Results

Results automatically obtained from ACSAC website.

Evaluation Results:

  • 14 Artifacts Functional
  • 23 Artifacts Reusable
  • 19 Results Reproduced
Title Funct. Reusa. Repro. Available At
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications Artifacts Functional Artifact
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems Artifacts Reusable Results Reproduced Artifact
Attack of the Knights: Non Uniform Cache Side Channel Attack Artifacts Reusable Results Reproduced Artifact
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons Artifacts Functional Artifact
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions Artifacts Reusable Results Reproduced Artifact
DOPE: DOmain Protection Enforcement with PKS Artifacts Functional Artifact
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks Artifacts Reusable Artifact
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection Artifacts Reusable Results Reproduced Artifact
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials Artifacts Reusable Artifact
Detecting Weak Keys in Manufacturing Certificates: A Case Study Artifacts Reusable Artifact
Detection of Anomalies in Electric Vehicle Charging Sessions Artifacts Functional Results Reproduced Artifact
Differentially Private Resource Allocation Artifacts Reusable Results Reproduced Artifact
Domain and Website Attribution beyond WHOIS Artifacts Functional Artifact
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks Artifacts Functional Artifact
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks Artifacts Functional Artifact
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! Artifacts Reusable Results Reproduced Artifact
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks Artifacts Reusable Results Reproduced Artifact
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance Artifacts Reusable Results Reproduced Artifact
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones Artifacts Functional Results Reproduced Artifact
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication Artifacts Reusable Artifact
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications Artifacts Functional Artifact
OAuth 2.0 Redirect URI Validation Falls Short Artifacts Reusable Results Reproduced Artifact
On the Detection of Image-Scaling Attacks in Machine Learning Artifacts Functional Artifact
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI Artifacts Reusable Results Reproduced Artifact
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning Artifacts Reusable Artifact
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior Results Reproduced Artifact
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names Artifacts Functional Artifact
Poisoning Network Flow Classifiers Artifacts Reusable Results Reproduced Artifact
Protecting Your Voice from Speech Synthesis Attacks Artifacts Functional Artifact
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis Artifacts Reusable Results Reproduced Artifact
Remote Attestation of Confidential VMs Using Ephemeral vTPMs Artifacts Reusable Results Reproduced Artifact
Remote Attestation with Constrained Disclosure Artifacts Reusable Artifact
Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse Artifacts Functional Results Reproduced Artifact
Secure Softmax/Sigmoid for Machine-learning Computation Artifacts Reusable Results Reproduced Artifact
Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles Artifacts Reusable Artifact
Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles Artifacts Reusable Artifact
Triereme: Speeding up hybrid fuzzing through efficient query scheduling Artifacts Reusable Results Reproduced Artifact
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild Artifacts Functional Artifact