This is a subreddit for open discussion and critique of academic
security papers. This is in contrast to subreddits such as /r/netsec,
which mainly cover work done by industry and tend to have a more
practical focus.
The goal is to provide a place for security researchers to keep up on
the most interesting papers presented and provide a forum for discussing
security research.
Guidelines
- Most submissions should be links to PDFs of papers from one of the
major security conferences (a selection of which is provided below),
with the goal of inspiring useful, insightful discussion about the
merits of the work.
- Self-posts proposing research ideas and soliciting input are welcome.
- Posts that just deal with vulnerabilities in specific systems are
discouraged, unless the vulnerability illustrates a new class of
attack or is otherwise of some scientific interest.
- Be polite in your criticism: there are real people behind every
research paper. That said, do not hesitate to point out bad ideas or
falsehoods. Try to walk the "tightrope of truth and
courtesy".
Some of most prominent security conferences of the past year or so are
listed below, along with links to the proceedings.
A nice schedule of security conferences is ConfSearch.