Online Bibliography on SoK (Systematization of Knowledge) Papers

Introduction

BibTeX File: http://www.hooklee.com/Research/SoK/SoK.bib

This BibTeX file was created by Shujun Li @ University of Kent, UK, based on two main sources: DBLP using the search keyword "SoK$" and Systematizing SoK (David Evans) for IEEE S&P SoK papers whose title does not include the word "SoK". The original DBLP BibTeX items were manually screened and edited to solve some formatting issues.

This HTML page was created using bib2xhtml on 6 September 2021.

The Bibliography

[Cabrero-Holgueras and Pastrana, 2021]
José Cabrero-Holgueras and Sergio Pastrana. SoK: Privacy-preserving computation techniques for deep learning. Proceedings on Privacy Enhancing Technologies, 2021(4):139–162, 2021. (doi:10.2478/popets-2021-0064)

[Chatel et al., 2021]
Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, and Jean-Pierre Hubaux. SoK: Privacy-preserving collaborative tree-based model learning. Proceedings on Privacy Enhancing Technologies, 2021(3):182–203, 2021. (doi:10.2478/popets-2021-0043)

[Chatzigiannis et al., 2021]
Panagiotis Chatzigiannis, Foteini Baldimtsi, and Konstantinos Chalkias. SoK: Auditability and accountability in distributed payment systems. In Kazue Sako and Nils Ole Tippenhauer, editors, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II, volume 12727 of Lecture Notes in Computer Science, pages 311–337. Springer, 2021. (doi:10.1007/978-3-030-78375-4_13)

[Fasano et al., 2021]
Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, and William Robertson. SoK: Enabling security analyses of embedded systems via rehosting. In Jiannong Cao, Man Ho Au, Zhiqiang Lin, and Moti Yung, editors, ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021, pages 687–701. ACM, 2021. (doi:10.1145/3433210.3453093)

[Gurtler and Goldberg, 2021]
Stan Gurtler and Ian Goldberg. SoK: Privacy-preserving reputation systems. Proceedings on Privacy Enhancing Technologies, 2021(1):107–127, 2021. (doi:10.2478/popets-2021-0007)

[Hegde et al., 2021]
Aditya Hegde, Helen Möllering, Thomas Schneider, and Hossein Yalame. SoK: Efficient privacy-preserving clustering. Proceedings on Privacy Enhancing Technologies, 2021(4):225–248, 2021. (doi:10.2478/popets-2021-0068)

[Howe et al., 2021]
James Howe, Thomas Prest, and Daniel Apon. SoK: How (not) to design and implement post-quantum cryptography. In Kenneth G. Paterson, editor, Topics in Cryptology - CT-RSA 2021 - Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings, volume 12704 of Lecture Notes in Computer Science, pages 444–477. Springer, 2021. (doi:10.1007/978-3-030-75539-3_19)

[Kochberger et al., 2021]
Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, and Edgar R. Weippl. SoK: Automatic deobfuscation of virtualization-protected applications. In Delphine Reinhardt and Tilo Müller, editors, ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pages 6:1–6:15. ACM, 2021. (doi:10.1145/3465481.3465772)

[Kolachala et al., 2021]
Kartick Kolachala, Ecem Simsek, Mohammed Ababneh, and Roopa Vishwanathan. SoK: Money laundering in cryptocurrencies. In Delphine Reinhardt and Tilo Müller, editors, ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pages 5:1–5:10. ACM, 2021. (doi:10.1145/3465481.3465774)

[Martınez-Rodrıguez et al., 2021]
Macarena C. Martınez-Rodrıguez, Ignacio M. Delgado-Lozano, and Billy Bob Brumley. SoK: Remote power analysis. In Delphine Reinhardt and Tilo Müller, editors, ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pages 7:1–7:12. ACM, 2021. (doi:10.1145/3465481.3465773)

[Nelson and Reuben, 2021]
Boel Nelson and Jenni Reuben. SoK: Chasing accuracy and privacy, and catching both in differentially private histogram publication. Transactions on Data Privacy: Foundations and Technologies, 13(3):201–245, 2021.

[Poettering et al., 2021]
Bertram Poettering, Paul Rösler, Jörg Schwenk, and Douglas Stebila. SoK: Game-based security models for group key exchange. In Kenneth G. Paterson, editor, Topics in Cryptology - CT-RSA 2021 - Cryptographers' Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings, volume 12704 of Lecture Notes in Computer Science, pages 148–176. Springer, 2021. (doi:10.1007/978-3-030-75539-3_7)

[Schnitzler et al., 2021]
Theodor Schnitzler, Muhammad Shujaat Mirza, Markus Dürmuth, and Christina Pöpper. SoK: Managing longitudinal privacy of publicly shared personal online data. Proceedings on Privacy Enhancing Technologies, 2021(1):229–249, 2021. (doi:10.2478/popets-2021-0013)

[Walker and Saxena, 2021]
Payton Walker and Nitesh Saxena. SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. In Christina Pöpper, Mathy Vanhoef, Lejla Batina, and René Mayrhofer, editors, WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021, pages 273–287. ACM, 2021. (doi:10.1145/3448300.3467825)

[Cerdeira et al., 2020]
David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. SoK: Understanding the prevailing security vulnerabilities in TrustZone-assisted TEE systems. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020, pages 1416–1432. IEEE, 2020. (doi:10.1109/SP40000.2020.00061)

[Chuat et al., 2020]
Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, and Adrian Perrig. SoK: Delegation and revocation, the missing links in the web's chain of trust. In IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020, pages 624–638. IEEE, 2020. (doi:10.1109/EuroSP48549.2020.00046)

[Dambra et al., 2020]
Savino Dambra, Leyla Bilge, and Davide Balzarotti. SoK: Cyber insurance - technical challenges and a system security roadmap. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020, pages 1367–1383. IEEE, 2020. (doi:10.1109/SP40000.2020.00019)

[Das et al., 2020]
Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh M. Verma, and Arthur Dunbar. SoK: A comprehensive reexamination of phishing research from the security perspective. IEEE Commun. Surv. Tutorials, 22(1):671–708, 2020. (doi:10.1109/COMST.2019.2957750)

[Desfontaines and Pejó, 2020]
Damien Desfontaines and Balázs Pejó. SoK: Differential privacies. Proceedings on Privacy Enhancing Technologies, 2020(2):288–313, 2020. (doi:10.2478/popets-2020-0028)

[Diesch and Krcmar, 2020]
Rainer Diesch and Helmut Krcmar. SoK: Linking information security metrics to management success factors. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 98:1–98:10. ACM, 2020. (doi:10.1145/3407023.3407059)

[Dionysiou and Athanasopoulos, 2020]
Antreas Dionysiou and Elias Athanasopoulos. SoK: Machine vs. machine - A systematic classification of automated machine learning-based CAPTCHA solvers. Comput. Secur., 97:101947, 2020. (doi:10.1016/j.cose.2020.101947)

[Dotan et al., 2020]
Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, and Aviv Zohar. SOK: Cryptocurrency networking context, state-of-the-art, challenges. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 5:1–5:13. ACM, 2020. (doi:10.1145/3407023.3407043)

[Du et al., 2020]
Xiaoyu Du, Chris Hargreaves, John W. Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, and Mark Scanlon. SoK: Exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 46:1–46:10. ACM, 2020. (doi:10.1145/3407023.3407068)

[Garay and Kiayias, 2020]
Juan A. Garay and Aggelos Kiayias. SoK: A consensus taxonomy in the blockchain era. In Stanislaw Jarecki, editor, Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings, volume 12006 of Lecture Notes in Computer Science, pages 284–318. Springer, 2020. (doi:10.1007/978-3-030-40186-3_13)

[Gudgeon et al., 2020]
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. SoK: Layer-two blockchain protocols. In Joseph Bonneau and Nadia Heninger, editors, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers, volume 12059 of Lecture Notes in Computer Science, pages 201–226. Springer, 2020. (doi:10.1007/978-3-030-51280-4_12)

[Haines and Müller, 2020]
Thomas Haines and Johannes Müller. SoK: Techniques for verifiable mix nets. In 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020, pages 49–64. IEEE, 2020. (doi:10.1109/CSF49147.2020.00012)

[Halpin, 2020]
Harry Halpin. SoK: Why johnny can't fix PGP standardization. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 34:1–34:6. ACM, 2020. (doi:10.1145/3407023.3407083)

[Husák et al., 2020]
Martin Husák, Tomás Jirsık, and Shanchieh Jay Yang. SoK: Contemporary issues and challenges to enable cyber situational awareness for network security. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 2:1–2:10. ACM, 2020. (doi:10.1145/3407023.3407062)

[Kakvi, 2020]
Saqib A. Kakvi. SoK: Comparison of the security of real world RSA hash-and-sign signatures. In Thyla van der Merwe, Chris J. Mitchell, and Maryam Mehrnezhad, editors, Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings, volume 12529 of Lecture Notes in Computer Science, pages 91–113. Springer, 2020. (doi:10.1007/978-3-030-64357-7_5)

[Kuhn et al., 2020]
Christiane Kuhn, Friederike Kitzing, and Thorsten Strufe. Sok on performance bounds in anonymous communication. In Jay Ligatti, Xinming Ou, Wouter Lueks, and Paul Syverson, editors, WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020, pages 21–39. ACM, 2020. (doi:10.1145/3411497.3420218)

[Moin et al., 2020]
Amani Moin, Kevin Sekniqi, and Emin Gün Sirer. SoK: A classification framework for stablecoin designs. In Joseph Bonneau and Nadia Heninger, editors, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers, volume 12059 of Lecture Notes in Computer Science, pages 174–197. Springer, 2020. (doi:10.1007/978-3-030-51280-4_11)

[Morel and Pardo, 2020]
Victor Morel and Raúl Pardo. SoK: Three facets of privacy policies. In Jay Ligatti, Xinming Ou, Wouter Lueks, and Paul Syverson, editors, WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020, pages 41–56. ACM, 2020. (doi:10.1145/3411497.3420216)

[Nelson and Reuben, 2020]
Boel Nelson and Jenni Reuben. SoK: Chasing accuracy and privacy, and catching both in differentially private histogram publication. Trans. Data Priv., 13(3):201–245, 2020.

[Rajendran et al., 2020]
Sree Ranjani Rajendran, Rijoy Mukherjee, and Rajat Subhra Chakraborty. SoK: Physical and logic testing techniques for hardware Trojan detection. In Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser, and Patrick Schaumont, editors, Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020, pages 103–116. ACM, 2020. (doi:10.1145/3411504.3421211)

[Riva et al., 2020]
Giovanni Maria Riva, Alexandr Vasenev, and Nicola Zannone. SoK: Engineering privacy-aware high-tech systems. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 19:1–19:10. ACM, 2020. (doi:10.1145/3407023.3407061)

[Rührmair, 2020]
Ulrich Rührmair. SoK: Towards secret-free security. In Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser, and Patrick Schaumont, editors, Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020, pages 5–19. ACM, 2020. (doi:10.1145/3411504.3421220)

[Saleem and Naveed, 2020]
Hamza Saleem and Muhammad Naveed. SoK: Anatomy of data breaches. Proceedings on Privacy Enhancing Technologies, 2020(4):153–174, 2020. (doi:10.2478/popets-2020-0067)

[Tschantz et al., 2020]
Michael Carl Tschantz, Shayak Sen, and Anupam Datta. SoK: Differential privacy as a causal property. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020, pages 354–371. IEEE, 2020. (doi:10.1109/SP40000.2020.00012)

[Widhalm et al., 2020]
Dominik Widhalm, Karl M. Göschka, and Wolfgang Kastner. SoK: A taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques. In Melanie Volkamer and Christian Wressnegger, editors, ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pages 17:1–17:10. ACM, 2020. (doi:10.1145/3407023.3407027)

[Yan et al., 2020]
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin Fu. SoK: A minimalist approach to formalizing analog sensor security. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020, pages 233–248. IEEE, 2020. (doi:10.1109/SP40000.2020.00026)

[Yao et al., 2020]
Jing Yao, Yifeng Zheng, Yu Guo, and Cong Wang. SoK: A systematic study of attacks in efficient encrypted cloud data search. In Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference, October 6, 2020, pages 14–20. ACM, 2020. (doi:10.1145/3384942.3406869)

[Alrawi et al., 2019]
Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. SoK: Security evaluation of home-based IoT deployments. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 1362–1380. IEEE, 2019. (doi:10.1109/SP.2019.00013)

[Alsalami and Zhang, 2019]
Nasser Alsalami and Bingsheng Zhang. SoK: A systematic study of anonymity in cryptocurrencies. In 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019, Hangzhou, China, November 18-20, 2019, pages 1–9. IEEE, 2019. (doi:10.1109/DSC47296.2019.8937681)

[Angelo et al., 2019]
Monika Di Angelo, Christian Sack, and Gernot Salzer. SoK: Development of secure smart contracts - lessons from a graduate course. In Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, and Massimiliano Sala, editors, Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers, volume 11599 of Lecture Notes in Computer Science, pages 91–105. Springer, 2019. (doi:10.1007/978-3-030-43725-1_8)

[Arias, 2019]
Emilio Jesús Gallego Arias. Towards principled compilation of Ethereum smart contracts (SoK). In 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019, Canary Islands, Spain, June 24-26, 2019, pages 1–5. IEEE, 2019. (doi:10.1109/NTMS.2019.8763856)

[Azraoui et al., 2019]
Monir Azraoui, Muhammad Barham, Beyza Bozdemir, Sébastien Canard, Eleonora Ciceri, Orhan Ermis, Ramy Masalha, Marco Mosconi, Melek Önen, Marie Paindavoine, Boris Rozenberg, Bastien Vialla, and Sauro Vicini. SoK: Cryptography for neural networks. In Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, and Samuel Fricker, editors, Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers, volume 576 of IFIP Advances in Information and Communication Technology, pages 63–81. Springer, 2019. (doi:10.1007/978-3-030-42504-3_5)

[Azriel et al., 2019]
Leonid Azriel, Ran Ginosar, and Avi Mendelson. SoK: An overview of algorithmic methods in IC reverse engineering. In Chip-Hong Chang, Ulrich Rührmair, Daniel E. Holcomb, and Patrick Schaumont, editors, Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15, 2019, pages 65–74. ACM, 2019. (doi:10.1145/3338508.3359575)

[Bano et al., 2019]
Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. SoK: Consensus in the age of blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, AFT 2019, Zurich, Switzerland, October 21-23, 2019, pages 183–198. ACM, 2019. (doi:10.1145/3318041.3355458)

[Burow et al., 2019]
Nathan Burow, Xinping Zhang, and Mathias Payer. SoK: Shining light on shadow stacks. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 985–999. IEEE, 2019. (doi:10.1109/SP.2019.00076)

[Das et al., 2019]
Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, and Fabian Monrose. SoK: The challenges, pitfalls, and perils of using hardware performance counters for security. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 20–38. IEEE, 2019. (doi:10.1109/SP.2019.00021)

[D'Elia et al., 2019]
Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, and Lorenzo Cavallaro. SoK: Using dynamic binary instrumentation for security (and how you may get caught red handed). In Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, and Zhenkai Liang, editors, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019, pages 15–27. ACM, 2019. (doi:10.1145/3321705.3329819)

[Eskandari et al., 2019]
Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. SoK: Transparent dishonesty: Front-running attacks on blockchain. In Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, and Massimiliano Sala, editors, Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers, volume 11599 of Lecture Notes in Computer Science, pages 170–189. Springer, 2019. (doi:10.1007/978-3-030-43725-1_13)

[Hastings et al., 2019]
Marcella Hastings, Brett Hemenway, Daniel Noble, and Steve Zdancewic. SoK: General purpose compilers for secure multi-party computation. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 1220–1237. IEEE, 2019. (doi:10.1109/SP.2019.00028)

[Khairallah et al., 2019]
Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, and Thomas Peyrin. SoK: On DFA vulnerabilities of substitution-permutation networks. In Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, and Zhenkai Liang, editors, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019, pages 403–414. ACM, 2019. (doi:10.1145/3321705.3329810)

[Kim et al., 2019]
Aram Kim, Junhyoung Oh, Jinho Ryu, Jemin Lee, Kookheui Kwon, and Kyungho Lee. SoK: A systematic review of insider threat detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10(4):46–67, 2019. (doi:10.22667/JOWUA.2019.12.31.046)

[Kiss et al., 2019]
Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, and Thomas Schneider. SoK: Modular and efficient private decision tree evaluation. Proceedings on Privacy Enhancing Technologies, 2019(2):187–208, 2019. (doi:10.2478/popets-2019-0026)

[Oosthoek and Doerr, 2019]
Kris Oosthoek and Christian Doerr. SoK: ATT&CK techniques and trends in Windows malware. In Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen, editors, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I, volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 406–425. Springer, 2019. (doi:10.1007/978-3-030-37228-6_20)

[Raikwar et al., 2019]
Mayank Raikwar, Danilo Gligoroski, and Katina Kralevska. Sok of used cryptography in blockchain. IEEE Access, 7:148550–148575, 2019. (doi:10.1109/ACCESS.2019.2946983)

[Song et al., 2019]
Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, and Michael Franz. SoK: Sanitizing for security. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pages 1275–1295. IEEE, 2019. (doi:10.1109/SP.2019.00010)

[van der Kouwe et al., 2019]
Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida. SoK: Benchmarking flaws in systems security. In IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, pages 310–325. IEEE, 2019. (doi:10.1109/EuroSP.2019.00031)

[Wang et al., 2019]
Gang Wang, Zhijie Jerry Shi, Mark Nixon, and Song Han. SoK: Sharding on blockchain. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, AFT 2019, Zurich, Switzerland, October 21-23, 2019, pages 41–61. ACM, 2019. (doi:10.1145/3318041.3355457)

[Atzei et al., 2018]
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, and Roberto Zunino. SoK: Unraveling Bitcoin smart contracts. In Lujo Bauer and Ralf Küsters, editors, Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, volume 10804 of Lecture Notes in Computer Science, pages 217–242. Springer, 2018. (doi:10.1007/978-3-319-89722-6_9)

[Faz-Hernández et al., 2018]
Armando Faz-Hernández, Julio César López-Hernández, and Ana Karina D. S. de Oliveira. SoK: A performance evaluation of cryptographic instruction sets on modern architectures. In Keita Emura, Jae Hong Seo, and Yohei Watanabe, editors, Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018, pages 9–18. ACM, 2018. (doi:10.1145/3197507.3197511)

[Gawlik and Holz, 2018]
Robert Gawlik and Thorsten Holz. SoK: Make JIT-Spray great again. In Christian Rossow and Yves Younan, editors, 12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018. USENIX Association, 2018.

[Monaco, 2018]
John V. Monaco. SoK: Keylogging side channels. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pages 211–228. IEEE Computer Society, 2018. (doi:10.1109/SP.2018.00026)

[Papernot et al., 2018]
Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha, and Michael P. Wellman. SoK: Security and privacy in machine learning. In 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018, pages 399–414. IEEE, 2018. (doi:10.1109/EuroSP.2018.00035)

[Tian et al., 2018]
Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam Bates, and Kevin R. B. Butler. SoK: ``plug & pray'' today - understanding USB insecurity in versions 1 through C. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pages 1032–1047. IEEE Computer Society, 2018. (doi:10.1109/SP.2018.00037)

[Urbanik and Jao, 2018]
David Urbanik and David Jao. SoK: The problem landscape of SIDH. In Keita Emura, Jae Hong Seo, and Yohei Watanabe, editors, Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018, pages 53–60. ACM, 2018. (doi:10.1145/3197507.3197516)

[Atzei et al., 2017]
Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. A survey of attacks on Ethereum smart contracts (SoK). In Matteo Maffei and Mark Ryan, editors, Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, volume 10204 of Lecture Notes in Computer Science, pages 164–186. Springer, 2017. (doi:10.1007/978-3-662-54455-6_8)

[Dou et al., 2017]
Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha, and Mohsen Guizani. Systematization of knowledge (SoK): A systematic review of software-based web phishing detection. IEEE Commun. Surv. Tutorials, 19(4):2797–2819, 2017. (doi:10.1109/COMST.2017.2752087)

[Fuller et al., 2017]
Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, and Robert K. Cunningham. SoK: Cryptographically protected database search. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pages 172–191. IEEE Computer Society, 2017. (doi:10.1109/SP.2017.10)

[Herley and van Oorschot, 2017]
Cormac Herley and Paul C. van Oorschot. SoK: Science, security and the elusive goal of security as a scientific pursuit. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pages 99–120. IEEE Computer Society, 2017. (doi:10.1109/SP.2017.38)

[Mainka et al., 2017]
Christian Mainka, Vladislav Mladenov, Jörg Schwenk, and Tobias Wich. SoK: Single sign-on security – an evaluation of OpenID connect. In 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017, pages 251–266. IEEE, 2017. (doi:10.1109/EuroSP.2017.32)

[Maleki et al., 2017]
Hoda Maleki, Reza Rahaeimehr, and Marten van Dijk. SoK: RFID-based clone detection mechanisms for supply chains. In Chip-Hong Chang, Ulrich Rührmair, and Wei Zhang, editors, Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2017, Dallas, TX, USA, November 3, 2017, pages 33–41. ACM, 2017. (doi:10.1145/3139324.3139332)

[Müller et al., 2017]
Jens Müller, Vladislav Mladenov, Juraj Somorovsky, and Jörg Schwenk. SoK: Exploiting network printers. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, pages 213–230. IEEE Computer Society, 2017. (doi:10.1109/SP.2017.47)

[Ruhault, 2017]
Sylvain Ruhault. SoK: Security models for pseudo-random number generators. IACR Trans. Symmetric Cryptol., 2017(1):506–544, 2017. (doi:10.13154/tosc.v2017.i1.506-544)

[Sahin et al., 2017]
Merve Sahin, Aurélien Francillon, Payas Gupta, and Mustaque Ahamad. SoK: Fraud in telephony networks. In 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017, pages 235–250. IEEE, 2017. (doi:10.1109/EuroSP.2017.40)

[Acar et al., 2016]
Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, and Matthew Smith. SoK: Lessons learned from Android security research for appified software platforms. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pages 433–451. IEEE Computer Society, 2016. (doi:10.1109/SP.2016.33)

[Cortier et al., 2016]
Véronique Cortier, David Galindo, Ralf Küsters, Johannes Müller, and Tomasz Truderung. SoK: Verifiability notions for e-voting protocols. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pages 779–798. IEEE Computer Society, 2016. (doi:10.1109/SP.2016.52)

[Khattak et al., 2016]
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg. SoK: Making sense of censorship resistance systems. Proceedings on Privacy Enhancing Technologies, 2016(4):37–61, 2016. (doi:10.1515/popets-2016-0028)

[Shoshitaishvili et al., 2016]
Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Krügel, and Giovanni Vigna. SoK: (state of) the art of war: Offensive techniques in binary analysis. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pages 138–157. IEEE Computer Society, 2016. (doi:10.1109/SP.2016.17)

[Späth et al., 2016]
Christopher Späth, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk. SoK: XML parser vulnerabilities. In Natalie Silvanovich and Patrick Traynor, editors, 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016. USENIX Association, 2016.

[Spensky et al., 2016]
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley, and Robert K. Cunningham. SoK: Privacy on mobile devices – it's complicated. Proceedings on Privacy Enhancing Technologies, 2016(3):96–116, 2016. (doi:10.1515/popets-2016-0018)

[Tschantz et al., 2016]
Michael Carl Tschantz, Sadia Afroz, anonymous, and Vern Paxson. SoK: Towards grounding censorship circumvention in empiricism. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pages 914–933. IEEE Computer Society, 2016. (doi:10.1109/SP.2016.59)

[Tu et al., 2016]
Huahong Tu, Adam Doupé, Ziming Zhao, and Gail-Joon Ahn. SoK: Everyone hates robocalls: A survey of techniques against telephone spam. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pages 320–338. IEEE Computer Society, 2016. (doi:10.1109/SP.2016.27)

[Zhang and Zhang, 2016]
Fengwei Zhang and Hongwei Zhang. SoK: A study of using hardware-assisted isolated execution environments for security. In Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016, pages 3:1–3:8. ACM, 2016. (doi:10.1145/2948618.2948621)

[Bernhard et al., 2015]
David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, and Bogdan Warinschi. SoK: A comprehensive analysis of game-based ballot privacy definitions. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 499–516. IEEE Computer Society, 2015. (doi:10.1109/SP.2015.37)

[Bonneau et al., 2015]
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 104–121. IEEE Computer Society, 2015. (doi:10.1109/SP.2015.14)

[Ugarte-Pedrero et al., 2015]
Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, and Pablo Garcıa Bringas. SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 659–673. IEEE Computer Society, 2015. (doi:10.1109/SP.2015.46)

[Unger et al., 2015]
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, and Matthew Smith. SoK: Secure messaging. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pages 232–249. IEEE Computer Society, 2015. (doi:10.1109/SP.2015.22)

[Jain et al., 2014]
Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion. SoK: Introspections on trust and the semantic gap. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 605–620. IEEE Computer Society, 2014. (doi:10.1109/SP.2014.45)

[Larsen et al., 2014]
Per Larsen, Andrei Homescu, Stefan Brunthaler, and Michael Franz. SoK: Automated software diversity. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 276–291. IEEE Computer Society, 2014. (doi:10.1109/SP.2014.25)

[Rushanan et al., 2014]
Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, and Colleen M. Swanson. SoK: Security and privacy in implantable medical devices and body area networks. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 524–539. IEEE Computer Society, 2014. (doi:10.1109/SP.2014.40)

[Alvisi et al., 2013]
Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, and Alessandro Panconesi. SoK: The evolution of sybil defense via social networks. In 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pages 382–396. IEEE Computer Society, 2013. (doi:10.1109/SP.2013.33)

[Clark and van Oorschot, 2013]
Jeremy Clark and Paul C. van Oorschot. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pages 511–525. IEEE Computer Society, 2013. (doi:10.1109/SP.2013.41)

[Meyer and Schwenk, 2013]
Christopher Meyer and Jörg Schwenk. SoK: Lessons learned from SSL/TLS attacks. In Yongdae Kim, Heejo Lee, and Adrian Perrig, editors, Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers, volume 8267 of Lecture Notes in Computer Science, pages 189–209. Springer, 2013. (doi:10.1007/978-3-319-05149-9_12)

[Reardon et al., 2013]
Joel Reardon, David A. Basin, and Srdjan Capkun. SoK: Secure data deletion. In 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pages 301–315. IEEE Computer Society, 2013. (doi:10.1109/SP.2013.28)

[Rossow et al., 2013]
Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, and Herbert Bos. SoK: P2PWNED – modeling and evaluating the resilience of peer-to-peer botnets. In 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pages 97–111. IEEE Computer Society, 2013. (doi:10.1109/SP.2013.17)

[Szekeres et al., 2013]
Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. SoK: Eternal war in memory. In 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pages 48–62. IEEE Computer Society, 2013. (doi:10.1109/SP.2013.13)

[Balsa et al., 2012]
Ero Balsa, Carmela Troncoso, and Claudia Diaz. OB-PWS: Obfuscation-based private web search. In 2012 IEEE Symposium on Security and Privacy, pages 491–505, 2012. (doi:10.1109/SP.2012.36)

[Bonneau et al., 2012]
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In 2012 IEEE Symposium on Security and Privacy, pages 553–567, 2012. (doi:10.1109/SP.2012.44)

[Dyer et al., 2012]
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton. Peek-a-Boo, I still see you: Why efficient traffic analysis countermeasures fail. In 2012 IEEE Symposium on Security and Privacy, pages 332–346, 2012. (doi:10.1109/SP.2012.28)

[Howe et al., 2012]
Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta Byrne. The psychology of security for the home computer user. In 2012 IEEE Symposium on Security and Privacy, pages 209–223, 2012. (doi:10.1109/SP.2012.23)

[Mayer and Mitchell, 2012]
Jonathan R. Mayer and John C. Mitchell. Third-party web tracking: Policy and technology. In 2012 IEEE Symposium on Security and Privacy, pages 413–427, 2012. (doi:10.1109/SP.2012.47)

[Rossow et al., 2012]
Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, and Maarten van Steen. Prudent practices for designing malware experiments: Status quo and outlook. In 2012 IEEE Symposium on Security and Privacy, pages 65–79, 2012. (doi:10.1109/SP.2012.14)

[Zhou and Jiang, 2012]
Yajin Zhou and Xuxian Jiang. Dissecting android malware: Characterization and evolution. In 2012 IEEE Symposium on Security and Privacy, pages 95–109, 2012. (doi:10.1109/SP.2012.16)

[Armknecht et al., 2011]
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, and Christian Wachsmann. A formalization of the security features of physical functions. In 2011 IEEE Symposium on Security and Privacy, pages 397–412, 2011. (doi:10.1109/SP.2011.10)

[Becher et al., 2011]
Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, and Christopher Wolf. Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In 2011 IEEE Symposium on Security and Privacy, pages 96–111, 2011. (doi:10.1109/SP.2011.29)

[Henry and Goldberg, 2011]
Ryan Henry and Ian Goldberg. Formalizing anonymous blacklisting systems. In 2011 IEEE Symposium on Security and Privacy, pages 81–95, 2011. (doi:10.1109/SP.2011.13)

[Kashyap et al., 2011]
Vineeth Kashyap, Ben Wiedermann, and Ben Hardekopf. Timing- and termination-sensitive secure information flow: Exploring a new approach. In 2011 IEEE Symposium on Security and Privacy, pages 413–428, 2011. (doi:10.1109/SP.2011.19)

[Bau et al., 2010]
Jason Bau, Elie Bursztein, Divij Gupta, and John Mitchell. State of the art: Automated black-box web application vulnerability testing. In 2010 IEEE Symposium on Security and Privacy, pages 332–345, 2010. (doi:10.1109/SP.2010.27)

[Bursztein et al., 2010]
Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, and Dan Jurafsky. How good are humans at solving CAPTCHAs? a large scale evaluation. In 2010 IEEE Symposium on Security and Privacy, pages 399–413, 2010. (doi:10.1109/SP.2010.31)

[Parno et al., 2010]
Bryan Parno, Jonathan M. McCune, and Adrian Perrig. Bootstrapping trust in commodity computers. In 2010 IEEE Symposium on Security and Privacy, pages 414–429, 2010. (doi:10.1109/SP.2010.32)

[Schwartz et al., 2010]
Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In 2010 IEEE Symposium on Security and Privacy, pages 317–331, 2010. (doi:10.1109/SP.2010.26)

[Sommer and Paxson, 2010]
Robin Sommer and Vern Paxson. Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy, pages 305–316, 2010. (doi:10.1109/SP.2010.25)