SoK Papers in IEEE Symposium on Security and Privacy

SoK Authors · Frequently Asked Questions · Other Conferences with SoK

Other Venues: All · Euro S&P · PETS · SaTML · · USENIX

2024
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense MechanismsMd Sadun Haq, Thien Duc Nguyan, Franziska Volmer, Ali Saman Tosun, Ahmad Reza Sadeghi, Turgay Korkmaz
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest ModelJelle Vos, Mauro Conti, Zekeriya Erkin
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime FieldsJean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson
SoK: Explainable Machine Learning in Adversarial EnvironmentsMaximilian Noppel, Christian Wressnegger
SoK: Privacy-Preserving Data SynthesisYuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Garrido, Chang Ge, Bolin Ding, David Forsyth, Bo Li, Dawn Song
SoK: Prudent Evaluation Practices for FuzzingMoritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale-Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz
SoK: SGX.Fail: How Stuff Gets eXposedStephan van Schaik, Alex Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman
SoK: Safer Digital-Safety Research Involving At-Risk UsersRosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart
SoK: Security and Privacy of Blockchain InteroperabilityAndre Augusto, Rafael Belchior, Miguel Nuno Dias Alves Pupo Correia, Andre Vasconcelos, Luyao Zhang, Thomas Hardjono
SoK: Technical Implementation and Human Impact of Internet Privacy RegulationsEleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan Hutson, Ada Lerner
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald BluetoothJianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, Antonio Bianchi
SoK: Unintended Interactions among Machine Learning Defenses and RisksVasisht Duddu, Sebastian Szyller, N. Asokan
2023
SoK: A Critical Evaluation of Efficient Website Fingerprinting DefensesNate Mathews, James K Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright
SoK: Anti-Facial Recognition TechnologyEmily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
SoK: Certified Robustness for Deep Neural NetworksLinyi Li, Tao Xie, Bo Li
SoK: Cryptographic Neural-Network ComputationLucien K. L Ng, Sherman S. M. Chow
SoK: Decentralized Finance (DeFi) AttacksLiyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
SoK: Distributed Randomness BeaconsKevin Choi, Aathira Manoj, Joseph Bonneau
SoK: History is a Vast Early Warning System: Auditing the Provenance of System IntrusionsMuhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine LearningAhmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Beguelin
SoK: Taxonomy of Attacks on Open-Source Software Supply ChainsPiergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais
2022
SoK: A Framework for Unifying At-Risk User Research Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas
SoK: Authentication in Augmented and Virtual Reality Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, Rahul Chatterjee
SoK: Demystifying Binary Lifters Through the Lens of Downstream ApplicationsZhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao
SoK: How Robust is Image Classification Deep Neural Network Watermarking?Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum
SoK: Practical Foundations for Software Spectre Defenses Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan
SoK: Social Cybersecurity Yuxi Wu, W. Keith Edwards, Sauvik Das
SoK: The Dual Nature of Technology in Sexual Assault Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, Konstantin
2021
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to AskChengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu
SoK: An Overview of FHE Compilers and ToolsAlexander Viand, Patrick Jattke, Anwar Hithnawi
SoK: Computer-Aided CryptographyManuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
SoK: Hate, Harassment, and the Changing Landscape of Online AbuseKurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini
SoK: Quantifying Cyber RiskDaniel W. Woods, Rainer Böhme
SoK: Security and Privacy in the Age of Commercial DronesBen Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification SystemsHadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor
2020
SoK: A Minimalist Approach to Formalizing Analog Sensor SecurityChen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu
SoK: Cyber Insurance - Technical Challenges and a System Security RoadmapSavino Dambra, Leyla Bilge, Davide Balzarotti
SoK: Differential Privacy as a Causal PropertyMichael C. Tschantz, Shayak Sen, Anupam Datta
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE SystemsDavid Cerdeira, Nuno Santos, Pedro Fonseca, Sandro Pinto
2019
SoK: General Purpose Compilers for Secure Multi-Party ComputationMarcella Hastings, Brett Hemenway, Daniel Noble, Steve Zdancewic
SoK: Sanitizing for SecurityDokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz
SoK: Security Evaluation of Home-Based IoT DeploymentsOmar Alrawi, Chaz Lever, Manos Antonakakis, Fabian Monrose
SoK: Shining Light on Shadow Stacks Nathan Burow, Xinping Zhang, Mathias Payer
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for SecuritySanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose
2018
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 through CJing Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam Bates, Kevin Butler
SoK: Keylogging Side ChannelsJohn V. Monaco
2017
SoK: Cryptographically Protected Database SearchBenjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham
SoK: Exploiting Network PrintersJens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
SoK: Science, Security, and the Elusive Goal of Security as a Scientific PursuitCormac Herley, Paul C. van Oorschot
2016
SoK: (State of) The Art of War: Offensive Techniques in Binary AnalysisYan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, Giovanni Vigna
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone SpamHuahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
SoK: Lessons Learned From Android Security Research For Appified Software PlatformsYasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, Matthew Smith
SoK: Towards Grounding Censorship Circumvention in EmpiricismMichael C. Tschantz, Sadia Afroz, Anonymous, Vern Paxson
SoK: Verifiability Notions for E-Voting ProtocolsVéronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung
2015
SoK: A comprehensive analysis of game-based ballot privacy definitionsDavid Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time PackersXabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos Grueiro, Pablo Garcia Bringas
SoK: Research Perspectives and Challenges for Bitcoin and CryptocurrenciesJoseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
SoK: Secure MessagingNik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith
2014
SoK: Automated Software DiversityPer Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz
SoK: Introspections on Trust and the Semantic GapBhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion
SoK: Security and Privacy in Implantable Medical Devices and Body Area NetworksMichael Rushanan, Colleen Swanson, Denis Foo Kune, Aviel D. Rubin
2013
SoK: Eternal War in MemoryLaszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song
SoK: P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer BotnetsChristian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model EnhancementsJeremy Clark, Paul C. van Oorschot
SoK: Secure Data DeletionJoel Reardon, David Basin, Srdjan Capkun
SoK: The Evolution of Sybil Defense via Social NetworksLorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi
2012
Dissecting Android Malware: Characterization and EvolutionYajin Zhou, Xuxian Jiang
OB-PWS: Obfuscation-Based Private Web SearchEro Balsa, Carmela Troncoso, Claudia Diaz
Peek-a-Boo, I Still See you: Why Efficient Traffic Analysis Countermeasures FailKevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
Prudent Practices for Designing Malware Experiments: Status Quo and OutlookChristian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen
The Psychology of Security for the Home Computer UserAdele Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta Byrne
The quest to replace passwords: A framework for comparative evaluation of web authentication schemesJoseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano
Third-Party Web Tracking Policy and TechnologyJonathan R. Mayer, John C. Mitchell
2011
A Formal Foundation for the Security Features of Physical FunctionsFrederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Francois-Xavier Standaert, Christian Wachsmann
Formalizing Anonymous Blacklisting SystemsRyan Henry, Ian Goldberg
Mobile Security Catching Up? - Revealing the nuts and bolts of the security of mobile devicesMichael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New ApproachVineeth Kashyap, Ben Wiedermann, Ben Hardekopf
2010
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)Thanassis Avgerinos, Edward Schwartz, David Brumley
Bootstrapping Trust in Commodity ComputersBryan Parno, Jonathan M. McCune, Adrian Perrig
How Good are Humans at Solving CAPTCHAs? A Large Scale EvaluationElie Bursztein, Steven Bethard, John C. Mitchell, Dan Jurafsky, Céline Fabry
Outside the Closed World: On Using Machine Learning For Network Intrusion DetectionRobin Sommer, Vern Paxson
State of the Art: Automated Black-Box Web Application Vulnerability TestingJason Bau, Elie Bursztein, Divij Gupta, John Mitchell