Artifacts
To help support the reproducibility for research results, this year ACSAC encouraged authors of accepted papers to submit software they develop and datasets they use to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. We thank all the authors who participated in this initiative, now in its second year!
- Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
- Shredder: Breaking Exploits through API Specialization
- Type-after-Type: Practical and Complete Type-Safe Memory Reuse
- StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification
- An Historical Analysis of the SEAndroid Policy Evolution
- An Extensive Evaluation of the Internet's Open Proxies
- A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites
- Analyzing Cache Side Channels Using Deep Neural Networks
- SENSS Against Volumetric DDoS Attacks
- SmarTor: Smarter Tor with Smart Contracts
- Towards Automated Generation of Exploitation Primitives for Web Browsers
- Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
- DeDoS: Defusing DoS with Dispersion Oriented Software
- Practical Integrity Protection with Oblivious Hashing
- Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts
- Microwalk: A Framework for Finding Side Channels in Binaries
- Finding the greedy, prodigal and suicidal contracts
- Improving Accuracy of Android malware Detection with Lightweight Contextual Awareness
- TIFF: Using Input Type Inference To Improve Fuzzing
- Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
- Obscuro: A Bitcoin Mixer using Trusted Execution Environments
- Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling
As authors provide us with links to their repositories, they will be added above.
GitHub Web archive