Results

Results automatically obtained from ACSAC website.

Evaluation Results:

  • 25 Artifacts Functional
  • 18 Artifacts Reusable
Title Funct. Reusa. Available At
A Qualitative Evaluation of Reverse Engineering Tool Usability Artifacts Functional Artifact
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing Artifacts Reusable Artifact
Analysis of Payment Service Provider SDKs in Android Artifacts Reusable Artifact
ArchiveSafe LT: Secure Long-term Archiving System Artifacts Functional Artifact
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks Artifacts Reusable Artifact
BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems Artifacts Functional Artifact
Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification Artifacts Functional Artifact
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation Artifacts Functional Artifact
CryptoGo: Automatic Detection of Go Cryptographic API Misuses Artifacts Functional Artifact
Curiosity-Driven and Victim-Aware Adversarial Policies Artifacts Functional Artifact
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical Artifacts Functional Artifact
DeView: Confining Progressive Web Applications by Debloating Web APIs Artifacts Functional Artifact
Designing a Provenance Analysis for SGX Enclaves Artifacts Reusable Artifact
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection Artifacts Reusable Artifact
Drone Authentication via Acoustic Fingerprint Artifacts Reusable Artifact
ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift Artifacts Functional Artifact
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput Artifacts Functional Artifact
Formal Modeling and Security Analysis for Intra-level Privilege Separation Artifacts Reusable Artifact
From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery Artifacts Functional Artifact
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning Artifacts Functional Artifact
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks Artifacts Functional Artifact
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms Artifacts Reusable Artifact
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks Artifacts Functional Artifact
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction Artifacts Reusable Artifact
POPKORN: Popping Windows Kernel Drivers At Scale Artifacts Reusable Artifact
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation Artifacts Reusable Artifact
Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning Artifacts Functional Artifact
Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles Artifacts Reusable Artifact
Randezvous: Making Randomization Effective on MCUs Artifacts Reusable Artifact
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms Artifacts Functional Artifact
SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing Artifacts Reusable Artifact
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots Artifacts Functional Artifact
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Artifacts Reusable Artifact
Spacelord: Private and Secure Smart Space Sharing Artifacts Functional Artifact
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning Artifacts Functional Artifact
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance Artifacts Reusable Artifact
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles Artifacts Reusable Artifact
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering Artifacts Reusable Artifact
Transformer-Based Language Models for Software Vulnerability Detection Artifacts Functional Artifact
Trebiz: Byzantine Fault Tolerance with Byzantine Merchants Artifacts Functional Artifact
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation Artifacts Functional Artifact
User Perceptions of Five-Word Passwords Artifacts Functional Artifact
User Perceptions of the Privacy and Usability of Smart DNS Artifacts Functional Artifact