Results

  • Total: 40
  • Artifacts Available: 40
  • Artifacts Functional: 34
  • Results Reproduced: 30
Paper Avail. Funct. Repro. Available At
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
"These results must be false": A usability evaluation of constant-time analysis tools Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
CAMP: Compiler and Allocator-based Heap Memory Protection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Cascade: CPU Fuzzing via Intricate Program Generation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
False Claims against Model Ownership Resolution Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Inference of Error Specifications and Bug Detection Using Structural Similarities Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
NetShaper: A Differentially Private Network Side-Channel Mitigation System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Practical Data-Only Attack Generation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) 📦 Artifact
📄 Appendix
SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Towards Privacy-Preserving Social-Media SDKs on Android Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
Web Platform Threats: Automated Detection of Web Security Issues With WPT Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality Artifacts Available (v1.1) 📦 Artifact
📄 Appendix
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) 📦 Artifact
📄 Appendix