Results

Paper Avail. Funct. Repro. Available At
BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems Artifacts Evaluated - Functional (v1.1) ๐Ÿ“„ Appendix
Be Write Back: An in-depth Study of Fault Injection Effects on FRAM Technology Artifacts Evaluated - Functional (v1.1)
Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
DeepRed: A Deep Learningโ€“Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Extract: A PHP Foot-Gun Case Study Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
FUZZVPN: Finding Vulnerabilities in OpenVPN Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) ๐Ÿ“ฆ Artifact
GlitchGlรผck: Enabling Software Vulnerabilities through Guided Hardware Fault Injection Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrogramsโ€™ Typo Correction Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) Results Reproduced (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
No Key, No Problem: Vulnerabilities in Master Lock Smart Locks Artifacts Evaluated - Functional (v1.1)
Oops, It Halted Again: Exploiting PLC Memory for Fun and Profit in Industrial Control Systems
Prekey Pogo: Investigating Security and Privacy Issues in WhatsAppโ€™s Handshake Mechanism Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution Artifacts Available (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub Artifacts Available (v1.1) Artifacts Evaluated - Functional (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Security through Transparency: Tales from the RP2350 Hacking Challenge Artifacts Available (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix
Stealth BGP Hijacks with uRPF Filtering Artifacts Available (v1.1) ๐Ÿ“ฆ Artifact
๐Ÿ“„ Appendix