Results

Results automatically obtained from ACSAC website.

Evaluation Results:

  • 11 Artifacts Functional
  • 9 Artifacts Reusable
Title Funct. Reusa. Available At
A formal analysis of IKEv2's post-quantum extension Artifacts Functional Artifact
CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech Artifacts Functional Artifact
Detecting Audio Adversarial Examples with Logit Noising Artifacts Functional Artifact
Eluding ML-based Adblockers With Actionable Adversarial Examples Artifacts Functional Artifact
FlexFilt: Towards Flexible Instruction Filtering for Security Artifacts Reusable Artifact
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems Artifacts Reusable Artifact
MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks Artifacts Reusable Artifact
Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification Artifacts Functional Artifact
Artifact
ReCFA: Resilient Control-Flow Attestation Artifacts Functional Artifact
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization Artifacts Reusable Artifact
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments Artifacts Reusable Artifact
RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age Artifacts Functional Artifact
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure Artifacts Reusable Artifact
Sipster: Settling IOU Privately and Quickly with Smart Meters Artifacts Functional Artifact
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment Artifacts Reusable Artifact
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors Artifacts Reusable Artifact
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency Artifacts Functional Artifact
VIA: Analyzing Device Interfaces of Protected Virtual Machines Artifacts Functional Artifact
What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP Artifacts Functional Artifact
argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries Artifacts Reusable Artifact