Results

Paper Avail. Funct. Repro. Available At
The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
"I’m trying to learn. . . and I’m shooting myself in the foot": Beginners’ Struggles When Solving Binary Exploitation Exercises Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
"Threat modeling is very formal, it’s very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects Artifacts Available (v1.1) πŸ“¦ Artifact
A Comprehensive Formal Security Analysis of OPC UA Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A First Look at Governments Enterprise Security Guidance Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Formal Analysis of Apple’s iMessage PQ3 Protocol Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Framework for Designing Provably Secure Steganography Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features Artifacts Available (v1.1) πŸ“¦ Artifact
A Tale of Two Worlds, a Formal Story of WireGuard Hybridization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A limited technical background is sufficient for attack-defense tree acceptability Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification Artifacts Available (v1.1) πŸ“¦ Artifact
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication Artifacts Available (v1.1) πŸ“¦ Artifact
ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense Artifacts Available (v1.1) πŸ“¦ Artifact
Addressing Sensitivity Distinction in Local Differential Privacy : A General Utility-Optimized Framework Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features Artifacts Available (v1.1) πŸ“¦ Artifact
An Industry Interview Study of Software Signing for Supply Chain Security Artifacts Available (v1.1) πŸ“¦ Artifact
Analyzing the AI Nudification Application Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
Approve Once, Regret Forever: On the Exploitation of Ethereum’s Approve-TransferFrom Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
Approximation Enforced Execution of Untrusted Linux Kernel Extensions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity Artifacts Available (v1.1) πŸ“¦ Artifact
Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Ares: Comprehensive Path Hijacking Detection via Routing Tree Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Artifacts for BarraCUDA: Edge GPUs do leak DNN weights Artifacts Available (v1.1) πŸ“¦ Artifact
Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Attacker Control and Bug Prioritization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection Artifacts Available (v1.1) πŸ“¦ Artifact
Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain Artifacts Available (v1.1) πŸ“¦ Artifact
AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2, 3, 4
Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems Artifacts Available (v1.1) πŸ“¦ Artifact
Automated Soundness and Completeness Vetting of Polygon zkEVM Artifacts Available (v1.1) πŸ“¦ Artifact
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention Artifacts Available (v1.1) πŸ“¦ Artifact
BGP Vortex: Update Message Floods Can Create Internet Instabilities Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Backdooring Bias ((B^2)) into Diffusion Models Artifacts Available (v1.1) πŸ“¦ Artifact
Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling Artifacts Available (v1.1) πŸ“¦ Artifact
Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Blockchain Address Poisoning Artifacts Available (v1.1) πŸ“¦ Artifact
BlueGuard: Accelerated Host and Guest Introspection Using DPUs Artifacts Available (v1.1) πŸ“¦ Artifact
Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings Artifacts Available (v1.1) πŸ“¦ Artifact
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis Artifacts Available (v1.1) πŸ“¦ Artifact
Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC Artifacts Available (v1.1) πŸ“¦ Artifact
Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities Artifacts Available (v1.1) πŸ“¦ Artifact
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup Artifacts Available (v1.1) πŸ“¦ Artifact
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers Artifacts Available (v1.1) πŸ“¦ Artifact
Catch-22: Uncovering Compromised Hosts using SSH Public Keys Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Censorship Evasion with Unidentified Protocol Generation Artifacts Available (v1.1) πŸ“¦ Artifact
CertPHash: Towards Certified Perceptual Hashing via Robust Training Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains Artifacts Available (v1.1) πŸ“¦ Artifact
Challenging Overreach: Addressing the Discrepancy Between Mobile App Privacy Practices and User Intention Artifacts Available (v1.1) πŸ“¦ Artifact
Characterizing and Detecting Propaganda-Spreading Accounts on Telegram Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Characterizing the MrDeepFakes Sexual Deepfake Marketplace Artifacts Available (v1.1) πŸ“¦ Artifact
Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago Artifacts Available (v1.1) πŸ“¦ Artifact
Cloak, Honey, Trap: Proactive Defenses Against LLM Agents Artifacts Available (v1.1) πŸ“¦ Artifact
CloudFlow Framework and CloudBench Suite Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CoVault: Secure, Scalable Analytics of Personal Data Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Confusing Value with Enumeration: Studying the Use of CVEs in Academia Artifacts Available (v1.1) πŸ“¦ Artifact
Context Matters: Qualitative Insights into Developers Approaches and Challenges with Software Composition Analysis Artifacts Available (v1.1) πŸ“¦ Artifact
CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models Artifacts Available (v1.1) πŸ“¦ Artifact
Current Affairs: A Security Measurement Study of CCS EV Charging Deployments Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Cyber-Physical Deception Through Coordinated IoT Honeypots Artifacts Available (v1.1) πŸ“¦ Artifact
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
DISPATCH: Unraveling Security Patches from Entangled Code Changes Artifacts Available (v1.1) πŸ“¦ Artifact
DNS FLaRE: A Flush-Reload Attack on DNS Forwarders Artifacts Available (v1.1) πŸ“¦ Artifact
DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram Artifacts Available (v1.1) πŸ“¦ Artifact
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning Artifacts Available (v1.1) πŸ“¦ Artifact
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI Artifacts Available (v1.1) πŸ“¦ Artifact
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data Artifacts Available (v1.1) πŸ“¦ Artifact
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2, 3
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Depth Gives a False Sense of Privacy: LLM Internal States Inversion Artifacts Available (v1.1) πŸ“¦ Artifact
Detecting Compromise of Passkey Storage on the Cloud Artifacts Available (v1.1) πŸ“¦ Artifact
DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of Β΅m-level HDD Vibrations Artifacts Available (v1.1) πŸ“¦ Artifact
Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Distributed Private Aggregation in Graph Neural Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Distributional Private Information Retrieval Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Dorami: Privilege Separating Security Monitor on RISC-V TEEs Artifacts Available (v1.1) πŸ“¦ Artifact
Dormant: Defending against Pose-driven Human Image Animation Artifacts Available (v1.1) πŸ“¦ Artifact
Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory Artifacts Available (v1.1) πŸ“¦ Artifact
EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Easy As Child’s Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar Artifacts Available (v1.1) πŸ“¦ Artifact
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Effective PII Extraction from LLMs through Augmented Few-Shot Learning Artifacts Available (v1.1) πŸ“¦ Artifact
Efficient 2PC for Constant Round Secure Equality Testing and Comparisons Artifacts Available (v1.1) πŸ“¦ Artifact
Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV Artifacts Available (v1.1) πŸ“¦ Artifact
Efficient Ranking, Order Statistics, and Sorting under CKKS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Endangered Privacy: Large-Scale Monitoring of Video Streaming Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Enhanced Label-Only Membership Inference Attacks with Fewer Queries Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Evaluating LLM-based Personal Information Extraction and Countermeasures Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach Artifacts Available (v1.1) πŸ“¦ Artifact
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
EvilEDR: Repurposing EDR as an Offensive Tool Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges Artifacts Available (v1.1) πŸ“¦ Artifact
Exploiting Inaccurate Branch History in Side-Channel Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs Artifacts Available (v1.1)
Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health Artifacts Available (v1.1) πŸ“¦ Artifact
Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALLΒ·E Text-to-Image Pipelines Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FIXX: FInding eXploits from eXamples Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FLOP: Breaking the Apple M3 CPU via False Load Output Predictions Artifacts Available (v1.1) πŸ“¦ Artifact
Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FastLloyd: Federated, Accurate, Secure, and Tunable kk-Means Clustering with Differential Privacy Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection Artifacts Available (v1.1) πŸ“¦ Artifact
Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling Artifacts Available (v1.1) πŸ“¦ Artifact
Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Following Devils’ Footprint: Towards Real-time Detection of Price Manipulation Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods Artifacts Available (v1.1) πŸ“¦ Artifact
From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifacts:
      1, 2, 3
πŸ“„ Appendix
From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning Artifacts Available (v1.1) πŸ“¦ Artifact
From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Further Study on Frequency Estimation under Local Differential Privacy Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Fuzzing the PHP Interpreter via Dataflow Fusion Artifacts Available (v1.1) πŸ“¦ Artifact
GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GNSS-WASP: GNSS Wide Area SPoofing Artifacts Available (v1.1) πŸ“¦ Artifact
GPC Web Crawler Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GPUHammer: Rowhammer Attacks on GPU Memories are Practical Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GenHuzz: An Efficient Generative Hardware Fuzzer Artifacts Available (v1.1) πŸ“¦ Artifact
General-Purpose ff-DP Estimation and Auditing in a Black-Box Setting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection Artifacts Available (v1.1) πŸ“¦ Artifact
Gotta Detect ’Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack Artifacts Available (v1.1) πŸ“¦ Artifact
H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Hercules Droidot and the murder on the JNI Express Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution: Artifacts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Hobbit: Space-Efficient zkSNARK with Optimal Prover Time Artifacts Available (v1.1) πŸ“¦ Artifact
How Researchers De-identify Data in Practice Artifacts Available (v1.1) πŸ“¦ Artifact
How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
HubBub: Contention-Based Side-channel Attacks on USB Hubs Artifacts Available (v1.1) πŸ“¦ Artifact
HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving Artifacts Available (v1.1) πŸ“¦ Artifact
I Cannot Write This Because It Violates Our Content Policy: Understanding Content Moderation Policies and User Experiences in Generative AI Products Artifacts Available (v1.1) πŸ“¦ Artifact
I have no idea how to make it safer: Studying Security and Privacy Mindsets of Browser Extension Developers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
I wasn’t sure if this is indeed a security risk: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages Artifacts Available (v1.1) πŸ“¦ Artifact
IDFuzz: Intelligent Directed Grey-box Fuzzing Artifacts Available (v1.1) πŸ“¦ Artifact
IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran Artifacts Available (v1.1) πŸ“¦ Artifact
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI Artifacts Available (v1.1) πŸ“¦ Artifact
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI Artifacts Available (v1.1) πŸ“¦ Artifact
Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs Artifacts Available (v1.1) πŸ“¦ Artifact
Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
LEMIX: Enabling Testing of Embedded Applications as Linux Applications Artifacts Available (v1.1) πŸ“¦ Artifact
LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites Artifacts Available (v1.1) πŸ“¦ Artifact
LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers Artifacts Available (v1.1) πŸ“¦ Artifact
LLMmap: Fingerprinting for Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Lancet: A Formalization Framework for Crash and Exploit Pathology Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Learning from Functionality Outputs: Private Join and Compute in the Real World Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Lemon: Network-wide DDoS Detection with Routing-Oblivious Per-flow Measurement Artifacts Available (v1.1) πŸ“¦ Artifact
Lets Move2EVM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Levenshtein-trinary: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
LightShed: Defeating Perturbation-based Image Copyright Protections Artifacts Available (v1.1) πŸ“¦ Artifact
Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators Artifacts Available (v1.1) πŸ“¦ Artifact
MAESTRO: Multi-party AES using Lookup Tables Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers Artifacts Available (v1.1) πŸ“¦ Artifact
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents Artifacts Available (v1.1) πŸ“¦ Artifact
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents Artifacts Available (v1.1) πŸ“¦ Artifact
MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information Artifacts Available (v1.1) πŸ“¦ Artifact
McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Membership Inference Attacks Against Vision-Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs’ Ethical Boundaries Artifacts Available (v1.1) πŸ“¦ Artifact
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink Artifacts Available (v1.1) πŸ“¦ Artifact
Misty Registry: An Empirical Study of Flawed Domain Registry Operation Artifacts Available (v1.1) πŸ“¦ Artifact
Mitigating Injection Attacks against Encrypted Applications via View-Based Partitioning Artifacts Available (v1.1) πŸ“¦ Artifact
More is Less: Extra Features in Contactless Payments Break Security Artifacts Available (v1.1) πŸ“¦ Artifact
My ZIP isn’t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines Artifacts Available (v1.1) πŸ“¦ Artifact
Narrowbeer: A Practical Replay Attack Against the Widevine DRM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Navigating Cookie Consent Violations Across the Globe Artifacts Available (v1.1) πŸ“¦ Artifact
Navigating Security and Privacy Threats in Homeless Service Provision Artifacts Available (v1.1) πŸ“¦ Artifact
No Way to Sign Out? Unpacking Non-Compliance with Google Play’s App Account Deletion Requirements Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
No, I Cant Be a Security Personnel on Your Phone: Security and Privacy Threats From Sharing Infrastructure in Rural Ghana Artifacts Available (v1.1) πŸ“¦ Artifact
Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Oblivious Digital Tokens Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
On the Atomicity and Efficiency Blockchain Payment Channels Artifacts Available (v1.1) πŸ“¦ Artifact
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts Artifacts Available (v1.1) πŸ“¦ Artifact
OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token Artifacts Available (v1.1) πŸ“¦ Artifact
OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
PRSA: Prompt Stealing Attacks against Real-World Prompt Services Artifacts Available (v1.1) πŸ“¦ Artifact
Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges Artifacts Available (v1.1) πŸ“¦ Artifact
Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments Artifacts Available (v1.1) πŸ“¦ Artifact
Password Guessing Using Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
PatchAgent: A Practical Program Repair Agent Mimicking Human Expertise Artifacts Available (v1.1) πŸ“¦ Artifact
Persistent Backdoor Attacks in Continual Learning Artifacts Available (v1.1) πŸ“¦ Artifact
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System Artifacts Available (v1.1) πŸ“¦ Artifact
Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations Artifacts Available (v1.1) πŸ“¦ Artifact
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1 Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Please don’t send that bot anything: Mixed-methods Study of Personal Impersonation Attacks to Steal Digital Payments on Social Media Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning Artifacts Available (v1.1) πŸ“¦ Artifact
PolySys: an Algebraic Leakage Attack Engine Artifacts Available (v1.1) πŸ“¦ Artifact
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Practical Keyword Private Information Retrieval from Key-to-Index Mappings Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption Artifacts Available (v1.1) πŸ“¦ Artifact
Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Pretender: Universal Active Defense against Diffusion Finetuning Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
Preventing Automated Monitoring on Voice Data Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Principled and Automated Approach for Investigating AR/VR Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity Artifacts Available (v1.1) πŸ“¦ Artifact
Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run Artifacts Available (v1.1) πŸ“¦ Artifact
Privacy Solution or Menace? Investigating Perceptions of Radio Frequency Sensing Artifacts Available (v1.1) πŸ“¦ Artifact
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty Artifacts Available (v1.1) πŸ“¦ Artifact
Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Prompt Obfuscation for Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Provably Robust Multi-bit Watermarking for AI-generated Text Artifacts Available (v1.1) πŸ“¦ Artifact
Qelect: Lattice-based Single Secret Leader Election Made Practical Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Questionnaire Data – Digital Security Perceptions & Practices in 12 Countries Artifacts Available (v1.1) πŸ“¦ Artifact
REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2, 3, 4
RangeSanitizer: Detecting Memory Errors with Efficient Range Checks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Recover from Excessive Faults in Partially-Synchronous BFT SMR Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective Artifacts Available (v1.1) πŸ“¦ Artifact
Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning Artifacts Available (v1.1) πŸ“¦ Artifact
Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act Artifacts Available (v1.1) πŸ“¦ Artifact
Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Replication Package of ELFuzz Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Revisiting Training-Inference Trigger Intensity in Backdoor Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Robustifying ML-powered Network Classifiers with PANTS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11
Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
S/MINE: Collecting and Analyzing S/MIME Certificates at Scale Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference Artifacts Available (v1.1) πŸ“¦ Artifact
SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data Artifacts Available (v1.1) πŸ“¦ Artifact
SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Save what must be saved: Secure context switching with Sailor Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Secure Caches for Compartmentalized Software Artifacts Available (v1.1) πŸ“¦ Artifact
Secure Information Embedding in Forensic 3D Fingerprinting Artifacts Available (v1.1) πŸ“¦ Artifact
Security Implications of Malicious G-Codes in 3D Printing Artifacts Available (v1.1) πŸ“¦ Artifact
Security and Privacy Advice for UPI Users in India Artifacts Available (v1.1) πŸ“¦ Artifact
Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Self-interpreting Adversarial Images Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner Artifacts Available (v1.1) πŸ“¦ Artifact
Serverless Functions Made Confidential and Efficient with Split Containers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Shadowed Realities: An Investigation of UI Attacks in WebXR Artifacts Available (v1.1) πŸ“¦ Artifact
Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles Artifacts Available (v1.1) πŸ“¦ Artifact
Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism Artifacts Available (v1.1) πŸ“¦ Artifact
Shortcut Measurement Codes Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SoK: Automated TTP Extraction from CTI Reports – Are We There Yet? Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Come Together – Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Efficiency Robustness of Dynamic Deep Learning Systems Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Machine Learning for Misinformation Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SoK: On Gradient Leakage in Federated Learning Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: So, You Think You Know All About Secure Randomized Caches? Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SoK: Towards Effective Security Patch Generation Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Towards a Unified Approach of Applied Replicability for Computer Security Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Software Availability Protection in Cyber-Physical Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Synthesis of Code-Reuse Attacks from p-code Programs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications Artifacts Available (v1.1) πŸ“¦ Artifact
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Systematic Evaluation of Randomized Cache Designs against Occupancy Attack Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis Artifacts Available (v1.1) πŸ“¦ Artifact
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX Artifacts Available (v1.1) πŸ“¦ Artifact
TEEcorrelate: An Information-Preserving Defense against Performance Counter Attacks on TEEs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TETD: Trusted Execution in Trust Domains Artifacts Available (v1.1) πŸ“¦ Artifact
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models Artifacts Available (v1.1) πŸ“¦ Artifact
TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TRex: Practical Type Reconstruction for Binary Code Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Tady: A Neural Disassembler without Structural Constraint Violations Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TapTrap: Animation-Driven Tapjacking on Android Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study Artifacts Available (v1.1) πŸ“¦ Artifact
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing Artifacts Available (v1.1) πŸ“¦ Artifact
Third Party Private Set Operations Artifacts Available (v1.1) πŸ“¦ Artifact
TockOwl: Asynchronous Consensus with Fault and Network Adaptability Artifacts Available (v1.1) πŸ“¦ Artifact
Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea Artifacts Available (v1.1) πŸ“¦ Artifact
Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation Artifacts Available (v1.1) πŸ“¦ Artifact
Towards Internet-Based State Learning of TLS State Machines Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness Artifacts Available (v1.1) πŸ“¦ Artifact
Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification Artifacts Available (v1.1) πŸ“¦ Artifact
Towards a Re-evaluation of Data Forging Attacks in Practice Artifacts Available (v1.1) πŸ“¦ Artifact
TracLLM: A Generic Framework for Attributing Long Context LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites Artifacts Available (v1.1) πŸ“¦ Artifact
Transparent Attested DNS for Confidential Computing Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Treebeard: A Scalable and Fault Tolerant ORAM Datastore Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Trust but Verify: An Assessment of Vulnerability Tagging Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails Artifacts Available (v1.1) πŸ“¦ Artifact
USD: NSFW Content Detection for Text-to-Image Models via Scene Graph Artifacts Available (v1.1) πŸ“¦ Artifact
Understanding How Users Prepare for and React to Smartphone Theft Artifacts Available (v1.1) πŸ“¦ Artifact
Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms Artifacts Available (v1.1) πŸ“¦ Artifact
Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization Artifacts Available (v1.1) πŸ“¦ Artifact
Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
VoiceWukong: Benchmarking Deepfake Voice Detection Artifacts Available (v1.1) πŸ“¦ Artifact
Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What minimizes losses? Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Voting-Bloc Entropy: A New Metric for DAO Decentralization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation Artifacts Available (v1.1) πŸ“¦ Artifact
Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models Artifacts Available (v1.1) πŸ“¦ Artifact
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing Artifacts Available (v1.1) πŸ“¦ Artifact
Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency Artifacts Available (v1.1) πŸ“¦ Artifact
ZK-GPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference Artifacts Available (v1.1) πŸ“¦ Artifact
eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
zk-promises: Anonymous Moderation, Reputation, and Blocking Artifacts Available (v1.1) πŸ“¦ Artifact
β€œHelps me Take the Post With a Grain of Salt:” Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
β€œIt’s not my responsibility to write them”: An Empirical Study of Software Product Managers and Security Requirements Artifacts Available (v1.1) πŸ“¦ Artifact
β€œThat’s my perspective from 30 years of doing this”: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code Artifacts Available (v1.1) πŸ“¦ Artifact