Results
Results automatically obtained from ACSAC website.
Evaluation Results:
- 13 Code Available
- 8 Code Reviewed
- 34 Code Reproducible
| Title | Avail. | Review. | Repro. | Available At |
|---|---|---|---|---|
| PP3D: An In-Browser Vision-Based Defense Against Web Behavior Manipulation Attacks |
|
Artifact
|
||
| No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains |
|
Artifact
|
||
| ELK: Effective Lock-and-Key Technique for Temporal Memory Safety on Embedded Devices in ARMv8-M |
|
Artifact
|
||
| Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems |
|
Artifact
|
||
| CAUA: A Realistic and Effective Attack on Machine Unlearning under Limited Information |
|
Artifact
|
||
| R+R: IoT Device Identification Under Realistic Conditions |
|
Artifact
|
||
| Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency |
|
Artifact
|
||
| Understanding the Security Impact of CHERI on the Operating System Kernel |
|
Artifact
|
||
| Fooling Machine's Eyes: Unicode Modifier Letter Evasion Attack |
|
Artifact
|
||
| Analysis of Encryption Key Zeroization from System-wide Perspective |
|
Artifact
|
||
| Non-Bare-Metal User-Space Control-Flow Attestation |
|
Artifact
|
||
| Gravity of the Situation:Security Analysis on Rocket.Chat E2EE |
|
Artifact
|
||
| TempoNet: Learning Realistic Communication and Timing Patterns for Network Traffic Simulation |
|
Artifact
|
||
| Clouseau: A Hierarchal Multi-Agent Approach For Autonomous Attack Investigation |
|
Artifact
|
||
| False Promises of Passwordless: Defeating Windows Hello through TPM Misuses |
|
Artifact
|
||
| APILOT: Improving the Security and Usability of LLM Code Suggestions via Outdated API Mitigation |
|
Artifact
|
||
| OTABase: Enhancing Over-the-Air Testing to Detect Memory Crashes in Cellular Basebands |
|
Artifact
|
||
| Siren: A Learning-Based Multi-Turn Attack Framework for Simulating Real-World Human Jailbreak Behaviors |
|
Artifact
|
||
| CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set |
|
Artifact
|
||
| SnoopDog: Detecting USB Bus Sniffers Using Responsive EMR |
|
Artifact
|
||
| MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration |
|
Artifact
|
||
| Sagitta: Facilitating Post-Fuzzing Root Cause Analysis via Data Flow Differencing |
|
Artifact
|
||
| Supply Chain Reaction: Enhancing the Precision of Vulnerability Triage using Code Reachability Information |
|
Artifact
|
||
| Environmental Rate Manipulation Attacks on Power Grid Security |
|
Artifact
|
||
| Octopus: Fast Homomorphic Convolution for Secure Neural Network Inference |
|
Artifact
|
||
| Zeus-IoT: Comprehensive Code Signing to Prevent IoT Device Weaponization |
|
Artifact
|
||
| Enhancing Noisy Functional Encryption for Privacy-Preserving Machine Learning |
|
Artifact
|
||
| Securing On-device Transformer with Hardware Binding and Reversible Obfuscation |
|
Artifact
|
||
| Fix it - If you Can! Towards Understanding the Impact of Tool Support and Domain Owners’ Reactions to SSHFP Misconfigurations |
|
Artifact
|
||
| Compact and Selective Disclosure for Verifiable Credentials |
|
Artifact
|
||
| TrustLeech: Privileged System Analysis using Nested Virtualization |
|
Artifact
|
||
| MoEvil: Poisoning Expert to Compromise the Safety of Mixture-of-Experts LLMs |
|
Artifact
|
||
| GET /large.file HTTP/1.1:Connection-Based TCP Amplification Attacks |
|
Artifact
|
||
| EM-Flow: Advanced Electromagnetic Control Flow Verification for Embedded Systems |
|
Artifact
|
||
| InteractionShield: Harnessing Event Relations for Interaction Threat Detection and Resolution in Smart Homes |
|
Artifact
|
||
| VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming |
|
Artifact
|
||
| Enabling Plausible Deniability in Flash-based Storage through Data Permutation |
|
Artifact
|
||
| In Pursuit of Lean OS Kernels: Improving Configuration-Based Debloating |
|
Artifact
|
||
| SMORE: Practical Redzone-Based Stack Memory Error Detection Mechanism for Embedded Systems |
|
Artifact
|
||
| Revisiting Prime+Prune+Probe: Pitfalls and Remedies |
|
Artifact
|
||
| Leaking Queries On Secure Stream Processing Systems |
|
Artifact
|
||
| Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras |
|
Artifact
|
||
| PSan: Towards Hybrid Metadata Scheme for Efficient Pointer Checking |
|
Artifact
|
||
| Revealing the True Indicators: Understanding and Improving IoC Extraction From Threat Reports |
|
Artifact
|
||
| Recovering Peripheral Maps and Protocols to Expedite Firmware Reverse Engineering |
|
Artifact
|
||
| The 2FA Illusion: Uncovering Weak Links of Web Account Access in the Wild |
|
Artifact
|
||
| AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation |
|
Artifact
|
||
| DP-Mix: Differentially Private Routing in Mix Networks |
|
Artifact
|
||
| One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises |
|
Artifact
|
||
| DeepProv: Behavioral Characterization and Repair of Neural Networks via Inference Provenance Graph Analysis |
|
Artifact
|
||
| FLAME: Flexible and Lightweight Biometric Authentication Scheme in Malicious Environments |
|
Artifact
|
||
| Uncovering Bigger Truths: Deobfuscating PHP with Phoebe |
|
Artifact
|
||
| A Period-Adaptive Traffic Fingerprint-Based Method for Smart Home Device Identification |
|
Artifact
|
||
| Belt and Braces! Fight against Key Compromising in Single Sign-On Systems |
|
|||
| MimicCall: Bypassing System Call Filters via Kernel Function Redundancy |
|
Artifact
|