Results

Results automatically obtained from ACSAC website.

Evaluation Results:

  • 7 Code Available
  • 17 Code Reviewed
  • 29 Code Reproducible
Title Avail. Review. Repro. Available At
TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems Code Available Artifact
Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs Code Available Artifact
Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory Code Available Artifact
R+R: Understanding Hyperparameter Effects in DP-SGD Code Available Artifact
ConProv: A Container-Aware Provenance System for Attack Investigation Code Available Artifact
T-Edge: Trusted Heterogeneous Edge Computing Code Available Artifact
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation Code Available Artifact
Faking deduplication to prevent timing side-channel attacks on memory deduplication Code Reviewed Artifact
SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware Code Reviewed Artifact
R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction Code Reviewed Artifact
You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations Code Reviewed Artifact
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks Code Reviewed Artifact
R+R: Towards Reliable and Generalizable Differentially Private Machine Learning Code Reviewed Artifact
RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments Code Reviewed Artifact
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android Code Reviewed Artifact
Stealing Watermarks of Large Language Models via Mixed Integer Programming Code Reviewed Artifact
WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home Code Reviewed Artifact
AirBugCatcher: Automated Wireless Reproduction of IoT Bugs Code Reviewed Artifact
Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations Code Reviewed Artifact
Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models Code Reviewed Artifact
Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks Code Reviewed Artifact
Artifact
Towards a Taxonomy of Challenges in Security Control Implementation Code Reviewed Artifact
Link Inference Attacks in Vertical Federated Graph Learning Code Reviewed Artifact
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World Code Reviewed Artifact
SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation Code Reproducible Artifact
VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs Code Reproducible Artifact
R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage Code Reproducible Artifact
FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free Code Reproducible Artifact
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks Code Reproducible Artifact
Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments Code Reproducible Artifact
Single Sign-On Privacy: We Still Know What You Did Last Summer Code Reproducible Artifact
Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software Code Reproducible Artifact
VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections Code Reproducible Artifact
R+R: Security Vulnerability Dataset Quality Is Critical Code Reproducible Artifact
FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs Code Reproducible Artifact
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning Code Reproducible Artifact
Privacy-Preserving Verifiable Neural Network Inference Service Code Reproducible Artifact
BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables Code Reproducible Artifact
FedCAP: Robust Federated Learning via Customized Aggregation and Personalization Code Reproducible Artifact
Manifest Problems: Analyzing Code Transparency for Android Application Bundles Code Reproducible Artifact
Model-Manipulation Attacks Against Black-Box Explanations Code Reproducible Artifact
R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries Code Reproducible Artifact
ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer Code Reproducible Artifact
Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality Code Reproducible Artifact
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding Code Reproducible Artifact
SECvma: Virtualization-based Linux Kernel Protection for Arm Code Reproducible Artifact
A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events Code Reproducible Artifact
CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis Code Reproducible Artifact
I'll Be There for You! Perpetual Availability in the A^8 MVX System Code Reproducible Artifact
I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques Code Reproducible Artifact
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning Code Reproducible Artifact
Practical Light Clients for Committee-Based Blockchains Code Reproducible Artifact
BlueScream: Screaming Channels on Bluetooth Low Energy Code Reproducible Artifact