Results
Evaluated Artifacts: 38
Evaluation Results:
- 36 Available (94.7% of requested)
- 36 Functional (97.2% of requested)
- 26 Reproduced (86.7% of requested)
| Title | Available | Functional | Reproduced | Available at |
|---|---|---|---|---|
| Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction |
|
|
|
Artifact |
| Architecting Trigger-Action Platforms for Security, Performance and Functionality |
|
|
|
Artifact |
| Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware [Artifacts] |
|
|
|
Artifact |
| HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation |
|
|
|
Artifact |
| Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation |
|
|
Artifact |
|
| Content Censorship in the InterPlanetary File System |
|
|
|
Artifact |
| ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning |
|
Artifact |
||
| SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing |
|
|
|
Artifact |
| Attributions for ML-based ICS Anomaly Detection: From Theory to Practice |
|
|
Artifact |
|
| Pisces: Private and Compliable Cryptocurrency Exchange |
|
|
|
Artifact |
| LARMix: Latency-Aware Routing in Mix Networks |
|
|
|
Artifact |
| Transpose Attack: Stealing Datasets with Bidirectional Training |
|
Artifact |
||
| A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance |
|
|
||
| Efficient and Timely Revocation of V2X Credentials |
|
|
|
Distinguished Artifact Award Artifact |
| Acoustic Keystroke Leakage on Smart Televisions |
|
|
|
Artifact |
| UntrustIDE: Exploiting Weaknesses in VS Code Extensions |
|
|
Artifact |
|
| Group-based Robustness: A General Framework for Customized Robustness in the Real World |
|
|
Artifact |
|
| BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking |
|
|
|
Artifact |
| Timing Channels in Adaptive Neural Networks |
|
|
|
Artifact |
| CamPro: Camera-based Anti-Facial Recognition |
|
|
|
Artifact |
| 50 Shades of Support: A Device-Centric Analysis of Android Security Updates |
|
|
|
Artifact |
| Sharing cyber threat intelligence: Does it really help? |
|
|
|
Artifact |
| When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications |
|
|
Artifact |
|
| A Security and Usability Analysis of Local Attacks Against FIDO2 |
|
|||
| Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data |
|
|
|
Artifact |
| Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum |
|
|
|
Artifact |
| A Unified Symbolic Analysis of WireGuard |
|
|
|
Artifact |
| GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks |
|
|
Artifact |
|
| Pencil: Private and Extensible Collaborative Learning without Non-Colluding Assumption |
|
|
Artifact |
|
| 5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service |
|
|
|
Distinguished Artifact Award Artifact |
| Large Language Model guided Protocol Fuzzing |
|
|
|
Artifact |
| zRA: Proofs of Attestation based on zkSNARKs |
|
|
|
Artifact |
| Watcher: The Tool for Inspecting Third-party Monitors |
|
|
Artifact |
|
| VETEOS: Statically Vetting EOSIO Contracts for the Groundhog Day Vulnerabilities |
|
|
|
Artifact |
| QUACKSHIELD: Hindering Deserialization Attacks via Static Duck Typing |
|
|
|
Artifact |
| Towards Precise Reporting of Cryptographic Misuses |
|
|
Artifact |
|
| Private Aggregate Queries to Untrusted Databases |
|
|
|
Artifact |
| From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices |
|
|
|
Artifact |