SoK Paper List

Sok paper List
I collect SoK Papers which attracts me and share them on this page .
This list will be dynamic and under-reconstruction because I don’t have a clear idea on how to classify them properly for now .
Now it is divided in to 4 groups . T0 papers attracts me most while T3 attracts me a little bit .
ToDo
- Find out how to classify those papers properly
- Add more intresting SoK papers
- Make several individual pages to list Good SoK / Specification Papers on segmented research areas.
SoK Paper List
T0
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit
SoK: Eternal War in Memory
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
SoK: Sanitizing for Security
T1
Study of Security Flaws in the Linux Kernel by Fuzzing
SoK: Secure Messaging
Web Services Security and Threats: A Systematic Literature Review
Web Services Attacks and Security- A Systematic Literature Review
SoK: Cryptojacking Malware
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations
An Exploration Into Web Session Security- A Systematic Literature Review
SoK: Single Sign-On Security — An Evaluation of OpenID Connect
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study
How to Attack and Generate Honeywords
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations
T2
Robust Multi-tab Website Fingerprinting Attacks in the Wild
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web
OB-PWS: Obfuscation-Based Private Web Search
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations
SoK: Trusting Self-Sovereign Identity
SoK: Practical Foundations for Software Spectre Defenses
A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains
SOK: On the Analysis of Web Browser Security
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
SoK: Exploiting Network Printers
SoK: Benchmarking Flaws in Systems Security
SoK: Lessons Learned from Android Security Research for Appified Software Platforms
SoK: Automated Software Diversity
SoK: Introspections on Trust and the Semantic Gap
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Formalizing Anonymous Blacklisting Systems
State of the Art: Automated Black-Box Web Application Vulnerability Testing
SoK: Prudent Evaluation Practices for Fuzzing
SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation
QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries
Finding Specification Blind Spots via Fuzz Testing
Continual Observation under User-level Differential Privacy
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities
Continuous Intrusion: Characterizing the Security of Continuous Integration Services
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask
Anatomy of Data Breaches
T3
SoK: SGX.Fail: How Stuff Gets eXposed
SoK: Differential Privacy as a Causal Property
Attacks on Industrial Control Logic and Formal Verification-Based Defenses
SoK: Safer Digital-Safety Research Involving At-Risk Users
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse![]()
SoK: Cyber Insurance – Technical Challenges and a System Security Roadmap
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems
SoK: Social Cybersecurity
SoK: Pitfalls in Evaluating Black-Box Attacks
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
- Title: SoK Paper List
- Author: 7erry
- Created at : 2024-05-26 19:43:21
- Updated at : 2024-05-26 19:43:21
- Link: http://7erry.com/2024/05/26/SoK-Paper-List/
- License: This work is licensed under CC BY-NC 4.0.
On this page
SoK Paper List