Results

Evaluated Artifacts: 38

Evaluation Results:

  • 36 Available (94.7% of requested)
  • 36 Functional (97.2% of requested)
  • 26 Reproduced (86.7% of requested)
Title Available Functional Reproduced Available at
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Architecting Trigger-Action Platforms for Security, Performance and Functionality Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware [Artifacts] Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation Artifacts Available Artifacts Evaluated Artifact
Content Censorship in the InterPlanetary File System Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning Artifacts Available Artifact
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice Artifacts Available Artifacts Evaluated Artifact
Pisces: Private and Compliable Cryptocurrency Exchange Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
LARMix: Latency-Aware Routing in Mix Networks Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Transpose Attack: Stealing Datasets with Bidirectional Training Artifacts Available Artifact
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance Artifacts Evaluated Artifacts Reproduced
Efficient and Timely Revocation of V2X Credentials Artifacts Available Artifacts Evaluated Artifacts Reproduced Distinguished Artifact Award
Artifact
Acoustic Keystroke Leakage on Smart Televisions Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
UntrustIDE: Exploiting Weaknesses in VS Code Extensions Artifacts Available Artifacts Evaluated Artifact
Group-based Robustness: A General Framework for Customized Robustness in the Real World Artifacts Available Artifacts Evaluated Artifact
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Timing Channels in Adaptive Neural Networks Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
CamPro: Camera-based Anti-Facial Recognition Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
50 Shades of Support: A Device-Centric Analysis of Android Security Updates Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Sharing cyber threat intelligence: Does it really help? Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications Artifacts Available Artifacts Evaluated Artifact
A Security and Usability Analysis of Local Attacks Against FIDO2 Artifacts Evaluated
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
A Unified Symbolic Analysis of WireGuard Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks Artifacts Available Artifacts Evaluated Artifact
Pencil: Private and Extensible Collaborative Learning without Non-Colluding Assumption Artifacts Available Artifacts Evaluated Artifact
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service Artifacts Available Artifacts Evaluated Artifacts Reproduced Distinguished Artifact Award
Artifact
Large Language Model guided Protocol Fuzzing Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
zRA: Proofs of Attestation based on zkSNARKs Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Watcher: The Tool for Inspecting Third-party Monitors Artifacts Available Artifacts Evaluated Artifact
VETEOS: Statically Vetting EOSIO Contracts for the Groundhog Day Vulnerabilities Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
QUACKSHIELD: Hindering Deserialization Attacks via Static Duck Typing Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
Towards Precise Reporting of Cryptographic Misuses Artifacts Available Artifacts Evaluated Artifact
Private Aggregate Queries to Untrusted Databases Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices Artifacts Available Artifacts Evaluated Artifacts Reproduced Artifact