Notable SoS Papers

To help the SoS Community be aware of the top security papers in the past year, the SoS Initiative is compiling a list of about 10-15 papers each year. This list is to help the community prioritize reading. These are just the best papers, one of us have read in the year. We're trying to keep the list short, so there will be oustanding papers missing.

2023 |2022 |2021 |2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014

2023

Author(s) Name(s)Nominated Paper TitleVenue Previously Published 
Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase UrA Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused PasswordsUSENIX Security 2023 
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, and Ben Y. ZhaoGlaze: Protecting Artists from Style Mimicry by Text-to-Image ModelsUSENIX Security 2023 
Boxin Wang, Weixin Chen, Hengzhi Pei, Chulin Xie, Mintong Kang, Chenhui Zhang, Chejian Xu, Zidi Xiong, Ritik Dutta, Rylan Schaeffer, Sang T. Truong, Simran Arora, Mantas Mazeika, Dan Hendrycks, Zinan Lin, Yu Cheng, Sanmi Koyejo, Dawn Song, Bo LiDecodingTrust: Comprehensive Assessment of Trustworthiness in GPT ModelsNeurIPS 2023Winner of NSA Paper Competition
Anna-Marie Ortloff, Christian Tiefenau, Matthew SmithSoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable SecuritySOUPS 2023Honorable Mention of NSA Paper Competition
Tadayoshi Kohno, Yasemin Acar, Wulf LohEthical Frameworks and Computer Security Trolley Problems: Foundations for ConversationsUSENIX Security 2023Honorable Mention of NSA Paper Competition
Fnu Suya, Xiao Zhang, Yuan Tian, and David EvansWhat Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?NeurIPS 2023 
Francesco Ciclosi; Fabio MassacciThe Data Protection Officer: A Ubiquitous Role That No One Really KnowsIEEE Security & Privacy Magazine 
Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael WaidnerKeep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the InternetUSENISX Security 2023 

2022

Author(s) Name(s)Nominated Paper TitleVenue Previously Published 
Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallarok, Konrad RieckDos and Don'ts of Machine Learning in Computer SecurityUSENIX Security 2022 
Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, and Xiao WangProving UNSAT in Zero KnowledgeCCS '22 
David Baelde, Stephanie Delaune, Adrien Koutsos, and Solène MoreauCracking the Stateful Nut -- Computational Proofs of Stateful Security Protocols using the Squirrel Proof AssistantIEEE S&P '23 
David Heath, Vladimir Kolesnikov, and Rafail OstrovskyEpiGRAM: Practical Garbled RAMEUROCRYPT 2022 
Brian Kondracki, Johnny So, Nick NikiforakisUninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency BotsUSENIX Security 2022NSA Best Paper Award Winner

2021

Author(s) Name(s)Nominated Paper TitleVenue Previously Published 
Boston, Brett & Breese, Samuel & Dodds, Josiah & Dodds, Mike & Huffman, Brian & Petcher, Adam & Stefanescu, AndreiVerified Cryptographic Code for Everybody33rd International Conference on Computer-Aided Verification 
Leslie Lamport and Fred B. SchneiderVerifying Hyperproperties with TLAIEEE Computer Security Foundations SymposiumWinner of Paper Competition
Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, and John Zhuang HuiA Secure and Formally Verified Linux KVM Hypervisor2021 IEEE Symposium on Security and Privacy 
L.Cheng, S. Ahmed, H. Liljestrand, T. Nyman, H. Cai, T. Jaeger, N. Asokan, D YaoExploitation Techniques for Data-oriented Attacks with Existing and Potential Defense ApproachesACM TOPS 
Liwei Song and Prateek MittalSystematic Evaluation of Privacy Risks of Machine Learning ModelsUSENIX Security 21 
Yu-Tsung LeePolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android SystemsUSENIX Security 21 
Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, and Alexandru G. BardasDefensive Technology Use by Political Activists During the Sudanese RevolutionIEEE Symposium on Security and Privacy (Oakland) and later IEEE Security & PrivacyHonorable Mention of Paper Competition

2020

Author(s) Name(s)Paper TitleVenue Previously PublishedNotes
Yanyi Liu and Rafel PassOn One-way Functions and Kolmogorov ComplexityFOCS 2020Winner of Paper Competition
Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian StefanRetrofitting Fine Grain Isolation in the Firefox Renderer29th USENIX Security Symposium (USENIX Security '20)Honorable Mention of Paper Competition
Ivan De Oliveira Nunes , Karim Eldefrawy, Norrathep Rattanavipanon, and Gene TsudikAPEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software CompromiseUsenix Security 2020 
Sauvik DasBlind and Human: Exploring More Usable Audio CAPTCHA DesignsSOUPS2020 
Qasim Lone (TU Delft), Maciej Korczy_ski (Univ. Grenoble Alpes), Carlos H. Gañán (TU Delft), Michel van Eeten (TU Delft)SAVing the Internet: Explaining the Adoption of Source Address Validation by Internet Service ProvidersWEIS 2020 
Freek Verbeek, Joshua A. Bockenek, and Binoy RavindranHighly Automated Formal Proofs over Memory Usage of Assembly Code26th International Conference, TACAS 2020 (Int’l Conf. on Tools and Algorithms for the Construction and Analysis of Systems), 
Isaac Polinsky, Kyle Martin, William Enck, Michael Reiter n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web ApplicationsCODASPY 2020  
Tim NoscoThe Industrial Age of Hacking  
Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, and Narseo Vallina-RodriguezAn Analysis of Pre-Installed Android SoftwareIEEE Symposium on Security and Privacy (2020) 

2019

Link to PaperAuthorsTitleVenueNotes
Link to PaperJoseph P. Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn SongDuet: A Expressive Higher-Order Language and Linear Type System Statically Enforcing Differential PrivacyOOPSLA 2019  
Link to PaperCarmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy ThibaultJourney Beyond Full Abstraction: Exploring Robust Property Preservation for Secure CompilationCSF'19 
Link to PaperInken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael BackesMBeacon: Privacy-Preserving Beacons for DNA Methylation DataNDSS '19 
Link to PaperJohn D. Ramsdell, Paul D. Rowe, Perry Alexander, Sarah C. Helble, Peter Loscocco, J. Aaron Pendergrass, Adam PetzOrchestrating Layered AttestationsPOST '19 
Link to PaperElissa M. Redmiles, Sean Kross, and Michelle L. MazurekHow well do my results generalize? Comparing security and privacy survey results from MTurk, web, and telephone samplesIEEE S&P '19 
Link to PaperRobert Künnemann, Ilkan Esiyok, Michael Backes Automated Verification of Accountability in Security Protocols
 
IEEE CSF '19 
Link to PaperPaul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval YaromSpectre Attacks: Exploiting Speculative ExecutionIEEE S&P '19Winner of SoS Paper Competition
Link to PaperOn the Universally Composable Security of OpenStackHoda Maleki, Kyle Hogan, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin ZhangIEEE SecDev '19 
Link to PaperSven Hammann, Saša Radomirović, Ralf Sasse, David BasinUser Account Access GraphsACM CCS '19 
Link to PaperJoanna C. S. Santos, Adriana Sej!a, Taylor Corrello, Smruthi Gadenkanahalli and Mehdi MirakhorliAchilles’ heel of plug-and-Play software architectures: a grounded theory based approachESEC/FSE '19 

2018

LinkAuthorsTitleVenueNotes
Link to PaperGeorge Klees, Andrew Ruef,
Benji Cooper,
Shiyi Wei, and
Michael Hicks
Evaluating Fuzz TestingConference on Computer and Communications Security (CCS) 2018Winner of SoS Paper Competition
Link to PaperGilles Barthe, Benjamin Grégoirey, Vincent LaporteSecure compilation of side-channel countermeasures:
the case of cryptographic “constant-time”
2018 IEEE 31st Computer Security Foundations Symposium 
Link to PaperSamuel Yeom, Irene Giacomelliy, Matt Fredrikson, Somesh JhaPrivacy Risk in Machine Learning:
Analyzing the Connection to Overfitting
2018 IEEE 31st Computer Security Foundations Symposium 
Link to PaperShridatt Sugrim, Can Liu, Meghan McLean, Janne LindqvistRobust Performance Metrics for
Authentication Systems
Network and Distributed System Security Symposium (NDSS) 
Link to PaperArthur Azevedo de Amorim, Catalin Hritcu, and Benjamin C. PierceThe Meaning of Memory SafetyPOST 2018: Principles of Security and Trust 
Link to PaperIsabel Wagner, David EckhoffTechnical Privacy Metrics: A Systematic SurveyACM Computing Surveys (CSUR) 
Link to PaperMoritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, et alMeltdown: Reading Kernel Memory from User Space27th USENIX Security SymposiumHonorable Mention of SoS Paper Competition
Link to PaperOctavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, and Tudor DumitrasWhen Does Machine Learning FAIL? Generalized Transferability for Evasion and
Poisoning Attacks
27th USENIX Security Symposium 
Link to PaperAndrey Chudnov, Nathan Collins, Byron Cook, et alContinuous Formal Verification
of Amazon s2n
CAV 2018: Computer Aided VerificationHonorable Mention of SoS PAper Competition
Link to PaperMahmood Sharif, Jumpei Urakawa, Nicolas Christin, et alPredicting Impending Exposure to Malicious Content
from User Behavior
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 
Link to PaperElissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv KuchhalAsking for a Friend:
Evaluating Response Biases in Security User Studies
2018 ACM SIGSAC Conference on Computer and Communications Security 

 

2017

LinkAuthorsTitleVenueNotes
Link to PaperCormac Herley and Paul van OorschotSoK: Science, Security, and the Elusive Goal of
Security as a Scientific Pursuit
2017 IEEE Symposium on Security and Privacy 
Link to PaperDaniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clementine
Maurice, and Stefan Mangard
KASLR is Dead: Long Live KASLRESSoS 2017: Engineering Secure Software and SystemsProposed solution, KASLR is basis for mitigation for Meltdown
Link to PaperOzgur Kafalı, Jasmine Jonesy, Megan Petrusoz, Laurie Williams, and Munindar P. SinghHow Good is a Security Policy against Real
Breaches? A HIPAA Case Study
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) 
Link to PaperBlase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin,
Jessica Colnago, Lorrie Faith Cranor, Henry Dixon, Pardis Emami Naeini,
Hana Habib, Noah Johnson,William Melicher
Design and Evaluation of a Data-Driven Password Meter2017 CHI Conference on Human Factors in Computing Systems 
Link to PaperGilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie and Alix TrieuVerified Translation Validation of Static Analyses2017 IEEE 30th Computer Security Foundations Symposium 
Link to PaperTiffany Bao, Yan Shoshitaishviliy, Ruoyu Wangy, Christopher Kruegely, Giovanni Vignay, David BrumleyHow Shall We Play a Game?
A Game-theoretical Model for Cyber-warfare Games
2017 IEEE 30th Computer Security Foundations Symposium (CSF)Winner of SoS Paper Competition
Link to PaperPrimal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon,
Serge Egelman, David Wagner, and Konstantin Beznosov
The Feasibility of Dynamically Granted Permissions:
Aligning Mobile Privacy with User Preferences
2017 IEEE Symposium on Security and Privacy (SP) 
Link to PaperRuba Abu-Salma,
Anastasia Danilova,
M. Angela Sasse,
Alena Naiakshina,
Joseph Bonneau, and
Matthew Smith
Obstacles to the Adoption of Secure
Communication Tools
2017 IEEE Symposium on Security and Privacy (SP) 
Link to PaperJonathan M. Spring, Tyler Moore, and David PymPracticing a Science of Security: A Philosophy of Science Perspective2017 New Security Paradigms WorkshopJonathan Spring presented at HoTSoS 2019

 

2016

Link to PaperCormac HerleyUnfalsifiability of security claimsProceedings of the National Academy of Sciences (PNAS) 
Link to PaperYasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian StranskyYou Get Where You’re Looking For: The Impact of Information Sources on Code Security2016 IEEE Symposium on Security and PrivacyWinner of the SoS Paper Competition
Link to PaperJaspreet Bhatia, Travis D. Breaux, Joel R. Reidenberg, Thomas B. NortonA Theory of Vagueness and Privacy Risk Perception2016 IEEE International Conference on Requirements Engineering 
Link to PaperAnibal Sanjab and Walid SaadData Injection Attacks on Smart Grids with Multiple Adversaries: A Game-Theoretic PerspectiveIEEE Transactions on Smart Grid 
Link to PaperVeronique Cortier, David Galindo, Ralf Kusters, Johannes Muller, Tomasz TruderungSoK: Verifiability Notions for E-Voting Protocols2016 IEEE Symposium on Security and Privacy 
Link to PaperStanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena Device-Enhanced Password Protocols with Optimal Online-Offline Protection2016 Asia Conference on Computer and Communications Security 
Link to PaperMounir Assaf Stevens and David A. NaumannCalculational Design of Information Flow Monitors 2016 Computer Security Foundations Symposium 
Link to PaperRocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, and Jianwei NiuToward a Framework for Detecting Privacy Policy Violations in Android Application Code2016 EEE International Conference on Software Engineering 
Link to PaperFrank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo WilsonMeasurement and Analysis of Private Key Sharing in the HTTPS Ecosystem2016 SIGSAC Conference on Computer and Communications Security (CCS) 

2015

Link to PaperLawrence A. Gordon, Martin P. Loeb, William Lucyshyn, and Lei ZhouIncreasing cybersecurity investments in private sector firmsJournal of CybersecuritySoS Paper Competition - Honorable Mention
Link to PaperBoulat A. Bash, Andrei H. Gheorghe, Monika Patel, Jonathan L. Habif, Dennis Goeckel, Don Towsley, & Saikat GuhaQuantum-secure covert communication on bosonic channelsNature CommunicationsSoS Paper Competition - Honorable Mention
Link to PaperJing Chen, Christopher S. Gates, Ninghui Li, and Robert W. ProctorInfluence of Risk/Safety Information Framing on Android App-Installation DecisionsJournal of Cognitive Engineering and Decision Making 
Link to PaperSoo-Jin Moon, Vyas Sekar, Michael K. ReiterNomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration2015 ACM Conference on Computer and Communications Security (CCS)SoS Paper Competition Winner
Link to PaperAntonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor DumitrasThe Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching2015 IEEE Symposium on Security and Privacy 
Link to PaperStephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael FranzReadactor: Practical Code Randomization Resilient to Memory Disclosure2015 IEEE Symposium on Security and Privacy 
Link to PaperGoran Doychev and Boris KopfRational Protection Against Timing Attacks2015 Computer Security Foundations Symposium 
Link to PaperIsaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard Shrobe, Martin Rinard, Hamed Okhravi, Stelios Sidiroglou-DouskosControl Jujutsu:On the Weaknesses of Fine-Grained Control Flow Integrity2015 ACM Conference on Computer and Communications Security (CCS) 
Link to PaperBlase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher and Richard ShayMeasuring Real-World Accuracies and Biases in Modeling Password GuessabilityUSENIX Security Symposium 
Link to PaperZack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, and Joshua SunshineEvaluating the Flexibility of the Java SandboxAnnual Computer Security Applications Conference 

2014

Link to PaperEnes Gökta, Elias Athanasopoulos, Herbert Bos, Georgios PortokalidisOut Of Control: Overcoming Control-Flow Integrity2014 IEEE Symposium on Security and Privacy 
Link to PaperJohannes Dahse and Thorsten HolzStatic Detection of Second-Order Vulnerabilities in Web ApplicationsUSENIX Security Symposium 
Link to PaperMatthew Fredrikson, Eric Lantz, and Somesh Jha, Simon Lin, David Page and Thomas RistenpartPrivacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin DosingUSENIX Security Symposium 
Link to PaperChris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, Brian Zill,Ironclad Apps: End-to-End Security via Automated Full-System VerificationUSENIX Symposium on Operating Systems Design and Implementation 
Link to PaperAjaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, and Rajesh KanaNeural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware WarningsNetwork and Distributed System Security Symposium 
Link to PaperJonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert Norton, Michael RoeThe CHERI capability model: Revisiting RISC in an age of riskinternational symposium on computer architecture 
Link to PaperSaman A. Zonouz, Himanshu Khurana, William H. Sanders, and Timothy M. YardleyRRE: A Game-Theoretic Intrusion Response and Recovery EngineIEEE Transactions on Parallel and Distributed Systems 
Link to PaperSauvik Das, Adam D I Kramer, Laura Dabbish, Jason I HongIncreasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation2014 ACM Conference on Computer and Communications Security (CCS)SoS Paper Competitio - Honorable Mention
Link to PaperVolodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn SongCode-Pointer IntegrityUSENIX Symposium on Operating Systems Design and Implementation 
Link to PaperHamed Okhravi, James Riordan, and Kevin CarterQuantitative Evaluation of Dynamic Platform Techniques as a Defensive MechanismInternational Symposium on Research in Attacks, Intrusions, and Defenses (RAID’14)SoS Paper Competition - Honorable Mention
Link to PaperMario S. Alvim, Kostas Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey SmithAdditive and multiplicative notions of leakage, and their capacities2014 IEEE Computer Security Foundations SymposiumSoS Paper Competition Winner