Advice collection for research in systems security
This is a work in progress page. If you see anything missing or know of similar advice collection, please send it my way!
Research in Computer Security
- How to Look for Ideas in Computer Science Research (link)
 - Threats to Validity and Relevance in Security Research (link)
 - Impostor Syndrome (link)
 - Finding and reading papers (link)
 
How to read research papers
How to write research papers
- How to write a great research paper, Simon Peyton Jones (link)
 - Things I Keep Repeating About Writing, Claire Le Goues (link)
 - Writing Technical Articles, Henning Schulzrinne (link)
 - Tips for Writing Technical Papers, Jennifer Widom (link)
 - Common Bugs in Writing, Henning Schulzrinne (link)
 
Reviewing conference papers
- Thoughts on Reviewing, Mark Allman (link)
 - So You’re a Program Committee Member Now, Ken Hinckley (link)
 - How (and How Not) to Write a Good Systems Paper, Roy Levin and David D. Redell (link)
 - Writing reviews for systems conferences, Timothy Roscoe (link)
 - John Ousterhout’s Hints for Reviewing Paper (link)
 - How NOT to review a paper: The tools and techniques of the adversarial reviewer, Graham Cormode (link)
 - On Civility in Reviewing, Robert Sternberg (link)
 - Writing good reviews is hard (link)
 
Rebuttals
Posters
- How to create a better research poster in less time (including templates) (link)
 BetterPosterformat (link)- NCSU colors and fonts (link)