Results
Evaluated Artifacts: 38
Evaluation Results:
- 36 Available (94.7% of requested)
- 36 Functional (97.2% of requested)
- 26 Reproduced (86.7% of requested)
Title | Available | Functional | Reproduced | Available at |
---|---|---|---|---|
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction |
![]() |
![]() |
![]() |
Artifact |
Architecting Trigger-Action Platforms for Security, Performance and Functionality |
![]() |
![]() |
![]() |
Artifact |
Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware [Artifacts] |
![]() |
![]() |
![]() |
Artifact |
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation |
![]() |
![]() |
![]() |
Artifact |
Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation |
![]() |
![]() |
Artifact |
|
Content Censorship in the InterPlanetary File System |
![]() |
![]() |
![]() |
Artifact |
ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning |
![]() |
Artifact |
||
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing |
![]() |
![]() |
![]() |
Artifact |
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice |
![]() |
![]() |
Artifact |
|
Pisces: Private and Compliable Cryptocurrency Exchange |
![]() |
![]() |
![]() |
Artifact |
LARMix: Latency-Aware Routing in Mix Networks |
![]() |
![]() |
![]() |
Artifact |
Transpose Attack: Stealing Datasets with Bidirectional Training |
![]() |
Artifact |
||
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance |
![]() |
![]() |
||
Efficient and Timely Revocation of V2X Credentials |
![]() |
![]() |
![]() |
Distinguished Artifact Award Artifact |
Acoustic Keystroke Leakage on Smart Televisions |
![]() |
![]() |
![]() |
Artifact |
UntrustIDE: Exploiting Weaknesses in VS Code Extensions |
![]() |
![]() |
Artifact |
|
Group-based Robustness: A General Framework for Customized Robustness in the Real World |
![]() |
![]() |
Artifact |
|
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking |
![]() |
![]() |
![]() |
Artifact |
Timing Channels in Adaptive Neural Networks |
![]() |
![]() |
![]() |
Artifact |
CamPro: Camera-based Anti-Facial Recognition |
![]() |
![]() |
![]() |
Artifact |
50 Shades of Support: A Device-Centric Analysis of Android Security Updates |
![]() |
![]() |
![]() |
Artifact |
Sharing cyber threat intelligence: Does it really help? |
![]() |
![]() |
![]() |
Artifact |
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications |
![]() |
![]() |
Artifact |
|
A Security and Usability Analysis of Local Attacks Against FIDO2 |
![]() |
|||
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data |
![]() |
![]() |
![]() |
Artifact |
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum |
![]() |
![]() |
![]() |
Artifact |
A Unified Symbolic Analysis of WireGuard |
![]() |
![]() |
![]() |
Artifact |
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks |
![]() |
![]() |
Artifact |
|
Pencil: Private and Extensible Collaborative Learning without Non-Colluding Assumption |
![]() |
![]() |
Artifact |
|
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service |
![]() |
![]() |
![]() |
Distinguished Artifact Award Artifact |
Large Language Model guided Protocol Fuzzing |
![]() |
![]() |
![]() |
Artifact |
zRA: Proofs of Attestation based on zkSNARKs |
![]() |
![]() |
![]() |
Artifact |
Watcher: The Tool for Inspecting Third-party Monitors |
![]() |
![]() |
Artifact |
|
VETEOS: Statically Vetting EOSIO Contracts for the Groundhog Day Vulnerabilities |
![]() |
![]() |
![]() |
Artifact |
QUACKSHIELD: Hindering Deserialization Attacks via Static Duck Typing |
![]() |
![]() |
![]() |
Artifact |
Towards Precise Reporting of Cryptographic Misuses |
![]() |
![]() |
Artifact |
|
Private Aggregate Queries to Untrusted Databases |
![]() |
![]() |
![]() |
Artifact |
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices |
![]() |
![]() |
![]() |
Artifact |