% This BibTeX file was created by Shujun Li @ University of Kent, UK (http://www.hooklee.com/). % HTML version: http://www.hooklee.com/Research/SoK/SoK.html % Release date: 21 January 2024 % The following items were extracted from DBLP and refined to remove SoK papers that were not peer reviewed and to fix some unprotected proper nouns and acronyms. @article{DBLP_journals_popets_GarridoNS24, author = {Gonzalo Munilla Garrido and Vivek Nair and Dawn Song}, title = {{SoK}: Data Privacy in Virtual Reality}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {21--40}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0003}, doi = {10.56553/POPETS-2024-0003}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GarridoNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_SasyG24, author = {Sajin Sasy and Ian Goldberg}, title = {{SoK}: Metadata-Protecting Communication Systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {509--524}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0030}, doi = {10.56553/POPETS-2024-0030}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/SasyG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_access_YaoDMW23, author = {Wei Yao and Fadi P. Deek and Renita Murimi and Guiling Wang}, title = {{SoK}: {A} Taxonomy for Critical Analysis of Consensus Mechanisms in Consortium Blockchain}, journal = {{IEEE} Access}, volume = {11}, pages = {79572--79587}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3298675}, doi = {10.1109/ACCESS.2023.3298675}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YaoDMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_compsec_MinnaM23, author = {Francesco Minna and Fabio Massacci}, title = {{SoK}: Run-time security for cloud microservices. Are we there yet?}, journal = {Comput. Secur.}, volume = {127}, pages = {103119}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103119}, doi = {10.1016/J.COSE.2023.103119}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MinnaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_compsec_VitorinoPM23, author = {Jo{\~{a}}o Vitorino and Isabel Pra{\c{c}}a and Eva Maia}, title = {{SoK}: Realistic adversarial attacks and defenses for intelligent network intrusion detection}, journal = {Comput. Secur.}, volume = {134}, pages = {103433}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103433}, doi = {10.1016/J.COSE.2023.103433}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/VitorinoPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_csur_PicekPMWB23, author = {Stjepan Picek and Guilherme Perin and Luca Mariot and Lichao Wu and Lejla Batina}, title = {{SoK}: Deep Learning-based Physical Side-channel Analysis}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {11}, pages = {227:1--227:35}, year = {2023}, url = {https://doi.org/10.1145/3569577}, doi = {10.1145/3569577}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/PicekPMWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_csur_WangYCX23, author = {Qin Wang and Jiangshan Yu and Shiping Chen and Yang Xiang}, title = {{SoK}: {DAG}-based Blockchain Systems}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {12}, pages = {261:1--261:38}, year = {2023}, url = {https://doi.org/10.1145/3576899}, doi = {10.1145/3576899}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/WangYCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_csur_XuPCF23, author = {Jiahua Xu and Krzysztof Paruch and Simon Cousaert and Yebo Feng}, title = {{SoK}: Decentralized Exchanges {(DEX)} with Automated Market Maker {(AMM)} Protocols}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {11}, pages = {238:1--238:50}, year = {2023}, url = {https://doi.org/10.1145/3570639}, doi = {10.1145/3570639}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/XuPCF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_dcc_BaumDSW23, author = {Carsten Baum and Samuel Dittmer and Peter Scholl and Xiao Wang}, title = {Sok: vector OLE-based zero-knowledge protocols}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3527--3561}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01292-8}, doi = {10.1007/S10623-023-01292-8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BaumDSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_DionysiouA23, author = {Antreas Dionysiou and Elias Athanasopoulos}, title = {{SoK}: Membership Inference is Harder Than Previously Thought}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {3}, pages = {286--306}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0082}, doi = {10.56553/POPETS-2023-0082}, timestamp = {Sat, 24 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DionysiouA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_GouertMT23, author = {Charles Gouert and Dimitris Mouris and Nektarios Georgios Tsoutsos}, title = {{SoK}: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {3}, pages = {154--172}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0075}, doi = {10.56553/POPETS-2023-0075}, timestamp = {Sat, 24 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GouertMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_HainesMMP23, author = {Thomas Haines and Rafieh Mosaheb and Johannes M{\"{u}}ller and Ivan Pryvalov}, title = {{SoK}: Secure E-Voting with Everlasting Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {279--293}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0017}, doi = {10.56553/POPETS-2023-0017}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/HainesMMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_MansouriOJC23, author = {Mohamad Mansouri and Melek {\"{O}}nen and Wafa Ben Jaballah and Mauro Conti}, title = {{SoK}: Secure Aggregation Based on Cryptographic Schemes for Federated Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {140--157}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0009}, doi = {10.56553/POPETS-2023-0009}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/MansouriOJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_MirandaPascualGPFS23, author = {{\`{A}}lex Miranda{-}Pascual and Patricia Guerra{-}Balboa and Javier Parra{-}Arnau and Jordi Forn{\'{e}} and Thorsten Strufe}, title = {{SoK}: Differentially Private Publication of Trajectory Data}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {2}, pages = {496--516}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0065}, doi = {10.56553/POPETS-2023-0065}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MirandaPascualGPFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_PowarB23, author = {Jovan Powar and Alastair R. Beresford}, title = {{SoK}: Managing risks of linkage attacks on data privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {2}, pages = {97--116}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0043}, doi = {10.56553/POPETS-2023-0043}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/PowarB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_SchefflerM23, author = {Sarah Scheffler and Jonathan R. Mayer}, title = {{SoK}: Content Moderation for End-to-End Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {2}, pages = {403--429}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0060}, doi = {10.56553/POPETS-2023-0060}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SchefflerM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tches_BatinaCHSS23, author = {Lejla Batina and Lukasz Chmielewski and Bj{\"{o}}rn Haase and Niels Samwel and Peter Schwabe}, title = {{SoK}: {SCA}-secure {ECC} in software - mission impossible?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {557--589}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.557-589}, doi = {10.46586/TCHES.V2023.I1.557-589}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BatinaCHSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tissec_ZhuoBKLR23, author = {Sijie Zhuo and Robert Biddle and Yun Sing Koh and Danielle M. Lottridge and Giovanni Russello}, title = {{SoK}: Human-centered Phishing Susceptibility}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {3}, pages = {24:1--24:27}, year = {2023}, url = {https://doi.org/10.1145/3575797}, doi = {10.1145/3575797}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhuoBKLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tosc_SunW23, author = {Ling Sun and Meiqin Wang}, title = {{SoK}: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {111--151}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.111-151}, doi = {10.46586/TOSC.V2023.I1.111-151}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_BhusalSSVCRR23, author = {Dipkamal Bhusal and Rosalyn Shin and Ajay Ashok Shewale and Monish Kumar Manikya Veerabhadran and Michael Clifford and Sara Rampazzi and Nidhi Rastogi}, title = {{SoK}: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {35:1--35:12}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600193}, doi = {10.1145/3600160.3600193}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BhusalSSVCRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_OhmS23, author = {Marc Ohm and Charlene Stuke}, title = {{SoK}: Practical Detection of Software Supply Chain Attacks}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {33:1--33:11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600162}, doi = {10.1145/3600160.3600162}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/OhmS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_PajuJNSMB23, author = {Arttu Paju and Muhammad Owais Javed and Juha Nurmi and Juha Savim{\"{a}}ki and Brian McGillion and Billy Bob Brumley}, title = {{SoK}: {A} Systematic Review of {TEE} Usage for Developing Trusted Applications}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {34:1--34:15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600169}, doi = {10.1145/3600160.3600169}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PajuJNSMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_acmicn_DavisC23, author = {Jeremiah S. Davis and Kenneth L. Calvert}, editor = {Kenneth L. Calvert and G{\'{\i}}sli Hj{\'{a}}lmt{\'{y}}sson and Patrick Crowley and Christos Papadopoulos}, title = {{SoK}: On Named Content and Inter-domain Routing}, booktitle = {Proceedings of the 10th {ACM} Conference on Information-Centric Networking, {ACM} {ICN} 2023, Reykjavik, Iceland, October 9-10, 2023}, pages = {55--66}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623565.3623716}, doi = {10.1145/3623565.3623716}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmicn/DavisC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_acmicn_GengZKKT023, author = {Wei Geng and Yulong Zhang and Dirk Kutscher and Abhishek Kumar and Sasu Tarkoma and Pan Hui}, editor = {Kenneth L. Calvert and G{\'{\i}}sli Hj{\'{a}}lmt{\'{y}}sson and Patrick Crowley and Christos Papadopoulos}, title = {{SoK}: Distributed Computing in {ICN}}, booktitle = {Proceedings of the 10th {ACM} Conference on Information-Centric Networking, {ACM} {ICN} 2023, Reykjavik, Iceland, October 9-10, 2023}, pages = {88--100}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623565.3623712}, doi = {10.1145/3623565.3623712}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acmicn/GengZKKT023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_acns_AdhikaryB23, author = {Asmita Adhikary and Ileana Buhan}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {{SoK}: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by {AI}}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {178--195}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6_10}, doi = {10.1007/978-3-031-41181-6_10}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/AdhikaryB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_BaumCDF23, author = {Carsten Baum and James Hsin{-}yu Chiang and Bernardo David and Tore Kasper Frederiksen}, editor = {Joseph Bonneau and S. Matthew Weinberg}, title = {{SoK}: Privacy-Enhancing Technologies in Finance}, booktitle = {5th Conference on Advances in Financial Technologies, {AFT} 2023, October 23-25, 2023, Princeton, NJ, {USA}}, series = {LIPIcs}, volume = {282}, pages = {12:1--12:30}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.AFT.2023.12}, doi = {10.4230/LIPICS.AFT.2023.12}, timestamp = {Wed, 18 Oct 2023 16:53:28 +0200}, biburl = {https://dblp.org/rec/conf/aft/BaumCDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_SharmaCCC23, author = {Geetanjli Sharma and M. A. P. Chamikara and Mohan Baruwal Chhetri and Yi{-}Ping Phoebe Chen}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {{SoK}: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {579--592}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3590328}, doi = {10.1145/3579856.3590328}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SharmaCCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiapkc_ShahN0D23, author = {Syed Wajid Ali Shah and Mohammad Reza Nosouhi and Lei Pan and Robin Doss}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {{SoK}: On Efficacy of the {BGF} Decoder for {QC}-{MDPC}-based Quantum-Safe Cryptosystems}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {2--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593070}, doi = {10.1145/3591866.3593070}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/ShahN0D23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_bcca_WangN23, author = {Gang Wang and Mark Nixon}, editor = {Moayad Aloqaily and Safa Otoum and Ouns Bouachir and Yaser Jararweh and Ismaeel Al Ridhawi and Khalid Al{-}Begain and Mohammad A. Alsmirat}, title = {{SoK}: Blockchain for Industrial Internet of Things}, booktitle = {Fifth International Conference on Blockchain Computing and Applications, {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023}, pages = {250--265}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BCCA58897.2023.10338872}, doi = {10.1109/BCCA58897.2023.10338872}, timestamp = {Thu, 18 Jan 2024 12:09:19 +0100}, biburl = {https://dblp.org/rec/conf/bcca/WangN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_bcca_WangN23a, author = {Gang Wang and Mark Nixon}, editor = {Moayad Aloqaily and Safa Otoum and Ouns Bouachir and Yaser Jararweh and Ismaeel Al Ridhawi and Khalid Al{-}Begain and Mohammad A. Alsmirat}, title = {{SoK}: Essentials of {BFT} Consensus for Blockchains}, booktitle = {Fifth International Conference on Blockchain Computing and Applications, {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023}, pages = {315--328}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BCCA58897.2023.10338868}, doi = {10.1109/BCCA58897.2023.10338868}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcca/WangN23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_bsci_WangLZLLZ23, author = {Feng Wang and Yang Lu and Qiang Zhang and Yang Liu and Linlin Liu and Zhiruo Zhang}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo}, title = {{SoK}: Research status and challenges of blockchain smart contracts}, booktitle = {Proceedings of the 5th {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {145--147}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3594556.3594620}, doi = {10.1145/3594556.3594620}, timestamp = {Thu, 21 Sep 2023 11:51:52 +0200}, biburl = {https://dblp.org/rec/conf/bsci/WangLZLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_coins_IlinaTBG23, author = {Olga Ilina and Ksenia Tagirova and Artem Barger and Vladimir Gorgadze}, title = {{SoK}: How Blockchain and Tokenization Will Transform the Energy Sector}, booktitle = {{IEEE} International Conference on Omni-layer Intelligent Systems, {COINS} 2023, Berlin, Germany, July 23-25, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COINS57856.2023.10189196}, doi = {10.1109/COINS57856.2023.10189196}, timestamp = {Fri, 04 Aug 2023 13:58:10 +0200}, biburl = {https://dblp.org/rec/conf/coins/IlinaTBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csfw_Dibbo23, author = {Sayanton V. Dibbo}, title = {{SoK}: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {439--456}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00027}, doi = {10.1109/CSF57540.2023.00027}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Dibbo23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csfw_MedleyLQ23, author = {Liam Medley and Angelique Faye Loe and Elizabeth A. Quaglia}, title = {{SoK}: Delay-Based Cryptography}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {169--183}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00028}, doi = {10.1109/CSF57540.2023.00028}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/MedleyLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csr2_KonalaKB23, author = {Pandu Ranga Reddy Konala and Vimal Kumar and David Bainbridge}, title = {{SoK}: Static Configuration Analysis in Infrastructure as Code Scripts}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {281--288}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224925}, doi = {10.1109/CSR57506.2023.10224925}, timestamp = {Wed, 06 Sep 2023 08:09:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/KonalaKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_esorics_AliMKNHHNSSZYGR23, author = {Muaz Ali and Muhammad Muzammil and Faraz Karim and Ayesha Naeem and Rukhshan Haroon and Muhammad Haris and Huzaifah Nadeem and Waseem Sabir and Fahad Shaon and Fareed Zaffar and Vinod Yegneswaran and Ashish Gehani and Sazzadur Rahaman}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {{SoK}: {A} Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14347}, pages = {229--249}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51482-1_12}, doi = {10.1007/978-3-031-51482-1_12}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AliMKNHHNSSZYGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_AhsanRA23, author = {Muhammad Ahsan and Muhammad Haris Rais and Irfan Ahmed}, title = {{SOK:} Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {1160--1178}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00071}, doi = {10.1109/EUROSP57164.2023.00071}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AhsanRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_ApruzzeseLS23, author = {Giovanni Apruzzese and Pavel Laskov and Johannes Schneider}, title = {{SoK}: Pragmatic Assessment of Machine Learning for Network Intrusion Detection}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {592--614}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00042}, doi = {10.1109/EUROSP57164.2023.00042}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ApruzzeseLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_ErnstbergerLEZSCMGS23, author = {Jens Ernstberger and Jan Lauinger and Fatima Elsheimy and Liyi Zhou and Sebastian Steinhorst and Ran Canetti and Andrew Miller and Arthur Gervais and Dawn Song}, title = {{SoK}: Data Sovereignty}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {122--143}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00017}, doi = {10.1109/EUROSP57164.2023.00017}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ErnstbergerLEZSCMGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_HoltrydMS23, author = {Nadja Ramh{\"{o}}j Holtryd and Madhavan Manivannan and Per Stenstr{\"{o}}m}, title = {{SoK}: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {631--650}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00044}, doi = {10.1109/EUROSP57164.2023.00044}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/HoltrydMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_NadeemVCPDBV23, author = {Azqa Nadeem and Dani{\"{e}}l Vos and Clinton Cao and Luca Pajola and Simon Dieck and Robert Baumgartner and Sicco Verwer}, title = {{SoK}: Explainable Machine Learning for Computer Security Applications}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {221--240}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00022}, doi = {10.1109/EUROSP57164.2023.00022}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/NadeemVCPDBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_NawrockiKHKSW23, author = {Marcin Nawrocki and John Kristoff and Raphael Hiesgen and Chris Kanich and Thomas C. Schmidt and Matthias W{\"{a}}hlisch}, title = {{SoK}: {A} Data-driven View on Methods to Detect Reflective Amplification {DDoS} Attacks Using Honeypots}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {576--591}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00041}, doi = {10.1109/EUROSP57164.2023.00041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/NawrockiKHKSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_SinghalLPTKSN23, author = {Mohit Singhal and Chen Ling and Pujan Paudel and Poojitha Thota and Nihal Kumarswamy and Gianluca Stringhini and Shirin Nilizadeh}, title = {{SoK}: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {868--895}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00056}, doi = {10.1109/EUROSP57164.2023.00056}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SinghalLPTKSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_XuHDLLZ23, author = {Yuan Xu and Xingshuo Han and Gelei Deng and Jiwei Li and Yang Liu and Tianwei Zhang}, title = {{SoK}: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {1082--1100}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00067}, doi = {10.1109/EUROSP57164.2023.00067}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/XuHDLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_hasp_ChiuX23, author = {Tinghung Chiu and Wenjie Xiong}, title = {{SoK}: Fault Injection Attacks on Cryptosystems}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {64--72}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623671}, doi = {10.1145/3623652.3623671}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/ChiuX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_hasp_Das23, author = {Subrata Das}, title = {{SoK}: {A} First Order Survey of Quantum Supply Dynamics and Threat Landscapes}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {82--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623664}, doi = {10.1145/3623652.3623664}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/Das23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc_WangN23, author = {Gang Wang and Mark Nixon}, editor = {Qin Wang and Jun Feng and Liang{-}Jie Zhang}, title = {{SoK}: {X}-assisted {BFT} Consensus Protocols}, booktitle = {Blockchain - {ICBC} 2023 - 6th International Conference, Held as Part of the Services Conference Federation, {SCF} 2023, Honolulu, HI, USA, September 23-26, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14206}, pages = {54--71}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44920-8_4}, doi = {10.1007/978-3-031-44920-8_4}, timestamp = {Sun, 08 Oct 2023 09:22:51 +0200}, biburl = {https://dblp.org/rec/conf/icbc/WangN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc2_BergerSVBJRK23, author = {Christian Berger and Signe Schwarz{-}R{\"{u}}sch and Arne Vogel and Kai Bleeke and Leander Jehl and Hans P. Reiser and R{\"{u}}diger Kapitza}, title = {{SoK}: Scalability Techniques for {BFT} Consensus}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--18}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174976}, doi = {10.1109/ICBC56567.2023.10174976}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/BergerSVBJRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc2_LeeMDG23, author = {Sung{-}Shine Lee and Alexandr Murashkin and Martin Derka and Jan Gorzny}, title = {{SoK}: Not Quite Water Under the Bridge: Review of Cross-Chain Bridge Hacks}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--14}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174993}, doi = {10.1109/ICBC56567.2023.10174993}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/LeeMDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc2_NichollsKL23, author = {Jack Nicholls and Aditya Kuppa and Nhien{-}An Le{-}Khac}, title = {{SoK}: The Next Phase of Identifying Illicit Activity in {Bitcoin}}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174963}, doi = {10.1109/ICBC56567.2023.10174963}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/NichollsKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc2_Zhang23, author = {Yiyin Zhang}, title = {{SoK}: Anonymity of Lightweight Clients in Cryptocurrency Systems}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--18}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174913}, doi = {10.1109/ICBC56567.2023.10174913}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_iciss_JainP23, author = {Anubha Jain and Emmanuel S. Pilli}, editor = {Vallipuram Muthukkumarasamy and Sithu D. Sudarsan and Rudrapatna K. Shyamasundar}, title = {{SoK}: Digital Signatures and Taproot Transactions in {Bitcoin}}, booktitle = {Information Systems Security - 19th International Conference, {ICISS} 2023, Raipur, India, December 16-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {360--379}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49099-6_22}, doi = {10.1007/978-3-031-49099-6_22}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/JainP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icse_AraniZLB23, author = {Ali Kazemi Arani and Mansooreh Zahedi and Triet Huynh Minh Le and Muhammad Ali Babar}, title = {{SoK}: Machine Learning for Continuous Integration}, booktitle = {{IEEE/ACM} International Workshop on Cloud Intelligence {\&} AIOps, AIOps@ICSE 2023, Melbourne, Australia, May 15, 2023}, pages = {8--13}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AIOps59134.2023.00006}, doi = {10.1109/AIOPS59134.2023.00006}, timestamp = {Wed, 02 Aug 2023 11:15:07 +0200}, biburl = {https://dblp.org/rec/conf/icse/AraniZLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_isi_CarelloMQA23, author = {Maria Patrizia Carello and Alberto Marchetti{-}Spaccamela and Leonardo Querzoni and Marco Angelini}, title = {{SoK}: Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2023, Charlotte, NC, USA, October 2-3, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISI58743.2023.10297246}, doi = {10.1109/ISI58743.2023.10297246}, timestamp = {Wed, 15 Nov 2023 09:43:45 +0100}, biburl = {https://dblp.org/rec/conf/isi/CarelloMQA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_secrypt_0001F23, author = {Hiroki Okada and Kazuhide Fukushima}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SoK}: Towards {CCA} Secure Fully Homomorphic Encryption}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {793--798}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012129800003555}, doi = {10.5220/0012129800003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_secsr_KakviMPQ23, author = {Saqib A. Kakvi and Keith M. Martin and Colin Putman and Elizabeth A. Quaglia}, editor = {Felix G{\"{u}}nther and Julia Hesse}, title = {{SoK}: Anonymous Credentials}, booktitle = {Security Standardisation Research - 8th International Conference, {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13895}, pages = {129--151}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30731-7_6}, doi = {10.1007/978-3-031-30731-7_6}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/KakviMPQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_soups_OrtloffT023, author = {Anna{-}Marie Ortloff and Christian Tiefenau and Matthew Smith}, editor = {Patrick Gage Kelley and Apu Kapadia}, title = {{SoK}: {I} Have the (Developer) Power! Sample Size Estimation for {Fisher}'s Exact, Chi-Squared, {McNemar}'s, {Wilcoxon} Rank-Sum, {Wilcoxon} Signed-Rank and t-tests in Developer-Centered Usable Security}, booktitle = {Nineteenth Symposium on Usable Privacy and Security, {SOUPS} 2023, Anaheim, CA, USA, August 5-7, 2023}, pages = {341--359}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/soups2023/presentation/ortloff}, timestamp = {Wed, 09 Aug 2023 15:04:34 +0200}, biburl = {https://dblp.org/rec/conf/soups/OrtloffT023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_ChoiMB23, author = {Kevin Choi and Aathira Manoj and Joseph Bonneau}, title = {{SoK}: Distributed Randomness Beacons}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {75--92}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179419}, doi = {10.1109/SP46215.2023.10179419}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChoiMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_InamCGLMMGBH23, author = {Muhammad Adil Inam and Yinfang Chen and Akul Goyal and Jason Liu and Jaron Mink and Noor Michael and Sneha Gaur and Adam Bates and Wajih Ul Hassan}, title = {{SoK}: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2620--2638}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179405}, doi = {10.1109/SP46215.2023.10179405}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/InamCGLMMGBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_LadisaPMB23, author = {Piergiorgio Ladisa and Henrik Plate and Matias Martinez and Olivier Barais}, title = {{SoK}: Taxonomy of Attacks on Open-Source Software Supply Chains}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1509--1526}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179304}, doi = {10.1109/SP46215.2023.10179304}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LadisaPMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_LiXL23, author = {Linyi Li and Tao Xie and Bo Li}, title = {{SoK}: Certified Robustness for Deep Neural Networks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1289--1310}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179303}, doi = {10.1109/SP46215.2023.10179303}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_MathewsHORHW23, author = {Nate Mathews and James K. Holland and Se Eun Oh and Mohammad Saidur Rahman and Nicholas Hopper and Matthew Wright}, title = {{SoK}: {A} Critical Evaluation of Efficient Website Fingerprinting Defenses}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {969--986}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179289}, doi = {10.1109/SP46215.2023.10179289}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MathewsHORHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_NgC23, author = {Lucien K. L. Ng and Sherman S. M. Chow}, title = {{SoK}: Cryptographic Neural-Network Computation}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {497--514}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179483}, doi = {10.1109/SP46215.2023.10179483}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NgC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_SalemCEKPSTB23, author = {Ahmed Salem and Giovanni Cherubin and David Evans and Boris K{\"{o}}pf and Andrew Paverd and Anshuman Suri and Shruti Tople and Santiago Zanella B{\'{e}}guelin}, title = {{SoK}: Let the Privacy Games Begin! {A} Unified Treatment of Data Inference Privacy in Machine Learning}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {327--345}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179281}, doi = {10.1109/SP46215.2023.10179281}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SalemCEKPSTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_WengerSZZ23, author = {Emily Wenger and Shawn Shan and Haitao Zheng and Ben Y. Zhao}, title = {{SoK}: Anti-Facial Recognition Technology}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {864--881}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179445}, doi = {10.1109/SP46215.2023.10179445}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WengerSZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_ZhouXECWWQWSG23, author = {Liyi Zhou and Xihan Xiong and Jens Ernstberger and Stefanos Chaliasos and Zhipeng Wang and Ye Wang and Kaihua Qin and Roger Wattenhofer and Dawn Song and Arthur Gervais}, title = {{SoK}: Decentralized Finance ({DeFi}) Attacks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2444--2461}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179435}, doi = {10.1109/SP46215.2023.10179435}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhouXECWWQWSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_wisec_AlatawiS23, author = {Mashari Alatawi and Nitesh Saxena}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {{SoK}: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {187--201}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581773}, doi = {10.1145/3558482.3581773}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AlatawiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_wisec_MahdadS23, author = {Ahmed Tanvir Mahdad and Nitesh Saxena}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {{SoK}: {A} Comprehensive Evaluation of {2FA}-based Schemes in the Face of Active Concurrent Attacks from User Terminal}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {175--186}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590183}, doi = {10.1145/3558482.3590183}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MahdadS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings {Arp:Dos+Donts+MLCS:USENIX_Security2022, author = {Daniel Arp and Erwin Quiring and Feargus Pendlebury and Alexander Warnecke and Fabio Pierazzi and Christian Wressnegger and Lorenzo Cavallaro and Konrad Rieck}, title = {Dos and Don'ts of Machine Learning in Computer Security}, booktitle = {Proceedings of the 31st USENIX Security Symposium}, year = {2022}, pages = {3971--3988}, publisher = {USENIX Association}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/arp}, } @article{DBLP_journals_access_FranzoniD22, author = {Federico Franzoni and Vanesa Daza}, title = {{SoK}: Network-Level Attacks on the {Bitcoin} {P2P} Network}, journal = {{IEEE} Access}, volume = {10}, pages = {94924--94962}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3204387}, doi = {10.1109/ACCESS.2022.3204387}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FranzoniD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_cybersecurity_CasinoPLBSP22, author = {Fran Casino and Claudia Pina and Pablo L{\'{o}}pez{-}Aguilar and Edgar Batista and Agusti Solanas and Constantinos Patsakis}, title = {{SoK}: cross-border criminal investigations and digital evidence}, journal = {J. Cybersecur.}, volume = {8}, number = {1}, year = {2022}, url = {https://doi.org/10.1093/cybsec/tyac014}, doi = {10.1093/CYBSEC/TYAC014}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/CasinoPLBSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_entropy_WangGS22, author = {Junchao Wang and Guoping Guo and Zheng Shan}, title = {{SoK}: Benchmarking the Performance of a Quantum Computer}, journal = {Entropy}, volume = {24}, number = {10}, pages = {1467}, year = {2022}, url = {https://doi.org/10.3390/e24101467}, doi = {10.3390/E24101467}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/WangGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_jocsap_TaziSCD22, author = {Faiza Tazi and Sunny Shrestha and Junibel De La Cruz and Sanchari Das}, title = {{SoK}: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {2}, pages = {329--357}, year = {2022}, url = {https://doi.org/10.3390/jcp2020018}, doi = {10.3390/JCP2020018}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/TaziSCD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_0057LCS22, author = {Chen Chen and Xiao Liang and Bogdan Carbunar and Radu Sion}, title = {{SoK}: Plausibly Deniable Storage}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {2}, pages = {132--151}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0039}, doi = {10.2478/POPETS-2022-0039}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/0057LCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_DeuberRR22, author = {Dominic Deuber and Viktoria Ronge and Christian R{\"{u}}ckert}, title = {{SoK}: Assumptions Underlying Cryptocurrency Deanonymizations}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {670--691}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0091}, doi = {10.56553/POPETS-2022-0091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DeuberRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_LiWWGR22, author = {Rujia Li and Qin Wang and Qi Wang and David Galindo and Mark Ryan}, title = {{SoK}: {TEE}-Assisted Confidential Smart Contract}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {711--731}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0093}, doi = {10.56553/POPETS-2022-0093}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LiWWGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_MeiklejohnDOTYS22, author = {Sarah Meiklejohn and Joe DeBlasio and Devon O'Brien and Chris Thompson and Kevin Yeo and Emily Stark}, title = {{SoK}: {SCT} Auditing in Certificate Transparency}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {336--353}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0075}, doi = {10.56553/POPETS-2022-0075}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MeiklejohnDOTYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_ZavalyshynLRR22, author = {Igor Zavalyshyn and Axel Legay and Annanda Rath and Etienne Rivi{\`{e}}re}, title = {{SoK}: Privacy-enhancing Smart Home Hubs}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {24--43}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0097}, doi = {10.56553/POPETS-2022-0097}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ZavalyshynLRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_ZinkusJG22, author = {Maximilian Zinkus and Tushar M. Jois and Matthew Green}, title = {{SoK}: Cryptographic Confidentiality of Data on Mobile Devices}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {586--607}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0029}, doi = {10.2478/POPETS-2022-0029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ZinkusJG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tches_Joye22, author = {Marc Joye}, title = {{SoK}: Fully Homomorphic Encryption over the [Discretized] Torus}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {661--692}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.661-692}, doi = {10.46586/TCHES.V2022.I4.661-692}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Joye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tissec_ChenZYZCWG22, author = {Yuxuan Chen and Jiangshan Zhang and Xuejing Yuan and Shengzhi Zhang and Kai Chen and Xiaofeng Wang and Shanqing Guo}, title = {{SoK}: {A} Modularized Approach to Study the Security of Automatic Speech Recognition Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {17:1--17:31}, year = {2022}, url = {https://doi.org/10.1145/3510582}, doi = {10.1145/3510582}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenZYZCWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_BillawaTFSSS22, author = {Priyanka Billawa and Anusha Bambhore Tukaram and Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and Jan{-}Philipp Stegh{\"{o}}fer and Riccardo Scandariato and Georg Simhandl}, title = {{SoK}: Security of Microservice Applications: {A} Practitioners' Perspective on Challenges and Best Practices}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {9:1--9:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538986}, doi = {10.1145/3538969.3538986}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BillawaTFSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_DuzgunNMDV22, author = {Reyhan D{\"{u}}zg{\"{u}}n and Naheem Noah and Peter Mayer and Sanchari Das and Melanie Volkamer}, title = {{SoK}: {A} Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {36:1--36:12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3539011}, doi = {10.1145/3538969.3539011}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DuzgunNMDV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_GhesmatiFW22, author = {Simin Ghesmati and Walid Fdhila and Edgar R. Weippl}, title = {{SoK}: How private is {Bitcoin}? Classification and Evaluation of {Bitcoin} Privacy Techniques}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {5:1--5:14}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538971}, doi = {10.1145/3538969.3538971}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GhesmatiFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_HusakC22, author = {Martin Hus{\'{a}}k and Milan Cerm{\'{a}}k}, title = {{SoK}: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna, Austria, August 23 - 26, 2022}, pages = {25:1--25:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538981}, doi = {10.1145/3538969.3538981}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HusakC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_NygardK22, author = {Arne Roar Nyg{\aa}rd and Sokratis K. Katsikas}, title = {{SoK}: Combating threats in the digital supply chain}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna, Austria, August 23 - 26, 2022}, pages = {128:1--128:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544421}, doi = {10.1145/3538969.3544421}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NygardK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_SamanisGR22, author = {Emmanouil Samanis and Joseph Gardiner and Awais Rashid}, title = {{SoK}: {A} Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna, Austria, August 23 - 26, 2022}, pages = {28:1--28:12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538979}, doi = {10.1145/3538969.3538979}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SamanisGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_SharifRCSR22, author = {Amir Sharif and Matteo Ranzi and Roberto Carbone and Giada Sciarretta and Silvio Ranise}, title = {{SoK}: {A} Survey on Technological Trends for (pre)Notified {eIDAS} Electronic Identity Schemes}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna, Austria, August 23 - 26, 2022}, pages = {85:1--85:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3543817}, doi = {10.1145/3538969.3543817}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SharifRCSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_acisp_RaikwarG22, author = {Mayank Raikwar and Danilo Gligoroski}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {{SoK}: Decentralized Randomness Beacon Protocols}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {420--446}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3_21}, doi = {10.1007/978-3-031-22301-3_21}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/RaikwarG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_HeimbachW22, author = {Lioba Heimbach and Roger Wattenhofer}, editor = {Maurice Herlihy and Neha Narula}, title = {{SoK}: Preventing Transaction Reordering Manipulations in Decentralized Finance}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {47--60}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559784}, doi = {10.1145/3558535.3559784}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/HeimbachW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_KiayiasL22, author = {Aggelos Kiayias and Philip Lazos}, editor = {Maurice Herlihy and Neha Narula}, title = {{SoK}: {Blockchain} Governance}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {61--73}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559794}, doi = {10.1145/3558535.3559794}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/KiayiasL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_Werner0GKHK22, author = {Sam Werner and Daniel Perez and Lewis Gudgeon and Ariah Klages{-}Mundt and Dominik Harz and William J. Knottenbelt}, editor = {Maurice Herlihy and Neha Narula}, title = {{SoK}: Decentralized Finance ({DeFi})}, booktitle = {Proceedings of the 4th {ACM} Conference on Advances in Financial Technologies, {AFT} 2022, Cambridge, MA, USA, September 19-21, 2022}, pages = {30--46}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558535.3559780}, doi = {10.1145/3558535.3559780}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/Werner0GKHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_Bove22, author = {Davide Bove}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{SoK}: The Evolution of Trusted {UI} on Mobile}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {616--629}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517417}, doi = {10.1145/3488932.3517417}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Bove22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_BuhanBYS22, author = {Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{SoK}: Design Tools for Side-Channel-Aware Implementations}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {756--770}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517415}, doi = {10.1145/3488932.3517415}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BuhanBYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_GoethemFSDJ22, author = {Tom van Goethem and Gertjan Franken and Iskander S{\'{a}}nchez{-}Rola and David Dworken and Wouter Joosen}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{SoK}: Exploring Current and Future Research Directions on {XS}-Leaks through an Extended Formal Model}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {784--798}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517416}, doi = {10.1145/3488932.3517416}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/GoethemFSDJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_HaoO22, author = {Feng Hao and Paul C. van Oorschot}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{SoK}: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {697--711}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3523256}, doi = {10.1145/3488932.3523256}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/HaoO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_SchmidbauerW22, author = {Tobias Schmidbauer and Steffen Wendzel}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{SoK}: {A} Survey Of Indirect Network-level Covert Channels}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {546--560}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517418}, doi = {10.1145/3488932.3517418}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SchmidbauerW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csr2_LeeKK22, author = {Hwiwon Lee and Sosun Kim and Huy Kang Kim}, title = {{SoK}: Demystifying Cyber Resilience Quantification in Cyber-Physical Systems}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {178--183}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850312}, doi = {10.1109/CSR54599.2022.9850312}, timestamp = {Fri, 19 Aug 2022 14:18:24 +0200}, biburl = {https://dblp.org/rec/conf/csr2/LeeKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_AlmashaqbehS22, author = {Ghada Almashaqbeh and Ravital Solomon}, title = {{SoK}: Privacy-Preserving Computing in the Blockchain Era}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {124--139}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00016}, doi = {10.1109/EUROSP53844.2022.00016}, timestamp = {Wed, 29 Jun 2022 16:03:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AlmashaqbehS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_ApruzzeseLT22, author = {Giovanni Apruzzese and Pavel Laskov and Aliya Tastemirova}, title = {{SoK}: The Impact of Unlabelled Data in Cyberthreat Detection}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {20--42}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00010}, doi = {10.1109/EUROSP53844.2022.00010}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ApruzzeseLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_CasacubertaHL22, author = {S{\'{\i}}lvia Casacuberta and Julia Hesse and Anja Lehmann}, title = {{SoK}: Oblivious Pseudorandom Functions}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {625--646}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00045}, doi = {10.1109/EUROSP53844.2022.00045}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/CasacubertaHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_KamaraKMSTY22, author = {Seny Kamara and Abdelkarim Kati and Tarik Moataz and Thomas Schneider and Amos Treiber and Michael Yonli}, title = {{SoK}: Cryptanalysis of Encrypted Search with {LEAKER} - {A} framework for {LEakage AttacK Evaluation on Real-world data}}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {90--108}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00014}, doi = {10.1109/EUROSP53844.2022.00014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KamaraKMSTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_SprecherKK22, author = {Steven Sprecher and Christoph Kerschbaumer and Engin Kirda}, title = {{SoK}: All or Nothing - {A} Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {206--222}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00021}, doi = {10.1109/EUROSP53844.2022.00021}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SprecherKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_SubramaniJKP22, author = {Karthika Subramani and Jordan Jueckstock and Alexandros Kapravelos and Roberto Perdisci}, title = {{SoK}: Workerounds - Categorizing Service Worker Attacks and Mitigations}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {555--571}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00041}, doi = {10.1109/EUROSP53844.2022.00041}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SubramaniJKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurousec_LamondRWP22, author = {Maria Lamond and Karen Renaud and Lara Wood and Suzanne Prior}, title = {{SOK:} Young Children's Cybersecurity Knowledge, Skills {\&} Practice: {A} Systematic Literature Review}, booktitle = {EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29 - 30, 2022}, pages = {14--27}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3549015.3554207}, doi = {10.1145/3549015.3554207}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/LamondRWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_BaumCDFG22, author = {Carsten Baum and James Hsin{-}yu Chiang and Bernardo David and Tore Kasper Frederiksen and Lorenzo Gentile}, editor = {Shin'ichiro Matsuo and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez Hernandez and Sam Werner and Thomas Haines and Aleksander Essex and Andrea Bracciali and Massimiliano Sala}, title = {{SoK}: Mitigation of Front-Running in Decentralized Finance}, booktitle = {Financial Cryptography and Data Security. {FC} 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13412}, pages = {250--271}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32415-4_17}, doi = {10.1007/978-3-031-32415-4_17}, timestamp = {Wed, 26 Jul 2023 08:43:08 +0200}, biburl = {https://dblp.org/rec/conf/fc/BaumCDFG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_ChatzigiannisBC22, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias}, editor = {Ittay Eyal and Juan A. Garay}, title = {{SoK}: Blockchain Light Clients}, booktitle = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, pages = {615--641}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9_31}, doi = {10.1007/978-3-031-18283-9_31}, timestamp = {Tue, 25 Oct 2022 22:22:45 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChatzigiannisBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_hasp_KucukMMMA22, author = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and Steve Moyle and Andrew C. Martin and Alexandru Mereacre and Nicholas Allott}, title = {{SoK}: How Not to Architect Your Next-Generation {TEE} Malware?}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {35--44}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569568}, doi = {10.1145/3569562.3569568}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/KucukMMMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc2_BellajOBCM22, author = {Badr Bellaj and Aafaf Ouaddah and Emmanuel Bertin and No{\"{e}}l Crespi and Abdellatif Mezrioui}, title = {{SOK:} {A} Comprehensive Survey on Distributed Ledger Technologies}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2022, Shanghai, China, May 2-5, 2022}, pages = {1--16}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICBC54727.2022.9805533}, doi = {10.1109/ICBC54727.2022.9805533}, timestamp = {Mon, 04 Jul 2022 17:06:16 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/BellajOBCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_icbc2_CousaertXM22, author = {Simon Cousaert and Jiahua Xu and Toshiko Matsui}, title = {{SoK}: Yield Aggregators in {DeFi}}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2022, Shanghai, China, May 2-5, 2022}, pages = {1--14}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICBC54727.2022.9805523}, doi = {10.1109/ICBC54727.2022.9805523}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbc2/CousaertXM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_scored_OkaforSTD22, author = {Chinenye Okafor and Taylor R. Schorlemmer and Santiago Torres{-}Arias and James C. Davis}, editor = {Santiago Torres{-}Arias and Marcela S. Melara and Laurent Simon}, title = {{SoK}: Analysis of Software Supply Chain Security by Establishing Secure Design Properties}, booktitle = {Proceedings of the 2022 {ACM} Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA, 7 November 2022}, pages = {15--24}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560835.3564556}, doi = {10.1145/3560835.3564556}, timestamp = {Fri, 24 Nov 2023 19:40:37 +0100}, biburl = {https://dblp.org/rec/conf/scored/OkaforSTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_seed_AkramAPL22, author = {Ayaz Akram and Venkatesh Akella and Sean Peisert and Jason Lowe{-}Power}, title = {{SoK}: Limitations of Confidential Computing via {TEEs} for High-Performance Compute Systems}, booktitle = {2022 {IEEE} International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022}, pages = {121--132}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SEED55351.2022.00018}, doi = {10.1109/SEED55351.2022.00018}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seed/AkramAPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_seed_GuancialePV22, author = {Roberto Guanciale and Nicolae Paladi and Arash Vahidi}, title = {{SoK}: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing}, booktitle = {2022 {IEEE} International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022}, pages = {109--120}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SEED55351.2022.00017}, doi = {10.1109/SEED55351.2022.00017}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seed/GuancialePV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_CauligiDMBS22, author = {Sunjay Cauligi and Craig Disselkoen and Daniel Moghimi and Gilles Barthe and Deian Stefan}, title = {{SoK}: Practical Foundations for Software Spectre Defenses}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {666--680}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833707}, doi = {10.1109/SP46214.2022.9833707}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/CauligiDMBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_LiuYWB22, author = {Zhibo Liu and Yuanyuan Yuan and Shuai Wang and Yuyan Bao}, title = {{SoK}: Demystifying Binary Lifters Through the Lens of Downstream Applications}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1100--1119}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833799}, doi = {10.1109/SP46214.2022.9833799}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiuYWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_LukasJLK22, author = {Nils Lukas and Edward Jiang and Xinda Li and Florian Kerschbaum}, title = {{SoK}: How Robust is Image Classification Deep Neural Network Watermarking?}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {787--804}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833693}, doi = {10.1109/SP46214.2022.9833693}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LukasJLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_Obada-ObiehHSB22, author = {Borke Obada{-}Obieh and Yue Huang and Lucrezia Spagnolo and Konstantin Beznosov}, title = {{SoK}: The Dual Nature of Technology in Sexual Abuse}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2320--2343}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833663}, doi = {10.1109/SP46214.2022.9833663}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Obada-ObiehHSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_StephensonPFFZ022, author = {Sophie Stephenson and Bijeeta Pal and Stephen Fan and Earlence Fernandes and Yuhang Zhao and Rahul Chatterjee}, title = {{SoK}: Authentication in Augmented and Virtual Reality}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {267--284}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833742}, doi = {10.1109/SP46214.2022.9833742}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/StephensonPFFZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_WarfordMYACKMMS22, author = {Noel Warford and Tara Matthews and Kaitlyn Yang and Omer Akgul and Sunny Consolvo and Patrick Gage Kelley and Nathan Malkin and Michelle L. Mazurek and Manya Sleeper and Kurt Thomas}, title = {{SoK}: {A} Framework for Unifying At-Risk User Research}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2344--2360}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833643}, doi = {10.1109/SP46214.2022.9833643}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WarfordMYACKMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_WuED22, author = {Yuxi Wu and W. Keith Edwards and Sauvik Das}, title = {{SoK}: Social Cybersecurity}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1863--1879}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833757}, doi = {10.1109/SP46214.2022.9833757}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WuED22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_wisec_MandalS22, author = {Anuradha Mandal and Nitesh Saxena}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {{SoK}: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {175--187}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528541}, doi = {10.1145/3507657.3528541}, timestamp = {Wed, 11 May 2022 08:49:13 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MandalS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_jsys_RazaMAKI21, author = {Ali Raza and Ibrahim Matta and Nabeel Akhtar and Vasiliki Kalavri and Vatche Isahagian}, title = {{SoK}: Function-As-A-Service: From An Application Developer's Perspective}, journal = {J. Syst. Res.}, volume = {1}, number = {1}, year = {2021}, url = {https://doi.org/10.5070/sr31154815}, doi = {10.5070/SR31154815}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsys/RazaMAKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_jsys_WhittakerGSHS21, author = {Michael J. Whittaker and Neil Giridharan and Adriana Szekeres and Joseph M. Hellerstein and Ion Stoica}, title = {{SoK}: {A} Generalized Multi-Leader State Machine Replication Tutorial}, journal = {J. Syst. Res.}, volume = {1}, number = {1}, year = {2021}, url = {https://doi.org/10.5070/sr31154817}, doi = {10.5070/SR31154817}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsys/WhittakerGSHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_Cabrero-Holgueras21, author = {Jos{\'{e}} Cabrero{-}Holgueras and Sergio Pastrana}, title = {{SoK}: Privacy-Preserving Computation Techniques for Deep Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {139--162}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0064}, doi = {10.2478/POPETS-2021-0064}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/Cabrero-Holgueras21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_ChatelPTH21, author = {Sylvain Chatel and Apostolos Pyrgelis and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Jean{-}Pierre Hubaux}, title = {{SoK}: Privacy-Preserving Collaborative Tree-based Model Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {3}, pages = {182--203}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0043}, doi = {10.2478/POPETS-2021-0043}, timestamp = {Fri, 21 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ChatelPTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_GurtlerG21, author = {Stan Gurtler and Ian Goldberg}, title = {{SoK}: Privacy-Preserving Reputation Systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {107--127}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0007}, doi = {10.2478/POPETS-2021-0007}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GurtlerG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_HegdeMSY21, author = {Aditya Hegde and Helen M{\"{o}}llering and Thomas Schneider and Hossein Yalame}, title = {{SoK}: Efficient Privacy-preserving Clustering}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {225--248}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0068}, doi = {10.2478/POPETS-2021-0068}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HegdeMSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_SchnitzlerMDP21, author = {Theodor Schnitzler and Muhammad Shujaat Mirza and Markus D{\"{u}}rmuth and Christina P{\"{o}}pper}, title = {{SoK}: Managing Longitudinal Privacy of Publicly Shared Personal Online Data}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {229--249}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0013}, doi = {10.2478/POPETS-2021-0013}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/SchnitzlerMDP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_KochbergerSSKW21, author = {Patrick Kochberger and Sebastian Schrittwieser and Stefan Schweighofer and Peter Kieseberg and Edgar R. Weippl}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {{SoK}: Automatic Deobfuscation of Virtualization-protected Applications}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {6:1--6:15}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465772}, doi = {10.1145/3465481.3465772}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KochbergerSSKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_KolachalaSAV21, author = {Kartick Kolachala and Ecem Simsek and Mohammed Ababneh and Roopa Vishwanathan}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {{SoK}: Money Laundering in Cryptocurrencies}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {5:1--5:10}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465774}, doi = {10.1145/3465481.3465774}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KolachalaSAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_Martinez-Rodriguez21, author = {Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and Ignacio M. Delgado{-}Lozano and Billy Bob Brumley}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {{SoK}: Remote Power Analysis}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {7:1--7:12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465773}, doi = {10.1145/3465481.3465773}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Martinez-Rodriguez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_acns_ChatzigiannisBC21, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {{SoK}: Auditability and Accountability in Distributed Payment Systems}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12727}, pages = {311--337}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78375-4_13}, doi = {10.1007/978-3-030-78375-4_13}, timestamp = {Thu, 10 Jun 2021 16:38:04 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChatzigiannisBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_EskandariSGC21, author = {Shayan Eskandari and Mehdi Salehi and Wanyun Catherine Gu and Jeremy Clark}, editor = {Foteini Baldimtsi and Tim Roughgarden}, title = {{SoK}: oracles from the ground truth to market manipulation}, booktitle = {{AFT} '21: 3rd {ACM} Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26 - 28, 2021}, pages = {127--141}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3479722.3480994}, doi = {10.1145/3479722.3480994}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/EskandariSGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccs_FasanoBMLBDEFLG21, author = {Andrew Fasano and Tiemoko Ballo and Marius Muench and Tim Leek and Alexander Bulekov and Brendan Dolan{-}Gavitt and Manuel Egele and Aur{\'{e}}lien Francillon and Long Lu and Nick Gregory and Davide Balzarotti and William Robertson}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{SoK}: Enabling Security Analyses of Embedded Systems via Rehosting}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {687--701}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453093}, doi = {10.1145/3433210.3453093}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_cans_NovkovicG21, author = {Bojan Novkovic and Marin Golub}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {{SoK}: Secure Memory Allocation}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {372--391}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2_20}, doi = {10.1007/978-3-030-92548-2_20}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/NovkovicG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csr2_RouffWSH21, author = {Christopher A. Rouff and Lanier A. Watkins and Roy Sterritt and Salim Hariri}, title = {{SoK}: Autonomic Cybersecurity - Securing Future Disruptive Technologies}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {66--72}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527908}, doi = {10.1109/CSR51186.2021.9527908}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csr2/RouffWSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csr2_TomurGSEKKC21, author = {Emrah Tomur and Utku G{\"{u}}len and Elif Ustundag Soykan and Mehmet Akif Ersoy and Ferhat Karako{\c{c}} and Leyli Kara{\c{c}}ay and Pinar {\c{C}}omak}, title = {{SoK}: Investigation of Security and Functional Safety in Industrial {IoT}}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {226--233}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527921}, doi = {10.1109/CSR51186.2021.9527921}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/TomurGSEKKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ctrsa_HowePA21, author = {James Howe and Thomas Prest and Daniel Apon}, editor = {Kenneth G. Paterson}, title = {{SoK}: How (not) to Design and Implement Post-quantum Cryptography}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {444--477}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3_19}, doi = {10.1007/978-3-030-75539-3_19}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HowePA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ctrsa_PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Kenneth G. Paterson}, title = {{SoK}: Game-Based Security Models for Group Key Exchange}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {148--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3_7}, doi = {10.1007/978-3-030-75539-3_7}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eisa_ShresthaITD21, author = {Sunny Shrestha and Esa Irby and Raghav Thapa and Sanchari Das}, editor = {Weizhi Meng and Sokratis K. Katsikas}, title = {{SoK}: {A} Systematic Literature Review of {Bluetooth} Security Threats and Mitigation Measures}, booktitle = {Emerging Information Security and Applications - Second International Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1403}, pages = {108--127}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93956-4_7}, doi = {10.1007/978-3-030-93956-4_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/ShresthaITD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_DessoukySZ21, author = {Ghada Dessouky and Ahmad{-}Reza Sadeghi and Shaza Zeitouni}, title = {{SoK}: Secure {FPGA} Multi-Tenancy in the Cloud: Challenges and Opportunities}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {487--506}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00040}, doi = {10.1109/EUROSP51992.2021.00040}, timestamp = {Thu, 11 Nov 2021 09:11:58 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/DessoukySZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_HeZMSFHU21, author = {Weijia He and Valerie Zhao and Olivia Morkved and Sabeeka Siddiqui and Earlence Fernandes and Josiah D. Hester and Blase Ur}, title = {{SoK}: Context Sensing for Access Control in the Adversarial Home {IoT}}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {37--53}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00014}, doi = {10.1109/EUROSP51992.2021.00014}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/HeZMSFHU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_RokickiML21, author = {Thomas Rokicki and Cl{\'{e}}mentine Maurice and Pierre Laperdrix}, title = {{SoK}: In Search of Lost Time: {A} Review of {JavaScript} Timers in Browsers}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {472--486}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00039}, doi = {10.1109/EUROSP51992.2021.00039}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/RokickiML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_SunMLC21, author = {Ruimin Sun and Alejandro Mera and Long Lu and David R. Choffnes}, title = {{SoK}: Attacks on Industrial Control Logic and Formal Verification-Based Defenses}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {385--402}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00034}, doi = {10.1109/EUROSP51992.2021.00034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SunMLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_TekinerAUKS21, author = {Ege Tekiner and Abbas Acar and A. Selcuk Uluagac and Engin Kirda and Ali Aydin Sel{\c{c}}uk}, title = {{SoK}: Cryptojacking Malware}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {120--139}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00019}, doi = {10.1109/EUROSP51992.2021.00019}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/TekinerAUKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_VermeerWCNCEFGM21, author = {Mathew Vermeer and Jonathan West and Alejandro Cuevas and Shuonan Niu and Nicolas Christin and Michel van Eeten and Tobias Fiebig and Carlos Ga{\~{n}}{\'{a}}n and Tyler Moore}, title = {{SoK}: {A} Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {440--456}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00037}, doi = {10.1109/EUROSP51992.2021.00037}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/VermeerWCNCEFGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurousec_MokhberiB21, author = {Azadeh Mokhberi and Konstantin Beznosov}, title = {{SoK}: Human, Organizational, and Technological Dimensions of Developers' Challenges in Engineering Secure Software}, booktitle = {EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11 - 12, 2021}, pages = {59--75}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3481357.3481522}, doi = {10.1145/3481357.3481522}, timestamp = {Tue, 14 Dec 2021 14:30:59 +0100}, biburl = {https://dblp.org/rec/conf/eurousec/MokhberiB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_BartolettiCL21a, author = {Massimo Bartoletti and James Hsin{-}yu Chiang and Alberto Lluch{-}Lafuente}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {{SoK}: Lending Pools in Decentralized Finance}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {553--578}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0_40}, doi = {10.1007/978-3-662-63958-0_40}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/BartolettiCL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_ClarkORSZ21, author = {Jeremy Clark and Paul C. van Oorschot and Scott Ruoti and Kent E. Seamons and Daniel Zappala}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {{SoK}: Securing Email - {A} Stakeholder-Based Analysis}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {360--390}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8_18}, doi = {10.1007/978-3-662-64322-8_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ClarkORSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_JudmayerSZTEGMW21, author = {Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar R. Weippl}, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {{SoK}: Algorithmic Incentive Manipulation Attacks on Permissionless {PoW} Cryptocurrencies}, booktitle = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, pages = {507--532}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0_38}, doi = {10.1007/978-3-662-63958-0_38}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JudmayerSZTEGMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_ZamyatinAZKMKK21, author = {Alexei Zamyatin and Mustafa Al{-}Bassam and Dionysis Zindros and Eleftherios Kokoris{-}Kogias and Pedro Moreno{-}Sanchez and Aggelos Kiayias and William J. Knottenbelt}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {{SoK}: Communication Across Distributed Ledgers}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {3--36}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0_1}, doi = {10.1007/978-3-662-64331-0_1}, timestamp = {Thu, 16 Mar 2023 14:52:53 +0100}, biburl = {https://dblp.org/rec/conf/fc/ZamyatinAZKMKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_seed_HuHL21, author = {Guangyuan Hu and Zecheng He and Ruby B. Lee}, title = {{SoK}: Hardware Defenses Against Speculative Execution Attacks}, booktitle = {2021 International Symposium on Secure and Private Execution Environment Design (SEED), Washington, DC, USA, September 20-21, 2021}, pages = {108--120}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SEED51797.2021.00023}, doi = {10.1109/SEED51797.2021.00023}, timestamp = {Tue, 08 Nov 2022 13:30:39 +0100}, biburl = {https://dblp.org/rec/conf/seed/HuHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_soups_FranzZAH0B021, author = {Anjuli Franz and Verena Zimmermann and Gregor Albrecht and Katrin Hartwig and Christian Reuter and Alexander Benlian and Joachim Vogt}, editor = {Sonia Chiasson}, title = {{SoK}: Still Plenty of Phish in the Sea - {A} Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {339--358}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/franz}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/FranzZAH0B021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_AbdullahWBPT21, author = {Hadi Abdullah and Kevin Warren and Vincent Bindschaedler and Nicolas Papernot and Patrick Traynor}, title = {{SoK}: The Faults in our {ASRs}: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {730--747}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00014}, doi = {10.1109/SP40001.2021.00014}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbdullahWBPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_BarbosaBBBCLP21, author = {Manuel Barbosa and Gilles Barthe and Karthik Bhargavan and Bruno Blanchet and Cas Cremers and Kevin Liao and Bryan Parno}, title = {{SoK}: Computer-Aided Cryptography}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {777--795}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00008}, doi = {10.1109/SP40001.2021.00008}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BarbosaBBBCLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_NassiBMSE21, author = {Ben Nassi and Ron Bitton and Ryusuke Masuoka and Asaf Shabtai and Yuval Elovici}, title = {{SoK}: Security and Privacy in the Age of Commercial Drones}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1434--1451}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00005}, doi = {10.1109/SP40001.2021.00005}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/NassiBMSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_PangYCKPMX21, author = {Chengbin Pang and Ruotong Yu and Yaohui Chen and Eric Koskinen and Georgios Portokalidis and Bing Mao and Jun Xu}, title = {{SoK}: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {833--851}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00012}, doi = {10.1109/SP40001.2021.00012}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/PangYCKPMX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_ThomasABBBCDDKK21, author = {Kurt Thomas and Devdatta Akhawe and Michael D. Bailey and Dan Boneh and Elie Bursztein and Sunny Consolvo and Nicola Dell and Zakir Durumeric and Patrick Gage Kelley and Deepak Kumar and Damon McCoy and Sarah Meiklejohn and Thomas Ristenpart and Gianluca Stringhini}, title = {{SoK}: Hate, Harassment, and the Changing Landscape of Online Abuse}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {247--267}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00028}, doi = {10.1109/SP40001.2021.00028}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ThomasABBBCDDKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_ViandJH21, author = {Alexander Viand and Patrick Jattke and Anwar Hithnawi}, title = {{SoK}: Fully Homomorphic Encryption Compilers}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1092--1108}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00068}, doi = {10.1109/SP40001.2021.00068}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ViandJH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_WoodsB21, author = {Daniel W. Woods and Rainer B{\"{o}}hme}, title = {{SoK}: Quantifying Cyber Risk}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {211--228}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00053}, doi = {10.1109/SP40001.2021.00053}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WoodsB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_stast_TaziDRD21, author = {Faiza Tazi and Josiah Dykstra and Prashanth Rajivan and Sanchari Das}, editor = {Simon E. Parkin and Luca Vigan{\`{o}}}, title = {{SOK:} Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare}, booktitle = {Socio-Technical Aspects in Security - 11th International Workshop, {STAST} 2021, Virtual Event, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13176}, pages = {153--181}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-10183-0_8}, doi = {10.1007/978-3-031-10183-0_8}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/TaziDRD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ucc_0033N21, author = {Gang Wang and Mark Nixon}, editor = {Luiz F. Bittencourt and Alan Sill}, title = {{SoK}: tokenization on blockchain}, booktitle = {{UCC} '21: 2021 {IEEE/ACM} 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021 - Companion Volume}, pages = {11:1--11:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3492323.3495577}, doi = {10.1145/3492323.3495577}, timestamp = {Thu, 10 Feb 2022 10:37:39 +0100}, biburl = {https://dblp.org/rec/conf/ucc/0033N21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_wisec_WalkerS21, author = {Payton Walker and Nitesh Saxena}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {{SoK}: assessing the threat potential of vibration-based attacks against live speech using mobile sensors}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {273--287}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467825}, doi = {10.1145/3448300.3467825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_compsec_DionysiouA20, author = {Antreas Dionysiou and Elias Athanasopoulos}, title = {{SoK}: Machine vs. machine - {A} systematic classification of automated machine learning-based {CAPTCHA} solvers}, journal = {Comput. Secur.}, volume = {97}, pages = {101947}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101947}, doi = {10.1016/J.COSE.2020.101947}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DionysiouA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_comsur_DasBAVD20, author = {Avisha Das and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Arthur Dunbar}, title = {{SoK}: {A} Comprehensive Reexamination of Phishing Research From the Security Perspective}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {1}, pages = {671--708}, year = {2020}, url = {https://doi.org/10.1109/COMST.2019.2957750}, doi = {10.1109/COMST.2019.2957750}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/DasBAVD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_DesfontainesP20, author = {Damien Desfontaines and Bal{\'{a}}zs Pej{\'{o}}}, title = {{SoK}: Differential privacies}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {2}, pages = {288--313}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0028}, doi = {10.2478/POPETS-2020-0028}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DesfontainesP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_SaleemN20, author = {Hamza Saleem and Muhammad Naveed}, title = {{SoK}: Anatomy of Data Breaches}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {4}, pages = {153--174}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0067}, doi = {10.2478/POPETS-2020-0067}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SaleemN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tdp_NelsonR20, author = {Boel Nelson and Jenni Reuben}, title = {{SoK}: Chasing Accuracy and Privacy, and Catching Both in Differentially Private Histogram Publication}, journal = {Trans. Data Priv.}, volume = {13}, number = {3}, pages = {201--245}, year = {2020}, url = {http://www.tdp.cat/issues16/abs.a387a20.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/NelsonR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_DieschK20, author = {Rainer Diesch and Helmut Krcmar}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SoK}: linking information security metrics to management success factors}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {98:1--98:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407059}, doi = {10.1145/3407023.3407059}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DieschK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_DotanP0TZ20, author = {Maya Dotan and Yvonne{-}Anne Pignolet and Stefan Schmid and Saar Tochner and Aviv Zohar}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SOK:} cryptocurrency networking context, state-of-the-art, challenges}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {5:1--5:13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407043}, doi = {10.1145/3407023.3407043}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DotanP0TZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_DuHSASLS20, author = {Xiaoyu Du and Chris Hargreaves and John Sheppard and Felix Anda and Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SoK}: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {46:1--46:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407068}, doi = {10.1145/3407023.3407068}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DuHSASLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_Halpin20, author = {Harry Halpin}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SoK}: why {Johnny} can't fix {PGP} standardization}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {34:1--34:6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407083}, doi = {10.1145/3407023.3407083}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Halpin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_HusakJY20, author = {Martin Hus{\'{a}}k and Tom{\'{a}}s Jirs{\'{\i}}k and Shanchieh Jay Yang}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SoK}: contemporary issues and challenges to enable cyber situational awareness for network security}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {2:1--2:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407062}, doi = {10.1145/3407023.3407062}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HusakJY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_RivaVZ20, author = {Giovanni Maria Riva and Alexandr Vasenev and Nicola Zannone}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SoK}: engineering privacy-aware high-tech systems}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {19:1--19:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407061}, doi = {10.1145/3407023.3407061}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RivaVZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_IEEEares_WidhalmGK20, author = {Dominik Widhalm and Karl M. G{\"{o}}schka and Wolfgang Kastner}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{SoK}: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {17:1--17:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407027}, doi = {10.1145/3407023.3407027}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WidhalmGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_asiaccsscc_YaoZGW20, author = {Jing Yao and Yifeng Zheng and Yu Guo and Cong Wang}, title = {{SoK}: {A} Systematic Study of Attacks in Efficient Encrypted Cloud Data Search}, booktitle = {Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference, October 6, 2020}, pages = {14--20}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384942.3406869}, doi = {10.1145/3384942.3406869}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccsscc/YaoZGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_RajendranMC20, author = {Sree Ranjani Rajendran and Rijoy Mukherjee and Rajat Subhra Chakraborty}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Patrick Schaumont}, title = {{SoK}: Physical and Logic Testing Techniques for Hardware {Trojan} Detection}, booktitle = {Proceedings of the 4th {ACM} Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020}, pages = {103--116}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411504.3421211}, doi = {10.1145/3411504.3421211}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RajendranMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_Ruhrmair20, author = {Ulrich R{\"{u}}hrmair}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Patrick Schaumont}, title = {{SoK}: Towards Secret-Free Security}, booktitle = {Proceedings of the 4th {ACM} Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020}, pages = {5--19}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411504.3421220}, doi = {10.1145/3411504.3421220}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ruhrmair20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_csfw_Haines020, author = {Thomas Haines and Johannes M{\"{u}}ller}, title = {{SoK}: Techniques for Verifiable Mix Nets}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {49--64}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00012}, doi = {10.1109/CSF49147.2020.00012}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Haines020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ctrsa_GarayK20, author = {Juan A. Garay and Aggelos Kiayias}, editor = {Stanislaw Jarecki}, title = {{SoK}: {A} Consensus Taxonomy in the Blockchain Era}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {284--318}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3_13}, doi = {10.1007/978-3-030-40186-3_13}, timestamp = {Fri, 14 Feb 2020 13:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GarayK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_ChuatAS0BP20, author = {Laurent Chuat and AbdelRahman Abdou and Ralf Sasse and Christoph Sprenger and David A. Basin and Adrian Perrig}, title = {{SoK}: Delegation and Revocation, the Missing Links in the Web's Chain of Trust}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {624--638}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00046}, doi = {10.1109/EUROSP48549.2020.00046}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ChuatAS0BP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_GudgeonMRMG20, author = {Lewis Gudgeon and Pedro Moreno{-}Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais}, editor = {Joseph Bonneau and Nadia Heninger}, title = {{SoK}: Layer-Two Blockchain Protocols}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {201--226}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4_12}, doi = {10.1007/978-3-030-51280-4_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GudgeonMRMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_MoinSS20, author = {Amani Moin and Kevin Sekniqi and Emin G{\"{u}}n Sirer}, editor = {Joseph Bonneau and Nadia Heninger}, title = {{SoK}: {A} Classification Framework for Stablecoin Designs}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {174--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4_11}, doi = {10.1007/978-3-030-51280-4_11}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MoinSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_micro_DangwalCALRT20, author = {Deeksha Dangwal and Meghan Cowan and Armin Alaghi and Vincent T. Lee and Brandon Reagen and Caroline Trippel}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {{SoK}: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458911}, doi = {10.1145/3458903.3458911}, timestamp = {Tue, 26 Oct 2021 15:43:33 +0200}, biburl = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_secsr_Kakvi20, author = {Saqib A. Kakvi}, editor = {Thyla van der Merwe and Chris J. Mitchell and Maryam Mehrnezhad}, title = {{SoK}: Comparison of the Security of Real World {RSA} Hash-and-Sign Signatures}, booktitle = {Security Standardisation Research - 6th International Conference, {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12529}, pages = {91--113}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64357-7_5}, doi = {10.1007/978-3-030-64357-7_5}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secsr/Kakvi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_Cerdeira0FP20, author = {David Cerdeira and Nuno Santos and Pedro Fonseca and Sandro Pinto}, title = {{SoK}: Understanding the Prevailing Security Vulnerabilities in {TrustZone}-assisted {TEE} Systems}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1416--1432}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00061}, doi = {10.1109/SP40000.2020.00061}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/Cerdeira0FP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_DambraBB20, author = {Savino Dambra and Leyla Bilge and Davide Balzarotti}, title = {{SoK}: Cyber Insurance - Technical Challenges and a System Security Roadmap}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1367--1383}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00019}, doi = {10.1109/SP40000.2020.00019}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DambraBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_TschantzSD20, author = {Michael Carl Tschantz and Shayak Sen and Anupam Datta}, title = {{SoK}: Differential Privacy as a Causal Property}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {354--371}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00012}, doi = {10.1109/SP40000.2020.00012}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/TschantzSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_YanSBXKF20, author = {Chen Yan and Hocheol Shin and Connor Bolton and Wenyuan Xu and Yongdae Kim and Kevin Fu}, title = {{SoK}: {A} Minimalist Approach to Formalizing Analog Sensor Security}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {233--248}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00026}, doi = {10.1109/SP40000.2020.00026}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YanSBXKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_wpes_MorelP20, author = {Victor Morel and Ra{\'{u}}l Pardo}, editor = {Jay Ligatti and Xinming Ou and Wouter Lueks and Paul Syverson}, title = {{SoK}: Three Facets of Privacy Policies}, booktitle = {WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020}, pages = {41--56}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411497.3420216}, doi = {10.1145/3411497.3420216}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MorelP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_jowua_KimORLKL19, author = {Aram Kim and Junhyoung Oh and Jinho Ryu and Jemin Lee and Kookheui Kwon and Kyungho Lee}, title = {{SoK}: {A} Systematic Review of Insider Threat Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {46--67}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.046}, doi = {10.22667/JOWUA.2019.12.31.046}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimORLKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_KissNLAS19, author = {{\'{A}}gnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider}, title = {{SoK}: Modular and Efficient Private Decision Tree Evaluation}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {2}, pages = {187--208}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0026}, doi = {10.2478/POPETS-2019-0026}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KissNLAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_BanoSAAMMD19, author = {Shehar Bano and Alberto Sonnino and Mustafa Al{-}Bassam and Sarah Azouvi and Patrick McCorry and Sarah Meiklejohn and George Danezis}, title = {{SoK}: Consensus in the Age of Blockchains}, booktitle = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies, {AFT} 2019, Zurich, Switzerland, October 21-23, 2019}, pages = {183--198}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3318041.3355458}, doi = {10.1145/3318041.3355458}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/aft/BanoSAAMMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_aft_WangSNH19, author = {Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han}, title = {{SoK}: Sharding on Blockchain}, booktitle = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies, {AFT} 2019, Zurich, Switzerland, October 21-23, 2019}, pages = {41--61}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3318041.3355457}, doi = {10.1145/3318041.3355457}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/WangSNH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_AzrielGM19, author = {Leonid Azriel and Ran Ginosar and Avi Mendelson}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Patrick Schaumont}, title = {{SoK}: An Overview of Algorithmic Methods in {IC} Reverse Engineering}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15, 2019}, pages = {65--74}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338508.3359575}, doi = {10.1145/3338508.3359575}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AzrielGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_DEliaCNPC19, author = {Daniele Cono D'Elia and Emilio Coppa and Simone Nicchi and Federico Palmaro and Lorenzo Cavallaro}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{SoK}: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {15--27}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329819}, doi = {10.1145/3321705.3329819}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DEliaCNPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_KhairallahHNBBP19, author = {Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{SoK}: On {DFA} Vulnerabilities of Substitution-Permutation Networks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {403--414}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329810}, doi = {10.1145/3321705.3329810}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhairallahHNBBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_desec_AlsalamiZ19a, author = {Nasser Alsalami and Bingsheng Zhang}, title = {{SoK}: {A} Systematic Study of Anonymity in Cryptocurrencies}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937681}, doi = {10.1109/DSC47296.2019.8937681}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/AlsalamiZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_KouweHABG19, author = {Erik van der Kouwe and Gernot Heiser and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida}, title = {{SoK}: Benchmarking Flaws in Systems Security}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {310--325}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00031}, doi = {10.1109/EUROSP.2019.00031}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KouweHABG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_AngeloSS19, author = {Monika Di Angelo and Christian Sack and Gernot Salzer}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {{SoK}: Development of Secure Smart Contracts - Lessons from a Graduate Course}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {91--105}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1_8}, doi = {10.1007/978-3-030-43725-1_8}, timestamp = {Mon, 03 Jan 2022 22:29:34 +0100}, biburl = {https://dblp.org/rec/conf/fc/AngeloSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_fc_EskandariMC19, author = {Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {{SoK}: Transparent Dishonesty: Front-Running Attacks on Blockchain}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {170--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1_13}, doi = {10.1007/978-3-030-43725-1_13}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/EskandariMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_primelife_AzraouiBBCCEMMO19, author = {Monir Azraoui and Muhammad Barham and Beyza Bozdemir and S{\'{e}}bastien Canard and Eleonora Ciceri and Orhan Ermis and Ramy Masalha and Marco Mosconi and Melek {\"{O}}nen and Marie Paindavoine and Boris Rozenberg and Bastien Vialla and Sauro Vicini}, editor = {Michael Friedewald and Melek {\"{O}}nen and Eva Lievens and Stephan Krenn and Samuel Fricker}, title = {{SoK}: Cryptography for Neural Networks}, booktitle = {Privacy and Identity Management. Data for Better Living: {AI} and Privacy - 14th {IFIP} {WG} 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {576}, pages = {63--81}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42504-3_5}, doi = {10.1007/978-3-030-42504-3_5}, timestamp = {Fri, 14 May 2021 08:34:20 +0200}, biburl = {https://dblp.org/rec/conf/primelife/AzraouiBBCCEMMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_securecomm_OosthoekD19, author = {Kris Oosthoek and Christian Doerr}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {{SoK}: {ATT\&CK} Techniques and Trends in {Windows} Malware}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {406--425}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6_20}, doi = {10.1007/978-3-030-37228-6_20}, timestamp = {Sat, 07 Mar 2020 15:32:26 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/OosthoekD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_AlrawiLAM19, author = {Omar Alrawi and Chaz Lever and Manos Antonakakis and Fabian Monrose}, title = {{SoK}: Security Evaluation of Home-Based {IoT} Deployments}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1362--1380}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00013}, doi = {10.1109/SP.2019.00013}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/AlrawiLAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_BurowZP19, author = {Nathan Burow and Xinping Zhang and Mathias Payer}, title = {{SoK}: Shining Light on Shadow Stacks}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {985--999}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00076}, doi = {10.1109/SP.2019.00076}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BurowZP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_DasWAPM19, author = {Sanjeev Das and Jan Werner and Manos Antonakakis and Michalis Polychronakis and Fabian Monrose}, title = {{SoK}: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {20--38}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00021}, doi = {10.1109/SP.2019.00021}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DasWAPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_HastingsHNZ19, author = {Marcella Hastings and Brett Hemenway and Daniel Noble and Steve Zdancewic}, title = {{SoK}: General Purpose Compilers for Secure Multi-Party Computation}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1220--1237}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00028}, doi = {10.1109/SP.2019.00028}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HastingsHNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_SongLRNVLF19, author = {Dokyung Song and Julian Lettner and Prabhu Rajasekaran and Yeoul Na and Stijn Volckaert and Per Larsen and Michael Franz}, title = {{SoK}: Sanitizing for Security}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1275--1295}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00010}, doi = {10.1109/SP.2019.00010}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SongLRNVLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_Faz-HernandezLO18, author = {Armando Faz{-}Hern{\'{a}}ndez and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Ana Karina D. S. de Oliveira}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {{SoK}: {A} Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {9--18}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197511}, doi = {10.1145/3197507.3197511}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Faz-HernandezLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_UrbanikJ18, author = {David Urbanik and David Jao}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {{SoK}: The Problem Landscape of {SIDH}}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {53--60}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197516}, doi = {10.1145/3197507.3197516}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/UrbanikJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_PapernotMSW18, author = {Nicolas Papernot and Patrick D. McDaniel and Arunesh Sinha and Michael P. Wellman}, title = {{SoK}: Security and Privacy in Machine Learning}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {399--414}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00035}, doi = {10.1109/EUROSP.2018.00035}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/PapernotMSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_post_AtzeiBCLZ18, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino}, editor = {Lujo Bauer and Ralf K{\"{u}}sters}, title = {{SoK}: Unraveling Bitcoin Smart Contracts}, booktitle = {Principles of Security and Trust - 7th International Conference, {POST} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10804}, pages = {217--242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89722-6_9}, doi = {10.1007/978-3-319-89722-6_9}, timestamp = {Fri, 31 Jan 2020 21:32:30 +0100}, biburl = {https://dblp.org/rec/conf/post/AtzeiBCLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_Monaco18, author = {John V. Monaco}, title = {{SoK}: Keylogging Side Channels}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {211--228}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00026}, doi = {10.1109/SP.2018.00026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Monaco18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_TianSKBBB18, author = {Jing (Dave) Tian and Nolen Scaife and Deepak Kumar and Michael D. Bailey and Adam Bates and Kevin R. B. Butler}, title = {{SoK}: "Plug {\&} Pray" Today - Understanding {USB} Insecurity in Versions 1 Through {C}}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {1032--1047}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00037}, doi = {10.1109/SP.2018.00037}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TianSKBBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_woot_GawlikH18, author = {Robert Gawlik and Thorsten Holz}, editor = {Christian Rossow and Yves Younan}, title = {{SoK}: Make {JIT}-Spray Great Again}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/gawlik}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/GawlikH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_tosc_Ruhault17, author = {Sylvain Ruhault}, title = {{SoK}: Security Models for Pseudo-Random Number Generators}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {506--544}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.506-544}, doi = {10.13154/TOSC.V2017.I1.506-544}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Ruhault17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_ccs_MalekiRD17, author = {Hoda Maleki and Reza Rahaeimehr and Marten van Dijk}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Wei Zhang}, title = {{SoK}: {RFID}-based Clone Detection Mechanisms for Supply Chains}, booktitle = {Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {33--41}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139324.3139332}, doi = {10.1145/3139324.3139332}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MalekiRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_MainkaMSW17, author = {Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk and Tobias Wich}, title = {{SoK}: Single Sign-On Security - An Evaluation of {OpenID Connect}}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {251--266}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.32}, doi = {10.1109/EUROSP.2017.32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MainkaMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_eurosp_SahinFGA17, author = {Merve Sahin and Aur{\'{e}}lien Francillon and Payas Gupta and Mustaque Ahamad}, title = {{SoK}: Fraud in Telephony Networks}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {235--250}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.40}, doi = {10.1109/EUROSP.2017.40}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SahinFGA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_FullerVYSHGSMC17, author = {Benjamin Fuller and Mayank Varia and Arkady Yerukhimovich and Emily Shen and Ariel Hamlin and Vijay Gadepally and Richard Shay and John Darby Mitchell and Robert K. Cunningham}, title = {{SoK}: Cryptographically Protected Database Search}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {172--191}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.10}, doi = {10.1109/SP.2017.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FullerVYSHGSMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_HerleyO17, author = {Cormac Herley and Paul C. van Oorschot}, title = {{SoK}: Science, Security and the Elusive Goal of Security as a Scientific Pursuit}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {99--120}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.38}, doi = {10.1109/SP.2017.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HerleyO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_MullerMSS17, author = {Jens M{\"{u}}ller and Vladislav Mladenov and Juraj Somorovsky and J{\"{o}}rg Schwenk}, title = {{SoK}: Exploiting Network Printers}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {213--230}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.47}, doi = {10.1109/SP.2017.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MullerMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_KhattakESSMG16, author = {Sheharbano Khattak and Tariq Elahi and Laurent Simon and Colleen M. Swanson and Steven J. Murdoch and Ian Goldberg}, title = {{SoK}: Making Sense of Censorship Resistance Systems}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {4}, pages = {37--61}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0028}, doi = {10.1515/POPETS-2016-0028}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KhattakESSMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP_journals_popets_SpenskySYSTHC16, author = {Chad Spensky and Jeffrey Stewart and Arkady Yerukhimovich and Richard Shay and Ari Trachtenberg and Rick Housley and Robert K. Cunningham}, title = {{SoK}: Privacy on Mobile Devices - It's Complicated}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {3}, pages = {96--116}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0018}, doi = {10.1515/POPETS-2016-0018}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SpenskySYSTHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_isca_ZhangZ16, author = {Fengwei Zhang and Hongwei Zhang}, title = {{SoK}: {A} Study of Using Hardware-assisted Isolated Execution Environments for Security}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948621}, doi = {10.1145/2948618.2948621}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_Acar0BFM016, author = {Yasemin Acar and Michael Backes and Sven Bugiel and Sascha Fahl and Patrick D. McDaniel and Matthew Smith}, title = {{SoK}: Lessons Learned from Android Security Research for Appified Software Platforms}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {433--451}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.33}, doi = {10.1109/SP.2016.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Acar0BFM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {{SoK}: Verifiability Notions for E-Voting Protocols}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {779--798}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.52}, doi = {10.1109/SP.2016.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_Shoshitaishvili16, author = {Yan Shoshitaishvili and Ruoyu Wang and Christopher Salls and Nick Stephens and Mario Polino and Andrew Dutcher and John Grosen and Siji Feng and Christophe Hauser and Christopher Kr{\"{u}}gel and Giovanni Vigna}, title = {{SOK:} (State of) The Art of War: Offensive Techniques in Binary Analysis}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {138--157}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.17}, doi = {10.1109/SP.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Shoshitaishvili16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_TschantzAAP16, author = {Michael Carl Tschantz and Sadia Afroz and anonymous and Vern Paxson}, title = {{SoK}: Towards Grounding Censorship Circumvention in Empiricism}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {914--933}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.59}, doi = {10.1109/SP.2016.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TschantzAAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_TuDZA16, author = {Huahong Tu and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {{SoK}: Everyone Hates Robocalls: {A} Survey of Techniques Against Telephone Spam}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {320--338}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.27}, doi = {10.1109/SP.2016.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TuDZA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_woot_SpathMMS16, author = {Christopher Sp{\"{a}}th and Christian Mainka and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Natalie Silvanovich and Patrick Traynor}, title = {{SoK}: {XML} Parser Vulnerabilities}, booktitle = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin, TX, USA, August 8-9, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/woot16/workshop-program/presentation/spath}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/SpathMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_BernhardCGPW15, author = {David Bernhard and V{\'{e}}ronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {{SoK}: {A} Comprehensive Analysis of Game-Based Ballot Privacy Definitions}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {499--516}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.37}, doi = {10.1109/SP.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BernhardCGPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_BonneauMCNKF15, author = {Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten}, title = {{SoK}: Research Perspectives and Challenges for {Bitcoin} and Cryptocurrencies}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {104--121}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.14}, doi = {10.1109/SP.2015.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BonneauMCNKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_Ugarte-PedreroB15, author = {Xabier Ugarte{-}Pedrero and Davide Balzarotti and Igor Santos and Pablo Garc{\'{\i}}a Bringas}, title = {{SoK}: Deep Packer Inspection: {A} Longitudinal Study of the Complexity of Run-Time Packers}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {659--673}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.46}, doi = {10.1109/SP.2015.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Ugarte-PedreroB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_UngerDBFPG015, author = {Nik Unger and Sergej Dechand and Joseph Bonneau and Sascha Fahl and Henning Perl and Ian Goldberg and Matthew Smith}, title = {{SoK}: Secure Messaging}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {232--249}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.22}, doi = {10.1109/SP.2015.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/UngerDBFPG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_JainBZPS14, author = {Bhushan Jain and Mirza Basim Baig and Dongli Zhang and Donald E. Porter and Radu Sion}, title = {{SoK}: Introspections on Trust and the Semantic Gap}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {605--620}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.45}, doi = {10.1109/SP.2014.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/JainBZPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_LarsenHBF14, author = {Per Larsen and Andrei Homescu and Stefan Brunthaler and Michael Franz}, title = {{SoK}: Automated Software Diversity}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {276--291}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.25}, doi = {10.1109/SP.2014.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LarsenHBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_RushananRKS14, author = {Michael Rushanan and Aviel D. Rubin and Denis Foo Kune and Colleen M. Swanson}, title = {{SoK}: Security and Privacy in Implantable Medical Devices and Body Area Networks}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {524--539}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.40}, doi = {10.1109/SP.2014.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RushananRKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_AlvisiCELP13, author = {Lorenzo Alvisi and Allen Clement and Alessandro Epasto and Silvio Lattanzi and Alessandro Panconesi}, title = {{SoK}: The Evolution of Sybil Defense via Social Networks}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {382--396}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.33}, doi = {10.1109/SP.2013.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AlvisiCELP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_ClarkO13, author = {Jeremy Clark and Paul C. van Oorschot}, title = {{SoK}: {SSL} and {HTTPS}: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {511--525}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.41}, doi = {10.1109/SP.2013.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ClarkO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_ReardonBC13, author = {Joel Reardon and David A. Basin and Srdjan Capkun}, title = {{SoK}: Secure Data Deletion}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {301--315}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.28}, doi = {10.1109/SP.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ReardonBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_RossowAWSPDB13, author = {Christian Rossow and Dennis Andriesse and Tillmann Werner and Brett Stone{-}Gross and Daniel Plohmann and Christian J. Dietrich and Herbert Bos}, title = {{SoK}: {P2PWNED} - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {97--111}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.17}, doi = {10.1109/SP.2013.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RossowAWSPDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_sp_SzekeresPWS13, author = {Laszlo Szekeres and Mathias Payer and Tao Wei and Dawn Song}, title = {{SoK}: Eternal War in Memory}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {48--62}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.13}, doi = {10.1109/SP.2013.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SzekeresPWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP_conf_wisa_MeyerS13, author = {Christopher Meyer and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {{SoK}: Lessons Learned from {SSL/TLS} Attacks}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {189--209}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9_12}, doi = {10.1007/978-3-319-05149-9_12}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MeyerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } % The following are SoK papers without the word "SoK" in its title. % Source: https://oaklandsok.github.io/ @INPROCEEDINGS{6234405, author={Rossow, Christian and Dietrich, Christian J. and Grier, Chris and Kreibich, Christian and Paxson, Vern and Pohlmann, Norbert and Bos, Herbert and Steen, Maarten van}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={Prudent Practices for Designing Malware Experiments: Status Quo and Outlook}, year={2012}, pages={65--79}, doi={10.1109/SP.2012.14}, url={https://doi.org/10.1109/SP.2012.14}, } @INPROCEEDINGS{6234407, author={Zhou, Yajin and Jiang, Xuxian}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={Dissecting Android Malware: Characterization and Evolution}, year={2012}, pages={95--109}, doi={10.1109/SP.2012.16}, url={https://doi.org/10.1109/SP.2012.16}, } @INPROCEEDINGS{6234414, author={Howe, Adele E. and Ray, Indrajit and Roberts, Mark and Urbanska, Malgorzata and Byrne, Zinta}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={The Psychology of Security for the Home Computer User}, year={2012}, pages={209--223}, doi={10.1109/SP.2012.23}, url={https://doi.org/10.1109/SP.2012.23}, } @INPROCEEDINGS{6234422, author={Dyer, Kevin P. and Coull, Scott E. and Ristenpart, Thomas and Shrimpton, Thomas}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={{Peek-a-Boo}, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}, year={2012}, pages={332--346}, doi={10.1109/SP.2012.28}, url={https://doi.org/10.1109/SP.2012.28}, } @INPROCEEDINGS{6234427, author={Mayer, Jonathan R. and Mitchell, John C.}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={Third-Party Web Tracking: Policy and Technology}, year={2012}, pages={413--427}, doi={10.1109/SP.2012.47}, url={https://doi.org/10.1109/SP.2012.47}, } @INPROCEEDINGS{6234432, author={Balsa, Ero and Troncoso, Carmela and Diaz, Claudia}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={{OB-PWS}: Obfuscation-Based Private Web Search}, year={2012}, pages={491--505}, doi={10.1109/SP.2012.36}, url={https://doi.org/10.1109/SP.2012.36}, } @INPROCEEDINGS{6234436, author={Bonneau, Joseph and Herley, Cormac and Oorschot, Paul C. van and Stajano, Frank}, booktitle={2012 IEEE Symposium on Security and Privacy}, title={The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes}, year={2012}, pages={553--567}, doi={10.1109/SP.2012.44}, url={https://doi.org/10.1109/SP.2012.44}, } @INPROCEEDINGS{5958023, author={Henry, Ryan and Goldberg, Ian}, booktitle={2011 IEEE Symposium on Security and Privacy}, title={Formalizing Anonymous Blacklisting Systems}, year={2011}, pages={81--95}, doi={10.1109/SP.2011.13}, url={https://doi.org/10.1109/SP.2011.13}, } @INPROCEEDINGS{5958024, author={Becher, Michael and Freiling, Felix C. and Hoffmann, Johannes and Holz, Thorsten and Uellenbeck, Sebastian and Wolf, Christopher}, booktitle={2011 IEEE Symposium on Security and Privacy}, title={Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices}, year={2011}, pages={96--111}, doi={10.1109/SP.2011.29}, url={https://doi.org/10.1109/SP.2011.29}, } @INPROCEEDINGS{5958042, author={Armknecht, Frederik and Maes, Roel and Sadeghi, Ahmad-Reza and Standaert, François-Xavier and Wachsmann, Christian}, booktitle={2011 IEEE Symposium on Security and Privacy}, title={A Formalization of the Security Features of Physical Functions}, year={2011}, pages={397--412}, doi={10.1109/SP.2011.10}, url={https://doi.org/10.1109/SP.2011.10}, } @INPROCEEDINGS{5958043, author={Kashyap, Vineeth and Wiedermann, Ben and Hardekopf, Ben}, booktitle={2011 IEEE Symposium on Security and Privacy}, title={Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach}, year={2011}, pages={413--428}, doi={10.1109/SP.2011.19}, url={https://doi.org/10.1109/SP.2011.19}, } @INPROCEEDINGS{5504793, author={Sommer, Robin and Paxson, Vern}, booktitle={2010 IEEE Symposium on Security and Privacy}, title={Outside the Closed World: On Using Machine Learning for Network Intrusion Detection}, year={2010}, pages={305--316}, doi={10.1109/SP.2010.25}, url={https://doi.org/10.1109/SP.2010.25}, } @INPROCEEDINGS{5504796, author={Schwartz, Edward J. and Avgerinos, Thanassis and Brumley, David}, booktitle={2010 IEEE Symposium on Security and Privacy}, title={All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)}, year={2010}, pages={317--331}, doi={10.1109/SP.2010.26}, url={https://doi.org/10.1109/SP.2010.26}, } @INPROCEEDINGS{5504795, author={Bau, Jason and Bursztein, Elie and Gupta, Divij and Mitchell, John}, booktitle={2010 IEEE Symposium on Security and Privacy}, title={State of the Art: Automated Black-Box Web Application Vulnerability Testing}, year={2010}, pages={332--345}, doi={10.1109/SP.2010.27}, url={https://doi.org/10.1109/SP.2010.27}, } @INPROCEEDINGS{5504799, author={Bursztein, Elie and Bethard, Steven and Fabry, Celine and Mitchell, John C. and Jurafsky, Dan}, booktitle={2010 IEEE Symposium on Security and Privacy}, title={How Good Are Humans at Solving {CAPTCHAs}? A Large Scale Evaluation}, year={2010}, pages={399--413}, doi={10.1109/SP.2010.31}, url={https://doi.org/10.1109/SP.2010.31}, } @INPROCEEDINGS{5504802, author={Parno, Bryan and McCune, Jonathan M. and Perrig, Adrian}, booktitle={2010 IEEE Symposium on Security and Privacy}, title={Bootstrapping Trust in Commodity Computers}, year={2010}, pages={414--429}, doi={10.1109/SP.2010.32}, url={https://doi.org/10.1109/SP.2010.32}, } % The following item is an ad hoc SoK paper identified by Shujun Li. @article{Nelson-Reuben:TDP2021, author = {Boel Nelson and Jenni Reuben}, title = {{SoK}: Chasing Accuracy and Privacy, and Catching Both in Differentially Private Histogram Publication}, journal = {Transactions on Data Privacy: Foundations and Technologies}, volume = {13}, number = {3}, pages = {201--245}, year = {2021}, url = {http://www.tdp.cat/issues16/abs.a387a20.php}, }