Results
Results automatically obtained from ACSAC website.
Evaluation Results:
- 14 Artifacts Functional
- 23 Artifacts Reusable
- 19 Results Reproduced
Title | Funct. | Reusa. | Repro. | Available At |
---|---|---|---|---|
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications |
Artifact
|
|||
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems |
Artifact
|
|||
Attack of the Knights: Non Uniform Cache Side Channel Attack |
Artifact
|
|||
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons |
Artifact
|
|||
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions |
Artifact
|
|||
DOPE: DOmain Protection Enforcement with PKS |
Artifact
|
|||
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks |
Artifact
|
|||
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection |
Artifact
|
|||
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials |
Artifact
|
|||
Detecting Weak Keys in Manufacturing Certificates: A Case Study |
Artifact
|
|||
Detection of Anomalies in Electric Vehicle Charging Sessions |
Artifact
|
|||
Differentially Private Resource Allocation |
Artifact
|
|||
Domain and Website Attribution beyond WHOIS |
Artifact
|
|||
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks |
Artifact
|
|||
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks |
Artifact
|
|||
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! |
Artifact
|
|||
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks |
Artifact
|
|||
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance |
Artifact
|
|||
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones |
Artifact
|
|||
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication |
Artifact
|
|||
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications |
Artifact
|
|||
OAuth 2.0 Redirect URI Validation Falls Short |
Artifact
|
|||
On the Detection of Image-Scaling Attacks in Machine Learning |
Artifact
|
|||
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI |
Artifact
|
|||
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning |
Artifact
|
|||
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior |
Artifact
|
|||
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names |
Artifact
|
|||
Poisoning Network Flow Classifiers |
Artifact
|
|||
Protecting Your Voice from Speech Synthesis Attacks |
Artifact
|
|||
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis |
Artifact
|
|||
Remote Attestation of Confidential VMs Using Ephemeral vTPMs |
Artifact
|
|||
Remote Attestation with Constrained Disclosure |
Artifact
|
|||
Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse |
Artifact
|
|||
Secure Softmax/Sigmoid for Machine-learning Computation |
Artifact
|
|||
Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles |
Artifact
|
|||
Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles |
Artifact
|
|||
Triereme: Speeding up hybrid fuzzing through efficient query scheduling |
Artifact
|
|||
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild |
Artifact
|