Skip to content

All the papers I've read since 2017. I probably read papers before then too, but I did a paper purge in Jan 2017 and they have been accumulating again ever since.

Notifications You must be signed in to change notification settings

kaoudis/readinglist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 

Repository files navigation

Reading List

There is no rhyme or reason to inclusion here except it's all stuff I'm interested in. "Interesting" is subjective and not objective here. This is a non-exhaustive list of papers I have read or am reading, organised by reading start date, with the most recently added paper at the top. If there's not a date on it, I haven't started reading it yet, but have probably printed it and put it in the local stack on my desk.

Why are the citations MLA? I like MLA. And it's the first citation format Google Scholar lists.

Why is paper A included but not paper B? I'd appreciate you teaching me about paper B's existence by making a PR to add it ;)

If you'd like to chat, I am on discord: kaoudis#9503 and mastodon: https://infosec.exchange/@kaoudis

2024

  • [_] LINK Miller, Mark S., et al. "Safe active content in sanitized JavaScript." Google, Inc., Tech. Rep (2008).

  • [_] LINK Lefebvre, Geoffrey, et al. "Tralfamadore: unifying source code and execution experience." Proceedings of the 4th ACM European Conference on Computer systems. 2009.

2023

  • 12/1/23 LINK Herrera, Adrian, Mathias Payer, and Antony L. Hosking. "Registered Report: DATAFLOW." NDSS. 2022.

  • 12/1/23 LINK Babić, Domagoj, et al. "Fudge: fuzz driver generation at scale." Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2019.

  • 11/1/23 LINK Kemerlis, Vasileios P., et al. "libdft: Practical dynamic data flow tracking for commodity systems." Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments. 2012.

  • 11/1/23 LINK Koch, Luke, et al. "Toward the detection of polyglot files." Proceedings of the 15th Workshop on Cyber Security Experimentation and Test. 2022.

  • 11/1/23 LINK Sang, Qian, et al. "Airtaint: Making dynamic taint analysis faster and easier." 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2023.

  • 7/26/23 LINK Lin, Zhenpeng, et al. "Your Trash Kernel Bug, My Precious 0day." Black Hat Europe 2021.

  • 7/17/23 LINK Mirsky, Yisroel, et al. "VulChecker: Graph-based Vulnerability Localization in Source Code." 31st USENIX Security Symposium, Security 2022. 2023.

  • 6/20/23 LINK Bernhard, Matthew, et al. "Public evidence from secret ballots." Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings 2. Springer International Publishing, 2017.

  • 6/6/23 LINK Benaloh, Josh. "Simple Verifiable Elections." EVT 6 (2006): 5-5.

  • 5/1/23 LINK Noble, James, et al. "Abstract and concrete data types vs object capabilities." Principled Software Development: Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday (2018): 221-240

  • 4/01/23 LINK Denning, Dorothy E. "A Lattice Model of Secure Information Flow." Communications of the ACM 19.5 (1976): 236-243.

  • 3/29/23 LINK Cheney, James, Amal Ahmed, and Umut A. Acar. "Provenance as dependency analysis." Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007, Revised Selected Papers 11. Springer Berlin Heidelberg, 2007.

  • 3/20/23 LINK Bruening, Derek, Qin Zhao, and Saman Amarasinghe. "Transparent dynamic instrumentation." Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments. 2012.

  • 2/22/23 LINK Cojocar, Lucian, et al. "PIE: Parser identification in embedded systems." Proceedings of the 31st Annual Computer Security Applications Conference. 2015.

  • 2/22/23 LINK Gangolli, Aakash, Qusay H. Mahmoud, and Akramul Azim. "A systematic review of fault injection attacks on IOT systems." Electronics 11.13 (2022): 2023.

  • 2/1/23 LINK Perez, Ben. "RSA GTFO." PoC||GTFO, 0x20.

  • 1/5/23 LINK Roessler, Nick, et al. "Lossless instruction-to-object memory tracing in the Linux kernel." Proceedings of the 14th ACM International Conference on Systems and Storage. 2021.

  • 1/5/23 LINK Le, Vu, Mehrdad Afshari, and Zhendong Su. "Compiler validation via equivalence modulo inputs." ACM Sigplan Notices 49.6 (2014): 216-226.

  • 1/5/23 LINK Elliott, Archibald Samuel, et al. "Checked C: making C safe by extension." 2018 IEEE Cybersecurity Development (SecDev). IEEE, 2018.

2022

  • 12/15/22 LINK Lee, Han, et al. "Understanding the behavior of compiler optimizations." Software: Practice and Experience 36.8 (2006): 835-844.

  • 12/15/22 LINK Grant, Brian, et al. "An evaluation of staged run-time optimizations in DyC." ACM SIGPLAN Notices 34.5 (1999): 293-304.

  • 12/10/22 LINK Zhang, Tong, Dongyoon Lee, and Changhee Jung. "Bogo: Buy spatial memory safety, get temporal memory safety (almost) free." Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems. 2019.

  • 12/5/22 LINK Chisnall, David, et al. "Beyond the PDP-11: Architectural support for a memory-safe C abstract machine." ACM SIGARCH Computer Architecture News 43.1 (2015): 117-130.

  • 12/5/22 LINK Hathhorn, Chris, Chucky Ellison, and Grigore Roşu. "Defining the undefinedness of C." Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015.

  • 12/1/22 LINK Brown, Michael D., et al. "Not so fast: understanding and mitigating negative impacts of compiler optimizations on code reuse gadget sets." Proceedings of the ACM on Programming Languages 5.OOPSLA (2021): 1-30.

  • 12/1/22 LINK Lee, Juneyoung, et al. "Taming undefined behavior in LLVM." ACM SIGPLAN Notices 52.6 (2017): 633-647.

  • 11/15/22 LINK Shen, Zefan. "The Impact of Undefined Behavior on Compiler Optimization." 2021 2nd European Symposium on Software Engineering. 2021.

  • 11/15/22 LINK Wang, Xi, et al. "A differential approach to undefined behavior detection." ACM Transactions on Computer Systems (TOCS) 33.1 (2015): 1-29.

  • 11/14/22 LINK Peng, Hui, Yan Shoshitaishvili, and Mathias Payer. "T-Fuzz: fuzzing by program transformation." 2018 IEEE Symposium on Security and Privacy (SP). IEEE.

  • 10/11/22 LINK Vadayath, Jayakrishna, et al. "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs." 31st USENIX Security Symposium (USENIX Security 22). 2022.

  • 10/11/22 LINK Brown, Fraser, Deian Stefan, and Dawson Engler. "Sys: A {Static/Symbolic} Tool for Finding Good Bugs in Good (Browser) Code." 29th USENIX Security Symposium (USENIX Security 20). 2020.

  • 9/13/22 LINK Harmon, Carson, Bradford Larsen, and Evan A. Sultanik. "Toward automated grammar extraction via semantic labeling of parser implementations." 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020.

  • 9/13/22 LINK Yelam, Anil, et al. "Coresident evil: Covert communication in the cloud with lambdas." Proceedings of the Web Conference 2021. 2021.

  • 8/22/22 LINK Wulf, William, et al. "Hydra: The kernel of a multiprocessor operating system." Communications of the ACM 17.6 (1974): 337-345.

  • 8/22/22 LINK Farina, Gian Pietro, Stephen Chong, and Marco Gaboardi. "Relational symbolic execution." Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming. 2019.

  • 6/12/22 LINK Efstathopoulos, Petros, et al. "Labels and event processes in the Asbestos operating system." ACM SIGOPS Operating Systems Review 39.5 (2005): 17-30.

  • 6/1/22 LINK Lampson, Butler W. "Protection." ACM SIGOPS Operating Systems Review 8.1 (1974): 18-24.

  • 5/15/22 LINK Saltzer, Jerome H., and Michael D. Schroeder. "The protection of information in computer systems." Proceedings of the IEEE 63.9 (1975): 1278-1308.

  • 5/1/22 LINK Li, Xiaowei, and Yuan Xue. "A survey on server-side approaches to securing web applications." ACM Computing Surveys (CSUR) 46.4 (2014): 1-29.

  • 4/22/22 LINK Majzoobi, Mehrdad, Farinaz Koushanfar, and Miodrag Potkonjak. "Testing techniques for hardware security." 2008 IEEE International Test Conference. IEEE, 2008.

2021

  • 12/1/21 LINK Martiny, Ian, et al. "Improving Signal's Sealed Sender." NDSS. 2021.

  • 11/20/21 LINK Gadepalli, Phani Kishore, et al. "Sledge: A serverless-first, light-weight wasm runtime for the edge." Proceedings of the 21st International Middleware Conference. 2020.

  • 11/12/21 LINK Setty, Vinay, et al. "The hidden pub/sub of spotify: (industry article)." Proceedings of the 7th ACM international conference on Distributed event-based systems. 2013.

  • 10/30/21 LINK Giffin, Daniel B., et al. "Hails: Protecting data privacy in untrusted web applications." 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 2012.

  • 10/26/21 LINK Stefan, Deian, et al. "Protecting Users by Confining {JavaScript} with {COWL}." 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). 2014.

  • 10/7/21 LINK Kwon, Albert, et al. "Circuit fingerprinting attacks: Passive deanonymization of tor hidden services." 24th USENIX Security Symposium (USENIX Security 15). 2015.

  • 10/2/21 LINK Arp, Daniel, Fabian Yamaguchi, and Konrad Rieck. "Torben: A practical side-channel attack for deanonymizing tor communication." Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. 2015.

  • 9/29/21 LINK Bauer, Kevin, Micah Sherr, and Dirk Grunwald. "{ExperimenTor}: A Testbed for Safe and Realistic Tor Experimentation." 4th Workshop on Cyber Security Experimentation and Test (CSET 11). 2011.

  • 9/21/21 LINK Xue, Hui, Nathan Dautenhahn, and Samuel T. King. "Using replicated execution for a more secure and reliable web browser." NDSS. 2012.

2019

  • 8/15/19 LINK Wu, Justin, et al. "" Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal." Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 2019.

  • 6/11/19 LINK Kaldor, Jonathan, et al. "Canopy: An end-to-end performance tracing and analysis system." Proceedings of the 26th symposium on operating systems principles. 2017.

  • 4/12/19 LINK Dean, Jeffrey, and Luiz André Barroso. "The tail at scale." Communications of the ACM 56.2 (2013): 74-80.

2018

  • 1/16/18 LINK Allodi, Luca, Luca Chiodi, and Marco Cremonini. "Self-organizing techniques for knowledge diffusion in dynamic social networks." Complex Networks V. Springer, Cham, 2014. 75-86.

  • 1/5/18 LINK Thomas, Kurt, et al. "Data breaches, phishing, or malware? Understanding the risks of stolen credentials." Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. 2017.

2017

  • 10/5/17 LINK Maddox, Philip. "Testing a distributed system." Communications of the ACM 58.9 (2015): 54-58.

About

All the papers I've read since 2017. I probably read papers before then too, but I did a paper purge in Jan 2017 and they have been accumulating again ever since.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published