Results Results automatically obtained from ACSAC website. Evaluation Results: 11 Artifacts Functional 9 Artifacts Reusable Title Funct. Reusa. Available At A formal analysis of IKEv2's post-quantum extension Artifact CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech Artifact Detecting Audio Adversarial Examples with Logit Noising Artifact Eluding ML-based Adblockers With Actionable Adversarial Examples Artifact FlexFilt: Towards Flexible Instruction Filtering for Security Artifact LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems Artifact MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks Artifact Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification Artifact Artifact ReCFA: Resilient Control-Flow Attestation Artifact Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization Artifact Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments Artifact RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age Artifact Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure Artifact Sipster: Settling IOU Privately and Quickly with Smart Meters Artifact TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment Artifact They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors Artifact Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency Artifact VIA: Analyzing Device Interfaces of Protected Virtual Machines Artifact What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP Artifact argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries Artifact