• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Research Artifacts
  • ACSAC
  • CHES
  • NDSS
  • SysTEX
  • USENIX Sec
  • WOOT

    WOOT 2024

    • Evaluation
    • Call for Artifacts
    • Results

    Results

    Paper Avail. Funct. Repro. Available At
    Attacking with Something That Does Not Exist: "Proof of Non-Existence" Can Exhaust DNS Resolver CPU Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
    Basilisk: Remote Code Execution by Laser Excitation of P–N Junctions Without Insider Assistance Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
    πŸ“„ Appendix
    Exploiting Android’s Hardened Memory Allocator Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
    πŸ“„ Appendix
    Introduction to Procedural Debugging through Binary Libification Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) πŸ“¦ Artifact
    πŸ“„ Appendix
    RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
    πŸ“„ Appendix
    Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
    SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication Artifacts Evaluated - Functional (v1.1)
    SoK: On the Effectiveness of Control-Flow Integrity in Practice Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
    SoK: Where’s the β€œup”?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems Artifacts Available (v1.1) πŸ“¦ Artifact
    The Power of Words: Generating PowerShell Attacks from Natural Language Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) πŸ“¦ Artifact
    Contribute to Secartifacts
    Goto SysArtifacts