Results
Results automatically obtained from ACSAC website.
Evaluation Results:
- 14 Artifacts Functional
- 23 Artifacts Reusable
- 19 Results Reproduced
Title | Funct. | Reusa. | Repro. | Available At |
---|---|---|---|---|
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications |
![]() |
Artifact
|
||
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems |
![]() |
![]() |
Artifact
|
|
Attack of the Knights: Non Uniform Cache Side Channel Attack |
![]() |
![]() |
Artifact
|
|
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons |
![]() |
Artifact
|
||
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions |
![]() |
![]() |
Artifact
|
|
DOPE: DOmain Protection Enforcement with PKS |
![]() |
Artifact
|
||
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks |
![]() |
Artifact
|
||
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection |
![]() |
![]() |
Artifact
|
|
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials |
![]() |
Artifact
|
||
Detecting Weak Keys in Manufacturing Certificates: A Case Study |
![]() |
Artifact
|
||
Detection of Anomalies in Electric Vehicle Charging Sessions |
![]() |
![]() |
Artifact
|
|
Differentially Private Resource Allocation |
![]() |
![]() |
Artifact
|
|
Domain and Website Attribution beyond WHOIS |
![]() |
Artifact
|
||
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks |
![]() |
Artifact
|
||
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks |
![]() |
Artifact
|
||
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! |
![]() |
![]() |
Artifact
|
|
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks |
![]() |
![]() |
Artifact
|
|
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance |
![]() |
![]() |
Artifact
|
|
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones |
![]() |
![]() |
Artifact
|
|
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication |
![]() |
Artifact
|
||
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications |
![]() |
Artifact
|
||
OAuth 2.0 Redirect URI Validation Falls Short |
![]() |
![]() |
Artifact
|
|
On the Detection of Image-Scaling Attacks in Machine Learning |
![]() |
Artifact
|
||
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI |
![]() |
![]() |
Artifact
|
|
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning |
![]() |
Artifact
|
||
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior |
![]() |
Artifact
|
||
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names |
![]() |
Artifact
|
||
Poisoning Network Flow Classifiers |
![]() |
![]() |
Artifact
|
|
Protecting Your Voice from Speech Synthesis Attacks |
![]() |
Artifact
|
||
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis |
![]() |
![]() |
Artifact
|
|
Remote Attestation of Confidential VMs Using Ephemeral vTPMs |
![]() |
![]() |
Artifact
|
|
Remote Attestation with Constrained Disclosure |
![]() |
Artifact
|
||
Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse |
![]() |
![]() |
Artifact
|
|
Secure Softmax/Sigmoid for Machine-learning Computation |
![]() |
![]() |
Artifact
|
|
Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles |
![]() |
Artifact
|
||
Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles |
![]() |
Artifact
|
||
Triereme: Speeding up hybrid fuzzing through efficient query scheduling |
![]() |
![]() |
Artifact
|
|
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild |
![]() |
Artifact
|