brook University
  • Sebastian Hasler, University of Stuttgart
  • Sebastian Kappes, Max Planck Institute for Informatics
  • Seonyoung Cheon, Yonsei University
  • Seyed Behnam andarzian, Radboud University
  • Seyed Mohammad Mehdi Mirnajafizadeh, Wayne State University
  • Shahroz Tariq, CSIRO’s Data61
  • Shan Wang, The Hong Kong Polytechnic University
  • Shaofeng Li, Southeast University
  • Sharad Agarwal, University College London
  • Shenao Yan, University of Connecticut
  • Shenghan Zheng, University of California
  • Shengtuo Hu, Palo Alto Networks
  • Shiwei Feng, Purdue University
  • Shixuan Guan, San Diego State University
  • Shixuan Zhao, The Ohio State University
  • Shiza Ali, University of Washington
  • Shubham Agarwal, CISPA Helmholtz Center for Information Security
  • Shuo Wang, Shanghai Jiao Tong University
  • Shuofeng Liu, The University of Queensland
  • Sina Rostami, Max Planck Institute for Informatics
  • Sindhu Reddy Kalathur Gopal, University of Wyoming
  • Sneha Sudhakaran, Florida Inst of technology
  • Sofiane Azogagh, Université du Québec à Montréal
  • Soomin Kim, KAIST
  • Stanley Wu, University of Chicago
  • Tao Ni City, University of Hong Kong
  • Tasnuva Farheen, Louisiana State University
  • Tian Dong, Shanghai Jiao Tong University
  • Tianchang Yang, The Pennsylvania State University
  • Ting Zhu, The Ohio State University
  • Tolga Atalay, Virginia Tech
  • Tomer Laor, Ben-Gurion University of the Negev
  • Tooba Aamir, CSIRO’s Data61
  • Torsten Krauß, University of Würzburg
  • Tuo Li, Tsinghua University
  • Tyler Tucker, University of Florida
  • Vidya Lakshmi Rajagopalan, Stevens Institute of Technology
  • Vijayanta Jain, University of Maine
  • Wanning Ding, Syracuse University
  • Wei Song, UNSW Sydney
  • Weiheng Bai, University of Minnesota
  • Wenhao Li, Shandong University
  • Xia Zhou, Zhejiang University
  • Xianbo Wang, The Chinese University of Hong Kong
  • Xiang Chen, The Hong Kong University of Science and Technology
  • Xiang Li, Nankai University
  • Xiangmin Shen, Northwestern University
  • Xiaochen Zhu, MIT
  • Xiaoqi Chen, Purdue University
  • Xiaoyu Cheng, Southeast University
  • Xiaoyuan Wu, Carnegie Mellon University
  • Xiaoyue Ma, George Mason University
  • Xin Zhang, Peking University
  • Xin Fan Guo, King’s College London
  • Xinhao Deng, Tsinghua University
  • Xuanbo Huang, University of Science and Technology of China
  • Xuesong Bai, University of California, Irvine
  • Yi He, Wuhan University
  • Yi Zhou, Carnegie Mellon University
  • Yibo Huang, University of Michigan
  • Yidong Ren, Michigan State University
  • Yifeng Cai, Peking University
  • Yilu Dong, The Pennsylvania State University
  • Yiming Zhang, Tsinghua University
  • Ying Li, UCLA
  • Ying Yuan, University of Padua
  • Yiting Qu, CISPA Helmholtz Center for Information Security
  • Yiwei Zhang, Purdue University
  • Yohan Beugin, University of Wisconsin-Madison
  • Yonatan Achamyeleh, UCI
  • Yongliang Chen, City University of Hong Kong
  • Yongwoo Lee, Yonsei University
  • Yuanhaur Chang, Washington University in St. Louis
  • Yue Huang, CSIRO’s Data61
  • Yujin Huang, The University of Melbourne
  • Yunming Xiao, University of Michigan
  • Yunyi Zhang, National University of Defense Technology, Tsinghua University
  • Yupei Liu, The Pennsylvania State University
  • Yupeng Yang, Georgia Institute of Technology
  • Yuxiang Yang, Tsinghua University
  • Zenong Zhang, Google
  • Zeyan Liu, University of Louisville
  • Zheng Yang, Georgia Institute of Technology
  • Zheng Yu, Northwestern University
  • Zhengjie Ji, Virginia Tech
  • Zhengyao Lin, Carnegie Mellon University
  • Zhengyu Liu, Johns Hopkins University
  • Zhipeng Lu, University of Minnesota
  • Zhiyuan Yu, Washington University in St. Louis
  • Zhuoran Liu, Radboud University
  • Zichuan Li, Indiana University Bloomington
  • Zidong Zhang, Simon Fraser University, QI-ANXIN Research Institute
  • Zifeng Kang, Johns Hopkins University
  • Zilin Shen, Purdue University
  • Zilong Lin, Indiana University Bloomington
  • Ziqing Yang, CISPA Helmholtz Center for Information Security
  • Zirui Huang, Nanjing University
  • Ziyang Li, University of Pennsylvania
  • Ziyi Guo, Northwestern University
  • Zizhuang Deng, School of Cyber Science and Technology, Shandong Universty
  • Zsolt Levente Kucsván, University of Twente