Results
Evaluated Artifacts: 63
Evaluation Results:
- 61 Available (100% of requested)
- 59 Functional (96.72% of requested)
- 45 Reproduced (90% of requested)
Title | Available | Functional | Reproduced | Available at |
---|---|---|---|---|
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector |
![]() |
![]() |
![]() |
Artifact |
Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed |
![]() |
![]() |
![]() |
Artifact |
Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures |
![]() |
![]() |
![]() |
Artifact |
EvoCrawl: Exploring Web Application Code and State using Evolutionary Search |
![]() |
![]() |
Artifact |
|
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models |
![]() |
![]() |
![]() |
Artifact |
A Method to Facilitate Membership Inference Attacks in Deep Learning Models |
![]() |
![]() |
![]() |
Artifact |
Delay-allowed Differentially Private Data Stream Release |
![]() |
![]() |
![]() |
Artifact |
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead |
![]() |
![]() |
Artifact |
|
Secure IP Address Allocation at Cloud Scale |
![]() |
![]() |
![]() |
Artifact |
TRAJDELETER: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents |
![]() |
![]() |
![]() |
Artifact |
Diffence: Fencing Membership Privacy With Diffusion Models |
![]() |
![]() |
![]() |
Artifact |
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting |
![]() |
![]() |
![]() |
Distinguished Artifact Award Artifact |
MineShark: Cryptomining Traffic Detection at Scale |
![]() |
![]() |
![]() |
Artifact |
type++: Prohibiting Type Confusion with Inline Type Information |
![]() |
![]() |
![]() |
Artifact |
THEMIS: Regulating Textual Inversion for Personalized Concept Censorship |
![]() |
![]() |
Artifact |
|
DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning |
![]() |
![]() |
![]() |
Artifact |
KernelSnitch: Side Channel-Attacks on Kernel Data Structures |
![]() |
![]() |
![]() |
Artifact |
Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems |
![]() |
![]() |
Artifact |
|
The Road to Trust: Building Enclaves within Confidential VMs |
![]() |
![]() |
Artifact |
|
Hardware-Assisted Retrofitting of XoM for Stripped Binaries |
![]() |
![]() |
Artifact |
|
Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth |
![]() |
![]() |
![]() |
Artifact |
Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach |
![]() |
![]() |
![]() |
Artifact |
Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE |
![]() |
![]() |
![]() |
Artifact |
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation |
![]() |
![]() |
![]() |
Artifact |
The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams |
![]() |
Artifact |
||
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models |
![]() |
![]() |
![]() |
Artifact |
Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse |
![]() |
![]() |
Artifact |
|
TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization |
![]() |
![]() |
![]() |
Artifact |
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples |
![]() |
![]() |
Artifact |
|
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs |
![]() |
![]() |
![]() |
Distinguished Artifact Award Artifact |
DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing |
![]() |
![]() |
![]() |
Artifact |
Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary |
![]() |
![]() |
![]() |
Artifact |
ICS-QUARTZ: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems |
![]() |
![]() |
![]() |
Artifact |
Starshields for iOS: Navigating the Security Cosmos in Satellite Communication |
![]() |
![]() |
![]() |
Artifact |
Onion Franking: Abuse Reports for Mix-Based Private Messaging |
![]() |
![]() |
![]() |
Artifact |
TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks |
![]() |
![]() |
Artifact |
|
Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing |
![]() |
![]() |
Artifact |
|
The Guardians of Name Street: Studying Defensive Registration Practices of the Fortune 500 |
![]() |
![]() |
Artifact |
|
Oreo: Protecting ASLR Against Microarchitectural Attacks |
![]() |
![]() |
![]() |
Artifact |
IsolateGPT: An Execution Isolation Architecture for LLM-Based Systems |
![]() |
![]() |
![]() |
Artifact |
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction |
![]() |
![]() |
![]() |
Artifact |
SKILLPOV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills |
![]() |
![]() |
Artifact |
|
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security |
![]() |
![]() |
Artifact |
|
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning |
![]() |
![]() |
||
Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks |
![]() |
![]() |
![]() |
Artifact |
Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks |
![]() |
![]() |
![]() |
Artifact |
SHAFT: Secure, Handy, Accurate and Fast Transformer Inference |
![]() |
![]() |
![]() |
Distinguished Artifact Award Artifact |
Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning |
![]() |
![]() |
Artifact |
|
ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments |
![]() |
![]() |
||
Towards Understanding Unsafe Video Generation |
Artifact |
|||
Safety Misalignment Against Large Language Models |
![]() |
![]() |
![]() |
Artifact |
MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL |
![]() |
![]() |
![]() |
Artifact |
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! |
![]() |
![]() |
![]() |
Artifact |
Alba: The Dawn of Scalable Bridges for Blockchains |
![]() |
![]() |
![]() |
Artifact |
NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities |
![]() |
![]() |
Artifact |
|
FUZZUER: Enabling Fuzzing of UEFI Interfaces |
![]() |
Artifact |
||
Rethinking Trust in Forge-Based Git Security |
![]() |
![]() |
![]() |
Artifact |
PBP: Post-training Backdoor Purification for Malware Classifiers |
![]() |
![]() |
![]() |
Artifact |
LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations |
![]() |
![]() |
![]() |
Artifact |
PQConnect: Automated Post-Quantum End-to-End Tunnels |
![]() |
![]() |
![]() |
Artifact |
GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization |
![]() |
![]() |
Artifact |
|
Uncovering iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis |
![]() |
![]() |
![]() |
Artifact |
Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic |
![]() |
![]() |
![]() |
Artifact |