Results Results automatically obtained from ACSAC website. Evaluation Results: 12 Artifacts Functional 8 Artifacts Reusable Title Funct. Reusa. Available At A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs Co-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUs Artifact Detecting organized eCommerce fraud using scalable categorical clustering Artifact Function Boundary Detection in Stripped Binaries Artifact FuzzBuilder: Automated building greybox fuzzing environment for C/C++ library Artifact JStap: A Static Pre-Filter for Malicious JavaScript Detection Artifact Koinonia: Verifiable E-Voting with Long-term Privacy Artifact Model Inversion Attacks Against Collaborative Inference Artifact Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones Artifact Out of Control: Stealthy Attacks Against Robotic Vehicles Protected by Control-based Techniques Artifact PDoT: Private DNS-over-TLS with TEE Support Artifact Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost Artifact Proof of Aliveness Artifact Revisiting Utility Metrics for Location Privacy-Preserving Mechanisms Artifact SIP Shaker: Software Integrity Protection Composition Artifact STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Artifact SecDATAVIEW: A Secure Big Data Workflow Management System for Heterogeneous Computing Environments Artifact Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations Artifact Will You Trust This TLS Certificate? Perceptions of People Working in IT Artifact WooKey: Designing a Trusted and Efficient USB Device Artifact