Results

Paper Avail. Funct. Repro. Available At
The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
"I’m trying to learn. . . and I’m shooting myself in the foot": Beginners’ Struggles When Solving Binary Exploitation Exercises Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
"Threat modeling is very formal, it’s very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects Artifacts Available (v1.1) πŸ“¦ Artifact
A Comprehensive Formal Security Analysis of OPC UA Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Formal Analysis of Apple’s iMessage PQ3 Protocol Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Framework for Designing Provably Secure Steganography Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features Artifacts Available (v1.1) πŸ“¦ Artifact
A limited technical background is sufficient for attack-defense tree acceptability Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification Artifacts Available (v1.1) πŸ“¦ Artifact
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication Artifacts Available (v1.1) πŸ“¦ Artifact
ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
An Industry Interview Study of Software Signing for Supply Chain Security Artifacts Available (v1.1) πŸ“¦ Artifact
Analyzing the AI Nudification Application Ecosystem Artifacts Available (v1.1) πŸ“¦ Artifact
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity Artifacts Available (v1.1) πŸ“¦ Artifact
Artifacts for BarraCUDA: Edge GPUs do leak DNN weights Artifacts Available (v1.1) πŸ“¦ Artifact
Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Attacker Control and Bug Prioritization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection Artifacts Available (v1.1) πŸ“¦ Artifact
Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain Artifacts Available (v1.1) πŸ“¦ Artifact
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention Artifacts Available (v1.1) πŸ“¦ Artifact
BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling Artifacts Available (v1.1) πŸ“¦ Artifact
BlueGuard: Accelerated Host and Guest Introspection Using DPUs Artifacts Available (v1.1) πŸ“¦ Artifact
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup Artifacts Available (v1.1) πŸ“¦ Artifact
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers Artifacts Available (v1.1) πŸ“¦ Artifact
Catch-22: Uncovering Compromised Hosts using SSH Public Keys Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CertPHash: Towards Certified Perceptual Hashing via Robust Training Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains Artifacts Available (v1.1) πŸ“¦ Artifact
Challenging Overreach: Addressing the Discrepancy Between Mobile App Privacy Practices and User Intention Artifacts Available (v1.1) πŸ“¦ Artifact
Characterizing and Detecting Propaganda-Spreading Accounts on Telegram Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Characterizing the MrDeepFakes Sexual Deepfake Marketplace Artifacts Available (v1.1) πŸ“¦ Artifact
Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago Artifacts Available (v1.1) πŸ“¦ Artifact
CoVault: Secure, Scalable Analytics of Personal Data Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Current Affairs: A Security Measurement Study of CCS EV Charging Deployments Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Cyber-Physical Deception Through Coordinated IoT Honeypots Artifacts Available (v1.1) πŸ“¦ Artifact
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
DISPATCH: Unraveling Security Patches from Entangled Code Changes Artifacts Available (v1.1) πŸ“¦ Artifact
DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram Artifacts Available (v1.1) πŸ“¦ Artifact
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning Artifacts Available (v1.1) πŸ“¦ Artifact
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI Artifacts Available (v1.1) πŸ“¦ Artifact
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data Artifacts Available (v1.1) πŸ“¦ Artifact
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2, 3
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Detecting Compromise of Passkey Storage on the Cloud Artifacts Available (v1.1) πŸ“¦ Artifact
DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of Β΅m-level HDD Vibrations Artifacts Available (v1.1) πŸ“¦ Artifact
Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Distributed Private Aggregation in Graph Neural Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Distributional Private Information Retrieval Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Dorami: Privilege Separating Security Monitor on RISC-V TEEs Artifacts Available (v1.1) πŸ“¦ Artifact
Dormant: Defending against Pose-driven Human Image Animation Artifacts Available (v1.1) πŸ“¦ Artifact
Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Easy As Child’s Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Efficient 2PC for Constant Round Secure Equality Testing and Comparisons Artifacts Available (v1.1) πŸ“¦ Artifact
Efficient Ranking, Order Statistics, and Sorting under CKKS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Endangered Privacy: Large-Scale Monitoring of Video Streaming Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Enhanced Label-Only Membership Inference Attacks with Fewer Queries Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Evaluating LLM-based Personal Information Extraction and Countermeasures Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
EvilEDR: Repurposing EDR as an Offensive Tool Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges Artifacts Available (v1.1) πŸ“¦ Artifact
Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALLΒ·E Text-to-Image Pipelines Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FIXX: FInding eXploits from eXamples Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
FLOP: Breaking the Apple M3 CPU via False Load Output Predictions Artifacts Available (v1.1) πŸ“¦ Artifact
Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection Artifacts Available (v1.1) πŸ“¦ Artifact
Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling Artifacts Available (v1.1) πŸ“¦ Artifact
Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Following Devils’ Footprint: Towards Real-time Detection of Price Manipulation Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
Further Study on Frequency Estimation under Local Differential Privacy Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Fuzzing the PHP Interpreter via Dataflow Fusion Artifacts Available (v1.1) πŸ“¦ Artifact
GNSS-WASP: GNSS Wide Area SPoofing Artifacts Available (v1.1) πŸ“¦ Artifact
GPC Web Crawler Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GenHuzz: An Efficient Generative Hardware Fuzzer Artifacts Available (v1.1) πŸ“¦ Artifact
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Gotta Detect ’Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack Artifacts Available (v1.1) πŸ“¦ Artifact
H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution: Artifacts Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
How Researchers De-identify Data in Practice Artifacts Available (v1.1) πŸ“¦ Artifact
HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI Artifacts Available (v1.1) πŸ“¦ Artifact
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI Artifacts Available (v1.1) πŸ“¦ Artifact
Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
LLMmap: Fingerprinting for Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
Learning from Functionality Outputs: Private Join and Compute in the Real World Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Lemon: Network-wide DDoS Detection with Routing-Oblivious Per-flow Measurement Artifacts Available (v1.1) πŸ“¦ Artifact
LightShed: Defeating Perturbation-based Image Copyright Protections Artifacts Available (v1.1) πŸ“¦ Artifact
Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators Artifacts Available (v1.1) πŸ“¦ Artifact
MAESTRO: Multi-party AES using Lookup Tables Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers Artifacts Available (v1.1) πŸ“¦ Artifact
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents Artifacts Available (v1.1) πŸ“¦ Artifact
Membership Inference Attacks Against Vision-Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink Artifacts Available (v1.1) πŸ“¦ Artifact
Misty Registry: An Empirical Study of Flawed Domain Registry Operation Artifacts Available (v1.1) πŸ“¦ Artifact
More is Less: Extra Features in Contactless Payments Break Security Artifacts Available (v1.1) πŸ“¦ Artifact
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines Artifacts Available (v1.1) πŸ“¦ Artifact
Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems Artifacts Available (v1.1) πŸ“¦ Artifacts:
      1, 2
Oblivious Digital Tokens Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts Artifacts Available (v1.1) πŸ“¦ Artifact
OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token Artifacts Available (v1.1) πŸ“¦ Artifact
PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments Artifacts Available (v1.1) πŸ“¦ Artifact
Persistent Backdoor Attacks in Continual Learning Artifacts Available (v1.1) πŸ“¦ Artifact
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System Artifacts Available (v1.1) πŸ“¦ Artifact
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning Artifacts Available (v1.1) πŸ“¦ Artifact
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Practical Keyword Private Information Retrieval from Key-to-Index Mappings Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption Artifacts Available (v1.1) πŸ“¦ Artifact
Pretender: Universal Active Defense against Diffusion Finetuning Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
Principled and Automated Approach for Investigating AR/VR Attacks Artifacts Available (v1.1) πŸ“¦ Artifact
Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run Artifacts Available (v1.1) πŸ“¦ Artifact
Provably Robust Multi-bit Watermarking for AI-generated Text Artifacts Available (v1.1) πŸ“¦ Artifact
Qelect: Lattice-based Single Secret Leader Election Made Practical Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Questionnaire Data – Digital Security Perceptions & Practices in 12 Countries Artifacts Available (v1.1) πŸ“¦ Artifact
RangeSanitizer: Detecting Memory Errors with Efficient Range Checks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Recover from Excessive Faults in Partially-Synchronous BFT SMR Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Revisiting Training-Inference Trigger Intensity in Backdoor Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Robustifying ML-powered Network Classifiers with PANTS Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Secure Caches for Compartmentalized Software Artifacts Available (v1.1) πŸ“¦ Artifact
Secure Information Embedding in Forensic 3D Fingerprinting Artifacts Available (v1.1) πŸ“¦ Artifact
Security Implications of Malicious G-Codes in 3D Printing Artifacts Available (v1.1) πŸ“¦ Artifact
Security and Privacy Advice for UPI Users in India Artifacts Available (v1.1) πŸ“¦ Artifact
Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner Artifacts Available (v1.1) πŸ“¦ Artifact
Serverless Functions Made Confidential and Efficient with Split Containers Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Shadowed Realities: An Investigation of UI Attacks in WebXR Artifacts Available (v1.1) πŸ“¦ Artifact
Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SoK: Come Together – Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: On Gradient Leakage in Federated Learning Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Towards Effective Security Patch Generation Artifacts Available (v1.1) πŸ“¦ Artifact
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Software Availability Protection in Cyber-Physical Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifacts:
      1, 2
πŸ“„ Appendix
Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Synthesis of Code-Reuse Attacks from p-code Programs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications Artifacts Available (v1.1) πŸ“¦ Artifact
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Systematic Evaluation of Randomized Cache Designs against Occupancy Attack Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models Artifacts Available (v1.1) πŸ“¦ Artifact
TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing Artifacts Available (v1.1) πŸ“¦ Artifact
Third Party Private Set Operations Artifacts Available (v1.1) πŸ“¦ Artifact
TockOwl: Asynchronous Consensus with Fault and Network Adaptability Artifacts Available (v1.1) πŸ“¦ Artifact
Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea Artifacts Available (v1.1) πŸ“¦ Artifact
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation Artifacts Available (v1.1) πŸ“¦ Artifact
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models Artifacts Available (v1.1) πŸ“¦ Artifact
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification Artifacts Available (v1.1) πŸ“¦ Artifact
Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites Artifacts Available (v1.1) πŸ“¦ Artifact
Trust but Verify: An Assessment of Vulnerability Tagging Services Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails Artifacts Available (v1.1) πŸ“¦ Artifact
Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms Artifacts Available (v1.1) πŸ“¦ Artifact
V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
VoiceWukong: Benchmarking Deepfake Voice Detection Artifacts Available (v1.1) πŸ“¦ Artifact
Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What minimizes losses? Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Voting-Bloc Entropy: A New Metric for DAO Decentralization Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation Artifacts Available (v1.1) πŸ“¦ Artifact
Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models Artifacts Available (v1.1) πŸ“¦ Artifact
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs Artifacts Available (v1.1) πŸ“¦ Artifact
When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
πŸ“„ Appendix
ZK-GPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference Artifacts Available (v1.1) πŸ“¦ Artifact
zk-promises: Anonymous Moderation, Reputation, and Blocking Artifacts Available (v1.1) πŸ“¦ Artifact
β€œThat’s my perspective from 30 years of doing this”: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code Artifacts Available (v1.1) πŸ“¦ Artifact