| 2026 |
| SoK: A Defense-Oriented Evaluation of Software Supply Chain Security | Eman Abu Ishgair, Juanita Gomez, Marcela S. Melara, Alvaro Cardenas, Santiago Torres-Arias |
| SoK: A Systematic Review of Integration and Reproducibility of Fuzzing Research into AFL++ | Nico Schiller, Nils Bars, Moritz Schloegel, Thorsten Holz |
| SoK: A Taxonomy for Cybersecurity Incident Response Influence Factors | Thomas Biege, Marius Brockhoff, Jonas Kaspereit, Fabian Ising, Lea Gröber, Sebastian Schinzel, Lea Gröber |
| SoK: Cybersecurity Assessment of Humanoid Ecosystem | Priyanka Surve, Asaf Shabtai, Yuval Elovici |
| SoK: Honeypots & LLMs, More Than the Sum of Their Parts? | Robert A. Bridges, Thomas R. Mitchell, Mauricio Muñoz, Ted Henriksson |
| SoK: The Cyber Attack Surface of Unmanned Vehicles (UxVs) | Alessandro Cantelli-Forti, Hosam Alamleh |
| SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices | Nikolai Puch, Maximilian Pursche, Sebastian Peters, Michael P. Heinl |
| SoK: The Next Frontier in AV Security: Systematizing Perception Attacks and the Emerging Threat of Multi-Sensor Fusion | Shahriar Rahman Khan, Tariqul Islam, Raiful Hasan |
| 2025 |
| SoK: Hardening Techniques in the Mobile Ecosystem - Are We There Yet? | Magdalena Steinböck, Jens Troost, Wilco van Beijnum, Jan Seredynski, Herbert Bos, Martina Lindorfer, Andrea Continella |
| SoK: No Goto, No Cry? The Fairy Tale of Flawless Control-Flow Structuring | Eva-Maria C. Behner, Steffen Enders, Elmar Padilla |
| SoK: Security of EMV Contactless Payment Systems | Mahshid Mehr Nezhad, Feng Hao, Gregory Epiphaniou, Carsten Maple, Timur Yunusov |
| SoK: Systematization and Benchmarking of Deepfake Detectors in a Unified Framework | Minh Binh Le, Jiwon Kim, Simon S. Woo, Kristen Moore, Alsharif Abuadbba, Shahroz Tariq |
| 2024 |
| SoK: Public Randomness | Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic |
| SoK: SSO-Monitor - The Current State and Future Research Directions in Single Sign-On Security Measurements | Louis Jannett, Maximilian Westers, Tobias Wich, Christian Mainka, Andreas Mayer, Vladislav Mladenov |
| 2023 |
| SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots | Marcin Nawrocki, John Kristoff, Chris Kanich, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch |
| SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations | Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström |
| SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice | Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh |
| SoK: Data Sovereignty | Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song |
| SoK: Explainable Machine Learning for Computer Security Applications | Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer |
| SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection | Giovanni Apruzzese, Pavel Laskov, Johannes Schneider |
| SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View | Yuan Xu, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu, Tianwei Zhang |
| SoK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities | Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed |
| 2022 |
| SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda |
| SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli |
| SoK: Oblivious Pseudorandom Functions | Sílvia Casacuberta, Julia Hesse, Anja Lehmann |
| SoK: Privacy-Preserving Computing in the Blockchain Era | Ghada Almashaqbeh, Ravital Solomon |
| SoK: The Impact of Unlabelled Data in Cyberthreat Detection | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova |
| SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci |
| 2021 |
| SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations | Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore |
| SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses | Ruimin Sun, Alejandro Mera, Long Lu, David Choffnes |
| SoK: Context Sensing for Access Control in the Adversarial Home IoT | Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah Hester, Blase Ur |
| SoK: Cryptojacking Malware | Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk |
| SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers | Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix |
| SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities | Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi |
| 2020 |
| SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust | Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig |
| 2019 |
| SoK: Benchmarking Flaws in Systems Security | Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida |
| 2018 |
| SoK: Security and Privacy in Machine Learning | Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael P. Wellman |
| 2017 |
| SoK: Fraud in Telephony Networks | Merve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad |
| SoK: Single Sign-On Security — An Evaluation of OpenID Connect | Christian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich |