| 2025 |
| SoK: A Security Architect's View of Printed Circuit Board Attacks | Jacob Harrison, Nathan Jessurun, Mark Tehranipoor |
| SoK: An Introspective Analysis of RPKI Security | Donika Mirdita, Haya Schulmann, Michael Waidner |
| SoK: Automated TTP Extraction from CTI Reports - Are We There Yet? | Marvin Büchel, Carl von Ossietzky, Tommaso Paladini, Stefano Longari, Michele Carminati, Stefano Zanero, Hodaya Binyamini, Gal Engelberg, Dan Klein, Giancarlo Guizzardi, Marco Caselli, Andrea Continella, Maarten van Steen, Andreas Peter, Carl von Ossietzky, Thijs van Ede |
| SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments | Yiwei Hu, Zhen Li, Kedie Shu, Shenghua Guan, Deqing Zou, Shouhuai Xu, Bin Yuan, Hai Jin |
| SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation | Yunsung Chung, Yunbei Zhang, Nassir Marrouche, Jihun Hamm |
| SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework | Ali Teymourian, Andrew M. Webb, Taha Gharaibeh, Arushi Ghildiyal, Ibrahim Baggili |
| SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark | Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang |
| SoK: Efficiency & Robustness of Dynamic Deep Learning Systems | Ravishka Rathnasuriya, Tingxi Li, Zexin Xu, Zihe Song, Mirazul Haque, Simin Chen, Wei Yang |
| SoK: Gradient Inversion Attacks in Federated Learning | Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento |
| SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic Proposals | Md Mojibur Rahman Redoy Akanda, Amanda Lacy, Nitesh Saxena |
| SoK: Machine Learning for Misinformation Detection | Madelyne Xiao, Jonathan Mayer |
| SoK: On Gradient Leakage in Federated Learning | Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Gong, Kui Ren, Chun Chen |
| SoK: So, You Think You Know All About Secure Randomized Caches? | Anubhav Bhatla, Hari Rohit Bhavsar, Sayandeep Saha, Biswabandan Panda |
| SoK: Towards Effective Automated Vulnerability Repair | Ying Li, Faysal Hossain Shezan, Bomin Wei, Gang Wang, Yuan Tian |
| SoK: Towards a Unified Approach to Applied Replicability for Computer Security | Daniel Olszewski, Tyler Tucker, Kevin Butler, Patrick Traynor |
| SoK: Understanding zk-SNARKs: The Gap Between Research and Practice | Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu |
| 2024 |
| Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks | David Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi |
| SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors | Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner |
| SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice | Tushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun |
| SoK: Neural Network Extraction Through Physical Side Channels | Péter Horváth, Dirk Lauret, Zhuoran Liu, Lejla Batina |
| SoK: Security of Programmable Logic Controllers | Efrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas |
| SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements | Aleksei Stafeev, Giancarlo Pellegrino |
| SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets | Seth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor |
| SoK: What Don't We Know? Understanding Security Vulnerabilities in SNARKs | Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits |