Organizers
Artifact Evaluation co-Chairs
- Aurore Fass, CISPA Helmholtz Center for Information Security
- Phani Vadrevu, Louisiana State University
Contact the AEC chairs at sec25aec@usenix.org.
Artifact Evaluation Publication Chair
- Tiago Heinrich, Max-Planck-Institut für Informatik
Artifact Evaluation Committee
- Abdullah Al Ishtiaq, The Pennsylvania State University
- Abdulrahman Diaa, University of Waterloo
- Abhinaya S.B., North Carolina State University
- Adrian Herrera, Interrupt Labs
- Ahmed Lekssays, Qatar Computing Research Institute
- Aleksei Stafeev, CISPA Helmholtz Center for Information Security
- Alexander Gaidis, Brown University
- Alexander Hart, CISPA Helmholtz Center for Information Security
- Alexandra Nisenoff, Carnegie Mellon University
- Andrea Di Dio, Vrije Universiteit Amsterdam
- Annika Wilde, Ruhr-Universität Bochum
- Antonio Muñoz, University of Malaga
- Aoyang Fang, The Chinese University of Hong Kong
- Atefeh Mohseni, University of California
- Ayomide Akinsanya, Stevens Institute of Technology
- Baodong Chen, The Ohio State University
- Billy Tsouvalas, Stony Brook University
- Bocheng Chen, Michigan State University
- Boheng Li, Nanyang Technological University
- Boru Chen, University of California, Berkeley
- Bowen Zhang, The Hong Kong University of Science and Technology
- Cen Zhang, Nanyang Technological University
- Chakshu Gupta, University of Twente
- Changming Liu, Northeastern University
- Chaoyuan Peng, Zhejiang University
- Christoph Sendner, University of Würzburg
- Chuanpu Fu, Tsinghua University
- Cong Wu, The University of Hong Kong
- Cristian Assaiante, Sapienza University of Rome
- David Balash, University of Richmond
- Devon Tuma, University of Minnesota
- Di Cao, Swinburne University of Technology
- Di Tang, Indiana University Bloomington
- Diksha Goel, CSIRO’s Data61
- Dongnan He, Renmin University of China
- Dongwei Xiao, Hong Kong University of Science and Technology
- Elias Suvanto, University of Luxembourg & CryptoLab Inc.
- Eric Ackermann, CISPA
- Evangelos Bitsikas, Northeastern University
- Fabian Bäumer Ruhr, University Bochum
- Fabian Fleischer, Georgia Institute of Technology
- Feiyang Yu, Duke University
- Felix Weissberg, TU Berlin
- Feng Wei, University at Buffalo
- Gabriel Zaid, Thales Group
- Ganxiang Yang, Columbia University
- Gertjan Franken, DistriNet, KU Leuven
- Grigoris Ntousakis, Brown University
- Guangsheng Zhang, University of Technology Sydney
- Guillaume DIDIER, Saarland University
- Gustavo Sánchez, Karlsruhe Institute of Technology (KIT)
- Gwihwan Go, Tsinghua University
- Haichuan Xu, Georgia Institute of Technology
- Halima Bouzidi, University of California Irvine
- Hanqing Zhao, Tsinghua University
- Hao Yu, National University of Defense Technology
- Haobin Hiroki Chen, Indiana University Bloomington
- He Zhang, RMIT University
- Hongbo Wen, University of Santa Barbara
- Hongrui Cui, Shanghai Jiao Tong University
- Hongsheng Hu, The University of Newcastle
- Hongyan Chang, National University of Singapore
- Hosein Yavarzadeh, UC San Diego
- Huanqi Yang, City University of Hong Kong
- Huanyao Rong, Indiana University Bloomington
- Huayi Duan, ETH Zürich
- Hugo Kermabon-Bobinnec, Concordia University
- Ismat Jarin, UC Irvine
- Jaeho Lee, Yonsei University
- Jake Ginesin, Northeastern University
- Jean-Charles Noirot Ferrand, University of Wisconsin-Madison
- Jessy Ayala, University of California, Irvine
- Jiacheng Xu, Zhejiang University
- Jiahao Yu, Northwestern University
- Jialuo Du, Tsinghua University
- Jian Cui, Indiana University Bloomington
- Jianjia Yu, Johns Hopkins University
- Jing Liu, UC Irvine & MPI-SP
- Jiongchi Yu, Singapore Management University
- Jiwon Kim, Purdue University
- Johnny So, Stony Brook University
- Jonas Kaspereit, FH Münster
- Jonas Möller, TU Berlin
- Joseph Khoury, Louisiana State University
- Jost Rossel, Paderborn University
- Jung-Woo Chang, UC San Diego
- Junming Liu, Zhejiang University
- Junpeng Wan, Purdue University
- Junqi Zhang, University of Science and Technology of China
- Kaixuan Luo, The Chinese University of Hong Kong
- Kaiyi Zhang, Shanghai Jiao Tong University
- Kelly Kaoudis, Trail of Bits
- Keno Hassler, CISPA Helmholtz Center for Information Security
- Keyan Guo, University at Buffalo
- Kha Dinh, Sungkyunkwan University
- Kiho Lee, ETRI
- Kun Wang, Zhejiang University
- Kunyang Li, University of Wisconsin-Madison
- Kyle Fredrickson, UCSC
- Kyle Zeng, Arizona State University
- Leonhard Balduf, TU Darmstadt
- Linard Arquint, ETH Zurich
- Lingzhi Wang, Northwestern University
- Liron David, Tel Aviv University
- Long Huang, Louisiana State University
- Luca Baldesi, University of California, Irvine
- Lukas Lamster, Graz University of Technology
- Marton Bognar, DistriNet, KU Leuven
- Maxime Puys, University Clermont Auvergne
- MD Armanuzzaman, Northeastern University
- Md. Ishtiaq Ashiq Khan, Virginia Tech
- Mengyao Ma The, University of Queensland
- Mert Yassi, Monash University
- Michael Brown, Trail of Bits
- Michael Clark, Brigham Young University
- Min Chen, Vrije Universiteit Amsterdam
- Mingda Han, Shandong University
- Mingfei Cheng, Singapore Management University
- Minghui Xu, Shandong University
- Mingming Chen, The Pennsylvania State University
- Mingming Zhang, Zhongguancun Laboratory
- Mingxi Ye, Sun Yat-sen University
- Mingyi Liu, Georgia Institute of Technology
- Mir Masood Ali, University of Illinois Chicago
- Mohammad Hammas Saeed, George Washington University
- Muhammad Ibrahim, Purdue University
- Muhammad Muzammil, Stony Brook University
- Muhammad Abu Bakar Aziz, Northeastern University
- Muhammad Hammad Mazhar, University of Northern Colorado
- Nan Wang, CSIRO’s Data61
- Nils Bars, CISPA Helmholtz Center for Information Security
- Nimish Mishra, Indian Institute of Technology, Kharagpur
- Ningyu He, The Hong Kong Polytechnic University
- Noah Mauthe, CISPA Helmholtz Center for Information Security
- Pankaj Niroula, William & Mary
- Pascal Cotret, Lab-STICC / ENSTA Bretagne
- Pathum Chamikara Mahawaga Arachchige, CSIRO’s Data61
- Patrick Jattke, ETH Zurich
- Paul L. R. OLIVIER
- Pedro Bernardo, TU Wien
- Peng Jiang, Southeast University
- Pierrick Gaudry, CNRS
- Priscilla Danso, Stony Brook University
- Qiming Guo, Texas A&M University-Corpus Christi
- Qinge Xie, Georgia Institute of Technology
- Qisheng Jiang, Duke University
- Rahul George, UC Riverside
- Rahul Kande, Texas A&M University
- Ruichen Li, Ohio State University
- Runze Zhang, Georgia Institute of Technology
- Ryan Vrecenar, Sandia National Laboratories
- Sander Huyghebaert, Vrije Universiteit Brussel & KU Leuven
- Sanket Goutam, Stony Brook University
- Sebastian Hasler, University of Stuttgart
- Sebastian Kappes, Max Planck Institute for Informatics
- Seonyoung Cheon, Yonsei University
- Seyed Behnam andarzian, Radboud University
- Seyed Mohammad Mehdi Mirnajafizadeh, Wayne State University
- Shahroz Tariq, CSIRO’s Data61
- Shan Wang, The Hong Kong Polytechnic University
- Shaofeng Li, Southeast University
- Sharad Agarwal, University College London
- Shenao Yan, University of Connecticut
- Shenghan Zheng, University of California
- Shengtuo Hu, Palo Alto Networks
- Shiwei Feng, Purdue University
- Shixuan Guan, San Diego State University
- Shixuan Zhao, The Ohio State University
- Shiza Ali, University of Washington
- Shubham Agarwal, CISPA Helmholtz Center for Information Security
- Shuo Wang, Shanghai Jiao Tong University
- Shuofeng Liu, The University of Queensland
- Sina Rostami, Max Planck Institute for Informatics
- Sindhu Reddy Kalathur Gopal, University of Wyoming
- Sneha Sudhakaran, Florida Inst of technology
- Sofiane Azogagh, Université du Québec à Montréal
- Soomin Kim, KAIST
- Stanley Wu, University of Chicago
- Tao Ni City, University of Hong Kong
- Tasnuva Farheen, Louisiana State University
- Tian Dong, Shanghai Jiao Tong University
- Tianchang Yang, The Pennsylvania State University
- Ting Zhu, The Ohio State University
- Tolga Atalay, Virginia Tech
- Tomer Laor, Ben-Gurion University of the Negev
- Tooba Aamir, CSIRO’s Data61
- Torsten Krauß, University of Würzburg
- Tuo Li, Tsinghua University
- Tyler Tucker, University of Florida
- Vidya Lakshmi Rajagopalan, Stevens Institute of Technology
- Vijayanta Jain, University of Maine
- Wanning Ding, Syracuse University
- Wei Song, UNSW Sydney
- Weiheng Bai, University of Minnesota
- Wenhao Li, Shandong University
- Xia Zhou, Zhejiang University
- Xianbo Wang, The Chinese University of Hong Kong
- Xiang Chen, The Hong Kong University of Science and Technology
- Xiang Li, Nankai University
- Xiangmin Shen, Northwestern University
- Xiaochen Zhu, MIT
- Xiaoqi Chen, Purdue University
- Xiaoyu Cheng, Southeast University
- Xiaoyuan Wu, Carnegie Mellon University
- Xiaoyue Ma, George Mason University
- Xin Zhang, Peking University
- Xin Fan Guo, King’s College London
- Xinhao Deng, Tsinghua University
- Xuanbo Huang, University of Science and Technology of China
- Xuesong Bai, University of California, Irvine
- Yi He, Wuhan University
- Yi Zhou, Carnegie Mellon University
- Yibo Huang, University of Michigan
- Yidong Ren, Michigan State University
- Yifeng Cai, Peking University
- Yilu Dong, The Pennsylvania State University
- Yiming Zhang, Tsinghua University
- Ying Li, UCLA
- Ying Yuan, University of Padua
- Yiting Qu, CISPA Helmholtz Center for Information Security
- Yiwei Zhang, Purdue University
- Yohan Beugin, University of Wisconsin-Madison
- Yonatan Achamyeleh, UCI
- Yongliang Chen, City University of Hong Kong
- Yongwoo Lee, Yonsei University
- Yuanhaur Chang, Washington University in St. Louis
- Yue Huang, CSIRO’s Data61
- Yujin Huang, The University of Melbourne
- Yunming Xiao, University of Michigan
- Yunyi Zhang, National University of Defense Technology, Tsinghua University
- Yupei Liu, The Pennsylvania State University
- Yupeng Yang, Georgia Institute of Technology
- Yuxiang Yang, Tsinghua University
- Zenong Zhang, Google
- Zeyan Liu, University of Louisville
- Zheng Yang, Georgia Institute of Technology
- Zheng Yu, Northwestern University
- Zhengjie Ji, Virginia Tech
- Zhengyao Lin, Carnegie Mellon University
- Zhengyu Liu, Johns Hopkins University
- Zhipeng Lu, University of Minnesota
- Zhiyuan Yu, Washington University in St. Louis
- Zhuoran Liu, Radboud University
- Zichuan Li, Indiana University Bloomington
- Zidong Zhang, Simon Fraser University, QI-ANXIN Research Institute
- Zifeng Kang, Johns Hopkins University
- Zilin Shen, Purdue University
- Zilong Lin, Indiana University Bloomington
- Ziqing Yang, CISPA Helmholtz Center for Information Security
- Zirui Huang, Nanjing University
- Ziyang Li, University of Pennsylvania
- Ziyi Guo, Northwestern University
- Zizhuang Deng, School of Cyber Science and Technology, Shandong Universty
- Zsolt Levente Kucsván, University of Twente