SoK Authors

Yasemin Acar

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Sadia Afroz

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Gail-Joon Ahn

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Lorenzo Alvisi

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Dennis Andriesse

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Anonymous

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Frederik Armknecht

A Formal Foundation for the Security Features of Physical Functions (2011)

Thanassis Avgerinos

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) (2010)

Michael Backes

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Mirza Basim Baig

SoK: Introspections on Trust and the Semantic Gap (2014)

Ero Balsa

OB-PWS: Obfuscation-Based Private Web Search (2012)

Davide Balzarotti

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

David Basin

SoK: Secure Data Deletion (2013)

Jason Bau

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

Michael Becher

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

David Bernhard

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

Steven Bethard

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Joseph Bonneau

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

SoK: Secure Messaging (2015)

Herbert Bos

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Pablo Garcia Bringas

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

David Brumley

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) (2010)

Sven Bugiel

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Elie Bursztein

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Zinta Byrne

The Psychology of Security for the Home Computer User (2012)

Srdjan Capkun

SoK: Secure Data Deletion (2013)

Jeremy Clark

SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements (2013)

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Allen Clement

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Véronique Cortier

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

SoK: Verifiability Notions for E-Voting Protocols (2016)

Scott E. Coull

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Robert K. Cunningham

SoK: Cryptographically Protected Database Search (2017)

Sergej Dechand

SoK: Secure Messaging (2015)

Claudia Diaz

OB-PWS: Obfuscation-Based Private Web Search (2012)

Christian J. Dietrich

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Adam Doupé

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Andrew Dutcher

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Kevin P. Dyer

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Alessandro Epasto

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Céline Fabry

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Sascha Fahl

SoK: Secure Messaging (2015)

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Edward W. Felten

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Siji Feng

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Felix C. Freiling

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Benjamin Fuller

SoK: Cryptographically Protected Database Search (2017)

Vijay Gadepally

SoK: Cryptographically Protected Database Search (2017)

David Galindo

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

SoK: Verifiability Notions for E-Voting Protocols (2016)

Ian Goldberg

Formalizing Anonymous Blacklisting Systems (2011)

SoK: Secure Messaging (2015)

Chris Grier

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

John Grosen

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Igor Santos Grueiro

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

Divij Gupta

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

Ariel Hamlin

SoK: Cryptographically Protected Database Search (2017)

Ben Hardekopf

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach (2011)

Christophe Hauser

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Ryan Henry

Formalizing Anonymous Blacklisting Systems (2011)

Cormac Herley

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit (2017)

Johannes Hoffmann

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Thorsten Holz

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Adele Howe

The Psychology of Security for the Home Computer User (2012)

Bhushan Jain

SoK: Introspections on Trust and the Semantic Gap (2014)

Xuxian Jiang

Dissecting Android Malware: Characterization and Evolution (2012)

Dan Jurafsky

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Vineeth Kashyap

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach (2011)

Christian Kreibich

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

Joshua A. Kroll

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Christopher Kruegel

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Ralf Kuesters

SoK: Verifiability Notions for E-Voting Protocols (2016)

Denis Foo Kune

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Silvio Lattanzi

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Jens Müller

SoK: Exploiting Network Printers (2017)

Roel Maes

A Formal Foundation for the Security Features of Physical Functions (2011)

Jonathan R. Mayer

Third-Party Web Tracking Policy and Technology (2012)

Jonathan M. McCune

Bootstrapping Trust in Commodity Computers (2010)

Patrick McDaniel

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Andrew Miller

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

John Darby Mitchell

SoK: Cryptographically Protected Database Search (2017)

John C. Mitchell

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Third-Party Web Tracking Policy and Technology (2012)

John Mitchell

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

Vladislav Mladenov

SoK: Exploiting Network Printers (2017)

Johannes Mueller

SoK: Verifiability Notions for E-Voting Protocols (2016)

Arvind Narayanan

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Paul C. van Oorschot

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements (2013)

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit (2017)

Alessandro Panconesi

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Bryan Parno

Bootstrapping Trust in Commodity Computers (2010)

Vern Paxson

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection (2010)

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Mathias Payer

SoK: Eternal War in Memory (2013)

Olivier Pereira

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

Henning Perl

SoK: Secure Messaging (2015)

Adrian Perrig

Bootstrapping Trust in Commodity Computers (2010)

Daniel Plohmann

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Norbert Pohlmann

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

Mario Polino

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Donald E. Porter

SoK: Introspections on Trust and the Semantic Gap (2014)

Indrajit Ray

The Psychology of Security for the Home Computer User (2012)

Joel Reardon

SoK: Secure Data Deletion (2013)

Thomas Ristenpart

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Mark Roberts

The Psychology of Security for the Home Computer User (2012)

Christian Rossow

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Aviel D. Rubin

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Michael Rushanan

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Ahmad-Reza Sadeghi

A Formal Foundation for the Security Features of Physical Functions (2011)

Christopher Salls

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Edward Schwartz

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) (2010)

Jörg Schwenk

SoK: Exploiting Network Printers (2017)

Richard Shay

SoK: Cryptographically Protected Database Search (2017)

Emily Shen

SoK: Cryptographically Protected Database Search (2017)

Yan Shoshitaishvili

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Thomas Shrimpton

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Radu Sion

SoK: Introspections on Trust and the Semantic Gap (2014)

Matthew Smith

SoK: Secure Messaging (2015)

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Robin Sommer

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection (2010)

Juraj Somorovsky

SoK: Exploiting Network Printers (2017)

Dawn Song

SoK: Eternal War in Memory (2013)

Frank Stajano

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

Francois-Xavier Standaert

A Formal Foundation for the Security Features of Physical Functions (2011)

Maarten van Steen

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

Nick Stephens

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Brett Stone-Gross

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Colleen Swanson

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Laszlo Szekeres

SoK: Eternal War in Memory (2013)

Carmela Troncoso

OB-PWS: Obfuscation-Based Private Web Search (2012)

Tomasz Truderung

SoK: Verifiability Notions for E-Voting Protocols (2016)

Michael C. Tschantz

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Huahong Tu

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Sebastian Uellenbeck

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Xabier Ugarte-Pedrero

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

Nik Unger

SoK: Secure Messaging (2015)

Malgorzata Urbanska

The Psychology of Security for the Home Computer User (2012)

Mayank Varia

SoK: Cryptographically Protected Database Search (2017)

Giovanni Vigna

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Christian Wachsmann

A Formal Foundation for the Security Features of Physical Functions (2011)

Ruoyu Wang

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Bogdan Warinschi

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

Tao Wei

SoK: Eternal War in Memory (2013)

Tillmann Werner

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Ben Wiedermann

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach (2011)

Christopher Wolf

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Arkady Yerukhimovich

SoK: Cryptographically Protected Database Search (2017)

Dongli Zhang

SoK: Introspections on Trust and the Semantic Gap (2014)

Ziming Zhao

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Yajin Zhou

Dissecting Android Malware: Characterization and Evolution (2012)