SoK Papers in IEEE Symposium on Security and Privacy
SoK Authors · Frequently Asked Questions ·
Other Conferences with SoK
2024 | |
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms | Md Sadun Haq, Thien Duc Nguyan, Franziska Volmer, Ali Saman Tosun, Ahmad Reza Sadeghi, Turgay Korkmaz |
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model | Jelle Vos, Mauro Conti, Zekeriya Erkin |
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields | Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson |
SoK: Explainable Machine Learning in Adversarial Environments | Maximilian Noppel, Christian Wressnegger |
SoK: Privacy-Preserving Data Synthesis | Yuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Garrido, Chang Ge, Bolin Ding, David Forsyth, Bo Li, Dawn Song |
SoK: Prudent Evaluation Practices for Fuzzing | Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale-Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz |
SoK: SGX.Fail: How Stuff Gets eXposed | Stephan van Schaik, Alex Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman |
SoK: Safer Digital-Safety Research Involving At-Risk Users | Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart |
SoK: Security and Privacy of Blockchain Interoperability | Andre Augusto, Rafael Belchior, Miguel Nuno Dias Alves Pupo Correia, Andre Vasconcelos, Luyao Zhang, Thomas Hardjono |
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations | Eleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan Hutson, Ada Lerner |
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth | Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, Antonio Bianchi |
SoK: Unintended Interactions among Machine Learning Defenses and Risks | Vasisht Duddu, Sebastian Szyller, N. Asokan |
2023 | |
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses | Nate Mathews, James K Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright |
SoK: Anti-Facial Recognition Technology | Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao |
SoK: Certified Robustness for Deep Neural Networks | Linyi Li, Tao Xie, Bo Li |
SoK: Cryptographic Neural-Network Computation | Lucien K. L Ng, Sherman S. M. Chow |
SoK: Decentralized Finance (DeFi) Attacks | Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais |
SoK: Distributed Randomness Beacons | Kevin Choi, Aathira Manoj, Joseph Bonneau |
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions | Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan |
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning | Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Beguelin |
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains | Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais |
2022 | |
SoK: A Framework for Unifying At-Risk User Research | Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas |
SoK: Authentication in Augmented and Virtual Reality | Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, Rahul Chatterjee |
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications | Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao |
SoK: How Robust is Image Classification Deep Neural Network Watermarking? | Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum |
SoK: Practical Foundations for Software Spectre Defenses | Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan |
SoK: Social Cybersecurity | Yuxi Wu, W. Keith Edwards, Sauvik Das |
SoK: The Dual Nature of Technology in Sexual Assault | Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, Konstantin |
2021 | |
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to Ask | Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu |
SoK: An Overview of FHE Compilers and Tools | Alexander Viand, Patrick Jattke, Anwar Hithnawi |
SoK: Computer-Aided Cryptography | Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno |
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse | Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini |
SoK: Quantifying Cyber Risk | Daniel W. Woods, Rainer Böhme |
SoK: Security and Privacy in the Age of Commercial Drones | Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici |
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems | Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor |
2020 | |
SoK: A Minimalist Approach to Formalizing Analog Sensor Security | Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu |
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap | Savino Dambra, Leyla Bilge, Davide Balzarotti |
SoK: Differential Privacy as a Causal Property | Michael C. Tschantz, Shayak Sen, Anupam Datta |
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems | David Cerdeira, Nuno Santos, Pedro Fonseca, Sandro Pinto |
2019 | |
SoK: General Purpose Compilers for Secure Multi-Party Computation | Marcella Hastings, Brett Hemenway, Daniel Noble, Steve Zdancewic |
SoK: Sanitizing for Security | Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz |
SoK: Security Evaluation of Home-Based IoT Deployments | Omar Alrawi, Chaz Lever, Manos Antonakakis, Fabian Monrose |
SoK: Shining Light on Shadow Stacks | Nathan Burow, Xinping Zhang, Mathias Payer |
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security | Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose |
2018 | |
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through C | Jing Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam Bates, Kevin Butler |
SoK: Keylogging Side Channels | John V. Monaco |
2017 | |
SoK: Cryptographically Protected Database Search | Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham |
SoK: Exploiting Network Printers | Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk |
SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit | Cormac Herley, Paul C. van Oorschot |
2016 | |
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis | Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, Giovanni Vigna |
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam | Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn |
SoK: Lessons Learned From Android Security Research For Appified Software Platforms | Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, Matthew Smith |
SoK: Towards Grounding Censorship Circumvention in Empiricism | Michael C. Tschantz, Sadia Afroz, Anonymous, Vern Paxson |
SoK: Verifiability Notions for E-Voting Protocols | Véronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung |
2015 | |
SoK: A comprehensive analysis of game-based ballot privacy definitions | David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi |
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers | Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos Grueiro, Pablo Garcia Bringas |
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies | Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten |
SoK: Secure Messaging | Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith |
2014 | |
SoK: Automated Software Diversity | Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz |
SoK: Introspections on Trust and the Semantic Gap | Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion |
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks | Michael Rushanan, Colleen Swanson, Denis Foo Kune, Aviel D. Rubin |
2013 | |
SoK: Eternal War in Memory | Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song |
SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets | Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos |
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements | Jeremy Clark, Paul C. van Oorschot |
SoK: Secure Data Deletion | Joel Reardon, David Basin, Srdjan Capkun |
SoK: The Evolution of Sybil Defense via Social Networks | Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi |
2012 | |
Dissecting Android Malware: Characterization and Evolution | Yajin Zhou, Xuxian Jiang |
OB-PWS: Obfuscation-Based Private Web Search | Ero Balsa, Carmela Troncoso, Claudia Diaz |
Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures Fail | Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton |
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen |
The Psychology of Security for the Home Computer User | Adele Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta Byrne |
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes | Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano |
Third-Party Web Tracking Policy and Technology | Jonathan R. Mayer, John C. Mitchell |
2011 | |
A Formal Foundation for the Security Features of Physical Functions | Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Francois-Xavier Standaert, Christian Wachsmann |
Formalizing Anonymous Blacklisting Systems | Ryan Henry, Ian Goldberg |
Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devices | Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf |
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach | Vineeth Kashyap, Ben Wiedermann, Ben Hardekopf |
2010 | |
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) | Thanassis Avgerinos, Edward Schwartz, David Brumley |
Bootstrapping Trust in Commodity Computers | Bryan Parno, Jonathan M. McCune, Adrian Perrig |
How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation | Elie Bursztein, Steven Bethard, John C. Mitchell, Dan Jurafsky, Céline Fabry |
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection | Robin Sommer, Vern Paxson |
State of the Art: Automated Black-Box Web Application Vulnerability Testing | Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell |