SoK Papers in USENIX Security Symposium

SoK Authors · Frequently Asked Questions · Other Conferences with SoK

Other Venues: All · Oakland · Euro S&P · PETS

2025
SoK: A Security Architect's View of Printed Circuit Board AttacksJacob Harrison, Nathan Jessurun, Mark Tehranipoor
SoK: An Introspective Analysis of RPKI SecurityDonika Mirdita, Haya Schulmann, Michael Waidner
SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?Marvin Büchel, Carl von Ossietzky, Tommaso Paladini, Stefano Longari, Michele Carminati, Stefano Zanero, Hodaya Binyamini, Gal Engelberg, Dan Klein, Giancarlo Guizzardi, Marco Caselli, Andrea Continella, Maarten van Steen, Andreas Peter, Carl von Ossietzky, Thijs van Ede
SoK: Automated Vulnerability Repair: Methods, Tools, and AssessmentsYiwei Hu, Zhen Li, Kedie Shu, Shenghua Guan, Deqing Zou, Shouhuai Xu, Bin Yuan, Hai Jin
SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image GenerationYunsung Chung, Yunbei Zhang, Nassir Marrouche, Jihun Hamm
SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis FrameworkAli Teymourian, Andrew M. Webb, Taha Gharaibeh, Arushi Ghildiyal, Ibrahim Baggili
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and BenchmarkRui Wen, Yiyong Liu, Michael Backes, Yang Zhang
SoK: Efficiency & Robustness of Dynamic Deep Learning SystemsRavishka Rathnasuriya, Tingxi Li, Zexin Xu, Zihe Song, Mirazul Haque, Simin Chen, Wei Yang
SoK: Gradient Inversion Attacks in Federated LearningVincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento
SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic ProposalsMd Mojibur Rahman Redoy Akanda, Amanda Lacy, Nitesh Saxena
SoK: Machine Learning for Misinformation DetectionMadelyne Xiao, Jonathan Mayer
SoK: On Gradient Leakage in Federated LearningJiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Gong, Kui Ren, Chun Chen
SoK: So, You Think You Know All About Secure Randomized Caches?Anubhav Bhatla, Hari Rohit Bhavsar, Sayandeep Saha, Biswabandan Panda
SoK: Towards Effective Automated Vulnerability RepairYing Li, Faysal Hossain Shezan, Bomin Wei, Gang Wang, Yuan Tian
SoK: Towards a Unified Approach to Applied Replicability for Computer SecurityDaniel Olszewski, Tyler Tucker, Kevin Butler, Patrick Traynor
SoK: Understanding zk-SNARKs: The Gap Between Research and PracticeJunkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu
2024
Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space NetworksDavid Koisser, Richard Mitev, Nikita Yadav, Franziska Vollmer, Ahmad-Reza Sadeghi
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security BehaviorsMiranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and PracticeTushar Nayan, Qiming Guo, Mohammed Al Duniawi, Marcus Botacin, Selcuk Uluagac, Ruimin Sun
SoK: Neural Network Extraction Through Physical Side ChannelsPéter Horváth, Dirk Lauret, Zhuoran Liu, Lejla Batina
SoK: Security of Programmable Logic ControllersEfrén López-Morales, Ulysse Planta, Carlos Rubio-Medrano, Ali Abbasi, Alvaro A. Cardenas
SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security MeasurementsAleksei Stafeev, Giancarlo Pellegrino
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media DatasetsSeth Layton, Tyler Tucker, Daniel Olszewski, Kevin Warren, Kevin Butler, Patrick Traynor
SoK: What Don't We Know? Understanding Security Vulnerabilities in SNARKsStefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits