SoK Papers in Euro Security and Privacy

SoK Authors · Frequently Asked Questions · Other Conferences with SoK

Other Venues: All · Oakland · PETS · SaTML

2023
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using HoneypotsMarcin Nawrocki, John Kristoff, Chris Kanich, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural OptimizationsNadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to PracticeMohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh
SoK: Data SovereigntyJens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
SoK: Explainable Machine Learning for Computer Security ApplicationsAzqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion DetectionGiovanni Apruzzese, Pavel Laskov, Johannes Schneider
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic ViewYuan Xu, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu, Tianwei Zhang
SoK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance CommunitiesMuhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed
2022
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path ForwardSteven Sprecher, Christoph Kerschbaumer, Engin Kirda
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world dataSeny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
SoK: Oblivious Pseudorandom FunctionsSílvia Casacuberta, Julia Hesse, Anja Lehmann
SoK: Privacy-Preserving Computing in the Blockchain EraGhada Almashaqbeh, Ravital Solomon
SoK: The Impact of Unlabelled Data in Cyberthreat DetectionGiovanni Apruzzese, Pavel Laskov, Aliya Tastemirova
SoK: Workerounds - Categorizing Service Worker Attacks and MitigationsKarthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci
2021
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting OrganizationsMathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore
SoK: Attacks on Industrial Control Logic and Formal Verification-Based DefensesRuimin Sun, Alejandro Mera, Long Lu, David Choffnes
SoK: Context Sensing for Access Control in the Adversarial Home IoTWeijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah Hester, Blase Ur
SoK: Cryptojacking MalwareEge Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk
SoK: In Search of Lost Time: A Review of JavaScript Timers in BrowsersThomas Rokicki, Clémentine Maurice, Pierre Laperdrix
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and OpportunitiesShaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi
2020
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of TrustLaurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig
2019
SoK: Benchmarking Flaws in Systems SecurityErik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida
2018
SoK: Security and Privacy in Machine LearningNicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael P. Wellman
2017
SoK: Fraud in Telephony NetworksMerve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad
SoK: Single Sign-On Security — An Evaluation of OpenID ConnectChristian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich