Results
Evaluated Artifacts: 63
Evaluation Results:
- 61 Available (100% of requested)
- 59 Functional (96.72% of requested)
- 45 Reproduced (90% of requested)
| Title | Available | Functional | Reproduced | Available at |
|---|---|---|---|---|
| Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector |
|
|
|
Artifact |
| Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed |
|
|
|
Artifact |
| Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures |
|
|
|
Artifact |
| EvoCrawl: Exploring Web Application Code and State using Evolutionary Search |
|
|
Artifact |
|
| Black-box Membership Inference Attacks against Fine-tuned Diffusion Models |
|
|
|
Artifact |
| A Method to Facilitate Membership Inference Attacks in Deep Learning Models |
|
|
|
Artifact |
| Delay-allowed Differentially Private Data Stream Release |
|
|
|
Artifact |
| Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead |
|
|
Artifact |
|
| Secure IP Address Allocation at Cloud Scale |
|
|
|
Artifact |
| TRAJDELETER: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents |
|
|
|
Artifact |
| Diffence: Fencing Membership Privacy With Diffusion Models |
|
|
|
Artifact |
| Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting |
|
|
|
Distinguished Artifact Award Artifact |
| MineShark: Cryptomining Traffic Detection at Scale |
|
|
|
Artifact |
| type++: Prohibiting Type Confusion with Inline Type Information |
|
|
|
Artifact |
| THEMIS: Regulating Textual Inversion for Personalized Concept Censorship |
|
|
Artifact |
|
| DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning |
|
|
|
Artifact |
| KernelSnitch: Side Channel-Attacks on Kernel Data Structures |
|
|
|
Artifact |
| Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems |
|
|
Artifact |
|
| The Road to Trust: Building Enclaves within Confidential VMs |
|
|
Artifact |
|
| Hardware-Assisted Retrofitting of XoM for Stripped Binaries |
|
|
Artifact |
|
| Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth |
|
|
|
Artifact |
| Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach |
|
|
|
Artifact |
| Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE |
|
|
|
Artifact |
| RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation |
|
|
|
Artifact |
| The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams |
|
Artifact |
||
| Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models |
|
|
|
Artifact |
| Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse |
|
|
Artifact |
|
| TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization |
|
|
|
Artifact |
| Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples |
|
|
Artifact |
|
| JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs |
|
|
|
Distinguished Artifact Award Artifact |
| DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing |
|
|
|
Artifact |
| Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary |
|
|
|
Artifact |
| ICS-QUARTZ: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems |
|
|
|
Artifact |
| Starshields for iOS: Navigating the Security Cosmos in Satellite Communication |
|
|
|
Artifact |
| Onion Franking: Abuse Reports for Mix-Based Private Messaging |
|
|
|
Artifact |
| TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks |
|
|
Artifact |
|
| Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing |
|
|
Artifact |
|
| The Guardians of Name Street: Studying Defensive Registration Practices of the Fortune 500 |
|
|
Artifact |
|
| Oreo: Protecting ASLR Against Microarchitectural Attacks |
|
|
|
Artifact |
| IsolateGPT: An Execution Isolation Architecture for LLM-Based Systems |
|
|
|
Artifact |
| Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction |
|
|
|
Artifact |
| SKILLPOV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills |
|
|
Artifact |
|
| Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security |
|
|
Artifact |
|
| YuraScanner: Leveraging LLMs for Task-driven Web App Scanning |
|
|
||
| Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks |
|
|
|
Artifact |
| Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks |
|
|
|
Artifact |
| SHAFT: Secure, Handy, Accurate and Fast Transformer Inference |
|
|
|
Distinguished Artifact Award Artifact |
| Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning |
|
|
Artifact |
|
| ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments |
|
|
||
| Towards Understanding Unsafe Video Generation |
Artifact |
|||
| Safety Misalignment Against Large Language Models |
|
|
|
Artifact |
| MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL |
|
|
|
Artifact |
| Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! |
|
|
|
Artifact |
| Alba: The Dawn of Scalable Bridges for Blockchains |
|
|
|
Artifact |
| NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities |
|
|
Artifact |
|
| FUZZUER: Enabling Fuzzing of UEFI Interfaces |
|
Artifact |
||
| Rethinking Trust in Forge-Based Git Security |
|
|
|
Artifact |
| PBP: Post-training Backdoor Purification for Malware Classifiers |
|
|
|
Artifact |
| LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations |
|
|
|
Artifact |
| PQConnect: Automated Post-Quantum End-to-End Tunnels |
|
|
|
Artifact |
| GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization |
|
|
Artifact |
|
| Uncovering iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis |
|
|
|
Artifact |
| Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic |
|
|
|
Artifact |