# CHERI Reading list ### CHERI Publications 1. [CHERI Tech Report](https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-951.pdf) 2. ### IEEE Security and Privacy 1. [Embedding Privacy Into Design Through Software Developers: Challenges and Solutions](https://ieeexplore.ieee.org/document/9904426) 2. [Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework](https://ieeexplore.ieee.org/document/9994631) 3. [Memory Errors and Memory Safety: C as a Case Study](https://ieeexplore.ieee.org/document/10102611) 4. [Are Machine Learning Models for Malware Detection Ready for Prime Time?](https://ieeexplore.ieee.org/document/10102612) 5. [Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats](https://ieeexplore.ieee.org/document/10098483) 6. [Memory Errors and Memory Safety: A Look at Java and Rust](https://ieeexplore.ieee.org/document/10137364) 7. [Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression](https://ieeexplore.ieee.org/document/9765840) 8. [Security Verification of the OpenTitan Hardware Root of Trust](https://ieeexplore.ieee.org/document/10106105) ### IEEE Symposium on Security and Privacy 1. [Examining Zero-Shot Vulnerability Repair with Large Language Models](https://ieeexplore.ieee.org/document/10179324) 2. [Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks](https://ieeexplore.ieee.org/document/10179456) 3. [Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities](https://ieeexplore.ieee.org/document/10179426) 4. [DBREACH: Stealing from Databases Using Compression Side Channels](https://ieeexplore.ieee.org/document/10179359) 5. [SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning](https://ieeexplore.ieee.org/document/10179281) 6. [Analyzing Leakage of Personally Identifiable Information in Language Models](https://ieeexplore.ieee.org/document/10179300) 7. [Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective](https://ieeexplore.ieee.org/document/10179463) 8. [On the (In)security of Peer-to-Peer Decentralized Machine Learning](https://ieeexplore.ieee.org/document/10179291) 9. [Vectorized Batch Private Information Retrieval](https://ieeexplore.ieee.org/document/10179329) 10. [SoK: Cryptographic Neural-Network Computation](https://ieeexplore.ieee.org/document/10179483) 11. [FLUTE: Fast and Secure Lookup Table Evaluations](https://ieeexplore.ieee.org/document/10179345) 12. ["In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya](https://ieeexplore.ieee.org/document/10179410) 13. [Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation](https://ieeexplore.ieee.org/document/10179375) 14. [Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols](https://ieeexplore.ieee.org/document/10179397/) 15. [TEEzz: Fuzzing Trusted Applications on COTS Android Devices](https://ieeexplore.ieee.org/document/10179302) 16. [Half&Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution](https://ieeexplore.ieee.org/document/10179415) 17. [Practical Program Modularization with Type-Based Dependence Analysis](https://ieeexplore.ieee.org/document/10179412) 18. [SoK: Certified Robustness for Deep Neural Networks](https://ieeexplore.ieee.org/document/10179303) 19. [FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information](https://ieeexplore.ieee.org/document/10179336) 20. ["Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain](https://ieeexplore.ieee.org/document/10179378) 21. [It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security](https://ieeexplore.ieee.org/document/10179320) 22. [Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy](https://ieeexplore.ieee.org/document/10179422) 23. [Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations](https://ieeexplore.ieee.org/document/10179321) 24. [SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing](https://ieeexplore.ieee.org/document/10179398) 25. [RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing](https://ieeexplore.ieee.org/document/10179421) 26. [SQUIP: Exploiting the Scheduler Queue Contention Side Channel](https://ieeexplore.ieee.org/document/10179368) 27. [DevIOus: Device-Driven Side-Channel Attacks on the IOMMU](https://ieeexplore.ieee.org/document/10179283) 28. [A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs](https://ieeexplore.ieee.org/document/10179399) 29. [Limits of I/O Based Ransomware Detection: An Imitation Based Attack](https://ieeexplore.ieee.org/document/10179372) 30. [Characterizing Everyday Misuse of Smart Home Devices](https://ieeexplore.ieee.org/document/10179476) 31. [SecureCells: A Secure Compartmentalized Architecture](https://ieeexplore.ieee.org/document/10179472) 32. [Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture](https://ieeexplore.ieee.org/document/10179416) 33. [EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation](https://ieeexplore.ieee.org/document/10179285) 34. [Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems](https://ieeexplore.ieee.org/document/10179388) 35. [One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices](https://ieeexplore.ieee.org/document/10179369) 36. [Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards](https://ieeexplore.ieee.org/document/10179282/) 37. [Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches](https://ieeexplore.ieee.org/document/10179404) 38. [SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers](https://ieeexplore.ieee.org/document/10179298/) 1. [Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors](https://ieeexplore.ieee.org/document/9833773) 2. [Finding and Exploiting CPU Features using MSR Templating](https://ieeexplore.ieee.org/document/9833599) 3. [Hardware-Software Contracts for Secure Speculation](https://ieeexplore.ieee.org/document/9519500) 4.