Results Results automatically obtained from ACSAC website. Evaluation Results: 22 Artifacts Functional Title Funct. Available At A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites Artifact An Extensive Evaluation of the Internet's Open Proxies Artifact An Historical Analysis of the SEAndroid Policy Evolution Artifact Analyzing Cache Side Channels Using Deep Neural Networks Artifact DeDoS: Defusing DoS with Dispersion Oriented Software Artifact Finding The Greedy, Prodigal, and Suicidal Contracts at Scale Artifact Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection Artifact Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness Artifact MicroWalk: A Framework for Finding Side Channels in Binaries Artifact Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS Artifact Obscuro: A Bitcoin Mixer using Trusted Execution Environments Artifact Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts Artifact Practical Integrity Protection with Oblivious Hashing Artifact SENSS Against Volumetric DDoS Attacks Artifact Shredder: Breaking Exploits through API Specialization Artifact Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study Artifact SmarTor: Smarter Tor with Smart Contracts Artifact StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification Artifact TIFF: Using Input Type Inference To Improve Fuzzing Artifact Towards Automated Generation of Exploitation Primitives for Web Browsers Artifact Type-after-Type: Practical and Complete Type-Safe Memory Reuse Artifact Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling Artifact