Results

Evaluated Artifacts: 114

Evaluation Results:

  • 112 Available
  • 97 Functional
  • 70 Reproduced
Title Available Functional Reproduced Artifact
A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis Artifacts Available Artifacts Functional Artifact
ADGFUZZ: Assignment Dependency-Guided Fuzzing for Robotic Vehicles Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Accurate Identification of the Vulnerability-introducing Commit based on Differential Analysis of Patching Patterns Artifacts Available Artifact
Achieving Interpretable DL-based Web Attack Detection through Malicious Payload Localization Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Action Required: A Mixed-Methods Study of Security Practices in GitHub Actions Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks Artifacts Available Artifacts Functional Artifact
AnonyCall: Enabling Native Private Calling in Mobile Networks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Are your Sites Truly Isolated? Automatically Detecting Logic Bugs in Site Isolation Implementations Artifacts Available Artifact
Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data Artifacts Available Artifacts Functional Artifact
BKPIR: Keyword PIR for Private Boolean Retrieval Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
BLERP: BLE Re-Pairing Attacks and Defenses Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Benchmarking and Understanding Safety Risks in AI Character Platforms Artifacts Available Artifacts Functional Artifact
Better Safe than Sorry: Uncovering the Insecure Resource Management in App-in-App Cloud Services Artifacts Available Artifacts Functional Artifact
Beyond Raw Bytes: Towards Large Malware Language Models Artifacts Available Artifacts Functional Artifact
Breaking the Bulkhead: Demystifying Cross-Namespace Reference Vulnerabilities in Kubernetes Operators Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Breaking the Generative Steganography Trilemma: ANStega for Optimal Capacity, Efficiency, and Security Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
BunnyFinder: Finding Incentive Flaws for Ethereum Consensus Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
CTng: Secure Certificate and Revocation Transparency Artifacts Available Artifacts Functional Artifact
CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Cease at the Ultimate Goodness: Approaching Optimal Website Fingerprinting Defense via Iterative Mutual Information Minimization Artifacts Available Artifacts Functional Artifact
CellShift: RTT-Aware Trace Transduction for Real-World Website Fingerprinting Artifacts Available Artifacts Functional Artifact
ChameleoScan: Demystifying and Detecting iOS Chameleon Apps via LLM-Powered UI Exploration Artifacts Available Artifact
Characterizing the Implementation of Censorship Policies in Chinese LLM Services Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Chasing Shadows: Pitfalls in LLM Security Research Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Cirrus: Performant and Accountable Distributed SNARK Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Consensus in the Known Participation Model with Byzantine Failures and Sleepy Replicas Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Convergent Privacy Framework for Multi-layer GNNs through Contractive Message Passing Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Cross-Boundary Mobile Tracking: Exploring Java-to-JavaScript Information Diffusion in WebViews Artifacts Available Artifact
Cross-Cache Attacks for the Linux Kernel via PCP Massaging Artifacts Available Artifacts Functional Artifact
CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Cryptobazaar: Private Sealed-bid Auctions at Scale Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
DNN Latency Sequencing: Extracting DNN Architectures from Intel SGX Enclaves with Single-Stepping Attacks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
DualStrike: Accurate, Real-time Eavesdropping and Injection of Keystrokes on Commodity Keyboards Artifacts Available Artifact
Enhancing Legal Document Security and Accessibility with TAF Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Enhancing Semantic-Aware Binary Diffing with High-Confidence Dynamic Instruction Alignment Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Entente: Cross-silo Intrusion Detection on Network Log Graphs with Federated Learning Artifacts Available Artifacts Functional Artifact
FARFETCH'D: Side-Channel Analysis for Privacy Applications on Confidential VMs Artifacts Available Artifact
Faster Than Ever: A New Lightweight Private Set Intersection and Its Variants Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented Generation Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
FirmCross: Detecting Taint-style Vulnerabilities in Modern C-Lua Hybrid Web Services of Linux-based Firmware Artifacts Functional Artifacts Reproduced
FlippyR.AM: A Large-Scale Study of Rowhammer Prevalence Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking Systems Artifacts Available Artifact
Formal Analysis of BLE Secure Connection Pairing and Revelation of the PE Confusion Attack Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
From Noise to Signal: Precisely Identify Affected Packages of Known Vulnerabilities in npm Ecosystem Artifacts Available Artifact
From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
HoneySat Artifact Evaluation Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Icarus: Achieving Performant Asynchronous BFT with Only Optimistic Paths Artifacts Available Artifacts Functional Artifact
Identifying Logical Vulnerabilities in QUIC Implementations Artifacts Available Artifact
In-Context Probing for Membership Inference in Fine-Tuned Language Models Artifacts Available Artifacts Functional Artifact
Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT Artifacts Available Artifacts Functional Artifact
Kangaroo: A Private and Amortized Inference Framework over WAN for Large-Scale Decision Tree Evaluation Artifacts Available Artifacts Functional Artifact
Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries Artifacts Available Artifact
Les Dissonances: Cross-Tool Harvesting and Polluting in Pool-of-Tools Empowered LLM Agents Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
LinkGuard: A Lightweight State-Aware Runtime Guard Against Link Following Attacks in Windows File System Artifacts Available Artifacts Functional Artifact
Loki: Proactively discovering online scams by mining toxic search queries Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
MUTATO: Enhancing Fuzz Drivers with Adaptive API Option Mutation Artifacts Available Artifacts Functional Artifact
MVP-ORAM: a Wait-free Concurrent ORAM for Confidential BFT Storage Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
MinBucket MPSI: Breaking the Max-Size Bottleneck in Multi-Party Private Set Intersection Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Mirage: Private, Mobility-based Routing for Censorship Evasion Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
NDSS '25 Artifact Appendix: Unknown Target: Uncovering and Detecting Novel In-Flight Attacks to Collision Avoidance (TCAS) Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
NDSS '26 Artifact Appendix: Cross-Consensus Reliable Broadcast and its Applications Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
NDSS '26 Artifact Appendix: Pando: Extremely Scalable BFT Based on Committee Sampling Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
NetRadar: Enabling Robust Carpet Bombing DDoS Detection Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
NeuroStrike: Neuron-Level Attacks on Aligned LLMs Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
OSAVRoute: Advancing Outbound Source Address Validation Deployment Detection with Non-Cooperative Measurement Artifacts Available Artifact
On the Security Risks of Memory Adaptation and Augmentation in Data-plane DoS Mitigation Artifacts Available Artifacts Functional Artifact
One Email, Many Faces: A Deep Dive into Identity Confusion in Email Aliases Artifacts Available Artifacts Functional Artifact
OptiMix: Scalable and Distributed Approaches for Latency Optimization in Modern Mixnets Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PACS: Privacy-Preserving Attribute-Driven Community Search over Attributed Graphs Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PANDORA: Lightweight Adversarial Defense for Edge IoT using Uncertainty-Aware Metric Learning Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PIRANHAS: PrIvacy-Preserving Remote Attestation in Non-Hierarchical Asynchronous Swarms Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Paladin: Defending LLM-enabled Phishing Emails with a New Trigger-Tag Paradigm Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PathProb: Probabilistic Inference and Path Scoring for Enhanced RPKI-based Route Leak Detection Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Peering Inside the Black-Box: Long-Range and Scalable Model Architecture Snooping via GPU Electromagnetic Side-Channel Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Pitfalls for Security Isolation in Multi-CPU Systems Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PriSrv+: Privacy and Usability-Enhanced Wireless Service Discovery with Fast and Expressive Matchmaking Encryption Artifacts Available Artifact
PrivCode: When Code Synthesis Meets Differential Privacy Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning Artifacts Available Artifacts Functional Artifact
ProtocolGuard: Detecting Protocol Non-compliance Bugs via LLM-guided Static Analysis and Dynamic Verification Artifacts Available Artifact
RTCON: Context-Adaptive Function-Level Fuzzing for RTOS Kernels Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Repairing Trust in Domain Name Disputes Practices: Insights from a Quarter-Century’s Worth of Squabbles Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Revisiting Differentially Private Hyper-parameter Tuning Artifacts Available Artifacts Functional Artifact
Reviving and Advancing Page Cache Attacks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
SACK: Systematic Generation of Function Substitution Attacks Against Control-Flow Integrity Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
SECV: Securing Connected Vehicles with Hardware Trust Anchors Artifacts Available Artifacts Functional Artifact
SVDefense: Effective Defense against Gradient Inversion Attacks via Singular Value Decomposition Artifacts Available Artifacts Functional Artifact
SWIPE - DOM-XSS Detection via Webpage Interaction Fuzzing and URL Component Synthesis Artifacts Available Artifacts Functional Artifact
SYSYPHUZZ and the Pressure of More Coverage Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
TIPSO-GAN: Malicious Network Traffic Detection Using a Novel Optimized Generative Adversarial Network Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Targeted Physical Evasion Attacks in the Near-Infrared Domain Artifacts Functional
The Butterfly Effect in LLM Watermarks: Character-Level Perturbations Disrupt Watermark Artifacts Available Artifacts Functional Artifact
The Dark Side of Flexibility : Detecting Exploitable Over-Permissions in Serverless Applications Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
The Heat is On: Understanding and Mitigating Vulnerabilities of Thermal Image Perception in Autonomous Systems Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
There is No War in Ba Sing Se: A Global Analysis of Content Moderation in Large Language Models Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
TranSPArent: Taint-style Vulnerability Detection of Generic Single-Page Applications through Automated Framework Abstraction Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Understanding the Status and Strategies of the Code Signing Abuse Ecosystem Artifacts Available Artifact
Understanding the Stealthy BGP Hijacking Risk in the ROV Era Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Unshaken by Weak Embedding: Robust Probabilistic Watermarking for Dataset Copyright Protection Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Unveiling BYOVD Threats: Malware's Use and Abuse of Kernel Drivers Artifacts Available Artifact
User-Space Dependency-Aware Rehosting for Linux-Based Firmware Binaries Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
Validity Is Not Enough: Uncovering the Security Pitfall in Chainlink's Off-Chain Reporting Protocol Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
WBSLT: A Framework for White-Box Encryption Based on Substitution-Linear Transformation Ciphers Artifacts Available Artifacts Functional Artifact
WCDCAnalyzer: Scalable Security Analysis of Wi-Fi Certified Device Connectivity Protocols Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
When Mixnets Fail: Evaluating, Quantifying, and Mitigating the Impact of Adversarial Nodes in Mix Networks Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
ZKSL: Verifiable and Efficient Split Federated Learning via Asynchronous Zero-Knowledge Proofs Artifacts Available Artifact
ropbot: Reimaging Code Reuse Attack Synthesis Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
vSim: Semantics-Aware Value Extraction for Efficient Binary Code Similarity Analysis Artifacts Available Artifacts Functional Artifacts Reproduced Artifact
μFuzz: Microcode-Guided Post-Silicon x86 CPU Fuzzer Artifacts Available Artifact