Results

Results automatically obtained from ACSAC website.

Evaluation Results:

  • 22 Artifacts Functional
Title Funct. Available At
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites Artifacts Functional Artifact
An Extensive Evaluation of the Internet's Open Proxies Artifacts Functional Artifact
An Historical Analysis of the SEAndroid Policy Evolution Artifacts Functional Artifact
Analyzing Cache Side Channels Using Deep Neural Networks Artifacts Functional Artifact
DeDoS: Defusing DoS with Dispersion Oriented Software Artifacts Functional Artifact
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale Artifacts Functional Artifact
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection Artifacts Functional Artifact
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness Artifacts Functional Artifact
MicroWalk: A Framework for Finding Side Channels in Binaries Artifacts Functional Artifact
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS Artifacts Functional Artifact
Obscuro: A Bitcoin Mixer using Trusted Execution Environments Artifacts Functional Artifact
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts Artifacts Functional Artifact
Practical Integrity Protection with Oblivious Hashing Artifacts Functional Artifact
SENSS Against Volumetric DDoS Attacks Artifacts Functional Artifact
Shredder: Breaking Exploits through API Specialization Artifacts Functional Artifact
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study Artifacts Functional Artifact
SmarTor: Smarter Tor with Smart Contracts Artifacts Functional Artifact
StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification Artifacts Functional Artifact
TIFF: Using Input Type Inference To Improve Fuzzing Artifacts Functional Artifact
Towards Automated Generation of Exploitation Primitives for Web Browsers Artifacts Functional Artifact
Type-after-Type: Practical and Complete Type-Safe Memory Reuse Artifacts Functional Artifact
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling Artifacts Functional Artifact