Results
Results automatically obtained from ACSAC website.
Evaluation Results:
- 7 Code Available
- 17 Code Reviewed
- 29 Code Reproducible
| Title | Avail. | Review. | Repro. | Available At |
|---|---|---|---|---|
| TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems |
|
Artifact
|
||
| Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs |
|
Artifact
|
||
| Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory |
|
Artifact
|
||
| R+R: Understanding Hyperparameter Effects in DP-SGD |
|
Artifact
|
||
| ConProv: A Container-Aware Provenance System for Attack Investigation |
|
Artifact
|
||
| T-Edge: Trusted Heterogeneous Edge Computing |
|
Artifact
|
||
| FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation |
|
Artifact
|
||
| Faking deduplication to prevent timing side-channel attacks on memory deduplication |
|
Artifact
|
||
| SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware |
|
Artifact
|
||
| R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction |
|
Artifact
|
||
| You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations |
|
Artifact
|
||
| Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks |
|
Artifact
|
||
| R+R: Towards Reliable and Generalizable Differentially Private Machine Learning |
|
Artifact
|
||
| RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments |
|
Artifact
|
||
| R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android |
|
Artifact
|
||
| Stealing Watermarks of Large Language Models via Mixed Integer Programming |
|
Artifact
|
||
| WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home |
|
Artifact
|
||
| AirBugCatcher: Automated Wireless Reproduction of IoT Bugs |
|
Artifact
|
||
| Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations |
|
Artifact
|
||
| Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models |
|
Artifact
|
||
| Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks |
|
Artifact
Artifact |
||
| Towards a Taxonomy of Challenges in Security Control Implementation |
|
Artifact
|
||
| Link Inference Attacks in Vertical Federated Graph Learning |
|
Artifact
|
||
| On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World |
|
Artifact
|
||
| SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation |
|
Artifact
|
||
| VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs |
|
Artifact
|
||
| R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage |
|
Artifact
|
||
| FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free |
|
Artifact
|
||
| No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks |
|
Artifact
|
||
| Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments |
|
Artifact
|
||
| Single Sign-On Privacy: We Still Know What You Did Last Summer |
|
Artifact
|
||
| Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software |
|
Artifact
|
||
| VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections |
|
Artifact
|
||
| R+R: Security Vulnerability Dataset Quality Is Critical |
|
Artifact
|
||
| FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs |
|
Artifact
|
||
| Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning |
|
Artifact
|
||
| Privacy-Preserving Verifiable Neural Network Inference Service |
|
Artifact
|
||
| BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables |
|
Artifact
|
||
| FedCAP: Robust Federated Learning via Customized Aggregation and Personalization |
|
Artifact
|
||
| Manifest Problems: Analyzing Code Transparency for Android Application Bundles |
|
Artifact
|
||
| Model-Manipulation Attacks Against Black-Box Explanations |
|
Artifact
|
||
| R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries |
|
Artifact
|
||
| ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer |
|
Artifact
|
||
| Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality |
|
Artifact
|
||
| TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding |
|
Artifact
|
||
| SECvma: Virtualization-based Linux Kernel Protection for Arm |
|
Artifact
|
||
| A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events |
|
Artifact
|
||
| CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis |
|
Artifact
|
||
| I'll Be There for You! Perpetual Availability in the A^8 MVX System |
|
Artifact
|
||
| I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques |
|
Artifact
|
||
| Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning |
|
Artifact
|
||
| Practical Light Clients for Committee-Based Blockchains |
|
Artifact
|
||
| BlueScream: Screaming Channels on Bluetooth Low Energy |
|
Artifact
|