SoK Authors

Yasemin Acar

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Sadia Afroz

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Gail-Joon Ahn

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Omar Alrawi

SoK: Security Evaluation of Home-Based IoT Deployments (2019)

Lorenzo Alvisi

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Dennis Andriesse

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Anonymous

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Manos Antonakakis

SoK: Security Evaluation of Home-Based IoT Deployments (2019)

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security (2019)

Frederik Armknecht

A Formal Foundation for the Security Features of Physical Functions (2011)

Thanassis Avgerinos

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) (2010)

Michael Backes

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Mirza Basim Baig

SoK: Introspections on Trust and the Semantic Gap (2014)

Michael Bailey

SoK: “Plug & Pray” Today - Understanding USB Insecurity in Versions 1 through C (2018)

Ero Balsa

OB-PWS: Obfuscation-Based Private Web Search (2012)

Davide Balzarotti

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

David Basin

SoK: Secure Data Deletion (2013)

Adam Bates

SoK: “Plug & Pray” Today - Understanding USB Insecurity in Versions 1 through C (2018)

Jason Bau

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

Michael Becher

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

David Bernhard

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

Steven Bethard

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Joseph Bonneau

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

SoK: Secure Messaging (2015)

Herbert Bos

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Pablo Garcia Bringas

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

David Brumley

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) (2010)

Stefan Brunthaler

SoK: Automated Software Diversity (2014)

Sven Bugiel

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Elie Bursztein

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Kevin Butler

SoK: “Plug & Pray” Today - Understanding USB Insecurity in Versions 1 through C (2018)

Zinta Byrne

The Psychology of Security for the Home Computer User (2012)

Srdjan Capkun

SoK: Secure Data Deletion (2013)

Jeremy Clark

SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements (2013)

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Allen Clement

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Véronique Cortier

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

SoK: Verifiability Notions for E-Voting Protocols (2016)

Scott E. Coull

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Robert K. Cunningham

SoK: Cryptographically Protected Database Search (2017)

Sanjeev Das

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security (2019)

Sergej Dechand

SoK: Secure Messaging (2015)

Claudia Diaz

OB-PWS: Obfuscation-Based Private Web Search (2012)

Christian J. Dietrich

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Adam Doupé

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Andrew Dutcher

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Kevin P. Dyer

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Alessandro Epasto

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Céline Fabry

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Sascha Fahl

SoK: Secure Messaging (2015)

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Edward W. Felten

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Siji Feng

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Michael Franz

SoK: Automated Software Diversity (2014)

SoK: Sanitizing for Security (2019)

Felix C. Freiling

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Benjamin Fuller

SoK: Cryptographically Protected Database Search (2017)

Vijay Gadepally

SoK: Cryptographically Protected Database Search (2017)

David Galindo

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

SoK: Verifiability Notions for E-Voting Protocols (2016)

Ian Goldberg

Formalizing Anonymous Blacklisting Systems (2011)

SoK: Secure Messaging (2015)

Chris Grier

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

John Grosen

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Igor Santos Grueiro

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

Divij Gupta

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

Ariel Hamlin

SoK: Cryptographically Protected Database Search (2017)

Ben Hardekopf

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach (2011)

Marcella Hastings

SoK: General Purpose Compilers for Secure Multi-Party Computation (2019)

Christophe Hauser

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Brett Hemenway

SoK: General Purpose Compilers for Secure Multi-Party Computation (2019)

Ryan Henry

Formalizing Anonymous Blacklisting Systems (2011)

Cormac Herley

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit (2017)

Johannes Hoffmann

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Thorsten Holz

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Andrei Homescu

SoK: Automated Software Diversity (2014)

Adele Howe

The Psychology of Security for the Home Computer User (2012)

Bhushan Jain

SoK: Introspections on Trust and the Semantic Gap (2014)

Xuxian Jiang

Dissecting Android Malware: Characterization and Evolution (2012)

Dan Jurafsky

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Vineeth Kashyap

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach (2011)

Christian Kreibich

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

Joshua A. Kroll

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Christopher Kruegel

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Ralf Kuesters

SoK: Verifiability Notions for E-Voting Protocols (2016)

Deepak Kumar

SoK: “Plug & Pray” Today - Understanding USB Insecurity in Versions 1 through C (2018)

Denis Foo Kune

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Per Larsen

SoK: Automated Software Diversity (2014)

SoK: Sanitizing for Security (2019)

Silvio Lattanzi

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Julian Lettner

SoK: Sanitizing for Security (2019)

Chaz Lever

SoK: Security Evaluation of Home-Based IoT Deployments (2019)

Jens Müller

SoK: Exploiting Network Printers (2017)

Roel Maes

A Formal Foundation for the Security Features of Physical Functions (2011)

Jonathan R. Mayer

Third-Party Web Tracking Policy and Technology (2012)

Jonathan M. McCune

Bootstrapping Trust in Commodity Computers (2010)

Patrick McDaniel

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Andrew Miller

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

John Mitchell

State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010)

John C. Mitchell

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010)

Third-Party Web Tracking Policy and Technology (2012)

John Darby Mitchell

SoK: Cryptographically Protected Database Search (2017)

Vladislav Mladenov

SoK: Exploiting Network Printers (2017)

John V. Monaco

SoK: Keylogging Side Channels (2018)

Fabian Monrose

SoK: Security Evaluation of Home-Based IoT Deployments (2019)

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security (2019)

Johannes Mueller

SoK: Verifiability Notions for E-Voting Protocols (2016)

Yeoul Na

SoK: Sanitizing for Security (2019)

Arvind Narayanan

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015)

Daniel Noble

SoK: General Purpose Compilers for Secure Multi-Party Computation (2019)

Paul C. van Oorschot

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements (2013)

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit (2017)

Alessandro Panconesi

SoK: The Evolution of Sybil Defense via Social Networks (2013)

Bryan Parno

Bootstrapping Trust in Commodity Computers (2010)

Vern Paxson

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection (2010)

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Mathias Payer

SoK: Eternal War in Memory (2013)

Olivier Pereira

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

Henning Perl

SoK: Secure Messaging (2015)

Adrian Perrig

Bootstrapping Trust in Commodity Computers (2010)

Daniel Plohmann

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Norbert Pohlmann

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

Mario Polino

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Michalis Polychronakis

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security (2019)

Donald E. Porter

SoK: Introspections on Trust and the Semantic Gap (2014)

Prabhu Rajasekaran

SoK: Sanitizing for Security (2019)

Indrajit Ray

The Psychology of Security for the Home Computer User (2012)

Joel Reardon

SoK: Secure Data Deletion (2013)

Thomas Ristenpart

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Mark Roberts

The Psychology of Security for the Home Computer User (2012)

Christian Rossow

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Aviel D. Rubin

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Michael Rushanan

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Ahmad-Reza Sadeghi

A Formal Foundation for the Security Features of Physical Functions (2011)

Christopher Salls

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Nolen Scaife

SoK: “Plug & Pray” Today - Understanding USB Insecurity in Versions 1 through C (2018)

Edward Schwartz

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) (2010)

Jörg Schwenk

SoK: Exploiting Network Printers (2017)

Richard Shay

SoK: Cryptographically Protected Database Search (2017)

Emily Shen

SoK: Cryptographically Protected Database Search (2017)

Yan Shoshitaishvili

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Thomas Shrimpton

Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail (2012)

Radu Sion

SoK: Introspections on Trust and the Semantic Gap (2014)

Matthew Smith

SoK: Secure Messaging (2015)

SoK: Lessons Learned From Android Security Research For Appified Software Platforms (2016)

Robin Sommer

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection (2010)

Juraj Somorovsky

SoK: Exploiting Network Printers (2017)

Dawn Song

SoK: Eternal War in Memory (2013)

Dokyung Song

SoK: Sanitizing for Security (2019)

Frank Stajano

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes (2012)

Francois-Xavier Standaert

A Formal Foundation for the Security Features of Physical Functions (2011)

Maarten van Steen

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012)

Nick Stephens

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Brett Stone-Gross

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Colleen Swanson

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014)

Laszlo Szekeres

SoK: Eternal War in Memory (2013)

Jing Tian

SoK: “Plug & Pray” Today - Understanding USB Insecurity in Versions 1 through C (2018)

Carmela Troncoso

OB-PWS: Obfuscation-Based Private Web Search (2012)

Tomasz Truderung

SoK: Verifiability Notions for E-Voting Protocols (2016)

Michael C. Tschantz

SoK: Towards Grounding Censorship Circumvention in Empiricism (2016)

Huahong Tu

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Sebastian Uellenbeck

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Xabier Ugarte-Pedrero

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers (2015)

Nik Unger

SoK: Secure Messaging (2015)

Malgorzata Urbanska

The Psychology of Security for the Home Computer User (2012)

Mayank Varia

SoK: Cryptographically Protected Database Search (2017)

Giovanni Vigna

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Stijn Volckaert

SoK: Sanitizing for Security (2019)

Christian Wachsmann

A Formal Foundation for the Security Features of Physical Functions (2011)

Ruoyu Wang

SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis (2016)

Bogdan Warinschi

SoK: A comprehensive analysis of game-based ballot privacy definitions (2015)

Tao Wei

SoK: Eternal War in Memory (2013)

Tillmann Werner

SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013)

Jan Werner

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security (2019)

Ben Wiedermann

Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach (2011)

Christopher Wolf

Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices (2011)

Arkady Yerukhimovich

SoK: Cryptographically Protected Database Search (2017)

Steve Zdancewic

SoK: General Purpose Compilers for Secure Multi-Party Computation (2019)

Dongli Zhang

SoK: Introspections on Trust and the Semantic Gap (2014)

Ziming Zhao

SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam (2016)

Yajin Zhou

Dissecting Android Malware: Characterization and Evolution (2012)