Results
Results automatically obtained from ACSAC website.
Evaluation Results:
- 14 Artifacts Functional
- 23 Artifacts Reusable
- 19 Results Reproduced
| Title | Funct. | Reusa. | Repro. | Available At |
|---|---|---|---|---|
| ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications |
|
Artifact
|
||
| Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems |
|
|
Artifact
|
|
| Attack of the Knights: Non Uniform Cache Side Channel Attack |
|
|
Artifact
|
|
| Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons |
|
Artifact
|
||
| Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions |
|
|
Artifact
|
|
| DOPE: DOmain Protection Enforcement with PKS |
|
Artifact
|
||
| DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks |
|
Artifact
|
||
| DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection |
|
|
Artifact
|
|
| Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials |
|
Artifact
|
||
| Detecting Weak Keys in Manufacturing Certificates: A Case Study |
|
Artifact
|
||
| Detection of Anomalies in Electric Vehicle Charging Sessions |
|
|
Artifact
|
|
| Differentially Private Resource Allocation |
|
|
Artifact
|
|
| Domain and Website Attribution beyond WHOIS |
|
Artifact
|
||
| FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks |
|
Artifact
|
||
| FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks |
|
Artifact
|
||
| From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! |
|
|
Artifact
|
|
| Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks |
|
|
Artifact
|
|
| Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance |
|
|
Artifact
|
|
| Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones |
|
|
Artifact
|
|
| Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication |
|
Artifact
|
||
| No Forking Way: Detecting Cloning Attacks on Intel SGX Applications |
|
Artifact
|
||
| OAuth 2.0 Redirect URI Validation Falls Short |
|
|
Artifact
|
|
| On the Detection of Image-Scaling Attacks in Machine Learning |
|
Artifact
|
||
| On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI |
|
|
Artifact
|
|
| PAVUDI: Patch-based Vulnerability Discovery using Machine Learning |
|
Artifact
|
||
| PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior |
|
Artifact
|
||
| PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names |
|
Artifact
|
||
| Poisoning Network Flow Classifiers |
|
|
Artifact
|
|
| Protecting Your Voice from Speech Synthesis Attacks |
|
Artifact
|
||
| RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis |
|
|
Artifact
|
|
| Remote Attestation of Confidential VMs Using Ephemeral vTPMs |
|
|
Artifact
|
|
| Remote Attestation with Constrained Disclosure |
|
Artifact
|
||
| Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse |
|
|
Artifact
|
|
| Secure Softmax/Sigmoid for Machine-learning Computation |
|
|
Artifact
|
|
| Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles |
|
Artifact
|
||
| Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles |
|
Artifact
|
||
| Triereme: Speeding up hybrid fuzzing through efficient query scheduling |
|
|
Artifact
|
|
| When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild |
|
Artifact
|