Results

Results automatically obtained from ACSAC website.

Evaluation Results:

  • 13 Code Available
  • 8 Code Reviewed
  • 34 Code Reproducible
Title Avail. Review. Repro. Available At
PP3D: An In-Browser Vision-Based Defense Against Web Behavior Manipulation Attacks Code Available Artifact
No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains Code Available Artifact
ELK: Effective Lock-and-Key Technique for Temporal Memory Safety on Embedded Devices in ARMv8-M Code Available Artifact
Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems Code Available Artifact
CAUA: A Realistic and Effective Attack on Machine Unlearning under Limited Information Code Available Artifact
R+R: IoT Device Identification Under Realistic Conditions Code Available Artifact
Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency Code Available Artifact
Understanding the Security Impact of CHERI on the Operating System Kernel Code Available Artifact
Fooling Machine's Eyes: Unicode Modifier Letter Evasion Attack Code Available Artifact
Analysis of Encryption Key Zeroization from System-wide Perspective Code Available Artifact
Non-Bare-Metal User-Space Control-Flow Attestation Code Available Artifact
Gravity of the Situation:Security Analysis on Rocket.Chat E2EE Code Available Artifact
TempoNet: Learning Realistic Communication and Timing Patterns for Network Traffic Simulation Code Available Artifact
Clouseau: A Hierarchal Multi-Agent Approach For Autonomous Attack Investigation Code Reviewed Artifact
False Promises of Passwordless: Defeating Windows Hello through TPM Misuses Code Reviewed Artifact
APILOT: Improving the Security and Usability of LLM Code Suggestions via Outdated API Mitigation Code Reviewed Artifact
OTABase: Enhancing Over-the-Air Testing to Detect Memory Crashes in Cellular Basebands Code Reviewed Artifact
Siren: A Learning-Based Multi-Turn Attack Framework for Simulating Real-World Human Jailbreak Behaviors Code Reviewed Artifact
CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set Code Reviewed Artifact
SnoopDog: Detecting USB Bus Sniffers Using Responsive EMR Code Reviewed Artifact
MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration Code Reviewed Artifact
Sagitta: Facilitating Post-Fuzzing Root Cause Analysis via Data Flow Differencing Code Reproducible Artifact
Supply Chain Reaction: Enhancing the Precision of Vulnerability Triage using Code Reachability Information Code Reproducible Artifact
Environmental Rate Manipulation Attacks on Power Grid Security Code Reproducible Artifact
Octopus: Fast Homomorphic Convolution for Secure Neural Network Inference Code Reproducible Artifact
Zeus-IoT: Comprehensive Code Signing to Prevent IoT Device Weaponization Code Reproducible Artifact
Enhancing Noisy Functional Encryption for Privacy-Preserving Machine Learning Code Reproducible Artifact
Securing On-device Transformer with Hardware Binding and Reversible Obfuscation Code Reproducible Artifact
Fix it - If you Can! Towards Understanding the Impact of Tool Support and Domain Owners’ Reactions to SSHFP Misconfigurations Code Reproducible Artifact
Compact and Selective Disclosure for Verifiable Credentials Code Reproducible Artifact
TrustLeech: Privileged System Analysis using Nested Virtualization Code Reproducible Artifact
MoEvil: Poisoning Expert to Compromise the Safety of Mixture-of-Experts LLMs Code Reproducible Artifact
GET /large.file HTTP/1.1:Connection-Based TCP Amplification Attacks Code Reproducible Artifact
EM-Flow: Advanced Electromagnetic Control Flow Verification for Embedded Systems Code Reproducible Artifact
InteractionShield: Harnessing Event Relations for Interaction Threat Detection and Resolution in Smart Homes Code Reproducible Artifact
VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming Code Reproducible Artifact
Enabling Plausible Deniability in Flash-based Storage through Data Permutation Code Reproducible Artifact
In Pursuit of Lean OS Kernels: Improving Configuration-Based Debloating Code Reproducible Artifact
SMORE: Practical Redzone-Based Stack Memory Error Detection Mechanism for Embedded Systems Code Reproducible Artifact
Revisiting Prime+Prune+Probe: Pitfalls and Remedies Code Reproducible Artifact
Leaking Queries On Secure Stream Processing Systems Code Reproducible Artifact
Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras Code Reproducible Artifact
PSan: Towards Hybrid Metadata Scheme for Efficient Pointer Checking Code Reproducible Artifact
Revealing the True Indicators: Understanding and Improving IoC Extraction From Threat Reports Code Reproducible Artifact
Recovering Peripheral Maps and Protocols to Expedite Firmware Reverse Engineering Code Reproducible Artifact
The 2FA Illusion: Uncovering Weak Links of Web Account Access in the Wild Code Reproducible Artifact
AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation Code Reproducible Artifact
DP-Mix: Differentially Private Routing in Mix Networks Code Reproducible Artifact
One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises Code Reproducible Artifact
DeepProv: Behavioral Characterization and Repair of Neural Networks via Inference Provenance Graph Analysis Code Reproducible Artifact
FLAME: Flexible and Lightweight Biometric Authentication Scheme in Malicious Environments Code Reproducible Artifact
Uncovering Bigger Truths: Deobfuscating PHP with Phoebe Code Reproducible Artifact
A Period-Adaptive Traffic Fingerprint-Based Method for Smart Home Device Identification Code Reproducible Artifact
Belt and Braces! Fight against Key Compromising in Single Sign-On Systems Code Reproducible
MimicCall: Bypassing System Call Filters via Kernel Function Redundancy Code Reproducible Artifact