SoK Papers in Euro Security and Privacy
SoK Authors · Frequently Asked Questions ·
Other Conferences with SoK
Other Venues: All · Oakland · PETS · SaTML
· USENIX
2024 | |
SoK: Public Randomness | Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic |
SoK: SSO-Monitor - The Current State and Future Research Directions in Single Sign-On Security Measurements | Louis Jannett, Maximilian Westers, Tobias Wich, Christian Mainka, Andreas Mayer, Vladislav Mladenov |
2023 | |
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots | Marcin Nawrocki, John Kristoff, Chris Kanich, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch |
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations | Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström |
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice | Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh |
SoK: Data Sovereignty | Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song |
SoK: Explainable Machine Learning for Computer Security Applications | Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer |
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection | Giovanni Apruzzese, Pavel Laskov, Johannes Schneider |
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View | Yuan Xu, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu, Tianwei Zhang |
SoK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities | Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed |
2022 | |
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda |
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli |
SoK: Oblivious Pseudorandom Functions | Sílvia Casacuberta, Julia Hesse, Anja Lehmann |
SoK: Privacy-Preserving Computing in the Blockchain Era | Ghada Almashaqbeh, Ravital Solomon |
SoK: The Impact of Unlabelled Data in Cyberthreat Detection | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova |
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci |
2021 | |
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations | Mathew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, Tyler Moore |
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses | Ruimin Sun, Alejandro Mera, Long Lu, David Choffnes |
SoK: Context Sensing for Access Control in the Adversarial Home IoT | Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah Hester, Blase Ur |
SoK: Cryptojacking Malware | Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk |
SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers | Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix |
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities | Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi |
2020 | |
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust | Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig |
2019 | |
SoK: Benchmarking Flaws in Systems Security | Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida |
2018 | |
SoK: Security and Privacy in Machine Learning | Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael P. Wellman |
2017 | |
SoK: Fraud in Telephony Networks | Merve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad |
SoK: Single Sign-On Security — An Evaluation of OpenID Connect | Christian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich |