Advice collection for research in systems security
This is a work in progress page. If you see anything missing or know of similar advice collection, please send it my way!
Research in Computer Security
- How to Look for Ideas in Computer Science Research (link)
- Threats to Validity and Relevance in Security Research (link)
- Impostor Syndrome (link)
- Finding and reading papers (link)
How to read research papers
How to write research papers
- How to write a great research paper, Simon Peyton Jones (link)
- Things I Keep Repeating About Writing, Claire Le Goues (link)
- Writing Technical Articles, Henning Schulzrinne (link)
- Tips for Writing Technical Papers, Jennifer Widom (link)
- Common Bugs in Writing, Henning Schulzrinne (link)
Reviewing conference papers
- Thoughts on Reviewing, Mark Allman (link)
- So You’re a Program Committee Member Now, Ken Hinckley (link)
- How (and How Not) to Write a Good Systems Paper, Roy Levin and David D. Redell (link)
- Writing reviews for systems conferences, Timothy Roscoe (link)
- John Ousterhout’s Hints for Reviewing Paper (link)
- How NOT to review a paper: The tools and techniques of the adversarial reviewer, Graham Cormode (link)
- On Civility in Reviewing, Robert Sternberg (link)
- Writing good reviews is hard (link)
Rebuttals
Posters
- How to create a better research poster in less time (including templates) (link)
BetterPoster
format (link)- NCSU colors and fonts (link)