Artifacts
To help support the reproducibility for research results, ACSAC encourages authors of accepted papers to submit software they develop and datasets they use to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. We thank all the authors who participated in this initiative!
For more details on the artifact evaluations process, please refer to the Call for Paper Artifacts.
Link Legend: GitHub Web archive
The artifacts associated with the research are found to be documented, consistent, complete, exercisable, and include appropriate evidence of verification and validation.
- From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
- Triereme: Speeding up hybrid fuzzing through efficient query scheduling
- Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones
- Secure Softmax/Sigmoid for Machine-learning Computation
- Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance
- PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names
- Remote attestation of confidential VMs using ephemeral vTPMs
- DOPE: DOmain Protection Enforcement with PKS
- On the Detection of Image-Scaling Attacks in Machine Learning
- Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles
- Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles
- On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI
- Remote Attestation with Constrained Disclosure
- Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons
- OAuth 2.0 Redirect URI Validation Falls Short, Literally
- Detecting Weak Keys in Manufacturing Certificates: A Case Study
- Differentially Private Resource Allocation
- Poisoning Network Flow Classifiers
- Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse
- ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications
- Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks
- Protecting Your Voice from Speech Synthesis Attacks
- Detection of Anomalies in Electric Vehicle Charging Sessions
- When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild
- No Forking Way: Detecting Cloning Attacks on Intel SGX Applications
- PAVUDI: Patch-based Vulnerability Discovery using Machine Learning
- Domain and Website Attribution beyond WHOIS
- DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection
- FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks
- FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks
- Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems
- Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions
- RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis
- Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
- Attack of the Knights:Non Uniform Cache Side Channel Attack
- Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication
- DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks
The artifacts associated with the paper are of a quality that significantly exceeds minimal functionality. That is, they have all the qualities of the Artifacts Evaluated – Functional level, but, in addition, they are very carefully documented and well-structured to the extent that reuse and repurposing is facilitated. In particular, norms and standards of the research community for artifacts of this type are strictly adhered to.
- From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
- Triereme: Speeding up hybrid fuzzing through efficient query scheduling
- Secure Softmax/Sigmoid for Machine-learning Computation
- Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance
- Remote attestation of confidential VMs using ephemeral vTPMs
- Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles
- Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles
- On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI
- Remote Attestation with Constrained Disclosure
- OAuth 2.0 Redirect URI Validation Falls Short, Literally
- Detecting Weak Keys in Manufacturing Certificates: A Case Study
- Differentially Private Resource Allocation
- Poisoning Network Flow Classifiers
- Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks
- PAVUDI: Patch-based Vulnerability Discovery using Machine Learning
- DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection
- Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems
- Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions
- RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis
- Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
- Attack of the Knights:Non Uniform Cache Side Channel Attack
- Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication
- DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks
The artifacts associated with the research whose results have been independently obtained in a subsequent study by a person or team other than the authors, without the use of author-supplied artifacts.
- From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
- Triereme: Speeding up hybrid fuzzing through efficient query scheduling
- Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones
- Secure Softmax/Sigmoid for Machine-learning Computation
- Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance
- Remote attestation of confidential VMs using ephemeral vTPMs
- On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI
- PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior
- OAuth 2.0 Redirect URI Validation Falls Short, Literally
- Differentially Private Resource Allocation
- Poisoning Network Flow Classifiers
- Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse
- Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks
- Detection of Anomalies in Electric Vehicle Charging Sessions
- DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection
- Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems
- Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions
- RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis
- Attack of the Knights:Non Uniform Cache Side Channel Attack