Professional Activities

Conference and Program Chair


  • 40th IEEE Symposium on Security and Privacy (Oakland), 2019
  • 39th IEEE Symposium on Security and Privacy (Oakland), 2018
  • 23rd ACM Conference on Computer and Communications Security (CCS), 2016
  • 22nd ACM Conference on Computer and Communications Security (CCS), 2015
  • 4th Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011
  • 5th ACM CCS Workshop on Recurring Malcode (WORM), 2007
  • 10th International Symposium on Recent Advances in Intrusion Detection (RAID), 2007
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2005

Program Committee and Organization Committee Membership


  • ACM Conference on Computer and Communications Security (CCS), 2023
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2023
  • ACM Conference on Computer and Communications Security (CCS), 2022
  • 31st Usenix Security Symposium, 2022
  • IEEE Symposium on Security and Privacy, 2022
  • 27th European Symposium on Research in Computer Security (ESORICS), 2022
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2022
  • ACM Conference on Computer and Communications Security (CCS), 2021
  • 30th Usenix Security Symposium, 2021
  • 26th European Symposium on Research in Computer Security (ESORICS), 2021
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2021
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment, 2017
  • Symposium on Electronic Crime Research (eCrime), 2016
  • IEEE European Symposium on Security and Privacy (Euro SnP), 2016
  • ISOC Network and Distributed Systems Security Symposium (NDSS), 2016
  • International World Wide Web Conference (WWW), Security and Privacy Abuse Track, 2015
  • 18th International Symposium on Recent Advances in Intrusion Detection (RAID), 2015
  • ISOC Network and Distributed Systems Security Symposium (NDSS), 2015
  • International Conference on Distributed Computing Systems (ICDCS), Security and Privacy, 2014
  • 23rd International World Wide Web Conference (WWW), Security, Privacy, Trust, and Abuse Track, 2014
  • 16th Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2013
  • International Conference on Availability, Reliability and Security (ARES)
  • Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2013
  • Usenix Workshop on Offensive Technologies (WOOT), 2013
  • 22nd International World Wide Web Conference (WWW), Security, Privacy, Trust, and Abuse Track, 2013
  • IEEE Symposium on Security and Privacy, 2013
  • ACM Program Protection and Reverse Engineering Workshop (PPREW), 2013
  • 15th Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2012
  • IEEE Symposium on Security and Privacy, 2012
  • ACM Conference on Computer and Communications Security (CCS), 2011
  • 14th International Symposium on Recent Advances in Intrusion Detection (RAID), 2011
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2011
  • Web 2.0 Security and Privacy Workshop (W2SP), 2011
  • IEEE Symposium on Security and Privacy, 2011
  • International Conference on Distributed Computing Systems (ICDCS), Security and Privacy, 2011
  • ACM Conference on Computer and Communications Security (CCS), Publicity Chair, 2010
  • Usenix Workshop on Hot Topics in Security (HotSec), 2010
  • Usenix Workshop on Offensive Technologies (WOOT), 2010
  • IEEE Symposium on Security and Privacy, 2010
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2010
  • European Workshop on Systems Security (EuroSec), 2010
  • 17th Network and Distributed System Security Symposium (NDSS), 2010
  • ACM Conference on Computer and Communications Security (CCS), Publicity Chair, 2009
  • 18th Usenix Security Symposium, 2009
  • New Security Paradigms Workshop (NSPW), 2009
  • 12th International Symposium on Recent Advances in Intrusion Detection (RAID), 2009
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2008
  • Usenix Workshop on Hot Topics in Security (HotSec), 2009
  • European Workshop on Systems Security (EuroSec), 2009
  • Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009
  • 29th International Conference on Distributed Computing Systems (ICDCS), Security and Privacy, 2009
  • 18th International World Wide Web Conference (WWW), Security and Privacy Track, 2009
  • 16th Network and Distributed System Security Symposium (NDSS), 2009
  • International Conference on Information Security and Cryptology (ICISC), 2008
  • ACM Conference on Computer and Communications Security (CCS), 2008
  • European Conference on Computer Network Defense (EC2ND), 2008
  • 13th European Symposium on Research in Computer Security (ESORICS), 2008
  • IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm), 2008
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2008
  • Trust Conference (TRUST), 2008
  • IEEE Symposium on Security and Privacy, 2008
  • Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008
  • 17th International World Wide Web Conference (WWW), Security, Privacy, Reliability, and Ethics Track, 2008
  • European Workshop on Systems Security (EuroSec), 2008
  • 15th Network and Distributed System Security Symposium (NDSS), 2008
  • International Conference on Information Security and Cryptography (ICISC), 2007
  • ACM Conference on Computer and Communications Security (CCS), 2007
  • European Conference on Computer Network Defense (EC2ND), 2007
  • 12th European Symposium on Research in Computer Security (ESORICS), 2007
  • IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm), 2007
  • International Conference on Security and Cryptography (SECRYPT), 2007
  • Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), 2007
  • 16th Usenix Security Symposium, 2007
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2007
  • International Conference on Networking and Services (ICNS), 2007
  • IEEE Symposium on Security and Privacy, 2007
  • 16th International World Wide Web Conference (WWW), Security, Privacy, Reliability, and Ethics Track, 2007
  • 2nd Workshop on Dependability Aspects on Data WArehousing and Mining applications (DAWAM), 2007
  • Workshop on Secure Software Engineering (SecSE), 2007
  • 8th International Conference on Information and Communications Security (ICICS), 2006
  • International Conference on Software Engineering Advances (ICSEA), 2006
  • IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm), 2006
  • International Conference on Information System Security (ICISS), 2006
  • International Conference on Security and Cryptography (SECRYPT), 2006
  • 9th International Symposium on Recent Advances in Intrusion Detection (RAID), 2006
  • International Conference on Networking and Services (ICNS), 2006
  • ICSE Workshop on Software Engineering for Secure Systems (SESS), 2006
  • Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2006
  • IEEE Symposium on Security and Privacy, 2006
  • International Conference on IP and Web Applications (ICIW), 2006
  • IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm), 2005
  • International Conference on Information System Security (ICISS), 2005
  • 3rd ACM CCS Workshop on Rapid Malcode (WORM), 2005
  • 8th International Symposium on Recent Advances in Intrusion Detection (RAID), 2005
  • International Conference on Networking and Services (ICNS), 2005
  • ICSE Workshop on Software Engineering for Secure Systems (SESS), 2005
  • 12th Network and Distributed System Security Symposium (NDSS), 2005
  • Workshop on Privacy Respecting Incident Management (PRIMA), 2005
  • Workshop on Safety, Reliability, and Security of Industrial Computer Systems (WSRS), 2004
  • 7th International Symposium on Recent Advances in Intrusion Detection (RAID), 2004
  • Workshop on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), 2004
  • 6th International Symposium on Recent Advances in Intrusion Detection (RAID), 2003
  • 8th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2001

Journal Reviewer


  • ACM Transactions on Information and System Security (TISSEC)
  • IEEE Transactions on Dependable and Secure Computing
  • IEEE Transactions on Programming Languages and Systems (TOPLAS)
  • IEEE Transactions on Parallel and Distributed Systems
  • IEEE Transactions on Knowledge and Data Engineering
  • IEEE Transactions on Computers
  • IEEE Transactions on Fuzzy Systems
  • IEEE Security and Privacy Magazine
  • IEEE Software
  • IEEE Internet Computing
  • IEEE Signal Processing Letters
  • IEEE Journal on Selected Areas in Communications
  • International Journal of Computers and Applications
  • International Journal of Information Security
  • International Journal of Innovative Computing, Information, and Control
  • International Journal of Internet Protocol Technology
  • Journal of Communications and Networks
  • Journal of Computer Networks
  • Journal of Computer Science and Technology
  • Journal of Computer Security
  • Journal of Machine Learning
  • Journal of Pattern Analysis and Applications
  • Journal of Systems and Software
  • AI Communications
  • The Computer Journal
  • Software Experience and Practice