Results

  • Total: 142
  • Artifacts Available: 142
  • Artifacts Functional: 126
  • Results Reproduced: 99
Paper Avail. Funct. Repro. Available At
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
"I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
"These results must be false": A usability evaluation of constant-time analysis tools Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
A Flushing Attack on the DNS Cache Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifacts:
      1, 2
📄 Appendix
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Adversarial Illusions in Multi-Modal Embeddings Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifacts:
      1, 2
📄 Appendix
Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Argus: All your (PHP) Injection-sinks are belong to us. Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Automated Large-Scale Analysis of Cookie Notice Compliance Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
BeeBox: Hardening BPF against Transient Execution Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Bending microarchitectural weird machines towards practicality Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
CAMP: Compiler and Allocator-based Heap Memory Protection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
CO3: Concolic Co-execution for Firmware Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
CacheWarp: Software-based Fault Injection using Selective State Reset Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Cascade: CPU Fuzzing via Intricate Program Generation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning
🏆 Distinguished Artifact Award
Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Closed-Form Bounds for DP-SGD against Record-level Inference Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
EL3XIR: Fuzzing COTS Secure Monitors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Enhancing Network Attack Detection with Distributed and In-Network Data Collection System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
False Claims against Model Ownership Resolution Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Formal Security Analysis of Widevine through the W3C EME Standard Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
GlobalConfusion: TrustZone Trusted Application 0-Days by Design Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
How does Endpoint Detection use the MITRE ATT&CK Framework? Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Inference of Error Specifications and Bug Detection Using Structural Similarities Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Invisibility Cloak: Proactive Defense Against Visual Game Cheating Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
MOAT: Towards Safe BPF Kernel Extension Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
MUSES: Efficient Multi-User Searchable Encrypted Database Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Near-Optimal Constrained Padding for Object Retrievals with Dependencies Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
NetShaper: A Differentially Private Network Side-Channel Mitigation System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS) Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
PURE: Payments with UWB RElay-protection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifacts:
      1, 2, 3
📄 Appendix
PURL: Safe and Effective Sanitization of Link Decoration Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Pandawan: Quantifying Progress in Linux-based Firmware Rehosting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing
🏆 Distinguished Artifact Award
Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Practical Data-Only Attack Generation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Query Recovery from Easy to Hard: Jigsaw Attack against SSE Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
SIMurai: Slicing Through the Complexity of SIM Card Security Research Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching
🏆 Distinguished Artifact Award
Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SeaK: Rethinking the Design of a Secure Allocator for OS Kernel Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Secure Account Recovery for a Privacy-Preserving Web Service Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SoK: Security of Programmable Logic Controllers Artifacts Available (v1.1) 📦 Artifacts:
      1, 2
📄 Appendix
SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Current Deepfake Media Datasets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SpotProxy: Rediscovering the Cloud for Censorship Circumvention Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Stateful Least Privilege Authorization for the Cloud Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation
🏆 Distinguished Artifact Award
Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Toward Unbiased Multiple-Target Fuzzing with Path Diversity Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Towards Privacy-Preserving Social-Media SDKs on Android Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Towards an Effective Method of ReDoS Detection for Non-backtracking Engines Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Trust Me If You Can - How Usable Is Trusted Types In Practice? Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Unveiling IoT Security in Reality: A Firmware-Centric Journey Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Web Platform Threats: Automated Detection of Web Security Issues With WPT Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
🏆 Distinguished Artifact Award
Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix