There is no rhyme or reason to inclusion here except it's all stuff I'm interested in. "Interesting" is subjective and not objective here. This is a non-exhaustive list of papers I have read or am reading, organised by reading start date, with the most recently added paper at the top. If there's not a date on it, I haven't started reading it yet, but have probably printed it and put it in the local stack on my desk.
Why are the citations MLA? I like MLA. And it's the first citation format Google Scholar lists.
Why is paper A included but not paper B? I'd appreciate you teaching me about paper B's existence by making a PR to add it ;)
If you'd like to chat, I am on discord: kaoudis#9503 and mastodon: https://infosec.exchange/@kaoudis
-
[_] LINK Miller, Mark S., et al. "Safe active content in sanitized JavaScript." Google, Inc., Tech. Rep (2008).
-
[_] LINK Lefebvre, Geoffrey, et al. "Tralfamadore: unifying source code and execution experience." Proceedings of the 4th ACM European Conference on Computer systems. 2009.
-
12/1/23 LINK Herrera, Adrian, Mathias Payer, and Antony L. Hosking. "Registered Report: DATAFLOW." NDSS. 2022.
-
12/1/23 LINK Babić, Domagoj, et al. "Fudge: fuzz driver generation at scale." Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2019.
-
11/1/23 LINK Kemerlis, Vasileios P., et al. "libdft: Practical dynamic data flow tracking for commodity systems." Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments. 2012.
-
11/1/23 LINK Koch, Luke, et al. "Toward the detection of polyglot files." Proceedings of the 15th Workshop on Cyber Security Experimentation and Test. 2022.
-
11/1/23 LINK Sang, Qian, et al. "Airtaint: Making dynamic taint analysis faster and easier." 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2023.
-
7/26/23 LINK Lin, Zhenpeng, et al. "Your Trash Kernel Bug, My Precious 0day." Black Hat Europe 2021.
-
7/17/23 LINK Mirsky, Yisroel, et al. "VulChecker: Graph-based Vulnerability Localization in Source Code." 31st USENIX Security Symposium, Security 2022. 2023.
-
6/20/23 LINK Bernhard, Matthew, et al. "Public evidence from secret ballots." Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings 2. Springer International Publishing, 2017.
-
6/6/23 LINK Benaloh, Josh. "Simple Verifiable Elections." EVT 6 (2006): 5-5.
-
5/1/23 LINK Noble, James, et al. "Abstract and concrete data types vs object capabilities." Principled Software Development: Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday (2018): 221-240
-
4/01/23 LINK Denning, Dorothy E. "A Lattice Model of Secure Information Flow." Communications of the ACM 19.5 (1976): 236-243.
-
3/29/23 LINK Cheney, James, Amal Ahmed, and Umut A. Acar. "Provenance as dependency analysis." Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007, Revised Selected Papers 11. Springer Berlin Heidelberg, 2007.
-
3/20/23 LINK Bruening, Derek, Qin Zhao, and Saman Amarasinghe. "Transparent dynamic instrumentation." Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments. 2012.
-
2/22/23 LINK Cojocar, Lucian, et al. "PIE: Parser identification in embedded systems." Proceedings of the 31st Annual Computer Security Applications Conference. 2015.
-
2/22/23 LINK Gangolli, Aakash, Qusay H. Mahmoud, and Akramul Azim. "A systematic review of fault injection attacks on IOT systems." Electronics 11.13 (2022): 2023.
-
2/1/23 LINK Perez, Ben. "RSA GTFO." PoC||GTFO, 0x20.
-
1/5/23 LINK Roessler, Nick, et al. "Lossless instruction-to-object memory tracing in the Linux kernel." Proceedings of the 14th ACM International Conference on Systems and Storage. 2021.
-
1/5/23 LINK Le, Vu, Mehrdad Afshari, and Zhendong Su. "Compiler validation via equivalence modulo inputs." ACM Sigplan Notices 49.6 (2014): 216-226.
-
1/5/23 LINK Elliott, Archibald Samuel, et al. "Checked C: making C safe by extension." 2018 IEEE Cybersecurity Development (SecDev). IEEE, 2018.
-
12/15/22 LINK Lee, Han, et al. "Understanding the behavior of compiler optimizations." Software: Practice and Experience 36.8 (2006): 835-844.
-
12/15/22 LINK Grant, Brian, et al. "An evaluation of staged run-time optimizations in DyC." ACM SIGPLAN Notices 34.5 (1999): 293-304.
-
12/10/22 LINK Zhang, Tong, Dongyoon Lee, and Changhee Jung. "Bogo: Buy spatial memory safety, get temporal memory safety (almost) free." Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems. 2019.
-
12/5/22 LINK Chisnall, David, et al. "Beyond the PDP-11: Architectural support for a memory-safe C abstract machine." ACM SIGARCH Computer Architecture News 43.1 (2015): 117-130.
-
12/5/22 LINK Hathhorn, Chris, Chucky Ellison, and Grigore Roşu. "Defining the undefinedness of C." Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015.
-
12/1/22 LINK Brown, Michael D., et al. "Not so fast: understanding and mitigating negative impacts of compiler optimizations on code reuse gadget sets." Proceedings of the ACM on Programming Languages 5.OOPSLA (2021): 1-30.
-
12/1/22 LINK Lee, Juneyoung, et al. "Taming undefined behavior in LLVM." ACM SIGPLAN Notices 52.6 (2017): 633-647.
-
11/15/22 LINK Shen, Zefan. "The Impact of Undefined Behavior on Compiler Optimization." 2021 2nd European Symposium on Software Engineering. 2021.
-
11/15/22 LINK Wang, Xi, et al. "A differential approach to undefined behavior detection." ACM Transactions on Computer Systems (TOCS) 33.1 (2015): 1-29.
-
11/14/22 LINK Peng, Hui, Yan Shoshitaishvili, and Mathias Payer. "T-Fuzz: fuzzing by program transformation." 2018 IEEE Symposium on Security and Privacy (SP). IEEE.
-
10/11/22 LINK Vadayath, Jayakrishna, et al. "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs." 31st USENIX Security Symposium (USENIX Security 22). 2022.
-
10/11/22 LINK Brown, Fraser, Deian Stefan, and Dawson Engler. "Sys: A {Static/Symbolic} Tool for Finding Good Bugs in Good (Browser) Code." 29th USENIX Security Symposium (USENIX Security 20). 2020.
-
9/13/22 LINK Harmon, Carson, Bradford Larsen, and Evan A. Sultanik. "Toward automated grammar extraction via semantic labeling of parser implementations." 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020.
-
9/13/22 LINK Yelam, Anil, et al. "Coresident evil: Covert communication in the cloud with lambdas." Proceedings of the Web Conference 2021. 2021.
-
8/22/22 LINK Wulf, William, et al. "Hydra: The kernel of a multiprocessor operating system." Communications of the ACM 17.6 (1974): 337-345.
-
8/22/22 LINK Farina, Gian Pietro, Stephen Chong, and Marco Gaboardi. "Relational symbolic execution." Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming. 2019.
-
6/12/22 LINK Efstathopoulos, Petros, et al. "Labels and event processes in the Asbestos operating system." ACM SIGOPS Operating Systems Review 39.5 (2005): 17-30.
-
6/1/22 LINK Lampson, Butler W. "Protection." ACM SIGOPS Operating Systems Review 8.1 (1974): 18-24.
-
5/15/22 LINK Saltzer, Jerome H., and Michael D. Schroeder. "The protection of information in computer systems." Proceedings of the IEEE 63.9 (1975): 1278-1308.
-
5/1/22 LINK Li, Xiaowei, and Yuan Xue. "A survey on server-side approaches to securing web applications." ACM Computing Surveys (CSUR) 46.4 (2014): 1-29.
-
4/22/22 LINK Majzoobi, Mehrdad, Farinaz Koushanfar, and Miodrag Potkonjak. "Testing techniques for hardware security." 2008 IEEE International Test Conference. IEEE, 2008.
-
12/1/21 LINK Martiny, Ian, et al. "Improving Signal's Sealed Sender." NDSS. 2021.
-
11/20/21 LINK Gadepalli, Phani Kishore, et al. "Sledge: A serverless-first, light-weight wasm runtime for the edge." Proceedings of the 21st International Middleware Conference. 2020.
-
11/12/21 LINK Setty, Vinay, et al. "The hidden pub/sub of spotify: (industry article)." Proceedings of the 7th ACM international conference on Distributed event-based systems. 2013.
-
10/30/21 LINK Giffin, Daniel B., et al. "Hails: Protecting data privacy in untrusted web applications." 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 2012.
-
10/26/21 LINK Stefan, Deian, et al. "Protecting Users by Confining {JavaScript} with {COWL}." 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). 2014.
-
10/7/21 LINK Kwon, Albert, et al. "Circuit fingerprinting attacks: Passive deanonymization of tor hidden services." 24th USENIX Security Symposium (USENIX Security 15). 2015.
-
10/2/21 LINK Arp, Daniel, Fabian Yamaguchi, and Konrad Rieck. "Torben: A practical side-channel attack for deanonymizing tor communication." Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. 2015.
-
9/29/21 LINK Bauer, Kevin, Micah Sherr, and Dirk Grunwald. "{ExperimenTor}: A Testbed for Safe and Realistic Tor Experimentation." 4th Workshop on Cyber Security Experimentation and Test (CSET 11). 2011.
-
9/21/21 LINK Xue, Hui, Nathan Dautenhahn, and Samuel T. King. "Using replicated execution for a more secure and reliable web browser." NDSS. 2012.
-
8/15/19 LINK Wu, Justin, et al. "" Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal." Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 2019.
-
6/11/19 LINK Kaldor, Jonathan, et al. "Canopy: An end-to-end performance tracing and analysis system." Proceedings of the 26th symposium on operating systems principles. 2017.
-
4/12/19 LINK Dean, Jeffrey, and Luiz André Barroso. "The tail at scale." Communications of the ACM 56.2 (2013): 74-80.
-
1/16/18 LINK Allodi, Luca, Luca Chiodi, and Marco Cremonini. "Self-organizing techniques for knowledge diffusion in dynamic social networks." Complex Networks V. Springer, Cham, 2014. 75-86.
-
1/5/18 LINK Thomas, Kurt, et al. "Data breaches, phishing, or malware? Understanding the risks of stolen credentials." Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. 2017.
- 10/5/17 LINK Maddox, Philip. "Testing a distributed system." Communications of the ACM 58.9 (2015): 54-58.