Skip to main content

Artifacts

To help support the reproducibility for research results, ACSAC encourages authors of accepted papers to submit software they develop and datasets they use to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. We thank all the authors who participated in this initiative!

For more details on the artifact evaluations process, please refer to the Call for Paper Artifacts.

Link Legend:      github GitHub       web Web archive


IEEE Code Available Badge

This badge signals that author-created digital objects used in the research (including data and code) are permanently archived in a public repository that assigns a global identifier and guarantees persistence, and are made available via standard open licenses that maximize artifact availability.

  • TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems github
  • Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs web
  • Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory github
  • R+R: Understanding Hyperparameter Effects in DP-SGD github
  • ConProv: A Container-Aware Provenance System for Attack Investigation github
  • T-Edge: Trusted Heterogeneous Edge Computing github
  • FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation web

IEEE Code Available Badge

This badge signals that all relevant author-created digital objects used in the research (including data and code) were reviewed according to the criteria provided by the badge issuer.

  • Faking deduplication to prevent timing side-channel attacks on memory deduplication web
  • SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware github
  • R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction github
  • You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations web
  • Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks github
  • R+R: Towards Reliable and Generalizable Differentially Private Machine Learning web
  • RouTEE: Secure", Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments github
  • R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android web
  • Stealing Watermarks of Large Language Models via Mixed Integer Programming github
  • WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home github
  • AirBugCatcher: Automated Wireless Reproduction of IoT Bugs web
  • Harnessing Multiplicity Granular Browser Extension Fingerprinting through User Configurations web
  • Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models web
  • Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks github
  • Towards a Taxonomy of Challenges in Security Control Implementation web
  • Link Inference Attacks in Vertical Federated Graph Learning github
  • On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World github

IEEE Code Reproduced Badge

This badge signals that an additional step was taken or facilitated by the badge issuer (e.g., publisher, trusted third-party certifier) to certify that an independent party has regenerated computational results using the author‑created research objects, methods, code, and conditions of analysis.

  • SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation github
  • VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs github
  • R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage web
  • FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free web
  • No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks github
  • Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments github
  • Single Sign-On Privacy: We Still Know What You Did Last Summer web
  • Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software github
  • VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections web
  • R+R: Security Vulnerability Repair Datasets Require Repair github
  • FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs github
  • Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning github
  • Privacy-Preserving Verifiable Neural Network Inference Service github
  • BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables github
  • FedCAP: Robust Federated Learning via Customized Aggregation and Personalization github
  • Manifest Problems: Analyzing Code Transparency for Android Application Bundles github
  • What You See Is Not What You Get: Model-Manipulation Attacks Against Black-Box Explanations github
  • R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries github
  • ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer web
  • Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality github
  • TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding web
  • SECvma: Virtualization-based Linux Kernel Protection for Arm github
  • A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events web
  • CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis web
  • I'll Be There for You! Perpetual Availability in the A^8 MVX System web
  • I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques github
  • Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning github
  • Practical Light Clients for Committee-Based Blockchains web
  • Screaming Channels on Bluetooth Low Energy github