Results Results automatically obtained from ACSAC website. Evaluation Results: 25 Artifacts Functional 18 Artifacts Reusable Title Funct. Reusa. Available At A Qualitative Evaluation of Reverse Engineering Tool Usability Artifact Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing Artifact Analysis of Payment Service Provider SDKs in Android Artifact ArchiveSafe LT: Secure Long-term Archiving System Artifact Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks Artifact BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems Artifact Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification Artifact Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation Artifact CryptoGo: Automatic Detection of Go Cryptographic API Misuses Artifact Curiosity-Driven and Victim-Aware Adversarial Policies Artifact DF-SCA: Dynamic Frequency Side Channel Attacks are Practical Artifact DeView: Confining Progressive Web Applications by Debloating Web APIs Artifact Designing a Provenance Analysis for SGX Enclaves Artifact DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection Artifact Drone Authentication via Acoustic Fingerprint Artifact ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift Artifact FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput Artifact Formal Modeling and Security Analysis for Intra-level Privilege Separation Artifact From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery Artifact Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning Artifact Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks Artifact Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms Artifact More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks Artifact One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction Artifact POPKORN: Popping Windows Kernel Drivers At Scale Artifact Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation Artifact Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning Artifact Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles Artifact Randezvous: Making Randomization Effective on MCUs Artifact Reconstruction Attack on Differential Private Trajectory Protection Mechanisms Artifact SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing Artifact Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots Artifact SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Artifact Spacelord: Private and Secure Smart Space Sharing Artifact Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning Artifact StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance Artifact Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles Artifact Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering Artifact Transformer-Based Language Models for Software Vulnerability Detection Artifact Trebiz: Byzantine Fault Tolerance with Byzantine Merchants Artifact TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation Artifact User Perceptions of Five-Word Passwords Artifact User Perceptions of the Privacy and Usability of Smart DNS Artifact