• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Research Artifacts
  • ACSAC
  • CHES
  • NDSS
  • SysTEX
  • USENIX Sec
  • WOOT

    WOOT 2023

    • Artifact Evaluation
    • Call for Artifacts
    • Results

    Results

    Title ORO ROR Repository
    CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode Artifact
    Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models Artifact
    Emoji shellcoding in RISC-V Artifact
    ROPfuscator: Robust Obfuscation with ROP Artifact
    The ghost is the machine: weird machines in transient execution Artifact
    Divergent Representations: When Compiler Optimizations Enable Exploitation Artifact
    Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems Artifact
    ASanity: On Bug Shadowing by Early ASan Exits Artifact
    ESPwn32: Hacking with ESP32 System-on-Chips Artifact
    Contribute to Secartifacts
    Goto SysArtifacts