Results

Evaluated Artifacts: 63

Evaluation Results:

  • 61 Available (100% of requested)
  • 59 Functional (96.72% of requested)
  • 45 Reproduced (90% of requested)
Title Available Functional Reproduced Available at
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
EvoCrawl: Exploring Web Application Code and State using Evolutionary Search Artifacts Available Artifacts Functional Artifact
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
A Method to Facilitate Membership Inference Attacks in Deep Learning Models Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Delay-allowed Differentially Private Data Stream Release Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead Artifacts Available Artifacts Functional Artifact
Secure IP Address Allocation at Cloud Scale Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
TRAJDELETER: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Diffence: Fencing Membership Privacy With Diffusion Models Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting Artifacts Available Artifacts Functional Artifacts Reproduced Distinguished Artifact Award
Artifact
MineShark: Cryptomining Traffic Detection at Scale Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
type++: Prohibiting Type Confusion with Inline Type Information Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
THEMIS: Regulating Textual Inversion for Personalized Concept Censorship Artifacts Available Artifacts Functional Artifact
DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
KernelSnitch: Side Channel-Attacks on Kernel Data Structures Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems Artifacts Available Artifacts Functional Artifact
The Road to Trust: Building Enclaves within Confidential VMs Artifacts Available Artifacts Reproduced Artifact
Hardware-Assisted Retrofitting of XoM for Stripped Binaries Artifacts Available Artifacts Functional Artifact
Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams Artifacts Available Artifact
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse Artifacts Available Artifacts Functional Artifact
TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples Artifacts Available Artifacts Functional Artifact
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs Artifacts Available Artifacts Functional Artifacts Reproduced Distinguished Artifact Award
Artifact
DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
ICS-QUARTZ: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Starshields for iOS: Navigating the Security Cosmos in Satellite Communication Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Onion Franking: Abuse Reports for Mix-Based Private Messaging Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks Artifacts Available Artifacts Functional Artifact
Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing Artifacts Available Artifacts Functional Artifact
The Guardians of Name Street: Studying Defensive Registration Practices of the Fortune 500 Artifacts Available Artifacts Functional Artifact
Oreo: Protecting ASLR Against Microarchitectural Attacks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
IsolateGPT: An Execution Isolation Architecture for LLM-Based Systems Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
SKILLPOV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills Artifacts Available Artifacts Functional Artifact
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security Artifacts Available Artifacts Functional Artifact
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning Artifacts Functional Artifacts Reproduced
Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
SHAFT: Secure, Handy, Accurate and Fast Transformer Inference Artifacts Available Artifacts Functional Artifacts Reproduced Distinguished Artifact Award
Artifact
Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning Artifacts Available Artifacts Functional Artifact
ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments Artifacts Functional Artifacts Reproduced
Towards Understanding Unsafe Video Generation Artifact
Safety Misalignment Against Large Language Models Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Alba: The Dawn of Scalable Bridges for Blockchains Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities Artifacts Available Artifacts Functional Artifact
FUZZUER: Enabling Fuzzing of UEFI Interfaces Artifacts Available Artifact
Rethinking Trust in Forge-Based Git Security Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PBP: Post-training Backdoor Purification for Malware Classifiers Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PQConnect: Automated Post-Quantum End-to-End Tunnels Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization Artifacts Available Artifacts Functional Artifact
Uncovering iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic Artifacts Available Artifacts Functional Artifacts Reproduced Artifact