[
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Zero-Change Object Transmission for Distributed Big Data Analytics",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Addrminer: A Comprehensive Global Active IPv6 Address Discovery System",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/AddrMiner/AddrMiner",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Meces: Latency-efficient Rescaling via Prioritized State Migration for Stateful Distributed Stream Processing Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ATC2022No63/Meces-Artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Riker: Always-Correct and Fast Incremental Builds from Simple Specifications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.6544966"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/yzr95924/DEBE",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "CBMM: Financial Advice for Kernel Memory Managers",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/multifacet/cbmm-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "IPLFS: Log-Structured File System without Garbage Collection",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ESOS-Lab/Interval_Mapping",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "EPK: Scalable and Efficient Memory Protection Key",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/EPK",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/wsczq1/straid",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Not that Simple: Email Delivery in the 21st Century",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ichdasich/email-measurement-toolchain",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/thustorage/pacman",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
    "badges": [
      "available"
    ],
    "repository_url": "https://doi.org/10.5281/zenodo.6544909",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Investigating Managed Language Runtime Performance: Why JavaScript and Python are 8x and 29x slower than C++, yet Java and Go can be Faster?",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/dsrg-uoft/LangBench-cpython",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/GLaDOS-Michigan/Sift",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "KRCORE: a microsecond-scale RDMA control plane for elastic computing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/krcore-artifacts.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/BoyuanFeng/Faith",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Excelsiorrr/AE",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "FlatFS: Flatten Hierarchical File System Namespace on Non-volatile Memories",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/miaogecm/FlatFS.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "PetS: A Unified Framework for Parameter-Efficient Transformers Serving",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/6534753#.YnpJtoxBz31"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/chengjiagan/RunD_ATC22",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/Borelset/MeGA",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "FpgaNIC: An FPGA-based Versatile 100Gb SmartNIC for GPUs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/carlzhang4/FPGANic",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/alibaba/EasyParallelLibrary",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Critical Path Analysis of Large-scale Microservice Architectures",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/6544915#.Yn3UZhPMJhE"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "uKharon: A Membership Service for Microsecond Applications",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/LPD-EPFL/ukharon-artifacts",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Co-opting Linux Processes for High-Performance Network Simulation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/netsim-atc2022/netsim-atc2022.github.io",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Vinter: Automatic Non-Volatile Memory Crash Consistency Testing for Full Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/6544869"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/Chen-Binghao/PilotFish",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Kaelus/Modulo",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Primo: Practical Learning-Augmented Systems with Interpretable Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/S-Lab-System-Group/Primo",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Towards Latency Awareness for Content Delivery Network Caching",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/GYan58/la-cache-atc22",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/HyperEnclave/atc22-ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Privbox: Faster System Calls Through Sandboxed Privileged Execution",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/privbox/devenv",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/lzjzx1122/Pagurus",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.19721692"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/princeton-sns/specreds",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/casys-kaist/CoVA",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/thustorage/AlNiCo",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "High Throughput Replication with Integrated Membership Management",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/pfouto/chain-results",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/casys-kaist/HUVM",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Cachew: Machine Learning Input Data Processing as a Service",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/eth-easl/cachew_experiments",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Building Fault-Tolerant Distributed Systems with DepFast",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/stonysystems/depfast-ae/tree/atc_ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Campo: A Cost-Aware and High-Performance Mixed Precision Optimizer for Neural Network Training",
    "badges": [
      "available"
    ],
    "repository_url": "https://gitee.com/sayounara/Campo_amp",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/sjtu-epcc/DVABatch",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/wwwzrb/zero-ae/tree/zero-ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "ZNSwap: un-Block your Swap",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/acsl-technion/znswap_policy_module",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/hku-systems/SOTER",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "JITServer: Disaggregated Caching JIT Compiler for the JVM in the Cloud",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/AlexeyKhrabrov/openj9-openjdk-jdk8/tree/atc22ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2022,
    "title": "TETRIS: Memory-efficient Serverless Inference through Tensor Sharing",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/JelixLi/Tetris",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Calcspar: A Contract-Aware LSM-Tree for Cloud Storage with Low Latency Spikes",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/yhzhou-pds/ATC23-Calcspar.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "SAGE: Software-based Attestation for GPU Execution",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/spcl/sage",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/spypaul/MQSim_CXL.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "UnFaaSener: Latency and Cost Aware Offloading of Functions from Serverless Platforms",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ubc-cirrus-lab/unfaasener",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/shadowcache/Cuki-Artifact-WSS-Estimation",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "P2CACHE: Exploring Tiered Memory for In-Kernel File Systems Caching",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/YesZhen/P2CACHE.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Towards Iterative Relational Algebra on the GPU",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/harp-lab/usenixATC23/",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/shijiuchen/Nodens",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/badge/latestdoi/580583199"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/ssdohammer-sl/ceph/tree/tidedup",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/secretflow/spu/tree/atc23_ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://gitlab.engr.illinois.edu/DEPEND/atc23-artifact-730",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Revisiting Secondary Indexing in LSM-based Storage Systems with Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/thustorage/perseid",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/MeloYang05/GLogS-Artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/hkust-adsl/kubernetes-scheduler-simulator",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "TC-GNN: Bridging Sparse GNN Computation and Dense Tensor Cores on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/YukeWang96/TCGNN-Pytorch.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "LLFree: Scalable and Optionally-Persistent Page-Frame Allocation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/luhsra/llfree-bench/tree/atc23-artifact-eval/artifact-eval",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/tzphh/SOWalker",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/mindspore-lab/mindrl",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Light-Dedup/Light-Dedup",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Zhuque: Failure Isn't an Option, It's an Exception",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/georgehodgkins/Zhuque_artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "oBBR: Optimize Retransmissions of BBR flows on the Internet",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/bpq233/oBBR",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "VectorVisor: A Binary Translation Scheme for Throughput-Oriented GPU Acceleration",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SamGinzburg/VectorVisor",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "SmartMoE: Efficiently Training Sparsely-Activated Models through Combining Static and Dynamic Parallelization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/thu-pacman/SmartMoE-AE",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Analysis and Optimization of Network I/O Tax in Confidential Virtual Machines",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/IPADS-Bifrost/ae-guide",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/JIESUN233/Legion",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/vegito/tree/gart",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Portunus: Re-imagining Access Control in Distributed Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/cloudflare/circl/tree/main/abe/cpabe/tkn20",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "PINOLO: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/qaqcatz/impomysql",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Translation Pass-Through for Near-Native Paging Performance in VMs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/acsl-technion/TPT",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/arbitor-project/artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Sponge: Fast Reactive Scaling for Stream Processing with Serverless Frameworks",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/apache/incubator-nemo/tree/sponge",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "MELF: Multivariant Executables for a Heterogeneous World",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://sra.uni-hannover.de/Publications/2023/melf-usenix-atc23/",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ordersage/paper-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://bit.ly/oakestra-artifacts",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Explore Data Placement Algorithm for Balanced Recovery Load Distribution",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/rcstor/rcstor",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "EnvPipe: Performance-preserving DNN Training Framework for Saving Energy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/casys-kaist/EnvPipe",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "FarReach: Write-back Caching in Programmable Switches",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/LGN520/farreach-public",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "MOSAIC Teaching Operating System Model and Checker",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/jiangyy/mosaic",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "Luci: Loader-based Dynamic Software Updates for Off-the-shelf Shared Objects",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/luci-project/eval-atc23",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2023,
    "title": "LPNS: Scalable and Latency-Predictable Local Storage Virtualization for Unpredictable NVMe SSDs in Clouds",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Massively Parallel Multi-Versioned Transaction Processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ShujianQian/epic-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/eth-easl/pecan-experiments",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Efficient Decentralized Federated Singular Vector Decomposition",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Di-Chai/Excalibur",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "XCommit: resource-efficient, performant and cost-effective file system journaling",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/harshadjs/fast-commit-atc-2024",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/shubhamchdhary/TileClipper",
    "artifact_url": "https://doi.org/10.5281/zenodo.11179900"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "A Tale of Two Paths: Toward a Hybrid Data Plane for Ef\ufb01cient Far-Memory Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/FereX98/atlas-ae/tree/main",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Starburst: A Cost-aware Scheduler for Cloud Bursting",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/michaelzhiluo/starburst",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Kivi: Verifying Cluster Management Systems",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/bingzheliu/Kivi",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "TeleScale: Telemetry for Gargantuan Memory Footprint Applications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://doi.org/10.5281/zenodo.11188652",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/wrl297/Calchas",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Exploit both SMART Attributes and NAND Flash Wear Characteristics to Effectively Forecast SSD-based Storage Failures in Clusters",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/SJTU-Storage-Lab/USENIX-ATC-2024-AE-APTN",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/funnygyc/gVulkan-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Opportunities and Limitations of Modern Hardware Isolation Mechanisms",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/mars-research/atc24-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.11181584"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/s3yonsei/rewind_serverless/tree/main/atc24_ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "UniMem: Redesigning Disaggregated Memory within A Unified Local-Remote Memory Hierarchy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/YeYan0304/UniMem-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Ethane: An Asymmetric File System for Disaggregated Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/miaogecm/Ethane.git",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Taming Hot Bloat Under Virtualization with HugeScope",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/TELOS-syslab/hugescope-atc23-ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Making Memory Management Extensible With Filesystems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/multifacet/fbmm-artifact",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Evaluating Chiplet-based Large-Scale Interconnection Networks via Cycle-Accurate Packet-Parallel Simulation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Yinxiao-Feng/chiplet-network-sim/releases/tag/ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "HiP4-UPF: Towards High-Performance Comprehensive 5G User Plane Function on P4 Programmable Switches",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "PeRF: Preemption-enabled RDMA Framework",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/acryl-aaai/perf",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "ExtMem: Enabling Application-Aware Memory Page Placement Policies",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SepehrDV2/ExtMem",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/kwai/Megatron-Kwai/tree/atc24ae/examples/atc24",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "DeepVisor: Effective Operator Graph Instantiation for Deep Learning by Execution State Monitoring",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/heheda12345/frontend",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "High-density Mobile Cloud Gaming on Edge SoC Farms",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/lizhang20/SFG",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "FwdFL: Efficient Federated Finetuning of Language Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/UbiquitousLearning/FwdLLM",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Power-aware Deep Learning Model Serving with \u03bc-Serve",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://gitlab.engr.illinois.edu/DEPEND/power-aware-model-serving",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Mangosteen: Fast Transparent Durability for Linearizable Applications using NVM",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Identifying On-/Off-CPU Bottlenecks Together with Blocked Samples",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/s3yonsei/blocked_samples/",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://spclgitlab.ethz.ch/mkhalilov/pspin-osmosis",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/suntong30/SimEnc",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Every Mapping Counts in Large Amounts: Folio Accounting",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://gitlab.com/foliomap_paper/ae",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Fast (Trapless) Kernel Probes Everywhere",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/hardos-ebpf-fuzzing/atc24-uno-kprobe",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Balancing Analysis Time and Bug Detection: Daily Development-friendly Bug Detection in Linux",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/sslab-keio/FiTx",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/rs3lab/Monarch",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/DISCOPASS/PASS",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "vFPIO: A Virtual I/O Abstraction for FPGA-accelerated I/O Devices",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/TUM-DSE/vFPIO",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/Beaconsys/Data_review_reporting",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/ChaseLab-PKU/ScalaAFA",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/usyd-fsalab/fp6_llm/",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "StreamCache: Revisiting Page Cache for File Scanning on Fast Storage Devices",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/11180773"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Richardhongyu/rfl_empirical_tools",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/fishercht1995/ALPS",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.11181953"
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/SoC-Cluster/SoC-Cluster-artifacts",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "RL-Watchdog: A Fast and Predictable SSD Liveness Watchdog on Storage Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/kinman0224/PUZZLE-AE/tree/main",
    "artifact_url": ""
  },
  {
    "conference": "ATC",
    "category": "systems",
    "year": 2024,
    "title": "mmTLS: Scaling the Performance of Encrypted Network Traffic Inspection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/TNET-SNU/mmTLS",
    "artifact_url": ""
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Accelerating Graph Sampling for Graph Machine Learning using GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/abhijangda/nextdoor-experiments/",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456244"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Achieving Low Tail-latency and High Scalability for Serializable Transactions in Edge Computing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/hku-systems/dast",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456238"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Characterizing, Exploiting, and Detecting DMA Code Injection Vulnerabilities in the Presence of an IOMMU",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Markuze/mmo-static",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456249"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "DGCL: An Efficient Communication Library for Distributed GNN Training",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/czkkkkkk/gccl",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456233"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "M3: End-to-End Memory Management in Elastic System Software Stacks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/dsrg-uoft",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456256"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Finding Heterogeneous-Unsafe Configuration Parameters in Cloud Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/StarThinking/ZebraConf",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456250"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Home, SafeHome: Smart Home Reliability with Visibility and Atomicity",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Shegufta/SafeHomeFramework",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456261"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "PaSh: Light-touch Data-Parallel Shell Processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/andromeda/pash",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456228"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "rkt-io: A Direct I/O Stack for Shielded Execution",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Mic92/rkt-io",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456255"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Seastar: Vertex-Centric Programming for Graph Neural Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://zenodo.org/records/4988602",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456247"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Site-to-Site Internet Traffic Control",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/bundler-project/evaluation",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456260",
    "award": "Best Artifact Award"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Tahoe: Tree Structure-Aware High Performance Inference Engine for Decision Tree Ensemble on GPU",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/zhen-xie/Tahoe",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456251"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Take it to the Limit: Peak Prediction-driven Resource Overcommitment in Datacenters",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/googleinterns/cluster-resource-forecast",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456259"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Unikraft: Fast, Specialized Unikernels the Easy Way",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/unikraft/eurosys21-artifacts",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456248"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Confidential Computing for OpenPOWER",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/mvle/eurosys2021_PEF_OpenPOWER",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456243"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "DZiG: Sparsity-Aware Incremental Processing of Streaming Graphs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/pdclab/graphbolt/tree/eurosys21-artifact",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456230"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "OFC: An Opportunistic Caching System for FaaS Platforms",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://gitlab.com/lenapster/faascache/-/tree/master/artifactEvaluation",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456239"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Understanding and Dealing with Hard Faults in Persistent Memory Systems",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/OrderLab/Arthas/blob/master/artifactREADME.md",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456252"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Odyssey: The Impact of Modern Hardware on Strongly-Consistent Replication Protocols",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/vasigavr1/Odyssey",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456240"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "TraceSplitter: A New Paradigm for Downscaling Traces",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/smsajal/TraceSplitter",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456262"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2021,
    "title": "Zeus: Locality-aware Distributed Transactions",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ease-lab/Zeus",
    "artifact_url": "",
    "paper_url": "10.1145/3447786.3456234"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "OS Scheduling with Nest: Keeping Tasks Close Together on Warm Cores",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://gitlab.inria.fr/nest-public/nest-artifact",
    "artifact_url": "10.5281/zenodo.6344960",
    "paper_url": "10.1145/3492321.3519585"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Improving Scalability of Database Systems by Reshaping User Parallel I/O",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/NingBellWind/AppleS_Artifact",
    "artifact_url": "10.5281/zenodo.6336004",
    "paper_url": "10.1145/3492321.3519570"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "A New Benchmark Harness for Systematic and Robust Evaluation of Streaming State Stores",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/CASP-Systems-BU/Gadget",
    "artifact_url": "10.5281/zenodo.6347736",
    "paper_url": "10.1145/3492321.3519592"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "SafePM: A Sanitizer for Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/mstniy/safepm",
    "artifact_url": "10.5281/zenodo.6338745",
    "paper_url": "10.1145/3492321.3519574",
    "award": "Distinguished Artifact Honorable Mention"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Building an Efficient Key-Value Store in a Flexible Address Space",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/flexible-address-space/eurosys22-artifact",
    "artifact_url": "10.5281/zenodo.6345713",
    "paper_url": "10.1145/3492321.3519555"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "BetrFS: A Compleat File System for Commodity SSDs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/oscarlab/betrfs",
    "artifact_url": "10.5281/zenodo.6345303",
    "paper_url": "10.1145/3492321.3519571"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "PKRU-Safe: Automatically Locking Down the Heap Between Safe and Unsafe Languages",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/securesystemslab/PKRU-Safe",
    "artifact_url": "10.5281/zenodo.6336301",
    "paper_url": "10.1145/3492321.3519582"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Rolis: a software approach to efficiently replicating multi-core transactions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/shenweihai1/rolis-eurosys2022",
    "artifact_url": "10.5281/zenodo.6335844",
    "paper_url": "10.1145/3492321.3519561"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "KASLR in the age of MicroVMs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/bencw12/in-monitor-rando-benchmarking",
    "artifact_url": "",
    "paper_url": "10.1145/3492321.3519578"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "OPEC: Operation-based Security Isolation for Bare-metal Embedded Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/XiaZhouZero/OPEC",
    "artifact_url": "10.5281/zenodo.6336200",
    "paper_url": "10.1145/3492321.3519573"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Jiffy: Elastic Far-Memory for Stateful Serverless Analytics.",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/resource-disaggregation/jiffy-artifact",
    "artifact_url": "10.5281/zenodo.6349596",
    "paper_url": "10.1145/3492321.3519587"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "D3: A Dynamic Deadline-Driven Approach for Building Autonomous Vehicles",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/erdos-project/erdos",
    "artifact_url": "10.5281/zenodo.6345350",
    "paper_url": "10.1145/3492321.3519576"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Isolating at the Hardware Limit with Virtines",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/virtines/wasp",
    "artifact_url": "10.5281/zenodo.6350453",
    "paper_url": "10.1145/3492321.3519553",
    "award": "Distinguished Artifact"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Unicorn: Reasoning about Configurable System Performance through the lens of Causality",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/softsys4ai/unicorn",
    "artifact_url": "10.5281/zenodo.6360540",
    "paper_url": "10.1145/3492321.3519575"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "GNNLab: A Factored System for Sample-based GNN Training over GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/fgnn-artifacts/tree/0abc7182",
    "artifact_url": "10.5281/zenodo.6347456",
    "paper_url": "10.1145/3492321.3519557",
    "award": "Distinguished Artifact Honorable Mention"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "VMSH: Hypervisor-agnostic Guest Overlays for VMs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Mic92/vmsh",
    "artifact_url": "10.5281/zenodo.6337102",
    "paper_url": "10.1145/3492321.3519589",
    "award": "Distinguished Artifact Honorable Mention"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Kite: Lightweight Critical Service Domains full strip note",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ssrg-vt/kite",
    "artifact_url": "10.5281/zenodo.6348174",
    "paper_url": "10.1145/3492321.3519586"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Characterizing the Performance of Intel Optane Persistent Memory -- A Close Look at its On-DIMM Buffering",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/lingfenghsiang/Persistent-Memory-Study",
    "artifact_url": "10.5281/zenodo.6342303",
    "paper_url": "10.1145/3492321.3519556"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "LiteReconfig: Cost and Content Aware Reconfiguration of Video Object Detection Systems for Mobile GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/StarsThu2016/LiteReconfig_AE",
    "artifact_url": "10.5281/zenodo.6345733",
    "paper_url": "10.1145/3492321.3519577"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "DAMYSUS: Streamlined BFT Consensus Leveraging Trusted Components",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/vrahli/damysus",
    "artifact_url": "",
    "paper_url": "10.1145/3492321.3519568"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Optimizing the Interval-centric Distributed Computing Model for Temporal Graph Algorithms",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/dream-lab/wicm/tree/Eurosys2022",
    "artifact_url": "10.5281/zenodo.6337790",
    "paper_url": "10.1145/3492321.3519588"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Out-Of-Order BackProp: An Effective Scheduling Technique for Deep Learning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/mlsys-seo/ooo-backprop",
    "artifact_url": "10.5281/zenodo.6345869",
    "paper_url": "10.1145/3492321.3519563"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/asonnino/narwhal",
    "artifact_url": "10.5281/zenodo.6353717",
    "paper_url": "10.1145/3492321.3519594"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Varuna: Scalable, Low-cost Training of Massive Deep Learning Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/microsoft/varuna/",
    "artifact_url": "10.5281/zenodo.6359660",
    "paper_url": "10.1145/3492321.3519584"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "State Machine Replication Scalability Made Simple",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/hyperledger-labs/mirbft/tree/research-iss",
    "artifact_url": "10.5281/zenodo.6344032",
    "paper_url": "10.1145/3492321.3519579"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Verified Programs Can Party: Optimizing Kernel Extensions via Post-Verification In-Kernel Merging",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/synercys/eurosys-kfuse-artifact",
    "artifact_url": "10.5281/zenodo.6336103",
    "paper_url": "10.1145/3492321.3519562"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Beating the I/O bottleneck: A case for log-structured virtual disks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/asch/dis",
    "artifact_url": "10.5281/zenodo.6354775",
    "paper_url": "10.1145/3492321.3524271"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Sharing is Caring: Secure and Efficient Shared Memory Support for MVEEs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ReMon-MVEE/ReMon",
    "artifact_url": "10.5281/zenodo.6360235",
    "paper_url": "10.1145/3492321.3519558"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "FaaSnap: FaaS Made Fast Using Snapshot-based VMs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ucsdsysnet/faasnap",
    "artifact_url": "10.5281/zenodo.6360833",
    "paper_url": "10.1145/3492321.3524270"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "DeepRest: Deep Resource Estimation for Interactive Microservices",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/IBM/api-tracing-app-management",
    "artifact_url": "10.5281/zenodo.6335690",
    "paper_url": "10.1145/3492321.3519564"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Tebis: Index Shipping for Efficient Replication in LSM Key-Value Stores",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/CARV-ICS-FORTH/tebis",
    "artifact_url": "10.5281/zenodo.6349594",
    "paper_url": "10.1145/3492321.3519572"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "p2KVS: a Portable 2-Dimensional Parallelizing Framework to Improve Scalability of Key-value Stores on SSDs",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/luziyi23/p2KVS/",
    "artifact_url": "10.5281/zenodo.6336196",
    "paper_url": "10.1145/3492321.3519567"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2022,
    "title": "Memory Deduplication for Serverless Computing with Medes",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/DivyanshuSaxena/Medes",
    "artifact_url": "10.5281/zenodo.6374411",
    "paper_url": "10.1145/3492321.3524272"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "DRAMHiT: A Hash Table Architected for the Speed of DRAM",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7719328",
    "paper_url": "https://doi.org/10.1145/3552326.3587457"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "NearPM: A Near-memory Processing Prototype for Storage-class Workloads",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7738934",
    "paper_url": "https://doi.org/10.1145/3552326.3587456"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7737994",
    "paper_url": "https://doi.org/10.1145/3552326.3587453"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Model Checking Guided Testing for Distributed Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7654817",
    "paper_url": "https://doi.org/10.1145/3552326.3587442"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7728972",
    "paper_url": "https://doi.org/10.1145/3552326.3587439"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Omni-Paxos: Breaking the Barriers of Partial Connectivity",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7737776",
    "paper_url": "https://doi.org/10.1145/3552326.3587441"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7725803",
    "paper_url": "https://doi.org/10.1145/3552326.3587452"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Pocket: ML Serving from the Edge",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7734815",
    "paper_url": "https://doi.org/10.1145/3552326.3587459"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "FrozenHot Cache: Rethinking Cache Management for Modern Software",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7733671",
    "paper_url": "https://doi.org/10.1145/3552326.3587446"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Unikernel Linux (UKL)",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7737645",
    "paper_url": "https://doi.org/10.1145/3552326.3587458"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "DyTIS: A Dynamic Dataset Targeted Index Structure Simultaneously Efficient for Search, Insert, and Scan",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7721895",
    "paper_url": "https://doi.org/10.1145/3552326.3587434"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Mumak: efficient and black-box bug detection for Persistent Memory",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7737117",
    "paper_url": "https://doi.org/10.1145/3552326.3587447"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7734627",
    "paper_url": "https://doi.org/10.1145/3552326.3587444"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Dissecting BFT Consensus: In Trusted Components we Trust!",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7734495",
    "paper_url": "https://doi.org/10.1145/3552326.3587455"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Efficient and Safe I/O Operations for Intermittent Systems",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7735158",
    "paper_url": "https://doi.org/10.1145/3552326.3587435"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7726172",
    "paper_url": "https://doi.org/10.1145/3552326.3587448",
    "award": "Gilles Muller Best Artifact Award"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7732935",
    "paper_url": "https://doi.org/10.1145/3552326.3587454"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "MariusGNN: Resource-Efficient Out-of-Core Training of Graph Neural Networks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7114594",
    "paper_url": "https://doi.org/10.1145/3552326.3567501"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7704577",
    "paper_url": "https://doi.org/10.1145/3552326.3567488"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7709922",
    "paper_url": "https://doi.org/10.1145/3552326.3567484"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Viper: A Fast Snapshot Isolation Checker",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.22223914.v1",
    "paper_url": "https://doi.org/10.1145/3552326.3567492"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "OLPart: Online Learning based Resource Partitioning for Colocating Multiple Latency-Critical Jobs on Commodity Computers",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7726928",
    "paper_url": "https://doi.org/10.1145/3552326.3567490"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Hi-Speed DNN Training with Espresso: Unleashing the Full Potential of Gradient Compression with Near-Optimal Usage Strategies",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.22233487.v1",
    "paper_url": "https://doi.org/10.1145/3552326.3567505"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "WAFL: Exposing Memory Ordering Bugs Efficiently with Active Delay Injection",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7710637",
    "paper_url": "https://doi.org/10.1145/3552326.3567507"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Fast and Efficient Model Serving Using Multi-GPUs with Direct-Host-Access",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7703530",
    "paper_url": "https://doi.org/10.1145/3552326.3567508",
    "award": "Gilles Muller Best Artifact Award"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Diablo: A Benchmark Suite for Blockchains",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7707312",
    "paper_url": "https://doi.org/10.1145/3552326.3567482"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Groundhog: Efficient Request Isolation in FaaS",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7703209",
    "paper_url": "https://doi.org/10.1145/3552326.3567503"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "All-Flash Array Key-Value Cache for Large Objects",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7703583",
    "paper_url": "https://doi.org/10.1145/3552326.3567509"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "REFL: Resource-Efficient Federated Learning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7141105",
    "paper_url": "https://doi.org/10.1145/3552326.3567485"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "With Great Freedom Comes Great Opportunity: Rethinking Resource Allocation for Serverless Functions",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7143413",
    "paper_url": "https://doi.org/10.1145/3552326.3567506"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Integrating Non-Volatile Main Memory in a Deterministic Database",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7706922",
    "paper_url": "https://doi.org/10.1145/3552326.3567494"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2023,
    "title": "Accelerating Graph Mining Systems with Subgraph Reshaping",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3552326.3567489"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10077042"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Adaptable Runtime Monitoring for Intermittent Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10792132"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10080460"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.6084/m9.figshare.24156084"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Characterization and Reclamation of Frozen Garbage in Managed FaaS Workloads",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10103366"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.8394044"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "CSAL: the Next-Gen Local Disks for the Cloud",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10086260"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10023703"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Draconis: Network-Accelerated Scheduling for Micro-Scale Workloads",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10688914"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "DynaPipe: Optimizing Multi-task Training through Dynamic Pipelines",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.8413925"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Effective Bug Detection with Unused Definitions",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10081116"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Efficient Auditing of Event-driven Web Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10790870"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10076583"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10791491"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10783932"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10783786"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10089643"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.8361554"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Improving GPU Energy Efficiency through an Application-transparent Frequency Scaling Policy with Performance Assurance",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.6084/m9.figshare.24523315.v1"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.8393982"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Model Selection for Latency-Critical Inference Serving",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.6084/m9.figshare.22721161.v2"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "On the Limitations of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10790855"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Orion: Interference-aware, Fine-grained GPU Sharing for ML Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10084464"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10089094"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Puddles: Application-Independent Recovery and Location-Independent Data for Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.8400339"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Serialization/Deserialization-free State Transfer in Serverless Workflows with RDMA-based Remote Memory Map",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10078917"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "SplitFT: Fault Tolerance for Disaggregated Datacenters via Remote Memory Logging",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10076707"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "TraceUpscaler: Upscaling Traces to Evaluate Systems at High Load",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10042017"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Transparent Multicore Scaling of Single-Threaded Network Functions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10087198"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "TTLs Matter: Efficient Cache Sizing with TTL-Aware Miss Ratio Curves and Working Set Sizes",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10783873"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10077300"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2024,
    "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.10791372"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13827000"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Efficiently Packing Privacy Budget with DPack",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13731043"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Understanding the Linux Kernel, Visually",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13710732"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "RAKIS: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13800029"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Collaborative Text Editing with Eg-walker: Better, Faster, Smaller",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13823409"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Flex: Fast, Accurate DNN Inference on Low-Cost Edges Using Heterogeneous Accelerator Execution",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Tanmoy058/Elastically-Scheduling-Multiple-DNN-Inference-Jobs-on-an-Edge-Device-for-High-Efficiency-and-Accurac/blob/main/README.md"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13714937"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13738672"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13714712"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "ParallelEVM: Operation-Level Concurrent Transaction Execution for EVM-Compatible Blockchains",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Efeu: generating efficient, verified, hybrid hardware/software drivers for I2C devices",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.13734520"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "CAPSys: Contention-aware task placement for data stream processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.13717642"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Nan-Ge/eurosys25_ae"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Introspective Congestion Control for Consistent High Performance",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13712326"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "You Only Prefill Once: Combining Cached Knowledge for Large Language Model Serving with CacheBlend",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/YaoJiayi/CacheBlend.git"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "DeltaZip: Efficient Serving of Multiple Full-Model-Tuned LLMs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/eth-easl/deltazip-ae"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Revealing the Unstable Foundations of eBPF-Based Kernel Extensions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ShawnZhong/DepSurf"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14809924"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14829560"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Samoyeds: Accelerating MoE Models with Structured Sparsity Leveraging Sparse Tensor Cores",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/guqiqi/Samoyeds"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Eva: Cost-Efficient Cloud-Based Cluster Scheduling",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/uw-mad-dash/Eva"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "TUNA: Tuning Unstable and Noisy Cloud Applications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14872390"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "SpotHedge: Serving AI Models on Spot Instances",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MaoZiming/spothedge_ae"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Jupiter: Pushing Speed and Scalability Limitations for Subgraph Matching on Multi-GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/AnySparse/Jupiter"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Borelset/GCCDF"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14871138"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "LOFT: A Lock-free and Adaptive Learned Index with High Scalability for Dynamic Workloads",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/yuxuanMo/LOFT/tree/main"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14871978"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "HyperAlloc: Efficient VM Memory De/Inflation via Hypervisor-Shared Page-Frame Allocators",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/luhsra/hyperalloc-bench/pkgs/container/hyperalloc_ae"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14875828"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tanksys/AlloyStack"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "HawkSet: Automatic, Application-Agnostic, and Efficient Concurrent PM Bug Detection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14917473"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dazz993/mist"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ASTERISC-Release/Erebor"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Empowering WebAssembly with Thin Kernel Interfaces",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14829424"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "A Hardware-Software Co-Design for Efficient Secure Containers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shijc-sjtu/cki-artifact"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14830621"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Impeller: Stream Processing on Shared Logs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ut-osa/impeller-artifact"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dgist-datalab/AppL"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Overcoming the Last Mile between Log-Structured File Systems and Persistent Memory via Scatter Logging",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fg-sn2003/slotfs-eurosys"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/xxyux/SpInfer"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/HKU-System-Security-Lab/Daredevil"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ucare-uchicago/Heimdall"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dipayan2/CRAVE_Artifact_EuroSys"
  },
  {
    "conference": "EUROSYS",
    "category": "systems",
    "year": 2025,
    "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Fjallraven-hc/NeuStream-AE"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Testing Database Engines via Pivoted Query Synthesis",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://doi.org/10.5281/zenodo.4005705"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/uw-unsat/jitterbug/tree/osdi20-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/netx-repo/RSCS",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Overload Control for \u00b5s-scale RPCs with Breakwater",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/joshuafried/caladan-ae/tree/osdi20ae/breakwater",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Gauntlet: Finding Bugs in Compilers for Programmable Packet Processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/p4gauntlet/gauntlet/tree/aec",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/efeslab/agamotto/tree/artifact-eval-osdi20/artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://gitlab.engr.illinois.edu/DEPEND/firm",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "SafetyPin: Encrypted Backups with Human-Memorable Secrets",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/edauterman/SafetyPin",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "DORY: An Encrypted Search System with Distributed Trust",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ucbrise/dory",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/bytedance/byteps/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/axbryd/hXDP-Artifacts/tree/camera-ready-v2.0",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Fault-tolerant and transactional stateful serverless workflows",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/eniac/Beldi",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://bitbucket.org/daiyifandanny/learned-leveldb/src/master/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "AIFM: High-Performance, Application-Integrated Far Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/zainryan/AIFM-AE",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Toward a Generic Fault Tolerance Technique for Partial Network Partitioning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/UWASL/NIFTY",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/cmu-snap/pigasus",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://gitlab.mpi-sws.org/cld/ml/clockwork/-/tree/osdi_2020_ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/secure-foundations/veribetrkv-osdi2020",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Pegasus: Tolerating Skewed Workloads in Distributed Storage with In-Network Coherence Directories",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/NUS-Systems-Lab/pegasus.git",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Byzantine Ordered Consensus without Byzantine Oligarchy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/yhzhang0128/osdi20-artifact-evaluation",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/nnfusion/tree/osdi20_artifact/artifacts",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "A Simpler and Faster NIC Driver Model for Network Functions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/dslab-epfl/tinynf",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Caladan: Mitigating Interference at Microsecond Timescales",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/joshuafried/caladan-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/mit-pdos/ward",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "PANIC: A High-Performance Programmable NIC for Multi-tenant Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://bitbucket.org/uw-madison-networking-research/panic_osdi20_artifact/src/master/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Performance-Optimal Read-Only Transactions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/princeton-sns/Scylla-PORT.git",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/nni/tree/retiarii_artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Fast RDMA-based Ordered Key-Value Store using Remote Learned Cache",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/xstore/tree/legacy",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/yunshengtw/scftl",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/saurabhkadekodi/preact-osdi-2020-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://bitbucket.org/lmzheng/ansor-artifact/src/master/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Do OS abstractions make sense on FPGAs?",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/fpgasystems/Coyote",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Orchard: Differentially Private Analytics at Scale",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/edoroth/orchard",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/hummingbird/commit/dbebbb715e7050b47895082664adc27f8b846aa1",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/vmware/declarative-cluster-management/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Theseus: an Experiment in Operating System Structure and State Management",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/theseus-os/Theseus/tree/osdi20ae/osdi20ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "A large scale analysis of hundreds of in-memory cache clusters at Twitter",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Thesys-lab/InMemoryCachingWorkloadAnalysis",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Cobra: Making Transactional Key-Value Stores Verifiably Serializable",
    "badges": [
      "available",
      "reproduced"
    ],
    "repository_url": "https://github.com/DBCobra/CobraHome/tree/OSDI20-AE",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "https://resin.azurehdinsight.net/zeppelin/#/notebook/2FJC89KRJ",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Heterogeneity-Aware Cluster Scheduling Policies for Deep Learning Workloads",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/stanford-futuredata/gavel/tree/osdi20",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Microsecond Consensus for Microsecond Applications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/osdi2020-no-152/dory",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Semeru: A Memory-Disaggregated Managed Runtime",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/uclasystem/Semeru",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/lsds/KungFu/tree/ae-submissionV2",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/OrderLab/violet",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Aragog: Scalable Runtime Verification of Shardable Networked Systems",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/NofelYaseen/MBVerifier",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "CrossFS: A Cross-layered Direct-Access File System",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://gitlab.com/yj_ren/aecross",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://bitbucket.org/mlfs/assise-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2020,
    "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
    "badges": [
      "available"
    ],
    "repository_url": "https://www.chameleoncloud.org/experiment/share/15?s=409ab137f20e4cd38ae3dd4e0d4bfa7c",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Nap: A Black-Box Approach to NUMA-Aware Persistent Memory Indexes",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/thustorage/osdi21ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Oort: Efficient Federated Learning via Guided Participant Selection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SymbioticLab/Kuiper",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "NrOS: Effective Replication and Sharing in an Operating System",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://nrkernel.systems/book/benchmarking/ArtifactEvaluation.html",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Optimizing Storage Performance with Calibrated Interrupts",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/amytai/cinterrupts-osdi",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/l-nic/chipyard/tree/nanoPU-artifact-v1.0",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ucbrise/mage",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://ipads.se.sjtu.edu.cn/ae/README_polyjuice.html",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/whjthu/pet-osdi21-ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Scalable Memory Protection in the PENGLAI Enclave",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Penglai-Enclave/Penglai-Enclave-TVM",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/YukeWang96/OSDI21_AE.git",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Rearchitecting Linux Storage Stack for \u00b5s latency and High Throughput",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/resource-disaggregation/blk-switch",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/mit-pdos/goose-nfsd/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "DistInv: Data-Driven Automated Invariant Learning for Distributed Protocols",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://drive.google.com/file/d/1ogBU9KvZsvSRhXerY9Bv-MuiW9oOezBU/view?usp=sharing",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/aurickq/pollux-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/uclasystem/dorylus",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Zeph: Cryptographic Enforcement of End-to-End Data Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/pps-lab/zeph-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "ZNS+: Advanced Zoned Namespace Interface for Supporting In-Storage Zone Compaction",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "http://nyx.skku.ac.kr/?page_id=2808",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "STORM: Refinement Types for Secure Web Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/storm-framework/artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Marius: Learning Massive Graph Embeddings on a Single Machine",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/marius-team/marius/tree/osdi2021",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "CLP: Efficient and Scalable Search on Compressed Text Logs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "http://permalinks.yscope.com/clp-osdi21.tar.gz",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "SANRAZOR: Reducing Redundant Sanitizer Checks in C/C++ Programs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/4655221#.YGU8SEhKhhE"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Modernizing File System through In-Storage Indexing",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/4659803"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Privacy Budget Scheduling",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/columbia/PrivateKube/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Retrofitting High Availability Mechanism to Tame Hybrid Transaction/Analytical Processing",
    "badges": [
      "available"
    ],
    "repository_url": "https://ipads.se.sjtu.edu.cn:1312/opensource/vegito",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "DMon: Efficient Detection and Correction of Data Locality Problems using Selective Profiling",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/efeslab/DMon-AE",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2021,
    "title": "Horcrux: Automatic JavaScript Parallelism for Resource-Efficient Web Computation",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ShaghayeghMrdn/horcrux-osdi21#horcrux",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Demystifying and Checking Silent Semantic Violations in Large Distributed Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/OrderLab/OathKeeper",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "KSplit: Automating Device Driver Isolation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/mars-research/ksplit-cloudlab/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/icanforce/Orion-OSDI22",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Time-Transcendent Debugging the OmniTable Way",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/arquinn/SteamDrill",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Achieving \u03bcs-scale Preemption for Concurrent GPU-accelerated DNN Inferences",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/reef-artifacts",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "BlackBox: Secure Containers on Untrusted Operating Systems using Arm Virtualization Hardware",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/columbia/osdi22-paper162-ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Trinity: Desirable Mobile Emulation through Graphics Projection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/TrinityEmulator/TrinityEmulator",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/thu-pacman/TriCache",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Coffers: Capability-Based Isolation and Sharing for Microservices",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/lsds/intravisor",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "zIO: Accelerating IO-Intensive Applications with Transparent Zero-Copy IO",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/tstamler/zIO",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "UPGRADVISOR: Early Adopting Dependency Updates Using Production Traces",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://figshare.com/s/69057b2bf22e0aa8a645",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/nni/tree/sparta_artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Enabling Storage Harvesting for Improved Storage Utilization in Cloud Platforms",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/breidys2/BlockFlex",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/binpash/pash/blob/osdi22-ae/evaluation/osdi22-eval/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Application-Informed Kernel Synchronization Primitives",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/rs3lab/SynCord",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/mit-pdos/daisy-nfsd",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Operating System Support for Safe and Efficient Auxiliary Executions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/OrderLab/orbit",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Efficient and Scalable Graph Pattern Mining on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/chenxuhao/GraphMiner",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Odinfs: Scaling PM performance with Opportunistic Delegation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/rs3lab/Odinfs",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/flexflow/FlexFlow/tree/osdi2022ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Metastable Failures in the Wild",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/lexiangh/Metastability",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Looking Beyond GPUs for DNN Scheduling on Multi-Tenant Clusters",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/msr-fiddle/synergy",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Cancel Culture in Systems: An Empirical Study of Task Cancellation Patterns and Failures",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/whoisutsav/cancellation-study-osdi",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Roller: Fast and Efficient Tensor Compilation for Deep Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/nnfusion/tree/osdi22_artifact/artifacts",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/mahaoran1997/MemLiner",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Design and Verification of the Arm Confidential Compute Architecture",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/columbia/osdi-paper196-ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Shortstack: Scalable & Fault-tolerant Noise-Injection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/pancake-security/shortstack-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Jawa: Web Archival in the Era of JavaScript",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/goelayu/Jawa",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Parax: Automating Inter- and Intra-Operator Parallelism for Distributed Deep Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/alpa-projects/alpa/tree/osdi22_artifact/osdi22_artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Fast, Automated Inference of Inductive Invariants for Verifying Distributed Protocols",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/VeriGu/Duo",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Immortal Threads: Multithreaded Event-driven Intermittent Computing on Ultra-Low-Power Microcontrollers",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/tinysystems/ImmortalThreads",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "XRP: In-Kernel Storage Functions with eBPF",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/xrp-project/XRP",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Embargo: Data Access Policy Enforcement for Web Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://hub.docker.com/repository/docker/blockaid/ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2022,
    "title": "Automatic Reliability Testing For Cluster Management Controllers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/sieve-project/sieve/tree/osdi-ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Take Out the TraChe: Maximizing (Tra)nsactional Ca(che) Hit",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/audreyccheng/detox",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/MSRSSP/slice-docker-env",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/JZuming/TxCheck",
    "artifact_url": "https://zenodo.org/record/7859034#.ZEbk2s5By4Q"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "EinNet: Optimizing Tensor Programs with Derivation-Based Transformations",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/zhengly123/OSDI23-EinNet-AE",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/ChenxingLi/asb-plotter",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/secure-foundations/ironsync-osdi2023",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Ens\u014d: A Streaming Interface for NIC-Application Communication",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/crossroadsfpga/enso",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Cilantro: A Framework for Performance-Aware Resource Allocation for General Objectives via Online Feedback",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/romilbhardwaj/cilantro",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Security and Performance in the Delegated User-level Virtualization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/IPADS-DuVisor/ae-guide",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/nox-410/Welder_artifacts",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Accelerating Graph Neural Networks with Fine-grained intra-kernel Communication-Computation Pipelining on Multi-GPU Platforms",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/YukeWang96/MGG-OSDI23-AE.git",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Honeycomb: An Secure, Efficient GPU Execution Environment with Minimal TCB",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Jiacheng/honeycomb-osdi23-ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Accountable authentication with privacy protection: The Larch system for universal login",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/edauterman/larch",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Hydro: Surrogate-Based Hyperparameter Tuning Service in the Datacenter",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/S-Lab-System-Group/Hydro",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/lsds/intravisor",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7859181"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Grinder: Analysis and Optimization for Dynamic Control Flow in Deep Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/nnfusion/tree/cocktailer_artifact",
    "artifact_url": "https://doi.org/10.5281/zenodo.7856472"
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Encrypted Databases Made Secure Yet Maintainable",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/zhaoxuyang13/hedb",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "ExoFlow: A Universal Workflow System for Exactly-Once DAGs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/suquark/ExoFlow",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Beta: Statistical Multiplexing with Model Parallelism for Deep Learning Serving",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/alpa-projects/mms/tree/main/osdi23_artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "AutoV: Scaling Machine-Checkable Verification for Large System Software",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/columbia/osdi23-paper114-ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Relational Debugging --- Pinpointing Root Causes of Performance Problems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/jrenx/Perspect/settings",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "VBase: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Catoverflow/VBASE-artifacts",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Optimizing Dynamic Neural Networks with Brainstorm",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Raphael-Hao/brainstorm/tree/osdi2023ae",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Userspace Bypass: Accelerating Syscall-intensive Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/glarer/UserspaceBypass",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Ship your Critical Section Not Your Data: Enabling Transparent Delegation with TCLocks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/rs3lab/TCLocks",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/dmemsys/SMART",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Pelton: Privacy-Compliant Storage For Web Applications By Construction",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/brownsys/K9db/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2023,
    "title": "Nimble: Rollback Protection for Confidential Cloud Services",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/MSRSSP/Nimble",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Data-flow Availability: Achieving Timing Assurance on Autonomous Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/WUSTL-CSPL/Shore-Userspace",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://anonymous.4open.science/r/sarathi-serve-osdi-artifact-5EB8/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Detecting Logic Bugs in Database Engines via Equivalent Expression Transformation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/JZuming/EET",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/Per-Packet-AI/Caravan-Artifact-OSDI24",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Automatic and Efficient Customization of Neural Networks for ML Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/UChi-JCL/chameleonAPI",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Fairness in Serving Large Language Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "git@github.com:Ying1123/VTC-artifact.git",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/vmware-research/verifiable-controllers",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Managing Memory Tiers with CXL in Virtualized Environments",
    "badges": [
      "available"
    ],
    "repository_url": "https://bitbucket.org/yuhong_zhong/memstrata/src/master/",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Sabre: Improving Memory Prefetching in Serverless MicroVMs with Near-Memory Hardware-Accelerated Compression",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/barabanshek/sabre",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "IronSpec: Increasing the Reliability of Formal Specifications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/GLaDOS-Michigan/IronSpec",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "VeriSMo: A Verified Security Module for Confidential VMs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/microsoft/verismo",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Inductive Invariants That Spark Joy: Using Invariant Taxonomies to Streamline Distributed Systems Proofs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/GLaDOS-Michigan/Kondo-Artifact-OSDI24",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/ParrotServe/tree/artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Anon: an FPGA-Based Collective Engine for Distributed Applications",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/Xilinx/ACCL/tree/dev",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/LPD-EPFL/dsig-artifacts",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "\ud835\udf07Slope: High Compression and Fast Search on Semi-Structured Logs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://zenodo.org/records/11069592",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/uclasystem/DRust",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/eniac/Beaver",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/alibaba/llm-scheduling-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/LLMServe/dLoRA-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Performance Interfaces for Hardware Accelerators",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/dslab-epfl/lpn",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "What will it take for Johnny to know when his Cloud job will finish? Towards providing reliable job completion time predictions using PCS",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/abdullahfsm/PCS/tree/osdi2024-artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/Distributed-EPFL/chop-chop-osdi24?tab=readme-ov-file",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Secret Key Recovery in a Global-Scale End-to-End Encryption System",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/vivi/SecureValueRecovery2/tree/artifact/paper_experiments#readme",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "SquirrelFS: using the Rust compiler to check file-system crash consistency",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/hayley-leblanc/squirrelfs",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "USHER: Holistic Interference Avoidance for Resource Optimized ML Inference",
    "badges": [
      "available"
    ],
    "repository_url": "https://github.com/ss7krd/Usher",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Flock: A Framework for Deploying On-Demand Distributed Trust",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/flock-org/flock",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "DistLLM: Disaggregating Prefill and Decoding for Goodput-optimized Large Language Model Serving",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/LLMServe/DistServe/blob/camera-ready/distserve/evaluation/docs/README-AE.md",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Cuber: Constraint-Guided Parallelization Plan Generation for Deep Learning Training",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "http://github.com/microsoft/nnscaler",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/zhaiyi000/tlm",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Bitter: Enabling Efficient Low-Precision Deep Learning Computing through Hardware-aware Tensor Transformation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/microsoft/BitBLAS/tree/osdi24_ladder_artifact",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/lingfenghsiang/Nomad",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "InfiniGen: Efficient Generative Inference of Large Language Models with Dynamic KV Cache Management",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "https://github.com/snu-comparch/InfiniGen",
    "artifact_url": ""
  },
  {
    "conference": "OSDI",
    "category": "systems",
    "year": 2024,
    "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "https://github.com/yiluwusbu/IntOS",
    "artifact_url": ""
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Temporal Vectorization for Stencils",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5151491",
    "paper_url": "https://doi.org/10.1145/3458817.3476149"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "LCCG: A Locality-Centric Hardware Accelerator for High Throughput of Concurrent Graph Processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5155769",
    "paper_url": "https://doi.org/10.1145/3458817.3480854"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Parallel Construction of Module Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5144438",
    "paper_url": "https://doi.org/10.1145/3458817.3476207"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Online Evolutionary Batch Size Orchestration for Scheduling Deep Learning Workloads in GPU Clusters",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5513082",
    "paper_url": "https://doi.org/10.1145/3458817.3480859"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Krill: A Compiler and Runtime System for Concurrent Graph Processing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5165762",
    "paper_url": "https://doi.org/10.1145/3458817.3476159"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Exploiting User Activeness for Data Retention in HPC Systems",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5168853",
    "paper_url": "https://doi.org/10.1145/3458817.3476201"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "LogECMem: Coupling Erasure-Coded In-Memory Key-Value Stores with Parity Logging",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5092219",
    "paper_url": "https://doi.org/10.1145/3458817.3480852"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "KAISA: An Adaptive Second-order Optimizer Framework for Deep Neural Networks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.4895203",
    "paper_url": "https://doi.org/10.1145/3458817.3476152"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Understanding, Predicting and Scheduling Serverless Workloads under Partial Interference",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5147569",
    "paper_url": "https://doi.org/10.1145/3458817.3476215"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Cuttlefish: Library for Achieving Energy Efficiency in Multicore Parallel Programs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5167629",
    "paper_url": "https://doi.org/10.1145/3458817.3476163"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Accelerating XOR-based Erasure Coding using Program Optimization Techniques",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5167006",
    "paper_url": "https://doi.org/10.1145/3458817.3476204"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Accelerating Applications using Edge Tensor Processing Units",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5156431",
    "paper_url": "https://doi.org/10.1145/3458817.3476177"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "On the Parallel I/O Optimality of Linear Algebra Kernels: Near-Optimal Matrix Factorizations",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5168027",
    "paper_url": "https://doi.org/10.1145/3458817.3476167"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "SV-Sim: Scalable PGAS-based State Vector Simulation of Quantum Circuits",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5206960",
    "paper_url": "https://doi.org/10.1145/3458817.3476169"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "DeltaFS: A Scalable No-Ground-Truth Filesystem For Massively-Parallel Computing",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.4884852",
    "paper_url": "https://doi.org/10.1145/3458817.3476148"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Reducing Redundancy in Data Organization and Arithmetic Calculation for Stencil Computations",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.3881644",
    "paper_url": "https://doi.org/10.1145/3458817.3476154"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "CAKE: Matrix Multiplication Using Constant-Bandwidth Blocks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5148715",
    "paper_url": "https://doi.org/10.1145/3458817.3476166"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Hardware-supported Remote Persistence for Distributed Persistent Memory",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5162688",
    "paper_url": "https://doi.org/10.1145/3458817.3476194"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "STM-Multifrontal QR: Streaming Task Mapping Multifrontal QR Factorization Empowered by GCN",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5144709",
    "paper_url": "https://doi.org/10.1145/3458817.3476199"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Clairvoyant Prefetching for Distributed Machine Learning I/O",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5166929",
    "paper_url": "https://doi.org/10.1145/3458817.3476181"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Discovering and Balancing Fundamental Cycles in Large Signed Graphs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5148797",
    "paper_url": "https://doi.org/10.1145/3458817.3476153"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "High Performance Uncertainty Quantification with Parallelized Multilevel Markov Chain Monte Carlo",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5158988",
    "paper_url": "https://doi.org/10.1145/3458817.3476150"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "3D Acoustic-Elastic Coupling with Gravity: The Dynamics of the 2018 Palu, Sulawesi Earthquake and Tsunami",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5159333",
    "paper_url": "https://doi.org/10.1145/3458817.3476173"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Enable Simultaneous DNN Services Based on Deterministic Operator Overlap and Precise Latency Prediction",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5176097",
    "paper_url": "https://doi.org/10.1145/3458817.3476143"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Index Launches: Scalable, Flexible Representation of Parallel Task Groups",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5164404",
    "paper_url": "https://doi.org/10.1145/3458817.3476175"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "PAGANI: A Parallel Adaptive GPU Algorithm for Numerical Integration full strip note",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5204819",
    "paper_url": "https://doi.org/10.1145/3458817.3476198"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Minimizing privilege for building HPC containers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.14396099",
    "paper_url": "https://doi.org/10.1145/3458817.3476187"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Efficient Tensor Core-based GPU Kernels for Structured Sparsity under Reduced Precision",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5136675",
    "paper_url": "https://doi.org/10.1145/3458817.3476182"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Preparing an Incompressible-Flow Fluid Dynamics Code for Exascale-Class Wind Energy Simulations",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.4899910",
    "paper_url": "https://doi.org/10.1145/3458817.3476185"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Efficient Large-Scale Language Model Training on GPU Clusters",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5181820",
    "paper_url": "https://doi.org/10.1145/3458817.3476209"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Pinpointing Crash-Consistency Bugs in the HPC I/O Stack: A Cross-Layer Approach",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5168471",
    "paper_url": "https://doi.org/10.1145/3458817.3476144"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "AgEBO-Tabular: Joint Neural Architecture and Hyperparameter Search with Autotuned Data-Parallel Training for Tabular Data full strip note",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.4094667",
    "paper_url": "https://doi.org/10.1145/3458817.3476203"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Bootstrapping In-situ Workflow Auto-Tuning via Combining Performance Models of Component Applications full strip note",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5003901",
    "paper_url": "https://doi.org/10.1145/3458817.3476197"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Systematically Inferring I/O Performance Variability by Examining Repetitive Job Behavior",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5236852",
    "paper_url": "https://doi.org/10.1145/3458817.3476186"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "MAPA: Multi-Accelerator Pattern Allocation Policy for Multi-Tenant GPU Servers",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5152741",
    "paper_url": "https://doi.org/10.1145/3458817.3480853"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Productivity, Portability, Performance: Data-Centric Python",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5155509",
    "paper_url": "https://doi.org/10.1145/3458817.3476176"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Flare: Flexible In-Network Allreduce",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.4836022",
    "paper_url": "https://doi.org/10.1145/3458817.3476178"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Non-Recurring Engineering (NRE) Best Practices: A Case Study with the NERSC/NVIDIA OpenMP Contract",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5168093",
    "paper_url": "https://doi.org/10.1145/3458817.3476213"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "SEEC: Stochastic Escape Express Channel",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5171429",
    "paper_url": "https://doi.org/10.1145/3458817.3476140"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "APNN-TC: Accelerating Arbitrary Precision Neural Networks on Ampere GPU Tensor Cores",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5144378",
    "paper_url": "https://doi.org/10.1145/3458817.3476157"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Paths to OpenMP in the Kernel",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5164666",
    "paper_url": "https://doi.org/10.1145/3458817.3476183"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "The Hidden cost of the Edge: A Performance Comparison ofEdge and Cloud Latencies",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5163851",
    "paper_url": "https://doi.org/10.1145/3458817.3476142"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Scalable adaptive PDE solvers in arbitrary domains",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5168313",
    "paper_url": "https://doi.org/10.1145/3458817.3476220"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "ZeRO-Infinity: Breaking the GPU Memory Wall for Extreme Scale Deep Learning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5156596",
    "paper_url": "https://doi.org/10.1145/3458817.3476205"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Accelerating large scale de novo metagenome assembly using GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5165333",
    "paper_url": "https://doi.org/10.1145/3458817.3476212"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Online Optimization of File Transfers in High-Speed Networks",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5164277",
    "paper_url": "https://doi.org/10.1145/3458817.3476208"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "In-Depth Analyses of Unified Virtual Memory System for GPU Accelerated Computing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5148930",
    "paper_url": "https://doi.org/10.1145/3458817.3480855"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "HatRPC: Hint-Accelerated Thrift RPC over RDMA",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5203281",
    "paper_url": "https://doi.org/10.1145/3458817.3476191"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Characterization and Prediction of Deep Learning Workloads in Large-Scale GPU Datacenters",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5116412",
    "paper_url": "https://doi.org/10.1145/3458817.3476223"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Reverse-Mode Automatic Differentiation and Optimization of GPU Kernels via Enzyme full strip note",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5147573",
    "paper_url": "https://doi.org/10.1145/3458817.3476165"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "LibShalom: Optimizing Small and Irregular-shaped Matrix Multiplications on ARMv8 Multi-Cores",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5201457",
    "paper_url": "https://doi.org/10.1145/3458817.3476217"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Simurgh: A Fully Decentralized and Secure NVMM User Space File System",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5163624",
    "paper_url": "https://doi.org/10.1145/3458817.3476180"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "HPAC: Evaluating Approximate Computing Techniques on HPC OpenMP Applications.",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5167980",
    "paper_url": "https://doi.org/10.1145/3458817.3476216"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Ribbon: Cost-Effective and QoS-Aware Deep Learning Model Inference using a Diverse Pool of Cloud Computing Instances",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5262865",
    "paper_url": "https://doi.org/10.1145/3458817.3476168"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Lunule: An Agile and Judicious Metadata Load Balancer for CephFS",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5171833",
    "paper_url": "https://doi.org/10.1145/3458817.3476196"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "A Next-Generation Discontinuous Galerkin Fluid Dynamics Solver with Application to High-Resolution Lung Airflow Simulations",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5176507",
    "paper_url": "https://doi.org/10.1145/3458817.3476171"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "LMFF: Efficient and Scalable Layered Materials Force Field on Heterogeneous Many-Core Processors",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5203181",
    "paper_url": "https://doi.org/10.1145/3458817.3476137"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Whale: Efficient One-to-Many Data Partitioning in RDMA-assisted Distributed Stream Processing Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.4897500",
    "paper_url": "https://doi.org/10.1145/3458817.3476192"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "ndzip-gpu: Efficient Lossless Compression of Scientific Floating-Point Data on GPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5144874",
    "paper_url": "https://doi.org/10.1145/3458817.3476224"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "cuTS: Scaling Subgraph Isomorphism on Distributed Multi-GPU Systems Using Trie Based Data Structure",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5154114",
    "paper_url": "https://doi.org/10.1145/3458817.3476214"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Representation of Women in High-Performance Computing Conferences",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.1145/3476480",
    "paper_url": "https://doi.org/10.1145/3458817.3476164"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.1145/3476481",
    "paper_url": "https://doi.org/10.1145/3458817.3476147"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.1145/3476482",
    "paper_url": "https://doi.org/10.1145/3458817.3476206"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.1145/3476483",
    "paper_url": "https://doi.org/10.1145/3458817.3480856"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.1145/3476484",
    "paper_url": "https://doi.org/10.1145/3458817.3476141"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.1145/3476485",
    "paper_url": "https://doi.org/10.1145/3458817.3476221"
  },
  {
    "conference": "SC",
    "category": "systems",
    "year": 2021,
    "title": "Chimera: Efficiently Training Large-Scale Neural Networks with Bidirectional Pipelines",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3458817.3476145"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Boki: Stateful Serverless Computing with Shared Logs",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/ut-osa/boki-benchmarks",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483541",
    "github_url": "https://github.com/ut-osa/boki-benchmarks"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/zlab-purdue/ds-upgrade",
    "artifact_url": "https://github.com/jwjwyoung/DUPChecker",
    "artifact_urls": [
      "https://github.com/jwjwyoung/DUPChecker",
      "https://gitlab.dsrg.utoronto.ca/zhuqi/DUPTester",
      "https://github.com/jwjwyoung/RecentUpgradeFailureStudy",
      "http://nas.dsrg.utoronto.ca:8080/share.cgi?ssid=0Sa7AQ1&fbclid=IwAR2XxgwGi34aP7m-LgnevZBrN4PBW9KRcnTItEtWTNX0s2XpUVP2m3PZykY"
    ],
    "paper_url": "https://doi.org/10.1145/3477132.3483577",
    "github_url": "https://github.com/zlab-purdue/ds-upgrade"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://gitlab.com/hipress/hipress",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483553",
    "github_url": "https://gitlab.com/hipress/hipress"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/VeriGu/sosp-paper211-ae",
    "artifact_url": "https://github.com/VeriGu/usenix-ae-linux",
    "artifact_urls": [
      "https://github.com/VeriGu/usenix-ae-linux",
      "https://github.com/VeriGu/vct-qemu",
      "https://github.com/VeriGu/sosp-paper211-ae-proof"
    ],
    "paper_url": "https://doi.org/10.1145/3477132.3483560",
    "github_url": "https://github.com/VeriGu/sosp-paper211-ae"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "iGUARD: In-GPU Advanced Race Detection",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/csl-iisc/iGUARD",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483545",
    "github_url": "https://github.com/csl-iisc/iGUARD"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/microsoft/Forerunner/",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483564",
    "github_url": "https://github.com/microsoft/Forerunner/"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Crash Consistent Non-Volatile Memory Express",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/thustorage/ccnvme",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483577",
    "github_url": "https://github.com/thustorage/ccnvme"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/casys-kaist/LineFS",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483565",
    "github_url": "https://github.com/casys-kaist/LineFS"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "When Idling is Ideal: Optimizing Tail-Latency for Highly-Dispersed Datacenter Workloads with Pers\u00e9phone",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/maxdml/psp",
    "artifact_url": "https://github.com/maxdml/psp/blob/master/sosp_aec/aec.ipynb",
    "paper_url": "https://doi.org/10.1145/3477132.3483571",
    "github_url": "https://github.com/maxdml/psp"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Exploiting Nil-Externality for Fast Replicated Storage",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://bitbucket.org/aganesan4/skyros/",
    "artifact_url": "https://zenodo.org/record/5520021",
    "paper_url": "https://doi.org/10.1145/3477132.3483543"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/haochenpan/rabia/",
    "artifact_url": "https://www.cloudlab.us/show-profile.php?uuid=1af34047-fb02-11eb-84f8-e4434b2381fc",
    "paper_url": "https://doi.org/10.1145/3477132.3483582",
    "github_url": "https://github.com/haochenpan/rabia/"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Coeus: A system for oblivious document ranking and retrieval",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/ishtiyaque/Coeus_artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483586",
    "github_url": "https://github.com/ishtiyaque/Coeus_artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "FragPicker: A New Defragmentation Tool for Modern Storage Devices",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/jonggyup/FragPicker",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483593",
    "github_url": "https://github.com/jonggyup/FragPicker"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "J-NVM: Off-heap Persistent Objects in Java",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/jnvm-project/jnvm",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483579",
    "github_url": "https://github.com/jnvm-project/jnvm"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Basil: Breaking up BFT with ACID (transactions)",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/fsuri/SOSP21_artifact_eval",
    "artifact_url": "https://www.cloudlab.us/p/morty/SOSP108",
    "paper_url": "https://doi.org/10.1145/3477132.3483552",
    "github_url": "https://github.com/fsuri/SOSP21_artifact_eval"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Scale and Performance in a Filesystem Semi-Microkernel",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/WiscADSL/uFS",
    "artifact_url": "https://research.cs.wisc.edu/adsl/Software/uFS/",
    "paper_url": "https://doi.org/10.1145/3477132.3483581",
    "github_url": "https://github.com/WiscADSL/uFS"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "HeMem: Scalable Tiered Memory Management for Big Data Applications and Real NVM",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://bitbucket.org/ajaustin/hemem/src/sosp-submission/",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483550"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "IODA: A Host/Device Co-Design for Strong Predictability Contract on Modern Flash Storage",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/huaicheng/IODA-SOSP21-AE",
    "artifact_url": "https://asciinema.org/a/431726",
    "paper_url": "https://doi.org/10.1145/3477132.3483573"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "BIDL: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/hku-systems/bidl",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483574",
    "github_url": "https://github.com/hku-systems/bidl"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/sslab-gatech/Rudra-Artifacts",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483570",
    "github_url": "https://github.com/sslab-gatech/Rudra-Artifacts",
    "award": true
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/shsym/mind",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483582",
    "github_url": "https://github.com/shsym/mind"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/karannewatia/Mycelium",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483585",
    "github_url": "https://github.com/karannewatia/Mycelium"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/stanford-futuredata/POP",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483588",
    "github_url": "https://github.com/stanford-futuredata/POP"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/ucbrise/snoopy",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483562",
    "github_url": "https://github.com/ucbrise/snoopy"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/rohankadekodi/WineFS",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483567",
    "github_url": "https://github.com/rohankadekodi/WineFS"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Caracal: Contention Management with Deterministic Concurrency Control",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/uoft-felis/felis",
    "artifact_url": "https://github.com/uoft-felis/felis-controller",
    "paper_url": "https://doi.org/10.1145/3477132.3483591",
    "github_url": "https://github.com/uoft-felis/felis"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "dSpace: Composable Abstractions for Smart Spaces",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/digi-project/sosp21-artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483559",
    "github_url": "https://github.com/digi-project/sosp21-artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "The Aurora Single Level Store Operating System",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/rcslab/aurora-12.1/",
    "artifact_url": "https://github.com/rcslab/aurora/",
    "artifact_urls": [
      "https://github.com/rcslab/aurora/",
      "https://rcs.uwaterloo.ca/aurora/",
      "https://github.com/rcslab/aurora-bench/"
    ],
    "paper_url": "https://doi.org/10.1145/3477132.3483563",
    "github_url": "https://github.com/rcslab/aurora-12.1/"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/SunHao-0/healer",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483547",
    "github_url": "https://github.com/SunHao-0/healer"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Random Walks on Huge Graphs at Cache Efficiency",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/flashmobwalk/flashmob/tree/sosp21-ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483575",
    "github_url": "https://github.com/flashmobwalk/flashmob/tree/sosp21-ae"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/rcstor/rcstor",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483558",
    "github_url": "https://github.com/rcstor/rcstor"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/Raycoms/Kauri-Public",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483584",
    "github_url": "https://github.com/Raycoms/Kauri-Public"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/saramcallister/Kangaroo",
    "artifact_url": "https://github.com/saramcallister/CacheLib-1",
    "paper_url": "https://doi.org/10.1145/3477132.3483568",
    "github_url": "https://github.com/saramcallister/Kangaroo"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/cosmoss-vt/witcher",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483556",
    "github_url": "https://github.com/cosmoss-vt/witcher"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "PACTree: A High Performance Persistent Range Index Using PAC Guidelines",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/cosmoss-vt/pactree",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483589",
    "github_url": "https://github.com/cosmoss-vt/pactree"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Automated SmartNIC Offloading Insights for Network Functions",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/824728350/Clara",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483583",
    "github_url": "https://github.com/824728350/Clara"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/rssys/snowboard",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483549",
    "github_url": "https://github.com/rssys/snowboard"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
    "badges": [
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3477132.3483557"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "Regular Sequential Serializability and Regular Sequential Consistency",
    "badges": [
      "Available"
    ],
    "repository_url": "https://github.com/jmhelt/tapir/tree/spanner",
    "artifact_url": "https://github.com/princeton-sns/gryff/tree/rs",
    "paper_url": "https://doi.org/10.1145/3477132.3483566",
    "github_url": "https://github.com/jmhelt/tapir/tree/spanner"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2021,
    "title": "The Demikernel Library OS Architecture for Microsecond, Kernel-Bypass Datacenter Systems",
    "badges": [
      "Available"
    ],
    "repository_url": "https://github.com/demikernel/demikernel",
    "artifact_url": "https://github.com/demikernel/echo",
    "artifact_urls": [
      "https://github.com/demikernel/echo",
      "https://github.com/demikernel/demikernel/tree/osdi-legacy-code",
      "https://www.cloudlab.us/p/Demeter/testing-pair/9"
    ],
    "paper_url": "https://doi.org/10.1145/3477132.3483569",
    "github_url": "https://github.com/demikernel/demikernel"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/xlab-uiuc/acto/tree/sosp-ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613161",
    "github_url": "https://github.com/xlab-uiuc/acto/tree/sosp-ae"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Bagpipe: Accelerating Deep Recommendation Model Training",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/iidsample/bagpipe_artifacts",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613142",
    "github_url": "https://github.com/iidsample/bagpipe_artifacts"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/deeptir18/cornflakes",
    "artifact_url": "https://www.cloudlab.us/p/955539a31b0c7be330933414edd8d4af54f7dbec",
    "artifact_urls": [
      "https://www.cloudlab.us/p/955539a31b0c7be330933414edd8d4af54f7dbec",
      "https://github.com/deeptir18/cornflakes-scripts"
    ],
    "paper_url": "https://doi.org/10.1145/3600006.3613137",
    "github_url": "https://github.com/deeptir18/cornflakes"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/dmemsys/Ditto",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613144",
    "github_url": "https://github.com/dmemsys/Ditto"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Edna: Disguising and Revealing User Data in Web Applications",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/tslilyai/edna/tree/artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613146",
    "github_url": "https://github.com/tslilyai/edna/tree/artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/sosp-ae-39/sosp-ae-astra",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613165",
    "github_url": "https://github.com/sosp-ae-39/sosp-ae-astra"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/vmexit/trio-sosp23-ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613171",
    "github_url": "https://github.com/vmexit/trio-sosp23-ae"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Falcon: Fast OLTP Engine for Persistent Cache and Non-Volatile Memory",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/madsys-dev/Falcon",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613141",
    "github_url": "https://github.com/madsys-dev/Falcon"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "FIFO Queues are All You Need for Cache Eviction",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/Thesys-lab/sosp23-s3fifo",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613147",
    "github_url": "https://github.com/Thesys-lab/sosp23-s3fifo"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/zhuangwang93/SOSP-30_AE",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613145",
    "github_url": "https://github.com/zhuangwang93/SOSP-30_AE"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Grove: a Separation-Logic Library for Verifying Distributed Systems",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/mit-pdos/grove-artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613172",
    "github_url": "https://github.com/mit-pdos/grove-artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/gpzlx1/gsampler-artifact-evaluation",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613168",
    "github_url": "https://github.com/gpzlx1/gsampler-artifact-evaluation"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Halfmoon: Log-Optimal Fault-Tolerant Stateful Serverless Computing",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/pkusys/Halfmoon-bench",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613154",
    "github_url": "https://github.com/pkusys/Halfmoon-bench"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Mira: A Program-Behavior-Guided Far Memory System",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://bitbucket.org/mira-sosp23/mira-ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613157",
    "github_url": "https://bitbucket.org/mira-sosp23/mira-ae"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Oobleck: Resilient Distributed Training of Large Models Using Pipeline Templates",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/SymbioticLab/oobleck",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613152",
    "github_url": "https://github.com/SymbioticLab/oobleck"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Paella: Low-latency Model Serving with Software-defined GPU Scheduling",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/eniac/paella/tree/sosp23_artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613163",
    "github_url": "https://github.com/eniac/paella/tree/sosp23_artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/madsys-dev/sosp-paper19-ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613135",
    "github_url": "https://github.com/madsys-dev/sosp-paper19-ae"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/microsoft/SparTA/tree/pit_artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613139",
    "github_url": "https://github.com/microsoft/SparTA/tree/pit_artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Private Web Search with Tiptoe",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/ahenzinger/tiptoe",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613134",
    "github_url": "https://github.com/ahenzinger/tiptoe"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Sia: Heterogeneity-Aware, Goodput-Optimized ML-Cluster Scheduling",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/siasosp23/artifacts/tree/main",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613175",
    "github_url": "https://github.com/siasosp23/artifacts/tree/main"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/rssys/snowcat",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613148",
    "github_url": "https://github.com/rssys/snowcat"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/SPFresh/SPFresh",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613166",
    "github_url": "https://github.com/SPFresh/SPFresh"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Turbo: Effective Caching in Differentially-Private Databases",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/columbia/turbo-artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613174",
    "github_url": "https://github.com/columbia/turbo-artifact"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "UGACHE: A Unified GPU Cache for Embedding-based Deep Learning",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/SJTU-IPADS/ugache-artifacts",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613169",
    "github_url": "https://github.com/SJTU-IPADS/ugache-artifacts"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Achieving Microsecond-Scale Tail Latency Efficiently with Approximate Optimal Scheduling",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/m8/concord",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613136",
    "github_url": "https://github.com/m8/concord"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Antipode: Enforcing Cross-Service Causal Consistency in Distributed Applications",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/Antipode-SOSP23",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613176",
    "github_url": "https://github.com/Antipode-SOSP23"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://gitlab.mpi-sws.org/cld/blueprint/blueprint-compiler",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613138",
    "github_url": "https://gitlab.mpi-sws.org/cld/blueprint/blueprint-compiler"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "MEMTIS: Efficient Memory Tiering with Dynamic Page Classification and Page Size Determination",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/cosmoss-jigu/memtis",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613167",
    "github_url": "https://github.com/cosmoss-jigu/memtis"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Pushing Performance Isolation Boundaries into Application with pBox",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/OrderLab/pBox",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613159",
    "github_url": "https://github.com/OrderLab/pBox"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/dedis/quepaxa/",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613150",
    "github_url": "https://github.com/dedis/quepaxa/"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/breidys2/RackBlox",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613170",
    "github_url": "https://github.com/breidys2/RackBlox"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/efeslab/siloz",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613143",
    "github_url": "https://github.com/efeslab/siloz"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Validating JIT Compilers via Compilation Space Exploration",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://doi.org/10.5281/zenodo.8188346",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613140",
    "github_url": "https://doi.org/10.5281/zenodo.8188346"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2023,
    "title": "Flexible Advancement in Asynchronous BFT Consensus",
    "badges": [
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3600006.3613164"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Fast, Flexible, and Practical Kernel Extensions",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/rs3lab/KFlex",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695950"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Practical Verification of System-Software Components Written in Standard C",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/dslab-epfl/tpot",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695980"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/VirtualSoC/vsoc/tree/artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695946"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Verus: A Practical Foundation for Systems Verification",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/verus-lang/paper-sosp24-artifact/blob/main/site/guide.md",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695952"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/anishathalye/parfait-hsm",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695956"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Caribou: Fine-Grained Geospatial Shifting of Serverless Applications for Sustainability",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/ubc-cirrus-lab/caribou",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695954"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Ozz: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/casys-kaist/ozz_artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695944"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Reducing Energy Bloat in Large Model Training",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/ml-energy/zeus/tree/kronos",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695970"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/dmemsys/CHIME",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695959"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/columbia/cookiemonster",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695965"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/LoongServe/LoongServe",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695948"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "LazyLog: A New Shared Log Abstraction for Low-Latency Applications",
    "badges": [
      "Available",
      "Functional"
    ],
    "repository_url": "https://github.com/dassl-uiuc/LazyLog-Artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695983"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/switch-container",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695967"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
    "badges": [
      "Available"
    ],
    "repository_url": "https://github.com/ChaseLab-PKU/BIZA",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695953"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/huzhisheng/Aceso",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695951"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/LPD-EPFL/swarm-artifacts",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695945"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/kungfu-team/tenplex/tree/sosp24-artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.369597"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Autobahn: Seamless high speed BFT",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/neilgiri/autobahn-artifact",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695942"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Dirigent: Lightweight Serverless Orchestration",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/eth-easl/dirigent",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695966"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Skyloft: A General High-Efficient Scheduling Framework in User Space",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/yhtzd/skyloft-sosp24-ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695973"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Fast Core Scheduling with Userspace Process Abstraction",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/neolinsu/sosp24ae",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695976"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/microsoft/nnfusion",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695961"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Tiered Memory Management: Access Latency is the Key!",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/host-architecture/colloid",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695968"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "SilvanForge: A Schedule-Guided Retargetable Compiler for Decision Tree Inference",
    "badges": [
      "Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "https://github.com/asprasad/treebeard/tree/silvanforge",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695958"
  },
  {
    "conference": "SOSP",
    "category": "systems",
    "year": 2024,
    "title": "Unearthing Semantic Checks for Cloud Infrastructure-as-Code Programs",
    "badges": [
      "Available"
    ],
    "repository_url": "https://github.com/824728350/Zodiac/tree/master",
    "artifact_url": "",
    "paper_url": "https://doi.org/10.1145/3694715.3695974"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "A Secure Mobile Authentication Alternative To Biometrics",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/casprlab/ai.lock",
    "paper_url": "https://www.acsac.org/2017/program-files/s144.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Automated Analysis Of Secure Internet Of Things Protocols",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jun-kim/Automated-security-verification-of-IoT-protocols",
    "paper_url": "https://www.acsac.org/2017/program-files/s189.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Decanter: Detection Of Anomalous Outbound Http Traffic By Passive Application Fingerprinting",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://scs.ewi.utwente.nl/downloads/show,Data%20Exfiltration%20Malware%20(DEM)/ https://github.com/rbortolameotti/decanter",
    "paper_url": "https://www.acsac.org/2017/program-files/s72.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Grid Shock: Coordinated Load-change Attacks On Power Grids",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://seclab.tuwien.ac.at/people/atrox/gridshock-dabrowski.zip",
    "paper_url": "https://www.acsac.org/2017/program-files/s259.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Kakute: A Precise, Unified Information Flow Analysis System For Big-data Security",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hku-systems/kakute",
    "paper_url": "https://www.acsac.org/2017/program-files/s78.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Measuring Popularity Of Cryptographic Libraries In Internet-wide Scans",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://crocs.fi.muni.cz/public/papers/acsac2017 https://github.com/crocs-muni/classifyRSAkey",
    "paper_url": "https://www.acsac.org/2017/program-files/s106.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Picky Attackers: Quantifying The Role Of System Properties On Intruder Behavior",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/uc?id=1q5jZin2KozCnkX-PDVleEU7dqybbGX4S&export=download",
    "paper_url": "https://www.acsac.org/2017/program-files/s115.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Quasar: Quantitative Attack Space Analysis And Reasoning",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/open?id=1aLmAwEXR1g3hAJeQwThn6JDpOI6Ff_u_",
    "paper_url": "https://www.acsac.org/2017/program-files/s225.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Secure And Efficient Software-based Attestation For Industrial Control Devices With Arm Processors",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://www.illinois.adsc.com.sg/attestation/Attestation-ADSC-Release-2017.zip",
    "paper_url": "https://www.acsac.org/2017/program-files/s175.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Spinner: Semi-automatic Detection Of Pinning Without Hostname Verification (or Why 10m Bank Users Were Vulnerable)",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ChrisMcMStone/spinner",
    "paper_url": "https://www.acsac.org/2017/program-files/s206.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Supplementing Modern Software Defenses With Stack-pointer Sanity",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bingseclab/spiglass",
    "paper_url": "https://www.acsac.org/2017/program-files/s274.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2017,
    "title": "Vulcan: Efficient Component Authentication And Software Isolation For Automotive Control Networks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://distrinet.cs.kuleuven.be/software/vulcan/ https://github.com/sancus-pma/vulcan/",
    "paper_url": "https://www.acsac.org/2017/program-files/s183.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://docs.google.com/spreadsheets/d/1K2Y5PH1jIhhIbf_8FDb2YvqZTHFLNHjzlY75QiOYs90/edit?usp=sharing",
    "paper_url": "https://www.acsac.org/2018/program-files/s125.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "An Extensive Evaluation of the Internet's Open Proxies",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://openproxies-acsac18.github.io/",
    "paper_url": "https://www.acsac.org/2018/program-files/s113.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "An Historical Analysis of the SEAndroid Policy Evolution",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://imbumjin.github.io/gitmining_sepolicy.tar.gz",
    "paper_url": "https://www.acsac.org/2018/program-files/s99.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Analyzing Cache Side Channels Using Deep Neural Networks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tianweiz07/DeepLearningSideChannel",
    "paper_url": "https://www.acsac.org/2018/program-files/s131.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dedos-project/DeDOS",
    "paper_url": "https://www.acsac.org/2018/program-files/s200.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MAIAN-tool/MAIAN",
    "paper_url": "https://www.acsac.org/2018/program-files/s267.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/drakvuf-on-arm/drakvuf-on-arm",
    "paper_url": "https://www.acsac.org/2018/program-files/s17.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jallen89/pikadroid.git",
    "paper_url": "https://www.acsac.org/2018/program-files/s268.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "MicroWalk: A Framework for Finding Side Channels in Binaries",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UzL-ITS/Microwalk",
    "paper_url": "https://www.acsac.org/2018/program-files/s264.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://itrust.sutd.edu.sg/research/dataset/dataset_characteristics/#swat",
    "paper_url": "https://www.acsac.org/2018/program-files/s280.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Obscuro: A Bitcoin Mixer using Trusted Execution Environments",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BitObscuro/Obscuro",
    "paper_url": "https://www.acsac.org/2018/program-files/s300.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/christoftorres/Osiris",
    "paper_url": "https://www.acsac.org/2018/program-files/s245.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Practical Integrity Protection with Oblivious Hashing",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tum-i22/sip-oblivious-hashing/tree/acsac",
    "paper_url": "https://www.acsac.org/2018/program-files/s224.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "SENSS Against Volumetric DDoS Attacks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://steel.isi.edu/projects/SENSS/ACSAC2018/",
    "paper_url": "https://www.acsac.org/2018/program-files/s142.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Shredder: Breaking Exploits through API Specialization",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shach33/shredder",
    "paper_url": "https://www.acsac.org/2018/program-files/s43.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.1436828",
    "paper_url": "https://www.acsac.org/2018/program-files/s186.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "SmarTor: Smarter Tor with Smart Contracts",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://greubelhome.ddns.net/index.php/s/NY2BxWnd88LP8XN",
    "paper_url": "https://www.acsac.org/2018/program-files/s170.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mohsinjuni/statedroid",
    "paper_url": "https://www.acsac.org/2018/program-files/s62.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "TIFF: Using Input Type Inference To Improve Fuzzing",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://www.vusec.net/projects/#testing",
    "paper_url": "https://www.acsac.org/2018/program-files/s271.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-SysSec/PrimGen",
    "paper_url": "https://www.acsac.org/2018/program-files/s177.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Type-after-Type: Practical and Complete Type-Safe Memory Reuse",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/type-after-type",
    "paper_url": "https://www.acsac.org/2018/program-files/s50.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2018,
    "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sefcom/Wi-Fi-Calling-scource-code",
    "paper_url": "https://www.acsac.org/2018/program-files/s320.html"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "A Game of \"Cut and Mouse\": Bypassing Antivirus by Simulating User Inputs",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359844"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Co-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUs",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://bitbucket.org/mpastyl/acsac_pattern_matching_benchmark_opencl/src/master/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359811"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Detecting organized eCommerce fraud using scalable categorical clustering",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SSGAalto/recagglo",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359810"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Function Boundary Detection in Stripped Binaries",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CenterforSecureAndDependableSystems/FunctionBoundary",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359825"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "FuzzBuilder: Automated building greybox fuzzing environment for C/C++ library",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hksecurity/FuzzBuilder",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359846"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "JStap: A Static Pre-Filter for Malicious JavaScript Detection",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Aurore54F/JStap",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359813"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Koinonia: Verifiable E-Voting with Long-term Privacy",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gehuangyi20/Koinonia",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359804"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Model Inversion Attacks Against Collaborative Inference",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zechenghe/Inverse_Collaborative_Inference",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359824"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Imtiazkarimik23/ATFuzzer",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359833"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Out of Control: Stealthy Attacks Against Robotic Vehicles Protected by Control-based Techniques",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DependableSystemsLab/stealthy-attacks",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359847"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "PDoT: Private DNS-over-TLS with TEE Support",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sprout-uci/PDoT",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359793"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://dx.doi.org/10.5281/zenodo.3384814",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359842"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Proof of Aliveness",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ChengluJin/Proof_of_Aliveness",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359827"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Revisiting Utility Metrics for Location Privacy-Preserving Mechanisms",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vrt1shjwlkr/Ride-Hailing-Service-Emulator",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359829"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "SIP Shaker: Software Integrity Protection Composition",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mr-ma/sip-shaker-artifact/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359848"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/garrisongys/STRIP",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359790"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "SecDATAVIEW: A Secure Big Data Workflow Management System for Heterogeneous Computing Environments",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shiyonglu/SecDATAVIEW",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359827"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ibm-research/speculator",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359837"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "Will You Trust This TLS Certificate? Perceptions of People Working in IT",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://crocs.fi.muni.cz/public/papers/acsac2019",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359800"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2019,
    "title": "WooKey: Designing a Trusted and Efficient USB Device",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://wookey-project.github.io/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3359789.3359802"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "AVclass2: Massive Malware Tag Extraction from AV Labels",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/malicialab/avclass",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427261"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/apphackuno/OAGen",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427244"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/scy-phy/ICS-Evasion-Attacks",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427660"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/egueler/cupid-artifact-eval",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427266"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/piano-man/DPIFuzz",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427662"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wangxiaodiu/DeepSim",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427254"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gwusec/2020-ACSAC-Double-Pattern-Artifacts",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427252"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.inria.fr/ddealmei/poc-iwd-acsac2020",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427295"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Faulty Point Unit: ABI Poisoning Attacks on Intel SGX",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fritzalder/faulty-point-unit",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427270"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://februustrojandefense.github.io/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427264"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/messlabnyu/heap-expo/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427645"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/voice-assistant-research/voice-assistant",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427250"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "On the Feasibility of Automating Stock Market Manipulation",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/carter-yagemann/Bot2Stock",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427241"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SMC-SMU/Accountable-Blockchain-Rewriting",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427247"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Practical Fine-Grained Binary Code Randomization+",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "http://seclab.cs.sunysb.edu/soumyakant/acsac-artifact.tar.gz",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427292"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cryspuwaterloo/OT-MP-PSI",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427267"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Privacy-Preserving Production Process Parameter Exchange",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/COMSYS/parameter-exchange",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427248"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Quantifying measurement quality and load distribution in Tor",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://go.uniwue.de/20",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427238"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "RusTEE: Developing Memory-Safe ARM TrustZone Applications",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sccommunity/rust-optee-trustzone-sdk",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427262"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.tue.nl/saibersoc/acsac2020-artifacts/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427233"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Security Study of Service Worker Cross-Site Scripting.",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://u.tamu.edu/sw-scanner",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427290"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/yang-sec/CAN-SessionKey",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427278"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://bitbucket.org/user-lab/oesch2020understanding/src/master/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427275"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Up2Dep: Android Tool Support to Fix Insecure Code Dependencies",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ngcuongst/up2dep",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427658"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/m3mmar/VerifyRevive",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427253"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2020,
    "title": "ZeroAUDIT",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/xfu2006/ACSAC20_Artifact",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3427228.3427249"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "A formal analysis of IKEv2's post-quantum extension",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mnm-team/tamarin-ikev2",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485885"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://commandergabble.info/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485892"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Detecting Audio Adversarial Examples with Logit Noising",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/namgyupark22/_Detecting_Audio_Adversarial_Examples_with_Logit_Noising",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485912"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/file/d/1NXgE7zZmZdT1dPtbAkhNuxuETBU0p1xL/view?usp=sharing",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488008"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "FlexFilt: Towards Flexible Instruction Filtering for Security",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bu-icsg/FlexFilt",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488019"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/intellisec/lasershark",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485911"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/soeai/MAppGraph",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485925"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ahma-hub https://zenodo.org/record/5414107",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485894"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "ReCFA: Resilient Control-Flow Attestation",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/suncongxd/ReCFA",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485900"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/totoR13/MARVEL",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488021"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ru37z/socbed-acsac-2021",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488020"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FoRTE-Research/RingRAM",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485905"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Kaelus/Rocky",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485886"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Sipster: Settling IOU Privately and Quickly with Smart Meters",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MobiSec-CSE-UTA/Sipster",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488029"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MingyuanGao/TEEKAP",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485919"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ssloxford/they-see-me-rollin",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488016"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sohaib730/Argus-Adversarial_Detection",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3485904"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "VIA: Analyzing Device Interfaces of Protected Virtual Machines",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/file-citas/via",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488011"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://www.dropbox.com/sh/yzbsw0hwok84wdt/AAANthZlzQuse8Tegjf4yQ0Ea?dl=0",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488030"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2021,
    "title": "argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/projectbtle/argXtract",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3485832.3488007"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "A Qualitative Evaluation of Reverse Engineering Tool Usability",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/James-Mattei/RE-Tool-Usability-Artifacts",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567993"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/artifact11/Alphuzz_overview.git",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564660"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Analysis of Payment Service Provider SDKs in Android",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wspr-ncsu/aardroid",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564641"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "ArchiveSafe LT: Secure Long-term Archiving System",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/moesabry/ACSAC22-Artifacts",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564635"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/scy-phy/ICS_Generic_Concealment_Attacks",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564633"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://sites.google.com/view/bayesmem/home",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564638"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/AgrAmplifierAE/AgrAmp",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564658"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/OxHainan/cloak.git",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567995"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CryptoGoIIE/cryptogo",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567989"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/soarsmu/Curiosity_in_Adversarial_Policy",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564636"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "DF-SCA: Dynamic Frequency Side Channel Attacks are Practical",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Diptakuet/DF-SCA-Dynamic-Frequency-Side-Channel-Attacks-are-Practical",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567979"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "DeView: Confining Progressive Web Applications by Debloating Web APIs",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shivamidow/deview",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567987"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Designing a Provenance Analysis for SGX Enclaves",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tregua87/sgxmonitor-artifact",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567994"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://gitee.com/yjasper/dit-detector",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567982"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Drone Authentication via Acoustic Fingerprint",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://gitfront.io/r/user-4171440/bJkdSdUFd9b6/authentication-ACSAC/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564653"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/X1anWang/ENIDrift-Artifact",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567992"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://bitbucket.org/sts-lab/faust",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567990"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Formal Modeling and Security Analysis for Intra-level Privilege Separation",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gyg128/Privilege-Centric-Model",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567984"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cheh2/ACSAC-Artifacts",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564654"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MohamadMansouri/fault-tolerant-secure-agg",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3568135"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wxt406611016/MDR",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564661"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ZJU-SEC/MANTA",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564634"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/xujing1994/bkd_fedgnn",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567999"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/drive/folders/1ZnHr28Quk7OiGv8c-o63aecr0KS-GOUh?usp=sharing",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564643"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ucsb-seclab/popkorn-artifact/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564631"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zhengjieyu/Dilithium-smallpoly",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564629"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/asw0316/binshot",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567975"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DominikRoy/PPTM",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564626"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Randezvous: Making Randomization Effective on MCUs",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/URSec/Randezvous",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567970"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Reconstruction Attack on Differential Private Trajectory Protection Mechanisms",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/erik-buchholz/RAoPT",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564628"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RICSecLab/SLOPTAFLpp",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564659"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/fuzzbench-snappy",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564639"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://spacephish.github.io/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567980"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Spacelord: Private and Secure Smart Space Sharing",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://project-spacelord.github.io/acsac22-ae/",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564637"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ning-wang1/DPFedMeta",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564652"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/StateDiver/StateDiver",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564650"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lucamrgs/MUDscope",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564644"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sus0pid/BowTie-Artifacts",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567996"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Transformer-Based Language Models for Software Vulnerability Detection",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://bitbucket.csiro.au/users/jan087/repos/acsac-2022-submission/browse",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567985"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/treble-h/trebiz",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567976"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/typro-type-propagation/TyPro-CFI/blob/master/ArtifactEvaluation.md",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3564627"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "User Perceptions of Five-Word Passwords",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gwusec/2022-ACSAC-Five-word-Passwords",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567981"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2022,
    "title": "User Perceptions of the Privacy and Usability of Smart DNS",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/GUSecLab/smartdns-study",
    "paper_url": "https://dl.acm.org/doi/pdf/10.1145/3564625.3567978"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://sites.google.com/view/andetect"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mnm678/artemis-artifacts"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/farabimahmud/aok_ae"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UHH-ISS/binary-sight-seeing"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/xq37z/?view_only=00c450b4baef41979eae73f9c971e095"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "DOPE: DOmain Protection Enforcement with PKS",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://extgit.iaik.tugraz.at/sesys/dope"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/qkrtjsgp08/DeepTaster"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hunie-son/DefWeb"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/revtls/revtls"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Detecting Weak Keys in Manufacturing Certificates: A Case Study",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/andrewchi/mercury/blob/acsac23/doc/batch-gcd.md"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Detection of Anomalies in Electric Vehicle Charging Sessions",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://code.fbi.h-da.de/seacop/ev-charging-ids-data-sets/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Differentially Private Resource Allocation",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dpra-dp/dpra"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Domain and Website Attribution beyond WHOIS",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://hub.docker.com/repository/docker/dianecode/whosedomain/general"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/FLARE-04F8/README.md"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/anonymouspapers8/FLEDGE"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://www.kaggle.com/datasets/emerald101/from-attachments-to-seo"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/bcndetection-55E0"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/didnet/Hades"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/lppd-CC94/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Jbai795/Mostree-pub"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "No Forking Way: Detecting Cloning Attacks on Intel SGX Applications",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SamiraBriongos/Clonebuster/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "OAuth 2.0 Redirect URI Validation Falls Short",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/innotommy/OAuthpaper-code"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "On the Detection of Image-Scaling Attacks in Machine Learning",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/EQuiw/2023-detection-scalingattacks.git"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7945511"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "PAVUDI: Patch-based Vulnerability Discovery using Machine Learning",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SAP-samples/security-research-taintgraphs/tree/main/PAVUDI"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
    "badges": [
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/PSP-Mal-1B74"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tkoide398/PhishReplicant"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Poisoning Network Flow Classifiers",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ClonedOne/poisoning_network_flow_classifiers"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Protecting Your Voice from Speech Synthesis Attacks",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/projectcejorp/project"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tum-itsec/randcompile"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Remote Attestation of Confidential VMs Using Ephemeral vTPMs",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/svsm-vtpm/SVSM-vTPM-artifacts"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Remote Attestation with Constrained Disclosure",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DominikRoy/RACD/tree/master"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tsinghua-ideal/TEMPER-Secure-MLaaS.git"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alipay/Antchain-MPC/tree/sec_softmoid"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cplappert/update-reporting"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles",
    "badges": [
      "reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cplappert/update-distribution"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
    "badges": [
      "reusable",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/fuzzbench-triereme"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2023,
    "title": "When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wpctsh/artifacts"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RIT-CHAOS-SEC/TRACES"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/intensity_detection-B461"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ch3ny1/AdvTraj_ID_Transfer/tree/main"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: Understanding Hyperparameter Effects in DP-SGD",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kit-ps/R-R-Understanding-Hyperparameter-Effects-in-DP-SGD"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "ConProv: A Container-Aware Provenance System for Attack Investigation",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/XiaoXiaoGuaiXiaShi/conprov"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "T-Edge: Trusted Heterogeneous Edge Computing",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/T-Edge/t-edge"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/paper-review-5C71"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Faking deduplication to prevent timing side-channel attacks on memory deduplication",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://www.dropbox.com/scl/fi/ldgwvte9ud2egj8xl25y3/ACSAC2024-Artifact-1.zip?rlkey=axfmzm5gqpxcsk4ngyjnrkx58&st=cwip9nw4&dl=0"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zlab-pub/SecurityHub"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zhenzhilai/ACSAC_ML_SCA_EVA/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/drive/folders/1GP56aoQds2gvlAliroSFGDturLefFSgv"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ssloxford/assault_and_battery"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: Towards Reliable and Generalizable Differentially Private Machine Learning",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wenxuan-Bao/Reliable-and-Generalizable-DPML"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RouTEE-SGX/rouTEE/tree/artifact"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/matrioska/README.md"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/plll4zzx/mip_watermark_stealing"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zlab-pub/WiShield"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "AirBugCatcher: Automated Wireless Reproduction of IoT Bugs",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/air-bug-catcher-E5C2"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/acsac_artifacts-F0D2/README.md"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/WEL-MIA-F46A/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/NomadShen/chipwhisperer https://github.com/NomadShen/fpga_based_attack"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/s/afd0ca190edd1e7f2193"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Link Inference Attacks in Vertical Federated Graph Learning",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/LIA-VFGL/LIA-VFGL-ACSAC"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
    "badges": [
      "reviewed"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/AdelaideAuto-IDLab/PhysicalBackdoorDetectors"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RIT-CHAOS-SEC/SpecCFA"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wangwwno1/Project-VIMU"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/graphMatching-EBE5/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/freeauth-543F/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/irqguard"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/PLA-AP/PLA/tree/main"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Single Sign-On Privacy: We Still Know What You Did Last Summer",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://sso-privacy-leak.info"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kleftog/sidecar-ae"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/vaktble-ble-defender/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: Security Vulnerability Dataset Quality Is Critical",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Anurag-Swarnim-Yadav/Security-Vulnerability-Repair"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BasantaChaulagain/faseal"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vt-asaplab/e-SeaFL/tree/ACSAC_2024"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Privacy-Preserving Verifiable Neural Network Inference Service",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vt-asaplab/vPIN/tree/ACSAC_2024"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SimaArasteh/binhuntertool"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Anonymouous0/FedCAP"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Manifest Problems: Analyzing Code Transparency for Android Application Bundles",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/asit-fdraschbacher/artifacts_manifest_problems"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Model-Manipulation Attacks Against Black-Box Explanations",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/achyuthegde/xai-backdoors-makrut"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cryptobinarybenchmark/CryptoBinary-Benchmarks"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://gitfront.io/r/user-5409342/8LbaoHMLR6nL/ViTGuard/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Leaky-Autofill/LeakyAutofill-Artifact"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/tattooed_artifact_evaluation-7870/README.md"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "SECvma: Virtualization-based Linux Kernel Protection for Arm",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ae-acsac24-44/acsac24-paper240-ae.git"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.tue.nl/aiss"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/cryptopyt-1CC6/README.md"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "I'll Be There for You! Perpetual Availability in the A^8 MVX System",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://1drv.ms/u/s!AhnNtaOjydZKb1_xHC_42hvxojw?e=csCS2o"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/censorship-event-detection/acsac-censorship-event-detection"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/anonymous-anonymous-dev/AGSD.git"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "Practical Light Clients for Committee-Based Blockchains",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/research-project-G8KJ41/"
  },
  {
    "conference": "ACSAC",
    "category": "security",
    "year": 2024,
    "title": "BlueScream: Screaming Channels on Bluetooth Low Energy",
    "badges": [
      "reproducible"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pierreay/screaming_channels_ble/blob/main/docs/demo_20240828_acsac/README.md"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a1/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a2/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "The design of scalar AES Instruction Set Extensions for RISC-V",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a3/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a4/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a5/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Fixslicing AES-like ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a6/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "NTT Multiplication for NTT-unfriendly Rings: New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a7/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a8/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "MFault Attacks on CCA-secure Lattice KEMs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a9/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Time-Memory Analysis of Parallel Collision Search Algorithms",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a10/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Online Template Attacks: Revisited: PoC: emulated single-trace attack on wolfSSL scalar multiplication",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a11/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a12/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Breaking Masked Implementations with Many Shares on 32-bit Software Platforms: or When the Security Order Does Not Matter",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a13/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Breaking CAS-Lock and Its Variants by Exploiting Structural Traces",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a14/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "ROTed: Random Oblivious Transfer for embedded devices",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a15/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "FIVER \u2013 Robust Veri\ufb01cation of Countermeasures against Fault Injections",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a16/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Side-Channel Protections for Picnic Signatures",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a17/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Rainbow on Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a18/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "Higher-Order Lookup Table Masking in Essentially Constant Memory",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a19/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2021,
    "title": "CTIDH: faster constant-time CSIDH",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2021/a20/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Practical Multiple Persistent Faults Analysis",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a1/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a2/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a3/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a4/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a5/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Quantum Period Finding against Symmetric Primitives in Practice",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a6/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a7/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a8/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a9/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a10/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "BreakMi: Reversing, Exploiting, and Fixing Xiaomi Fitness Tracking Ecosystem",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a11/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Don\u2019t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a12/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "A Security Model for Randomization-based Protected Caches",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a13/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a14/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "VERICA - Verification of Combined Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a15/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a16/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a17/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a18/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "PROLEAD - A Probing-Based Hardware Leakage Detection Tool",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a19/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, Saber, and NTRU",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a20/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a21/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Faster constant-time decoder for MDPC codes and applications to BIKE KEM",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a22/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a23/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a24/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2022,
    "title": "SoC Root Canal!",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2022/a25/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "A Faster Third-Order Masking of Lookup Tables",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a1/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a2/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "SoK: SCA-secure ECC in software \u2013 mission impossible?",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a4/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "On Protecting SPHINCS+ Against Fault Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a5/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a6/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a8/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "\"Whispering MLaaS\" \u2013 Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a9/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a10/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Oil and Vinegar: Modern Parameters and Implementations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a11/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Formally verifying Kyber \u2013 Episode IV: Implementation correctness",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a12/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a13/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a14/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Separating Oil and Vinegar with a Single Trace \u2013 Side-Channel Assisted Kipnis-Shamir Attack on UOV",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a15/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a16/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "PROLEAD_SW \u2013 Probing-Based Software Leakage Detection for ARM Binaries",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a17/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations \u2013 Towards Analytical Attacks against 32-bit Implementations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a18/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Enhancing Quality and Security of the PLL-TRNG",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a19/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2023,
    "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2023/a22/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Who Watches the Watchers: Attacking Glitch Detection Circuits",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a1/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a2/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a3/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a4/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a5/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Fast and Clean: Auditable high-performance assembly via constraint solving",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a6/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a7/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a8/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a9/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a10/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Impact of the Flicker Noise on the Ring Oscillator-based TRNGs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a11/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a12/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "High-Performance Design Patterns and File Formats for Side-Channel Analysis",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a13/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a14/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a15/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a16/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a17/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a18/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Correction Fault Attacks on Randomized CRYSTALS-Dilithium",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a19/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Time Sharing - A Novel Approach to Low-Latency Masking",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a20/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a21/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a22/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "COMPRESS: Generate Small and Fast Masked Pipelined Circuits",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a23/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a24/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a25/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a26/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a27/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a28/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a29/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2024,
    "title": "Robust but Relaxed Probing Model",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2024/a30/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Multiplying Polynomials without Powerful Multiplication Instructions",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a1/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a2/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a3/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a4/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a5/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a6/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a7/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a8/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a17/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a9/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a10/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a11/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Designing a General-Purpose 8-bit (T)FHE Processor Abstraction",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a12/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Constant time lattice reduction in dimension 4 with application to SQIsign",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a13/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a14/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Higher-Order Time Sharing Masking",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a15/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a16/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Optimal Dimensionality Reduction using Conditional Variational AutoEncoder",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a18/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Adaptive Template Attacks on the Kyber Binomial Sampler",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a19/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a20/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Hardware IP Protection through Low-Overhead Fine-Grain Redaction",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a21/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "KeyVisor \u00e2\u0080\u0093 A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a22/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a23/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a24/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Accelerating EdDSA Signature Verification with Faster Scalar Size Halving",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a26/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "dCTIDH: Fast & Deterministic CTIDH",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a27/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Let\u2019s DOIT: Using Intel\u2019s Extended HW/SW Contract for Secure Compilation of Crypto Code",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a28/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a29/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a30/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a31/"
  },
  {
    "conference": "CHES",
    "category": "security",
    "year": 2025,
    "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://artifacts.iacr.org/tches/2025/a32/"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8271276"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Architecting Trigger-Action Platforms for Security, Performance and Functionality",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8287340"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware [Artifacts]",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8279954"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8296342"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8296807"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Content Censorship in the InterPlanetary File System",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8300034"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8303532"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8287857"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Attributions for ML-based ICS Anomaly Detection: From Theory to Practice",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8305392"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Pisces: Private and Compliable Cryptocurrency Exchange",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8286827"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "LARMix: Latency-Aware Routing in Mix Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8311052"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Transpose Attack: Stealing Datasets with Bidirectional Training",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8313254"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Efficient and Timely Revocation of V2X Credentials",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10117921",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Acoustic Keystroke Leakage on Smart Televisions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10151215"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "UntrustIDE: Exploiting Weaknesses in VS Code Extensions",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10146469"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10104298"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10161487"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Timing Channels in Adaptive Neural Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10164348"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "CamPro: Camera-based Anti-Facial Recognition",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10156141"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10139527"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Sharing cyber threat intelligence: Does it really help?",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://dx.doi.org/10.6084/m9.figshare.24581004"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10160535"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "A Security and Usability Analysis of Local Attacks Against FIDO2",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10169176"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10136987"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "A Unified Symbolic Analysis of WireGuard",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10126619"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "http://dx.doi.org/10.5281/zenodo.10201956"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Pencil: Private and Extensible Collaborative Learning without Non-Colluding Assumption",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10140580"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10154551",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Large Language Model guided Protocol Fuzzing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10115151"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "zRA: Proofs of Attestation based on zkSNARKs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8391637"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Watcher: The Tool for Inspecting Third-party Monitors",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10148256"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "VETEOS: Statically Vetting EOSIO Contracts for the Groundhog Day Vulnerabilities",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10158696"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "QUACKSHIELD: Hindering Deserialization Attacks via Static Duck Typing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://dx.doi.org/10.6084/m9.figshare.24578644"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Towards Precise Reporting of Cryptographic Misuses",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://dx.doi.org/10.5281/zenodo.10158303"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "Private Aggregate Queries to Untrusted Databases",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10180105"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2024,
    "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.10117168"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13621822"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13627731"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13723143"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "EvoCrawl: Exploring Web Application Code and State using Evolutionary Search",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13617803"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Black-box Membership Inference Attacks against Fine-tuned Diffusion Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13371475"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "A Method to Facilitate Membership Inference Attacks in Deep Learning Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13709528"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Delay-allowed Differentially Private Data Stream Release",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13643225"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13594519"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Secure IP Address Allocation at Cloud Scale",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13698654"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "TRAJDELETER: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.26928706"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Diffence: Fencing Membership Privacy With Diffusion Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13706131"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13712489",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "MineShark: Cryptomining Traffic Detection at Scale",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13624057"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "type++: Prohibiting Type Confusion with Inline Type Information",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13687049"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "THEMIS: Regulating Textual Inversion for Personalized Concept Censorship",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13732052"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14209303"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "KernelSnitch: Side Channel-Attacks on Kernel Data Structures",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249716"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14250642"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "The Road to Trust: Building Enclaves within Confidential VMs",
    "badges": [
      "available",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14241711"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Hardware-Assisted Retrofitting of XoM for Stripped Binaries",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13892220"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14214999"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249681"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249467"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/OSF.IO/HDSQR"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13910629"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14251896"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14210565"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14257983"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14213306"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14194517",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249678"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14220042"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "ICS-QUARTZ: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249993"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Starshields for iOS: Navigating the Security Cosmos in Satellite Communication",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13863530"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Onion Franking: Abuse Reports for Mix-Based Private Messaging",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14225977"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14261195"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14248909"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "The Guardians of Name Street: Studying Defensive Registration Practices of the Fortune 500",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14188149"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Oreo: Protecting ASLR Against Microarchitectural Attacks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14261065"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "IsolateGPT: An Execution Isolation Architecture for LLM-Based Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14257920"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249064"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "SKILLPOV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14187988"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/OSF.IO/9RVSX"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "YuraScanner: Leveraging LLMs for Task-driven Web App Scanning",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14189484"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14251874"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "SHAFT: Secure, Handy, Accurate and Fast Transformer Inference",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14253770",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14098389"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Towards Understanding Unsafe Video Generation",
    "badges": [
      "Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14257724"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Safety Misalignment Against Large Language Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249424"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14135448"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14250089"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Alba: The Dawn of Scalable Bridges for Blockchains",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249987"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249091"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "FUZZUER: Enabling Fuzzing of UEFI Interfaces",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14257287"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Rethinking Trust in Forge-Based Git Security",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14252266"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "PBP: Post-training Backdoor Purification for Malware Classifiers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14253945"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14218376"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "PQConnect: Automated Post-Quantum End-to-End Tunnels",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14253085"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14249397"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Uncovering iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14244150"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2025,
    "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14262356"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17759528"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "ADGFUZZ: Assignment Dependency-Guided Fuzzing for Robotic Vehicles",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16956667"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Accurate Identification of the Vulnerability-introducing Commit based on Differential Analysis of Patching Patterns",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17064690"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Achieving Interpretable DL-based Web Attack Detection through Malicious Payload Localization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16978408"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17060060"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Action Required: A Mixed-Methods Study of Security Practices in GitHub Actions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17916232"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17905485 "
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "AnonyCall: Enabling Native Private Calling in Mobile Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17851159"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Are your Sites Truly Isolated? Automatically Detecting Logic Bugs in Site Isolation Implementations",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17750615"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17032669"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "BKPIR: Keyword PIR for Private Boolean Retrieval",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16962425"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "BLERP: BLE Re-Pairing Attacks and Defenses",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17671926"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Benchmarking and Understanding Safety Risks in AI Character Platforms",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17826443"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Better Safe than Sorry: Uncovering the Insecure Resource Management in App-in-App Cloud Services",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16946146"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Beyond Raw Bytes: Towards Large Malware Language Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17047102"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Breaking the Bulkhead: Demystifying Cross-Namespace Reference Vulnerabilities in Kubernetes Operators",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/OSF.IO/PWVC4"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Breaking the Generative Steganography Trilemma: ANStega for Optimal Capacity, Efficiency, and Security",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17943483"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "BunnyFinder: Finding Incentive Flaws for Ethereum Consensus",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17042549"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "CTng: Secure Certificate and Revocation Transparency",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16999030"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17035715"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Cease at the Ultimate Goodness: Approaching Optimal Website Fingerprinting Defense via Iterative Mutual Information Minimization",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17677722"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "CellShift: RTT-Aware Trace Transduction for Real-World Website Fingerprinting",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15863906"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "ChameleoScan: Demystifying and Detecting iOS Chameleon Apps via LLM-Powered UI Exploration",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17540091"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Characterizing the Implementation of Censorship Policies in Chinese LLM Services",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17064238"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Chasing Shadows: Pitfalls in LLM Security Research",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17847798"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Cirrus: Performant and Accountable Distributed SNARK",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17843693"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Consensus in the Known Participation Model with Byzantine Failures and Sleepy Replicas",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16956543",
    "award": "Distinguished Artifact Award \ud83c\udfc6"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Convergent Privacy Framework for Multi-layer GNNs through Contractive Message Passing",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17539660"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Cross-Boundary Mobile Tracking: Exploring Java-to-JavaScript Information Diffusion in WebViews",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16687648"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Cross-Cache Attacks for the Linux Kernel via PCP Massaging",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17640260"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Cross-Consensus Reliable Broadcast and its Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16945739"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17036866"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Cryptobazaar: Private Sealed-bid Auctions at Scale",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17817520"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "DNN Latency Sequencing: Extracting DNN Architectures from Intel SGX Enclaves with Single-Stepping Attacks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17038976"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "DualStrike: Accurate, Real-time Eavesdropping and Injection of Keystrokes on Commodity Keyboards",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17033644"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Enhancing Legal Document Security and Accessibility with TAF",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17819921"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Enhancing Semantic-Aware Binary Diffing with High-Confidence Dynamic Instruction Alignment",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17550303"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Entente: Cross-silo Intrusion Detection on Network Log Graphs with Federated Learning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16955361"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "FARFETCH'D: Side-Channel Analysis for Privacy Applications on Confidential VMs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17542706"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Faster Than Ever: A New Lightweight Private Set Intersection and Its Variants",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17699084"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented Generation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17070171"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "FirmCross: Detecting Taint-style Vulnerabilities in Modern C-Lua Hybrid Web Services of Linux-based Firmware",
    "badges": [
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "FlippyR.AM: A Large-Scale Study of Rowhammer Prevalence",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17881765"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17051835"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Formal Analysis of BLE Secure Connection Pairing and Revelation of the PE Confusion Attack",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17677477"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "From Noise to Signal: Precisely Identify Affected Packages of Known Vulnerabilities in npm Ecosystem",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17544970"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17531662"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "HoneySat: A Network-based Satellite Honeypot Framework",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17871431"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17790334"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Icarus: Achieving Performant Asynchronous BFT with Only Optimistic Paths",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17797381"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Identifying Logical Vulnerabilities in QUIC Implementations",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17015304"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "In-Context Probing for Membership Inference in Fine-Tuned Language Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17906756"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17459636"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Ipotane: Achieving the Best of All Worlds in Asynchronous BFT",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17008411"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Kangaroo: A Private and Amortized Inference Framework over WAN for Large-Scale Decision Tree Evaluation",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17055770"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17725706"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Les Dissonances: Cross-Tool Harvesting and Polluting in Pool-of-Tools Empowered LLM Agents",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17792601"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "LinkGuard: A Lightweight State-Aware Runtime Guard Against Link Following Attacks in Windows File System",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17481221"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Loki: Proactively discovering online scams by mining toxic search queries",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17049965"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17807275"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "MUTATO: Enhancing Fuzz Drivers with Adaptive API Option Mutation",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16812294"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "MVP-ORAM: a Wait-free Concurrent ORAM for Confidential BFT Storage",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17842154"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "MinBucket MPSI: Breaking the Max-Size Bottleneck in Multi-Party Private Set Intersection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17927023"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Mirage: Private, Mobility-based Routing for Censorship Evasion",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16953762"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "NetRadar: Enabling Robust Carpet Bombing DDoS Detection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17582527"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "NeuroStrike: Neuron-Level Attacks on Aligned LLMs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17072075"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "OSAVRoute: Advancing Outbound Source Address Validation Deployment Detection with Non-Cooperative Measurement",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.30000817.v1"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "On the Security Risks of Memory Adaptation and Augmentation in Data-plane DoS Mitigation",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17490769"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "One Email, Many Faces: A Deep Dive into Identity Confusion in Email Aliases",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16735091"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "OptiMix: Scalable and Distributed Approaches for Latency Optimization in Modern Mixnets",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17054156"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PACS: Privacy-Preserving Attribute-Driven Community Search over Attributed Graphs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17811170"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Pando: Extremely Scalable BFT Based on Committee Sampling",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16959662"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PANDORA: Lightweight Adversarial Defense for Edge IoT using Uncertainty-Aware Metric Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17881774"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PIRANHAS: PrIvacy-Preserving Remote Attestation in Non-Hierarchical Asynchronous Swarms",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17879097"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Paladin: Defending LLM-enabled Phishing Emails with a New Trigger-Tag Paradigm",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15897613"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PathProb: Probabilistic Inference and Path Scoring for Enhanced RPKI-based Route Leak Detection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17920056"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Peering Inside the Black-Box: Long-Range and Scalable Model Architecture Snooping via GPU Electromagnetic Side-Channel",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17080118"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Pitfalls for Security Isolation in Multi-CPU Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17524720"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PriSrv+: Privacy and Usability-Enhanced Wireless Service Discovery with Fast and Expressive Matchmaking Encryption",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16945935"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PrivCode: When Code Synthesis Meets Differential Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17845611"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17845537"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "ProtocolGuard: Detecting Protocol Non-compliance Bugs via LLM-guided Static Analysis and Dynamic Verification",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17506328"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "RTCON: Context-Adaptive Function-Level Fuzzing for RTOS Kernels",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17540919"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Repairing Trust in Domain Name Disputes Practices: Insights from a Quarter-Century\u2019s Worth of Squabbles",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16954716"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Revisiting Differentially Private Hyper-parameter Tuning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17073774"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Reviving and Advancing Page Cache Attacks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17915256"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "SACK: Systematic Generation of Function Substitution Attacks Against Control-Flow Integrity",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17782315"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "SECV: Securing Connected Vehicles with Hardware Trust Anchors",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17785984"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "SVDefense: Effective Defense against Gradient Inversion Attacks via Singular Value Decomposition",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16948135 "
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "SWIPE - DOM-XSS Detection via Webpage Interaction Fuzzing and URL Component Synthesis",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15883603"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "SYSYPHUZZ and the Pressure of More Coverage",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.1596101"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17849201"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "TIPSO-GAN: Malicious Network Traffic Detection Using a Novel Optimized Generative Adversarial Network",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17759516"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Targeted Physical Evasion Attacks in the Near-Infrared Domain",
    "badges": [
      "functional"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "The Butterfly Effect in LLM Watermarks: Character-Level Perturbations Disrupt Watermark",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15872569"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "The Dark Side of Flexibility : Detecting Exploitable Over-Permissions in Serverless Applications",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16957393"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "The Heat is On: Understanding and Mitigating Vulnerabilities of Thermal Image Perception in Autonomous Systems",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17051228"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "There is No War in Ba Sing Se: A Global Analysis of Content Moderation in Large Language Models",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17897311"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "TranSPArent: Taint-style Vulnerability Detection of Generic Single-Page Applications through Automated Framework Abstraction",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17822391"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Understanding the Status and Strategies of the Code Signing Abuse Ecosystem",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17666996"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Understanding the Stealthy BGP Hijacking Risk in the ROV Era",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16565359"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Unknown Target: Uncovering and Detecting Novel In-Flight Attacks to Collision Avoidance (TCAS)",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17428590",
    "award": "Distinguished Artifact Award \ud83c\udfc6"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Unshaken by Weak Embedding: Robust Probabilistic Watermarking for Dataset Copyright Protection",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17873466"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Unveiling BYOVD Threats: Malware's Use and Abuse of Kernel Drivers",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17047559"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "User-Space Dependency-Aware Rehosting for Linux-Based Firmware Binaries",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17083186"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15855167"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "Validity Is Not Enough: Uncovering the Security Pitfall in Chainlink's Off-Chain Reporting Protocol",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17874648"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "WBSLT: A Framework for White-Box Encryption Based on Substitution-Linear Transformation Ciphers",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17543341"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "WCDCAnalyzer: Scalable Security Analysis of Wi-Fi Certified Device Connectivity Protocols",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17083189"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "When Mixnets Fail: Evaluating, Quantifying, and Mitigating the Impact of Adversarial Nodes in Mix Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17703144",
    "award": "Distinguished Artifact Award \ud83c\udfc6"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "ZKSL: Verifiable and Efficient Split Federated Learning via Asynchronous Zero-Knowledge Proofs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17866076"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "ropbot: Reimaging Code Reuse Attack Synthesis",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17811054"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "vSim: Semantics-Aware Value Extraction for Efficient Binary Code Similarity Analysis",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17751555"
  },
  {
    "conference": "NDSS",
    "category": "security",
    "year": 2026,
    "title": "\u03bcFuzz: Microcode-Guided Post-Silicon x86 CPU Fuzzer",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17012971"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/dedis/prifi",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue4/popets-2020-0059.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "dPHI: An improved high-speed network-layer anonymity protocol",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/AlexB030/dPHI",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue3/popets-2020-0054.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Protecting against Website Fingerprinting with Multihoming",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/sebhenri/HyWF",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0019.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "A Framework of Metrics for Differential Privacy from Local Sensitivity",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://pleak.io/wiki/",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0023.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Automatic Discovery of Privacy-Utility Pareto Fronts",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/amzn/differential-privacy-bayesian-optimization",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue4/popets-2020-0058.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Secure Evaluation of Quantized Neural Networks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/anderspkd/SecureQ8",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue4/popets-2020-0075.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/msrocean/Tik_Tok",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue3/popets-2020-0043.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Website Fingerprinting with Website Oracles",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/pylls/wfwo",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue1/popets-2020-0013.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Effective writing style transfer via combinatorial paraphrasing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/ssg-research/mlsec/parchoice/",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue4/popets-2020-0066.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Differentially Private SQL with Bounded User Contribution",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/google/differential-privacy",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0025.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Mind the Gap: Ceremonies for Applied Secret Sharing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://git-crysp.uwaterloo.ca/ckomlo/VerifiableSecretSharing",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0033.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Tandem: Securing Keys by Using a Central Server While Preserving Privacy",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/tandem",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue3/popets-2020-0055.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "NoMoATS: Towards Automatic Detection of Mobile Tracking",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://athinagroup.eng.uci.edu/projects/nomoads/",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0017.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://athinagroup.eng.uci.edu/projects/smarttv/",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0021.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/schoppmp/private-knn",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0024.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/pahfat/PoPETs2020.git",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue3/popets-2020-0053.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/djdubois/smart-speakers-study",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue4/popets-2020-0070.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/TEE-3/T3",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0039.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://pape.science/paper/HPR20pets/",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0020.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/jun521ju/PETS2020_Web_Tracking",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue2/popets-2020-0016.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "The Privacy Policy Landscape After the GDPR",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/wi-pi/GDPR",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue1/popets-2020-0004.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2020,
    "title": "Mitigator: Privacy policy compliance using trusted hardware",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://git-crysp.uwaterloo.ca/miti/mitigator",
    "paper_url": "https://petsymposium.org/2020/files/papers/issue3/popets-2020-0049.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/ppmlguy/fastgradclip",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue1/popets-2021-0008.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Private Stream Aggregation with Labels in the Standard Model",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/johanernst/khPRF-PSA",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0063.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Automated Extraction and Presentation of Data Practices in Privacy Policies",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/um-rtcl/piextract_dataset",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0019.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Privacy Preference Signals: Past, Present and Future",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/mhils/pets2021-privacy-preference-signals/",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0069.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Growing synthetic data through differentially-private vine copulas",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/alxxrg/copula-shirley",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue3/popets-2021-0040.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/snwagh/falcon-public",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue1/popets-2021-0011.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/PPMTF/PPMTF",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0015.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Face-Off: Adversarial Face Obfuscation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/wi-pi/face-off",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0032.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "SoK: Efficient Privacy-preserving Clustering",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/encryptogroup/SoK_ppClustering",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0068.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Zhiyi-Zhang/PS-Signature-and-EL-PASSO",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0018.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Residue-Free Computing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://larkema.github.io/residuefree/",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0076.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "A calculus of tracking: theory and practice",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/giorgioditizio/calculus_of_tracking",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0027.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "D\u00e9j\u00e0 vu: Abusing Browser Cache Headers to Identify and Track Online Users",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/mishravikas/PETS_dejavu",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0033.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "ML-CB: Machine Learning Canvas Block",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/shbe7/",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue3/popets-2021-0056.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Fast Privacy-Preserving Punch Cards",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/SabaEskandarian/PunchCard",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue3/popets-2021-0048.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.uni.lu/APSIA/uuhd-ppls",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue3/popets-2021-0039.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Privacy-Preserving &amp; Incrementally-Deployable Support for Certificate Transparency in Tor",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/rgdd/ctor/tree/master/artifact",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0024.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "LogPicker: Strengthening Certificate Transparency against covert adversaries",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/logpicker/prototype",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0066.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/SwapCT/SwapCT",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0070.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "HashWires: Hyperefficient Credential-Based Range Proofs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/novifinancial/hashwires",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0061.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/openhaystack",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue3/popets-2021-0045.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Website Fingerprinting in the Age of QUIC",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/jpcsmith/wf-in-the-age-of-quic",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0017.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "GANDaLF: GAN for Data-Limited Fingerprinting",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/traffic-analysis/gandalf",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue2/popets-2021-0029.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://homepage.np-tokumei.net/publication/publication_2021_popets",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0078.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2021,
    "title": "Multiparty Homomorphic Encryption from Ring-Learning-With-Errors",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/ldsec/lattigo-pets21",
    "paper_url": "https://petsymposium.org/2021/files/papers/issue4/popets-2021-0071.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://tudatalib.ulb.tu-darmstadt.de/handle/tudatalib/3490",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Mixnet optimization methods",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/ibenguir/mixim_pets",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0081.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "OrgAn: Organizational Anonymity with Low Latency",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/zhtluo/organ",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0087.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Leveraging Strategic Connection Migration-Powered Traffic Splitting for Privacy",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/comps",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0083.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://aka.ms/2PC-Circuit-PSI",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0018.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Keeping Privacy Labels Honest",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Keeping-Privacy-Labels-Honest/Main",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0119.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/chatbot-study/chatbot",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0086.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/SpidLab/GWAS-Verification",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0094.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/lu562/Polymath_artifact",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0020.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/OmniCrawl/OmniCrawl",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0012.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/OSUSecLab/GAENPlus",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0130.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/CoronaHeatMap",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0132.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/nomokazu/linking-attack-poc",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0103.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/wi-pi/VCAMuteButton_PoPETS",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0077.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Privacy accounting \u03b5conomics: Improving differential privacy composition via a posteriori bounds",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.19330649",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0070.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Differentially private partition selection",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/google/differential-privacy/blob/main/common_docs/partition_selection.md",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0017.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "d3p - A Python Package for Differentially-Private Probabilistic Programming",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/DPBayes/d3p",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue2/popets-2022-0052.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "ATOM: Ad-network Tomography",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://vitalstatistix.cs.uiowa.edu:2443/maaz/atom-archive",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0110.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://cbw.sh/static/archives/ccpa_2022_pets.tar.gz",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0030.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "A Multi-Region Investigation of Use and Perceptions of Smart Home Devices",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/sameer-patil/shd-popets",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0060.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "LLAMA: A Low Latency Math Library for Secure Inference",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/mpc-msri/EzPC/tree/master/FSS",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0109.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Hidden Issuer Anonymous Credential",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.inria.fr/mgestin/hiac_docker_implementation.git",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0123.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Dataprove/Dataprovetool/",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0028.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Integrating Privacy into the Electric Vehicle Charging Architecture",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://code.fbi.h-da.de/seacop/daa-pnc-tamarin",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0066.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/LabelDP",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0112.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Masking Feedforward Neural Networks against Power Analysis Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/athanasiou.k/masked-nn-lib",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0025.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/majed-almansoori/IPS-dual-use-android-apps",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0102.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://www.platformcontrol.org/",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue2/popets-2022-0033.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/dilawer11/iot-device-fingerprinting",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue2/popets-2022-0057.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Formalizing and Estimating Distribution Inference Risks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/iamgroot42/FormEstDistRisks",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0121.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Disparate Vulnerability to Membership Inference Attacks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/disparate-vulnerability",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0023.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Athena: Probabilistic Verification of Machine Unlearning",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/unlearning-verification",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0072.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/gaoji7777/DeleteLeakage",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0079.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "On Defeating Graph Analysis of Anonymous Transactions",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/siccegge/research-notebooks/-/tree/master/ELRWY22",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0085.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "FingerprinTV: Fingerprinting Smart TV Apps",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/UCI-Networking-Group/fingerprintv",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0088.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Watch Over Your TV: A Security and Privacy Analysis of the Android TV ecosystem",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/s3lab-rhul/watch-over-your-tv-paper",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0092.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Building a Privacy-Preserving Smart Camera System",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/siis/CaCTUs",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue2/popets-2022-0034.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/GMU-Crypto/gOTzilla",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0107.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/zswap-E332/",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0120.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Privacy-preserving FairSwap: Fairness and Privacy Interplay",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Prezzy/pFairSwap",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0021.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "I know what you did on Venmo: Discovering privacy leaks in mobile social payments",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/STEELISI/SENMO",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0069.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/hdarir2/mleflow",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0005.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "From \"Onion Not Found\" to Guard Discovery",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/numbleroot/from-onion-not-found-to-guard-discovery",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0026.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/wyrhc/",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue2/popets-2022-0040.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/DistriNet/DLTC",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue3/popets-2022-0074.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "If You Like Me, Please Don\u2019t \"Like\" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://www.wim.uni-mannheim.de/ths/research/data",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue1/popets-2022-0022.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/nunesgh/bvm-library",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue4/popets-2022-0114.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2022,
    "title": "Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/priyakalot/ViP-demo",
    "paper_url": "https://petsymposium.org/2022/files/papers/issue2/popets-2022-0058.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/veichta/DeepSE-WF",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0047.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "RPM: Robust Anonymity at Scale",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/lu562/MP-SPDZ",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0057.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/akshayeshenoi/ipet",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0048.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/liangw89/RAVEN/tree/main",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0077.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/quic-wf-defenses",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0099.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Data-Explainable Website Fingerprinting with Network Simulation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://explainwf-popets2023.github.io/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0125.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/yunhaoyang234/Membership-Attack-Privacy-Preserving",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0005.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Differentially Private Simple Genetic Algorithms",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.uwaterloo.ca/t3humphr/dp-simple-ga",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0124.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Towards Sentence Level Inference Attack Against Pre-trained Language Models",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/KangGu96/Adv_decoder",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0070.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Heads in the Clouds? Measuring Universities\u2019 Migration to Public Clouds: Implications for Privacy &amp; Academic Freedom",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://git.aperture-labs.org/Cloudheads/cloudheadschecker",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0044.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/anbaccar/RSS_ring_ppml",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0035.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Private Collection Matching Protocols",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/private-collection-matching",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0091.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Secure and Accurate Summation of Many Floating-Point Numbers",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/chennyc/floating_point_summation.git",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0090.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/jgdumas/vespo",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0085.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Strengthening Privacy-Preserving Record Linkage using Diffusion",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/youzheheng/2022_PoPETS",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0054.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "SoK: Membership Inference is Harder Than we Previously Thought",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://bitbucket.org/srecgrp/sok-membership-inference-public/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0082.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Exploring the Privacy Risks of Adversarial VR Game Design",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/metaguard/metadata",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0108.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/mobilesec/DAC-from-EQS",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0093.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Attribute-based Single Sign-On. Secure, Private, and Efficient",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/aicis/fresco-outsourcing/tree/macro-bench",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0097.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Understanding Person Identification Through Gait",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://git.scc.kit.edu/ps-chair/understanding-person-identification-through-gait-popets-2023",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0011.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/secret-pets-submitter/individualized-pate-pets-submission-",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0010.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/tau200/gdpr_master",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0088.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "GDPRxiv: Establishing the State of the Art in GDPR Enforcement",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/lawfulcomputing/GDPRxiv/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0121.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Lox: Protecting the Social Graph in Bridge Distribution",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://git-crysp.uwaterloo.ca/iang/lox",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0029.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/spahl/hydra-popets2023",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0081.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Designing a Location Trace Anonymization Contest",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/PPMTFPlus/PPMTFPlus",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0014.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Robust Fingerprint of Privacy-Preserving Location Trajectories",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/spid-lab/Robust-Fingerprint-of-Location-Trajectories-Under-Differential-Privacy",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0095.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Privacy-Aware Adversarial Network in Human Mobility Prediction",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/YutingZhan/Mo-PAE",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0032.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": " Creative beyond TikToks: Investigating Adolescents\u2019 Social Privacy Management on TikTok",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/z8d3w/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0049.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/9xtpc/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0120.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": " Private Sampling with Identifiable Cheaters",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.inria.fr/cesabate/privatesampling-exp",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0058.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": " Convolutions in Overdrive: Maliciously Secure Convolutions for MPC",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/sec-stuttgart/MP-SPDZ-convolution-triples",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0084.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/z8d3w/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0068.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Verifiable Distributed Aggregation Functions",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/cloudflareresearch/doplar/tree/cjpatton/PoPETS-2023.4-Artifact",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0126.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Story Beyond the Eye: Glyph Positions Break PDF Text Redaction",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/maxwell-bland/deredaction",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0069.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/dzhong2/DSV_Graph.git",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0103.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/fturati/floc-minhash-attacks",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0101.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": " StyleID: Identity Disentanglement for Anonymizing Faces",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/minha12/StyleID",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0016.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Two-Cloud Private Read Alignment to a Public Reference Genome",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/sindhujamohan9/TwoCloudShuffledBWT",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0062.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Compact and Divisible E-Cash with Threshold Issuance",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/aniampio/TI-OfflineEcash",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0116.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://ibm.github.io/helayers/",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0020.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Private Graph Extraction via Feature Explanations",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/iyempissy/graph-stealing-attacks-with-explanation",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0041.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Usability and Enforceability of Global Privacy Control",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/privacy-tech-lab/gpc-optmeowt",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0052.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Blocking JavaScript without Breaking the Web: An Empirical Investigation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/hadiamjad/Blocking-JavaScript-without-Breaking-the-Web",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0087.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "On the Robustness of Topics API to a Re-Identification Attack",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/nikhiljha95/topics-api-simulator",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0098.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://anonymous.4open.science/r/widevine_eme_fingerprinting-880C",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0112.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/SEAL-IIT-KGP/TWINSSE",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0008.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/cloudsecuritygroup/ers-attacks",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue4/popets-2023-0106.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/brave-experiments/frodo-pir",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0022.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "DPrio: Efficient Differential Privacy with High Utility for Prio",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/DPrio-PoPETs/dprio",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0086.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "A Unified Framework for Quantifying Privacy Risk in Synthetic Data",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/statice/anonymeter",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue2/popets-2023-0055.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/TrustworthyComputing/T2-FHE-Compiler-and-Benchmarks",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue3/popets-2023-0075.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2023,
    "title": "\"Revoked just now!\"Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/z6fw9/?view_only=dc5e1b32561e48248a97865b0f4dcf16",
    "paper_url": "https://petsymposium.org/2023/files/papers/issue1/popets-2023-0004.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "I still know it's you! On Challenges in Anonymizing Source Code",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/horlabs/anonymizer/tree/b20a4c96228260d130ddaa5bacb7b3c07048f99c",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0102.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "User-Controlled Privacy: Taint, Track, and Control",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.ethz.ch/fhublet/ttc/tree/988c7ccf8a1da6d0b6b0e8f7de0b051551b31a3a",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0034.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Data Isotopes for Data Provenance in DNNs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/uchicago-sandlab/dataisotopes/tree/41680e8b1b0906fdef113a7f860ff70820c2df4e",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0024.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/LiangqinRen/PrivDNN/tree/a60ffc334f34a7541387329b701ae6922e64fc2e",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0089.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/amiradavoudi/Tracing/tree/4b0b0577348145e77f9784df22b2c3411c826b2c",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0014.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/bmixonba/network-alchemy-dev/tree/791986d9c09d2a0101eb73215a3d591fa05bc65c",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0070.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/UChicagoSUPERgroup/TrackingTransparencyPETS2024/tree/c4a153b597e7bf3697a11cf8c8d67ba4a6f4a88e",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0101.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Traceable mixnets",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/agrawalprash/traceable-mixnets/releases/tag/v1",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0049.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "MixMatch: Flow Matching for Mixnet Traffic",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/mixnet-correlation/mixmatch-flow-matching-for-mixnet-traffic_popets-2024-2/tree/5159d2c21ad3e480955f3800ecbf4d2bd9cbe5d2",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0050.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/initc3/SecretNetwork-Sandbox/",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0035.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/internet-sicherheit/A-Large-Scale-Study-of-Cookie-Banner-Interaction-Tools-and-Their-Impact-on-Users-Privacy/tree/97f1c9fc7e3970b154711b8f34e9579963465cd4",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0002.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://tudatalib.ulb.tu-darmstadt.de/handle/tudatalib/3927",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0011.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://dx.doi.org/20.50s0.11850/627400",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0012.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/privacy-tech-lab/gpc-privacy-choice/releases/tag/v2.10.3",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0015.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/ckaplan100/PETS-2024/tree/aeb90296060292147cbdbea2889aa5ee3c86aa7a",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0031.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/FerranAlborch/RIPFEDP/tree/e74ba9efda74a4f7810902bc31482d33c724d323",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0131.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Connecting the Dots: Tracing Data Endpoints in IoT Devices",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/jakariamd/IoT-Measurement/tree/45b59d4b27e2d422d6e404c80d31f607ca466fe6",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0090.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/tusharjois/socioty/tree/artifact_review",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0026.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/KillianDavitt/CoStricTor/tree/af48fadca30a24af5eba7a434029b62a11d35070",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0020.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "DeTorrent: An Adversarial Padding-only Traffic Analysis Defense",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/jkhollandjr/PETS_DeTorrent/tree/c08ad14c1e14539f22cf657dbb170524452e1283",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0007.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/DAMSlabUMBC/GenAIPABench/tree/0a5fffcb00b92ba5a604e6b1b5127b1199e52919",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0081.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Edge Private Graph Neural Networks with Singular Value Perturbation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/TinaTangTingting/Eclipse/tree/e0a397133ae91a02f5b14169f0e0056dbcfbe6a9",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0084.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "TMI! Finetuned Models Leak Private Information from their Pretraining Data",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/johnmath/tmi-pets24/tree/4117d649adf496d68faded93f950f357d7e1e851",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0075.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Privacy Preserving Feature Selection for Sparse Linear Regression",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/IBM/helayers-examples/tree/244408348746441a48cce0b698dd8078b71722d9",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0017.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Model-driven Privacy",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://polybox.ethz.ch/index.php/s/RoJSS2ECAMww1br",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0018.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Defining and Controlling Information Leakage in US Equities Trading",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/arthuramerico/toilc/tree/af1652de1f03a4c75a6316c1886420bf0f0e9f3f",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0054.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/masood/2024-pets-privacy-labels-policies/tree/61c31b3ee4caea4c74cc8f823370db8e485ad059",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0111.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "QUICKeR: Quicker Updates Involving Continuous Key Rotation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/lawrencekhlim/QUICKeR/tree/QUICKeR-PoPETS-paper",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0005.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/lng-ng/anonify/tree/d0c87d0a9a0b5c926f403840e9697f3976345755",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0069.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://osf.io/wnad8/",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0145.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/applied-crypto-lab/mal-ext-circuits/tree/4d1bbd232d717ff5e83bcaf191139f8861420aad",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0006.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Multipars: Reduced-Communication MPC over Z2k",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/haslersn/multipars/tree/3d373038f28541f520db027724955f8d1fe49ec6",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0038.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://git-crysp.uwaterloo.ca/iang/prac/src/popets-repro",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0100.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "PRIVIC: A privacy-preserving method for incremental collection of location data",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/blitzwas/PRIVIC/tree/21a460cfbf102e9a3361daf16eae5502775b847f",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0033.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Snail: Secure Single Iteration Localization",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/secret-snail/localization-server/tree/ab30546afa7c22c56f053ae620a084a0829476d3",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0087.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "SoK: Can Trajectory Generation Combine Privacy and Utility?",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/erik-buchholz/SoK-TrajGen/releases/tag/v2.0.0",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0068.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/abubakaraziz/Assessing-IAB-CCPA-Framework/tree/835672bc86754febfa4534b151af35e70cdb7805",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0120.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Evaluating Google's Protected Audience Protocol",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Elena6918/PrAu-Simulation/tree/2cfd2bd03101967aa681f218efdce6cf5696dad6",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0147.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "CheckOut: User-Controlled Anonymization for Customer Loyalty Programs",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/MatthewGregoire42/LoyaltyPointsCrypto/tree/1a6cb047c60b78c60b15d206c3c183ed3eb6c9f2",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0076.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/neha-jawalkar/EzPC/tree/8f434400d3fbe6620ce4fae0507286e3c5928e8b",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0107.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/TrustworthyComputing/plasma/tree/c3ca8fac17ed6f41d737ece96bee43a5051f5b6b",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0064.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Constant-Round Private Decision Tree Evaluation for Secret Shared Data",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/nann-cheng/PDTE/tree/b854a10438f696b047476a8d4787bf5a867fbbf4",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0023.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "DeVoS: Deniable Yet Verifiable Vote Updating",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://gitlab.uni.lu/APSIA/DeVoS/-/tree/f0320f8b39c3c0de4ebaa18ef7266d5d110aeb17",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0021.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Delegated Private Matching For Compute",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/facebookresearch/Private-ID/tree/58af4eff6e2add0e46c88fb844bdab702954555f",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0040.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/yohhaan/topics_analysis/releases/tag/petsymposium-artifact2024.1",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0004.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Multi-level Entropy-based Thresholds",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/soumboussaha/FP-tracer/tree/bbdede91500b0265e8cd3dd9cc0555efda3e62e7",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0092.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Post-quantum XML and SAML Single Sign-On",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/PQSAML/index/tree/3b49d759fe3021b6ee6fc322999e483df427f8bd",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0128.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/UQ-Trust-Lab/Quper/tree/66bcac724f7083d28c29c87d529f66c3a81306b5",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0028.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/microsoft/shadow-realignment-mia/tree/v2.0",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0085.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Anonymous Complaint Aggregation for Secure Messaging",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/connorbelll/anonymous-tally/tree/15e71ddaf5e7c59c9d85022dc1d3dd344c0a216a",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0078.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/honeymessages",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0099.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "NOTRY: Deniable messaging with retroactive avowal",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/xxsqwe/notry/tree/8647801cebb3184e150d5b1c6a5fb1c0dbc7f4c7",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0056.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Fant\u00f4mas: Understanding Face Anonymization Reversibility",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/kit-ps/seba/tree/b5fe27c5b518ce69ee65ade5e14fc10521441c8",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0105.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Website Data Transparency in the Browser",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/privacy-tech-lab/privacy-pioneer/releases/tag/v1.2.1",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0048.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/trafnex/raising-the-bar/tree/7fd66eafd24fcadf7f6bd390e32d74a483f58e64",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0112.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/minha12/StyleAdv/tree/fd42cb6121dccdade747ab37c085c218aee7bd5d",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0043.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/anonymous-repo-submission/artifact/tree/a2d5187b4d6e5fc75133aa0b0a7378c175ae3bde",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0025.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "PLAN: Variance-Aware Private Mean Estimation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/ChristianLebeda/PLAN-experiments/tree/94470ac71ec6d45537edf3168c95dbf29c2ebd93",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0095.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/SWiSSSE-crypto/SWiSSSE/tree/c2c4d04b7fceacb34b1ab774a7c26cbdc866f6a1",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0032.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/lambdapioneer/sloth/tree/0bf22c5178808e75d1e3f2c01e090869b8c19f83",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0123.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "https://petsymposium.org/popets/2024/popets-2024-0123.pdf",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/YuanXun2024/VFLGAN/tree/5e9d319e4ba6a514b3416c10ed8b99565d679329",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0144.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Decision-based Data Distribution (D\u00b3): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://tudatalib.ulb.tu-darmstadt.de/handle/tudatalib/4236",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0113.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/HuangPZ/STAMP/tree/b7f9eab2b5d98da9883315075dd2a8066618a876",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0119.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/acoksuz/AUTOLYCUS/tree/402bd2e407a82b49ffa7a0aebd2921563b0c101b",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0137.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Differentially Private Functional Encryption",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/JasZal/differentially_private_functional_encryption/tree/725607f7f67f59deeaab5ec5c2a793ffbceefddf",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0061.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/das-group/CAuthN-Study-Dataset/tree/e1429b98c6053293ae86a2cf19c940572ae8f785",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0060.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/tjungND/caoe-cerberus-query/tree/654783f5629a28c9b3e9469fbc164fa3bbc862ab",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0114.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2024,
    "title": "Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/hharcolezi/ldp-audit/tree/5cd1c5d47c089c6ae55292e7ccb75b2677893c9a",
    "paper_url": "https://petsymposium.org/popets/2024/popets-2024-0110.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CybersecurityForDemocracy/trackers-not-equal/tree/11f90dc1711d604ea550137cf24d364c111055eb",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0151.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Understanding Regional Filter Lists: Efficacy and Impact",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/internet-sicherheit/Understanding-Regional-Filter-Lists-Efficacy-and-Impact-/tree/a47d0eebd0df9dd2c5e78ca92c7217eebdc6df94",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0063.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Sheep's clothing, wolfish impact: Automated detection and evaluation of problematic 'allowed' advertisements",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Racro/AcceptableAds_PETS/tree/6a595bb33e0be56df1b2290fea8954f29c6da6e9",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0142.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/JakeC007/Automated_GKC-CI_Privacy_Policy_Annotations/tree/6e964c98b148d51d9ccdbf6a0cf1f06d93217ec1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0062.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "RPKI-based Location-Unaware Tor Guard Relay Selection Algorithms",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/z-lu2017/TOR-RPKI/tree/83c4c84affa967100966c318ce0e585d6d369c2b",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0077.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "The Last Hop Attack: Why Loop Cover Traffic over Fixed Cascades Threatens Anonymity",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Ti-ger/Last_Hop_Attack/tree/2e5ea768949f8689c9320d4f5d2002ff6b20e34c",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0067.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Time-Efficient Locally Relevant Geo-Location Privacy Protection",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/chenxiunt/LocalRelevant_Geo-Obfuscation/tree/ebcd8afa1715e42baf29d21096e58c9365171cc1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0046.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "SoK: Descriptive Statistics Under Local Differential Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mad-lab-fau/sok-ldp-data-analysis/tree/df6372a45b9c98ae093cc48afe43c9b5aff29f33",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0008.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/xQiratNL/VLDP/tree/v1.1.0",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0076.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ZhengYeah/Optimal-GPM/releases/tag/v1.0.0",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0124.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ISC-Lab/sok_artifact/commit/fd348c3661b8ef9be573f73482251a3594dd1d47",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0026.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Identifying Privacy Personas",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/idiap/identifying-privacy-personas/tree/7fe0bf45025f07fc52a7b68affed8afc6e9a672",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0006.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/NEU-SNS/voice-assistants-pets25/tree/59ec90ef31d7b753b09a1a9fa2da3ecc68612af1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0050.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/timwalsh300/open-world-vf/releases/tag/PETS",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0123.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lakewood999/ebay-mac-pipeline/tree/6c65c2485ed871d5d4002b0342097293cbf697d5",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0164.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/anonymous141592/FHE-Fairness-aware-FL/tree/bf582bbf6c1460e725146ca4ffe1a5d1f3f5aa48",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0044.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/horanshi/Privacy_PDAFD/tree/6d327dcaa861a9ab7fd54af75dc79e4c18871604",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0127.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Low-Cost Privacy-Preserving Decentralized Learning",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dimiarbre/ZIP-DL/tree/artifact-submission",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0108.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zghodsi/anofel/commit/244ea650a2c108183421b9b92c84aadb686db7f8",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0051.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DataSmithLab/Panopticon/tree/236b792058b2cc65a43c55b624bb4649b4bbd328",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0105.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Defining Privacy Engineering as a Profession",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/blues-lab/priv-eng-dataset/tree/ca35ffbb3c38ff7877c01ee92bfda29b2033ae6e",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0144.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "\"Do It to Know It\": Reshaping the Privacy Mindset of Computer Science Undergraduates",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MaishaB/undergraduate-privacy-curriculum/tree/0a7f27a8b4220298040323fb100daa658583717b",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0167.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sprout-uci/DB-PAISA/tree/5f1eaf424eb8734dce78c71422e25ea938ca747e",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0070.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/PrivacyGuard-PETS/PrivacyGuard/tree/f9ad12ccbef7eb32e205abccfa7b64258a00e253",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0040.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/watchwitch/tree/a4f77b704274f6e1f1e0e8319bf6c0d6465687e5",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0121.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Janus: Fast Privacy-Preserving Data Provenance For TLS",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jplaui/janus_artifacts/tree/a2390d6c69cff7a1b73e87b96ac4a05e70fcb55d",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0028.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15685011",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0140.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Akeso: Bringing Post-Compromise Security to Cloud Storage",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/etclab/akeso-artifact/tree/e08c958b95da04c32ae3f716bb49e7cc61c1e738",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0139.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://git-crysp.uwaterloo.ca/iang/teems/src/popets-artifact/ARTIFACT-EVALUATION.md",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0119.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Message Authentication Code with Fast Verification over Encrypted Data and Applications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ASEC-lab/auth-HE-retrieval/tree/876daf9bccc075b9e04ff071d4bb23093a710186",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0173.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mit-enclaves/argos/tree/65b74b4ca6597247d008cbf41480dd6ad5cea64f",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0099.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "BehaVR: User Identification Based on VR Sensor Data",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UCI-Networking-Group/BehaVR/tree/516a1296a9bb9d8a8e6a90a4aaf8fa686d83101d",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0022.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/aberke/fingerprinting-study/tree/7a776b99565e277f230dddfb9693c55ba3930da8",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0038.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bannerclick/bannerclick/tree/v0.26.0_pets25_artifact",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0138.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Onion-Location Measurements and Fingerprinting",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pylls/ol-measurements-and-fp/tree/6fe53382235abc5daec8b7e6649f523fa78ce01c",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0074.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Classification in an Imbalanced Setting",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wolfrieder/http-response-classifier/tree/c57f88785fec19e54c8f4d9aa12f742834e3fd9a",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0007.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://edmond.mpg.de/dataset.xhtml?persistentId=doi:10.17617/3.STVMDI",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0053.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/chart21/hpmpc/blob/7c4132243abf11c940b2a70aad875a6be6912402/measurements/configs/artifacts/truncation/ARTIFACT_EVALUATION.md",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0135.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bitzj2015/SpinML-Artifact/tree/f34b9a9ae65af22db10b799c1824677fef852585",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0054.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/asu-crypto/ppgan/tree/1dcb7804720941b92a6504cbf2c6f81b1fcdb9f9",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0088.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/chart21/hpmpc/tree/a07c3ff0b39222afe092231fd5ac25b8cae7ed7f",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0090.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Differentially Private Release of Hierarchical Origin/Destination Data with a TopDown Approach",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/aidaLabDEI/TDA_hierarchical/tree/6f8d70bf6d5ef2b39cd099c65d3c4b4160231d73",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0087.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Locally Differentially Private Frequency Estimation via Joint Randomized Response",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ZhengYeah/JRR/releases/tag/v1.0.0",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0097.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Estimating Group Means Under Local Differential Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mad-lab-fau/ldp-group-mean/tree/9fe89f92f36af8973e6b59115030ac75d8f3cdac",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0129.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Understanding Privacy Norms through Web Forms",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UCI-Networking-Group/webform/tree/PoPETs-AE-v1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0002.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Learning Privacy from Visual Entities",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/graphnex/privacy-from-visual-entities/tree/ac9322e7c7b7860d8eea3b6ea9830518fa31c4ef",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0098.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/em4i/Surveillance-Disguised-as-Protection_Artifacts/tree/3d525b8246b87b30fd3290179f01b0eeb728e7b4",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0052.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/citizenlab/wechat-security-report/tree/artifact",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0163.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DavidRodriguezTorrado/PrivacySDKSettingsAnalyzer/tree/9db2f6514277983c9549acecf1ad4f302afb8802",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0056.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Impact-of-Mobile-SDK-Usage-on-Privacy/artifact/tree/feae392f07f8f8f4d73e9a10fa92c1e9c8f64927",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0042.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Improving the Performance and Security of Tor\u2019s Onion Services",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BARC-Purdue/CenTor/tree/d2a9efe839df73de7aee87a317a8725b391e0042",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0029.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/AyanaMoshruba/Neuromorphic_Privacy/tree/640708de29d6c8744397394b6f210975c34a53a7",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0060.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/chart21/hpmpc/tree/334f71c7986630cadb43dbbb8c6c7fba7f060809",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0015.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Private Shared Random Minimum Spanning Forests",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MarianDietz/secure-msf/tree/v0.1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0055.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/TrustworthyComputing/mastic/tree/pets-2025.1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0017.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Ryndalf/Label-Encrypted/tree/e205bbf07135fb917536ba9383988a89a328d60c",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0061.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/varunthakore/mprove-nova/tree/af9ed3424b523e86df161969cd4001e9e8e98417",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0078.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mapierce23/psa/tree/4c0b809ab30ffdf24a449754167e7bad9d90c2f5",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0168.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/szyszyzys/GNNBleed/tree/77a91ddcb61c7d0ea145b303c8ce305a8e4d3961",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0089.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "A non-comparison oblivious sort and its application to private k-NN",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sofianeazogagh/knn/tree/v2",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0093.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/encryptogroup/MultiCent/tree/v0.1.1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0166.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/patrickmesana/waka/tree/06740c9ab8c0d1b6a6821d487edff2b680309451",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0110.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Aimless Onions: Mixing without Topology Information",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kit-ps/aimless-onions/tree/b6774e5ff14b9c6f2ed1dbd834ef6969bcfbd24b",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0131.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Real-world Deniability in Messaging",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/si-co/rwdm/tree/c81cb1d1517dc59bef1156934ebeee61129d11f6",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0018.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Enhancing Metric Privacy With a Shuffler",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/andathan/metric_privacy_shuffle_model/tree/metric_shuffle_code_2",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0081.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Non-Interactive Verifiable Aggregation",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WeiqiNs/NIVA/tree/b6d9767a369cd2d876014ddddb53b77d4886f342",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0171.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Stochastic Models for Remote Timing Attacks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Asterius27/SecPerf-Artifacts/tree/c31491f2cd8a1fa8c4557ecaa90f1e7d6ac90e7b",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0112.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MonashCybersecurityLab/SDSSE/tree/v1.0.0-paper",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0024.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CybersecurityForDemocracy/youtube-ad-settings/tree/artifact-eval",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0169.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Navigating Social Media Privacy: Awareness, Preferences, and Discoverability",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/STEELISI/Social-Media-Privacy-Awareness-Preferences-Discoverability/tree/81bf39637d8877b23ab6a881c9941e1013c5a651",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0148.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15631563",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0157.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Gayatri-Priyadarsini/Measuring-Compliance-of-Consent-Revocation-on-the-Web/tree/03a8c9bc38b289d32cade782ed95dca25a9a0861",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0133.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alshabae/EEMU/tree/7d68bbd84309a4103b2b6f0ad99309299ae71909",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0152.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Vote&amp;Check: Secure Postal Voting with Reduced Trust Assumptions",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://inria.hal.science/hal-04813613",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0101.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sprlab/binary-stylometry/tree/artifact",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0102.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vs-uulm/prepams/tree/pets25.1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0034.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Wave Hello to Privacy - Efficient Mixed-Mode MPC using Wavelet Transforms",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/NillionNetwork/WaveHelloToPrivacy/tree/9d8165e78aa9814b4fbff3c4891c8af21f30ec5b",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0083.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Okay Google, Where\u2019s My Tracker? Security, Privacy, and Performance Evaluation of Google\u2019s Find My Device Network",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/Artifacts-for-Okay-Google-Where-is-My-Tracker/tree/pets25-artifact-evaluation",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0147.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "An Analysis of Censorship Bias in LLMs",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://huggingface.co/collections/mohamedah/an-analysis-of-chinese-censorship-bias-in-llms-683f0916ef3fb0fc657372d9",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0122.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/domiwk/didots/tree/995364c938599cbdf4eb4384a7d701d2ee53c4a8",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0012.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/luan-xiaokun/permumark/tree/c54393e523c0d14e65143331380a06a85744ffa6",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0126.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/n7koirala/image_matching/tree/1a2f0ab9457a5b1eb4461aa6af8a0ae8ae4a5ac9",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0146.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "EpiOracle: Privacy-Preserving Cross-Facility EarlyWarning for Unknown Epidemics",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Yuan-Zhang-uestc/EpiOracleCode/commit/3ccebbf25539a7847b1bfd42a44af03e454a1eab",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0020.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/necst/TimberStrike/releases/tag/pets25-artifact-evaluation",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0145.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "AlphaFL: Secure Aggregation with Malicious\u00b2 Security for Federated Learning against Dishonest Majority",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Barkhausen-Institut/AlphaFL/tree/555426323ddbc2d0f463a5b84d3f8b2a9be3f231",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0134.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Noiseless Privacy-Preserving Decentralized Learning",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sacs-epfl/shatter/tree/shatter-pets-2025",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0043.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Topology-Based Reconstruction Prevention for Decentralised Learning",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://data.4tu.nl/datasets/da119685-3288-4869-88c7-f8138066df66",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0030.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jmakr0/OPPID-artifacts/tree/artifact-review",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0080.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zero-savvy/vimz/tree/9505c178cd7767bdbd74857617a6968df699d8de",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0065.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Client-Efficient Online-Offline Private Information Retrieval",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vt-asaplab/pirex/tree/85090c619abbe2446c9b675a661ea0af322ab2c1",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0095.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/markatou/Partial-APSI/tree/05fbf0f1faf8bd90e5f89b72421acfd3bb5c46ad",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0041.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sustainable-computing/PrivDiffuser/tree/26b17a921274b0224e8985d6be10945aedeb360f",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0118.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Sybil-Resistant Parallel Mixnets",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/maya-kleinstein/Sybil-Resistant-Mixnet/tree/artifact",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0149.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Estimating Group Means Under Local Differential Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mad-lab-fau/ldp-group-mean/tree/9fe89f92f36af8973e6b59115030ac75d8f3cdac",
    "paper_url": "https://www.petsymposium.org/popets/2025/popets-2025-0129.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Who\u2019s Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/PERSUE-Lab-ASU/Zoom-Privacy-Data-Collection-Framework/tree/eaf7555062733fc710fb81d955b977871a42bdce",
    "paper_url": "https://www.petsymposium.org/popets/2025/popets-2025-0143.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/YYangNUS/PETS_PGUP/tree/e2e46ab3f6c3664fd7e548ad838cf093cc71fb95",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0071.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "DiffPrivate: Facial Privacy Protection with Diffusion Models",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/minha12/DiffPrivate/tree/4f7e86c7308b4b09e04f1a619ec5e7c9afa0b939",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0049.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/page0egap/probabilistic-linear-regression-attack-hypersphere-secure-sketch/tree/056cd39eaa2b52e400738dce0e039687b6ec7530",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0154.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2025,
    "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/liang-xiaojian/McPSI/tree/4a1a3c0b9fcf6375e9c31849c34e389aa79920b9",
    "paper_url": "https://petsymposium.org/popets/2025/popets-2025-0082.pdf"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Gaze3P: Gaze-Based Prediction of Perceived Privacy",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17104154",
    "paper_url": "https://doi.org/10.56553/popets-2026-0002"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Ad Personalization and Transparency in Mobile Ecosystems: A Comparative Analysis of Google\u2019s and Apple\u2019s EU App Stores",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/appstore-ad-tools/tree/4bc9d4f70b13e52523382b81574c62983c3ca879",
    "paper_url": "https://doi.org/10.56553/popets-2026-0031"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "dX-Privacy for Text and the Curse of Dimensionality",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/r-carpentier/dx-privacy-curse/tree/acabdd7cc72046d32c354001cda6cf97ac7ebdf1",
    "paper_url": "https://doi.org/10.56553/popets-2026-0012"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Location-Enhanced Information Flow for Home Automations",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/OSF.IO/NPHRV",
    "paper_url": "https://doi.org/10.56553/popets-2026-0018"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "PriVA-C: Defending Voice Assistants from Fingerprinting Attacks",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dilawer11/PriVA-C/tree/fc0e1fc8c1cb4656ff72d3b32a4d4e43367dc243"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/csienslab/bot-among-us/tree/df1622ecaa2bf46f83d8153361a8b2abf7725a99",
    "paper_url": "https://doi.org/10.56553/popets-2026-0003"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "SPRINT: Scalable Secure & Differentially Private Inference for Transformers",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SAP/sprint/tree/69179165f305075af9c765ee415bf1c77da4bd28",
    "paper_url": "https://doi.org/10.56553/popets-2026-0008"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Ephemeral Network-Layer Fingerprinting Defenses",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/maybenot-io/popets-2026.1-ephemeral-defs-paper-artifacts/tree/31ff58466742c69b738191bc66789064bac849c2",
    "paper_url": "https://doi.org/10.56553/popets-2026-0022"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Evaluating connection migration based QUIC censorship circumvention",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/QUICstep-PETS/tree/fdc3ff5f1a39396bb0ba8dcb2015ec9df30a89aa",
    "paper_url": "https://doi.org/10.56553/popets-2026-0014"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Privacy Attacks on Matrix Profiles based on Reconstruction Techniques",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.inria.fr/petscraft-public/attacks-by-reconstruction/-/tree/17dac8b10ca7998a3bf143ee30c88443899509d3",
    "paper_url": "https://doi.org/10.56553/popets-2026-0005"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kylehogan/idealAdsFunctionalities/tree/5bddc412b536da75395ff822a853f126f9bdccfb",
    "paper_url": "https://doi.org/10.56553/popets-2026-0023"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Personal Data Flows and Privacy Policy Traceability in Third-party LLM Apps in the GPT Ecosystem",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17094729",
    "paper_url": "https://doi.org/10.56553/popets-2026-0015"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Sanitization or Deception? Rethinking Privacy Protection in Large Language Models",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BipinPaudel/PrivacyOrDeception_PETS/tree/253ac69e826b13c0ab072d25e90b9f2739a69af5",
    "paper_url": "https://doi.org/10.56553/popets-2026-0009"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tomcory/privacy-policy-annotator/tree/28cc2b1ad104f78696793c33c548cab3ac07c070",
    "paper_url": "https://doi.org/10.56553/popets-2026-0026"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.7278/S5d-f8b6-satb",
    "paper_url": "https://doi.org/10.56553/popets-2026-0020"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Securing Private Federated Learning in a Malicious Setting: A Scalable TEE-Based Approach with Client Auditing",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://arxiv.org/src/2509.08709v2/anc",
    "paper_url": "https://doi.org/10.56553/popets-2026-0025"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "How Experts Personalize Privacy & Security Advice for At-Risk Users",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/osf.io/pqh84",
    "paper_url": "https://doi.org/10.56553/popets-2026-0017"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Breaking BAD? Better Call SAUL! -- Breaking and Fixing Bloom Filters with Added Diffusion",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SchaeferJ/BreakingBAD/tree/11ea61c1bdd0edf3082b77b60bacbc0991b3564f"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Frequency Estimation of Correlated Multi-attribute Data under Local Differential Privacy",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shafizurRseeam/Corr-RR/tree/cc6c059fcc073ab55feeb230ce66d78929e042c1"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Preserving Target Distributions With Differentially Private Count Mechanisms",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/nitinkohli/fixed_point_privacy/tree/dbbf3ce302142f56c3740e052c0216eb6af6917b"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Analyzing Societal Awareness and Perception of Digital Fingerprinting and Fingerprinting Countermeasures",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.lrz.de/digitalfingerprinting/popets-2026.2-analyzing-societal-awareness-and-perception-of-digital-fingerprinting-and-fingerprinting-countermeasures/-/tree/PoPETs_AE_v3"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Privacy Bias in LLMs: A Contextual Integrity-based Auditing Metric",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/yansh/privacy-bias/tree/fce9c3adc7b95fc1bbe3c39cca469deada0145c5"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Clicking into Exposure: Uncovering Privacy Risks of Google Click Identifier in YouTube Ads",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17617/3.H5T0W4"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "CoinJoin ecosystem insights for Wasabi 1.x, Wasabi 2.x and Whirlpool coordinator-based privacy mixers",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/crocs-muni/pets26_coinjoin_analysis/tree/36d61641c9525ae2f828df67d35329c16c351ff3"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Secure Change-Point Detection for Time Series under Homomorphic Encryption",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FedericoMazzone/secure-change-point-detection/tree/8b12738aa2ab91afe4c9995a8d13546d1a96d686"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Exercising the CCPA Opt-out Right on Android: Legally Mandated but Practically Challenging",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/privacy-tech-lab/gpc-android/tree/04b82f2e3d59cb5d7af2bd4a36d4a523fe559d8e"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scambaiting by Leveraging LLMs and Federated Learning",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/supreme-lab/ai-in-the-loop/tree/9443fed81b563848131789bfc724ccea9a8a2e61"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Cryptographically-Secured Domain Validation",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/cryptographic-dv-tamarin-model/tree/540698b9034bb654c7f39132b5bff33d13fab9ba"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/AfonsoVilalonga/Obscura---Artifact/tree/027ab152ada5cfcaade2962a11f8f45f0fe43f7b"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/KillianDavitt/mixnet-user-study/tree/9d05904350c0673f0fb7a054fa5a706f4eb4f02a"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "What-App? App usage detection using encrypted LTE/5G traffic",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Jinjin-Wang07/whatapp-popets26-ae/tree/3a63924dd2d69384091e2c748a2aae4e6888474a"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "CURE: Privacy-Preserving Split Learning Done Right",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CRYPTO-KU/CURE-Privacy-Preserving-Split-Learning/tree/3a130dfcbf1f8f41c7c02e6ffcedb5be1e57b6ce"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Analysis and Attacks on the Reputation System of Nym",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alexiscao/nym-reputation-system/tree/60af552d3db60cd72f18429db52e6a62edb48f65"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "SentinelTouch: A Lightweight Privacy-Preserving Biometric-Fingerprinting Authentication and Identification System Based on Neural Networks and Homomorphic Encryption",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/stamcenter/sentineltouch/tree/43926b171d2126386ae3986c47ee7d734b70b44a"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Humanitarian Aid Distribution with Privacy-Preserving Assessment Capabilities",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/aid-distribution-with-assessments-artifacts/tree/4e4b64c40cbd00c6520df2b78d5e7e5956ff5524"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Gryphes: Hybrid Proofs for Modular SNARKs with Applications to zkRollups",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hkust-okx-zkdex-project/pets26-artifacts/tree/f8ea4a48b0af869e486c641b9ac2ef0bad30872f"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Pantomime: Motion Data Anonymization Using Foundation Motion Models",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kit-ps/Pantomime-Motion-Data-Anonymization-using-Foundation-Motion-Models/tree/39aaca8ca68131c249d46b582b9e913c2fb15881"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Privacy by Voice: Designing Usable Privacy Notices for the Voice Interface",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/h7wkm/overview?view_only=baedc79e9f304172ae000f8392c30c9e"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "tigro: Trust Infrastructure for Grassroots Organizing via Grounded Digital Annotations",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tigro-project/artifact/tree/09e8a6a053091f7899996b6450db862a55f70525"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Multi-Party Private Join",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hpicrypto/mppj-artifacts/tree/c0f9fea21409bfe2c1d8ce8fce20fa74746563eb"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Privacy vs. Profit: The Impact of Google's Manifest Version 3 (MV3) Update on Ad Blocker Effectiveness",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lukic-papadopoulos-research/impact_of_google_mv3_update_on_ad_blocker_effectiveness/tree/c95598f906b9b1f4b1a64143ddd3e31d6bfc4b72"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "\u201cI Just Press Allow\u201d: Understanding Privacy Practices of New Internet Users in Urban India",
    "badges": [
      "available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Priyankapopuri08/PoPETs-Understanding-Privacy-Practices/tree/1191ca5b1274b49bab8ed1d38a6cc3c790b70fd1"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "Website fingerprinting on Nym: Attacks and Defenses",
    "badges": [
      "available",
      "functional",
      "reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/WF4NYM-artifacts/tree/e6f95df158658ed99c28115aad82924f9f534f88"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "HyperVerITAS: Verifying Image Transformations at Scale on Boolean Hypercubes",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/glgreiner/HyperVerITAS/tree/915c48a29252067121832ea9c51fdaff5ec9a961"
  },
  {
    "conference": "PETS",
    "category": "security",
    "year": 2026,
    "title": "SoK: Can Fully Homomorphic Encryption Support General AI Computation? A Functional and Cost Analysis",
    "badges": [
      "available",
      "functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jqxue1999/Artifact/tree/3146ec3ebb1035300d2ea4e341af2220d8bb53e2"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "Delegating Verification for Remote Attestation using TEE",
    "badges": [
      "Artifacts Available + Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hatena75/ProxyVerifier_QVS/tree/49fbc48af05806f9cea76bd0f56fc40ce729bad0"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "duet: Combining a Trustworthy Controller with a Confidential Computing Environment",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Nokia-Bell-Labs/tee-duet/tree/9eb44fe5e1b60519656b93630b9f5cbf5a111861"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "NetReach: Guaranteed Network Availability and Reachability to enable Resilient Networks for  Embedded Systems",
    "badges": [
      "Artifacts Available + Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/distrinet-netreach/documentation/-/tree/systex-2024"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "PraaS: Verifiable Proofs of Property as-a-Service with Intel SGX",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Nokia-Bell-Labs/proof-as-a-service/tree/1e24dce47fd468e56ebc3ad2b55c093c412b866d"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains",
    "badges": [
      "Artifacts Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/chenchanglew/systex2024/tree/2bd229b4d4c4e6be9648c411aa8e4d744eff3524"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "Secure Intermittent Computing with ARM TrustZone on the Cortex-M",
    "badges": [
      "Artifacts Available + Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ptrchv/STM32-IntermittentSecurity/tree/systex2024_submission"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2024,
    "title": "SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SNPGuard/snp-guard/tree/v0.1.3"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2025,
    "title": "An Early Experience with Confidential Computing Architecture for On-Device Model Protection",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/comet-cc/CCA-Evaluation/tree/SysTEX25"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2025,
    "title": "Enclave Application Cache for RISC-V Keystone",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Nanamiiiii/keystone-ecache/tree/systex-2025"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2025,
    "title": "End-to-End Confidentiality with SEV-SNP Leveraging In-Memory Storage",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lorenzobrescia/snp-guard-in-memory-storage/tree/v1.0.0"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2025,
    "title": "Principled Symbolic Validation of Enclaves on Low-End Microcontrollers",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pandora-tee/pandora-examples/tree/systex25-artifact/sancus"
  },
  {
    "conference": "SYSTEX",
    "category": "security",
    "year": 2025,
    "title": "Wait a Cycle: Eroding Cryptographic Trust in Low-End TEEs via Timing Side Channels",
    "badges": [
      "Artifacts Available + Functional + Reusable"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dnet-tee/wait-a-cycle/tree/systex25-artifacts"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "http://securityadvice.cs.umd.edu/",
    "paper_url": "https://www.usenix.org/system/files/sec20-redmiles.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://cispa.saarland/group/cremers/tools/tamarin/WPA2/index.html",
    "paper_url": "https://www.usenix.org/system/files/sec20-cremers.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://dane-study.github.io/",
    "paper_url": "https://www.usenix.org/system/files/sec20-lee-hyeonmin.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/symphorien/spectral-noise-analysis-usenix-artifact",
    "paper_url": "https://www.usenix.org/system/files/sec20-girol_0.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/framing-control-proxy",
    "paper_url": "https://www.usenix.org/system/files/sec20-calzavara.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Achieving Keyless CDNs with Conclaves",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://phoenix.cs.umd.edu/",
    "paper_url": "https://www.usenix.org/system/files/sec20-herwig.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://scaling-attacks.net/",
    "paper_url": "https://www.usenix.org/system/files/sec20-quiring.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/securesystemslab/agamotto",
    "paper_url": "https://www.usenix.org/system/files/sec20-song.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/open?id=1xLssDxYWyKFCwS5HUrQaSex0uwJRSvDi",
    "paper_url": "https://www.usenix.org/system/files/sec20-zhou-shunfan.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/assist-project/dtls-fuzzer/",
    "paper_url": "https://www.usenix.org/system/files/sec20-fiterau-brostean.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sprout-uci/apex",
    "paper_url": "https://www.usenix.org/system/files/sec20-nunes.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Automatic Techniques to Systematically Discover New Heap Exploitation Primitives",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sslab-gatech/ArcHeap",
    "paper_url": "https://www.usenix.org/system/files/sec20-yun.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Automating the Development of Chosen Ciphertext Attacks",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Pythia3431/Delphinium",
    "paper_url": "https://www.usenix.org/system/files/sec20-beck_0.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Fraunhofer-AISEC/DATA",
    "paper_url": "https://www.usenix.org/system/files/sec20-weiser.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "BlockSci: Design and applications of a blockchain analysis platform",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/citp/BlockSci",
    "paper_url": "https://www.usenix.org/system/files/sec20-kalodner.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Certified Side Channels",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.3736311",
    "paper_url": "https://www.usenix.org/system/files/sec20-garcia.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Chaperone: Real-time Locking and Loss Prevention for Smartphones",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cryspuwaterloo/chaperone",
    "paper_url": "https://www.usenix.org/system/files/sec20-chen-jiayi.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Datalog Disassembly",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/GrammaTech/ddisasm",
    "paper_url": "https://www.usenix.org/system/files/sec20-flores-montoya.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/Donky",
    "paper_url": "https://www.usenix.org/system/files/sec20-schrammel.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MoonLight-SteinsGate/EcoFuzz",
    "paper_url": "https://www.usenix.org/system/files/sec20-yue.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/iromise/fans",
    "paper_url": "https://www.usenix.org/system/files/sec20-liu.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/frankenstein",
    "paper_url": "https://www.usenix.org/system/files/sec20-ruge.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://dx.doi.org/10.17635/lancaster/researchdata/319",
    "paper_url": "https://www.usenix.org/system/files/sec20-weir.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/embedded-sec/halucinator",
    "paper_url": "https://www.usenix.org/system/files/sec20-clements.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/suyeecav/Hybrid-Attack",
    "paper_url": "https://www.usenix.org/system/files/sec20-suya.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://mctiny.org/software.html",
    "paper_url": "https://www.usenix.org/system/files/sec20-bernstein.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://sfzhu93.github.io/projects/vt/index.html",
    "paper_url": "https://www.usenix.org/system/files/sec20-zhu.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WSP-LAB/Montage",
    "paper_url": "https://www.usenix.org/system/files/sec20-lee-suyoung.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bu-icsg/PHMon",
    "paper_url": "https://www.usenix.org/system/files/sec20-delshadtehrani.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/greenlsi/reload_refresh",
    "paper_url": "https://www.usenix.org/system/files/sec20-briongos_0.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://usenix2020-aec.rlbox.dev/",
    "paper_url": "https://www.usenix.org/system/files/sec20-narayan.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Scaling Verifiable Computation Using Efficient Set Accumulators",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alex-ozdemir/bellman-bignat",
    "paper_url": "https://www.usenix.org/system/files/sec20-ozdemir.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sengsgx/sengsgx",
    "paper_url": "https://www.usenix.org/system/files/sec20-schwarz.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/URSec/Silhouette",
    "paper_url": "https://www.usenix.org/system/files/sec20-zhou-jie.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Symbolic execution with SymCC: Don't interpret, compile!",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://www.s3.eurecom.fr/tools/symbolic_execution/symcc.html",
    "paper_url": "https://www.usenix.org/system/files/sec20-poeplau.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Temporal System Call Specialization for Attack Surface Reduction",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shamedgh/temporal-specialization",
    "paper_url": "https://www.usenix.org/system/files/sec20-ghavamnia.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2020,
    "title": "Towards HTTPS Everywhere on Android: We Are Not There Yet",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec20-possemato.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MarcT0K/Refined-score-atk-SSE",
    "paper_url": "https://www.usenix.org/system/files/sec21-damie.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec21-moon.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Adversarial Policy Training against Deep Reinforcement Learning",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/psuwuxian/rl_attack",
    "paper_url": "https://www.usenix.org/system/files/sec21summer_wu-xian.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Blind Backdoors in Deep Learning Models",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ebagdasa/backdoors101/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/system/files/sec21-bagdasaryan.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Blind In/On-Path Attacks and Applications to VPNs",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://git.breakpointingbad.com/Breakpointing-Bad-Public/vpn-attacks",
    "paper_url": "https://www.usenix.org/system/files/sec21fall-tolley.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/whyisyoung/CADE",
    "paper_url": "https://www.usenix.org/system/files/sec21-yang-limin.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Card Brand Mixup Attack: Billions of EMV Cards Pwned",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/EMVrace/EMVerify-PAN-routing",
    "paper_url": "https://www.usenix.org/system/files/sec21-basin.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mc2-project/cerebro",
    "paper_url": "https://www.usenix.org/system/files/sec21-zheng.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Disrupting Continuity of Apple\u2019s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/openwifipass",
    "paper_url": "https://www.usenix.org/system/files/sec21-stute.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/efeslab/dolma",
    "paper_url": "https://www.usenix.org/system/files/sec21-loughlin.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SP2-MC2/e2ee",
    "paper_url": "https://www.usenix.org/system/files/sec21-akgul.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/plaperdr/fingerprinting-in-style",
    "paper_url": "https://www.usenix.org/system/files/sec21-laperdrix.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec21-li-shih-wei.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dn0sar/frontal_poc/archive/refs/tags/v0.1.1.zip",
    "paper_url": "https://www.usenix.org/system/files/sec21-puddu.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/christoftorres/Frontrunner-Jones",
    "paper_url": "https://www.usenix.org/system/files/sec21-torres.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FPSG-UIUC/lotr",
    "paper_url": "https://www.usenix.org/system/files/sec21-paccagnella.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/softsec-unh/MBA-Blast",
    "paper_url": "https://www.usenix.org/system/files/sec21-liu-binbin.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gururaj-s/mirage/",
    "paper_url": "https://www.usenix.org/system/files/sec21fall-saileshwar.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Muse: Secure CNN Inference for Malicious Clients",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ryanleh/muse",
    "paper_url": "https://www.usenix.org/system/files/sec21-lehmkuhl.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec21-son.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://neverenough-sec2021.github.io/",
    "paper_url": "https://www.usenix.org/system/files/sec21-jansen.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Osiris: Automated Discovery Of Microarchitectural Side Channels",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/osiris",
    "paper_url": "https://www.usenix.org/system/files/sec21-weber.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "PACStack: an Authenticated Call Stack",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://pacstack.github.io/",
    "paper_url": "https://www.usenix.org/system/files/sec21-liljestrand.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec21-acharya.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lambdapioneer/rollercoaster/tree/f09706766b736bb714a5efa3c34936e2cb19556d",
    "paper_url": "https://www.usenix.org/system/files/sec21-hugenroth.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BUseclab/saphire",
    "paper_url": "https://www.usenix.org/system/files/sec21-bulekov.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "SEApp: Bringing Mandatory Access Control to Android Apps",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/matthewrossi/seapp",
    "paper_url": "https://www.usenix.org/system/files/sec21-rossi.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "SELECTIVETAINT: Efficient Data Flow Tracking With Static Binary Rewriting",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/OSUSecLab/SelectiveTaint",
    "paper_url": "https://www.usenix.org/system/files/sec21-chen-sanchuan.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ssloxford/short-lived-adversarial-perturbations",
    "paper_url": "https://www.usenix.org/system/files/sec21-lovisotto.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec21-so.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/sec21-liu-shinan.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Undo Workarounds for Kernel Bugs",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/trusslab/hecaton",
    "paper_url": "https://www.usenix.org/system/files/sec21-talebi.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FHMS-ITS/EAST",
    "paper_url": "https://www.usenix.org/system/files/sec21-poddebniak.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2021,
    "title": "YarIx: Scalable YARA-based Malware Intelligence",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mbrengel/yarix",
    "paper_url": "https://www.usenix.org/system/files/sec21-brengel.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Orca: Blocklisting in Sender-Anonymous Messaging",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/nirvantyagi/orca/releases/tag/usenix-sec22-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/tyagi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sunblaze-ucb/privguard-artifact/tree/b1b5f3a16af6ab5f7cb0f0737aba27dd9d76c25b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/wang-lun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "OpenSSLNTRU: Faster post-quantum TLS key exchange",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5833729",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/bernstein",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Midas: Systematic Kernel TOCTTOU Protection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/5753026",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/bhattacharyya",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final4.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Jenny: Securing Syscalls for PKU-based Memory Isolation Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/Jenny/tree/39bb0c696ce3c178e9593b7dbc034b2447ba2d00",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/schrammel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Back-Propagating System Dependency Impact for Attack Investigation",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/5559214#.YWYJT2LMKUk",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/fang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Automated Side Channel Analysis of Media Software with Manifold Learning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/5816702#.YdQMHxNByjA",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/yuan-yuanyuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Mining Node.js Vulnerabilities via Object Dependence Graph and Query",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Song-Li/ODGen/tree/24d68fa810cae8c028cf36f269461e178c198c98",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/li-song",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alex1230608/Bedrock/tree/4eef2619d7fb007b4c8ed690c6d78e8fea377455",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/xing",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Polynomial Commitment with a One-to-Many Prover and Applications",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sunblaze-ucb/eVSS/tree/e8f1cd4d6ef086b2ae017ed56560328fdffec491",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-jiaheng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IoTAccessControl/RapidPatch/tree/ae-v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/he-yi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/LVI-NULLify/tree/3858b2b0dac7a98764ca245616c283bca1bb4e72",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/giner",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5565170",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/trimananda",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final13.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/corkami/mitra/tree/Usenix22",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/albertini",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Synthetic Data \u2013 Anonymisation Groundhog Day",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/synthetic_data_release/tree/v1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/stadler",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "HyperDegrade: From GHz to MHz Effective CPU Frequencies",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/5549559",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/aldaya",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/derbear/aardvark-prototype/tree/dd8f6aaf5f76173118f3f3decbe099bda5972ce2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/leung",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "On the Security Risks of AutoML",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ain-soph/autovul/tree/ade119d3c9aa1e851eba7db35f2de3c99eb0bf33",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/pang-ren",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/donnod/linux-sgx-mage/tree/713fbd7479a37d1b768c615b3fd656c1774d9601",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/chen-guoxing",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "A Large-scale Investigation into Geodifferences in Mobile Apps",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/censoredplanet/geodiff-app/tree/9ae97196ee82e741e17126dfc6ad518a88ea2cac",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kumar",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Debloating Address Sanitizer",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/junxzm1990/ASAN--/tree/f497310328fafddc7fe7993edb8befd4ab4d6393",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-yuchen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seclab-ucr/SyzScope/tree/b1a6e20783ba8c92dd33d508e469bc24eaacaab6",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zou",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/suciu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Incremental Offline/Online PIR",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/eniac/incpir/tree/a7d1bcf45b1bd5a3e98bcb421276ecd09c6eebdd",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/ma",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Morphuzz: Bending (Input) Space to Fuzz Virtual Devices",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/5655839",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/bulekov",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/skilldetective/skilldetective/releases/tag/V0.3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/young",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SecSMT: Securing SMT Processors against Contention-Based Covert Channels",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mktrm/SecSMT_Artifact/tree/86286e06f6f1d8ce9583af950edacb87f14e39ba",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/taram",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final27.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Regulator: Dynamic Analysis to Detect ReDoS",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5669243",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/mclaughlin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DeepBitsTechnology/DeepDi/tree/74f0af0d4cdf33fc5de6f55d5f4ec5142de68c18",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/yu-sheng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shahakash28/simc/tree/2a5fd092b52427cc9cac55b36ec50ae43ecee6be",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/chandran",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/jain",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final31.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Automating Cookie Consent and GDPR Violation Detection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.5838646",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/bollinger",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/5702603",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/hiesgen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final33.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Elasticlave: An Efficient Memory Model for Enclaves",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jasonyu1996/elasticlave/tree/29aab3993f2c4c28b4c59053ecd1fb44a448012f",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/yu-jason",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WSP-LAB/FUGIO-artifact/tree/v0.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/park-sunnyeo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22summerae-final35.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Caring about Sharing: User Perceptions of Multiparty Data Sharing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bkacsmar/CaringAboutSharing/releases/tag/V1.Usenix.22",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kacsmar",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alex-ozdemir/multiprover-snark/tree/98cc63c7b885ade04989a5505050504ae7f2aac0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/ozdemir",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Membership Inference Attacks and Defenses in Neural Network Pruning",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Machine-Learning-Security-Lab/mia_prune/tree/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/yuan-xiaoyong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "PolyCruise: A Cross-Language Dynamic Information Flow Analysis",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Daybreak2019/PolyCruise/releases/tag/v3.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/li-wen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/bhi-spectre-bhb/releases/tag/ae_final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/barberis",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Khaleesi: Breaker of Advertising and Tracking Request Chains",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/uiowa-irl/Khaleesi/tree/bd28513878a363b39b0ee9e7a6a4350f71672912",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/iqbal",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jkrshnmenon/arbiter/releases/tag/v1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/vadayath",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sefcom/KHeaps/tree/22b35da5f9f259f5cc8f349da9f791d9428295e4",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zeng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/KULeuven-COSIC/Double-Trouble/tree/ArtifactsAvailable",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/purnal",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zuo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/JaronMink/DeepPhish/releases/tag/USENIX-22-artifact-evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/mink",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final13.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hyperproofs/hyperproofs/releases/tag/1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/srinivasan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Alibaba-Gemini-Lab/OpenCheetah/tree/a9b362e4497f640f49c7926e372bf625d9f45ccf",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/huang-zhicong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/URSec/Kage/tree/195d489bcab7f0914a0092a614ff5d88894a165e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/du",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Provably-Safe Multilingual Software Sandboxing using WebAssembly",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/secure-foundations/provably-safe-sandboxing-wasm-usenix22/tree/6f5668d3f216aeef65cf2bf2d916a40d3c750e53",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/bosamiya",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shakevsky/keybuster/tree/v0.1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/shakevsky",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/PatchCleanser/tree/2370c78da15ccec08b7a05145c92cafb9b0f73a9",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/xiang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Security and Privacy Perceptions of Third-Party Application Access for Google Accounts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gwusec/api-privacy-archive-usenix22/tree/116104e7112b311ccf0567b58aebaf3f13ee3a50",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/balash",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Transferring Adversarial Robustness Through Robust Representation Matching",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Ethos-lab/robust-representation-matching/releases/tag/final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/vaishnavi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/yoo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Efficient Representation of Numerical Optimization Problems for SNARKs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/eniac/otti/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/angel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "ppSAT: Towards Two-Party Private SAT Solving",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/PP-FM/ppsat/releases/tag/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/luo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Anycast Agility: Network Playbooks to Fight DDoS",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/6473023",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/rizvi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final27.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Practical Data Access Minimization in Trigger-Action Platforms",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.6523010",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/chen-yunang-practical",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sss-wue/scraps/releases/tag/1.0.2-beta",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/petzi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.mpi-sws.org/pacer/pacer/-/tags/security22-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/mehta",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/uwb-sniffer/tree/usenix22-artifact-evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/leu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final31.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-NDS/DocumentSignatureValidator/releases/tag/Artifact_Evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/rohlmann",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Zero-Knowledge Middleboxes",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pag-crypto/zkmbs/tree/096ed18772d8e63f4a03e7f4d16e118aa3923135",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/grubbs",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RasoulAM/constant-weight-pir/releases/tag/artifact-accepted",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/mahdavi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final35.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models",
    "badges": [
      "Badges: Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/smehnaz/black-boxMIAI",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/mehnaz",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/iaik/minefield/tree/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kogler-minefield",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fuzzware-fuzzer/fuzzware/releases/tag/sec22-ae-accepted",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22fallae-final39.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/citp/mps-operations/releases/tag/usenix22",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kulshrestha",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/Supplementary_artifact_for_the_paper_FIXREVERTER_A_Realistic_Bug_Injection_Methodology_for_Benchmarking_Fuzz_Testing_/20647821",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-zenong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Ground Truth for Binary Disassembly is Not Easy",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/junxzm1990/x86-sok/tree/25656adbe14",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/pang-chengbin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/comsec-group/cellift-artifacts/tree/eaa9a26ae85fd6a7ae8cd248416315414ae4c135",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/solt",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Stateful Greybox Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bajinsheng/SGFuzz/tree/8f45141b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/ba",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/the-security-lottery/tree/66cc012fe7603e1758dde68fe9eec2d23542968e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/roth",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/R-Fuzz/fastgen/commit/01d31bc6bb42ee3535bb3aa8a0f88d345e9cb23d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/chen-ju",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Twilight: A Differentially Private Payment Channel Network",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/saart/Twilight/tree/USENIX-Security-22",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/dotan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jpcsmith/qcsd-experiments/tree/v1.0.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/smith",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/islamazhar/MIGP_python/releases/tag/artifact_eval",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/pal",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FPSG-UIUC/hertzbleed/releases/tag/usenix2022ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/wang-yingchen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/messlabnyu/DrifuzzProject/tree/d0b9edfa364c2f9fe45d4b63c0ad9f62dca0bfc9",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/shen-zekun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CSAIL-Arch-Sec/dont-mesh-around/releases/tag/usenix2022",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/dai",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/tlbdr/tree/sec22-ae-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/tatar",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SecRank/secrank-sourcecode/releases/tag/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/xie",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "One-off Disclosure Control by Heterogeneous Generalization",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/discont/disclosurecontrol/releases/tag/artifact-evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/gkountouna",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/yananli117/E2SE/tree/bd4de7fb1c6c70df96bf89a17c100624fa665d0b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/chen-long",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/MIAdefenseSELENA/tree/39428e763566a8276d82e1c0fe91bbaaddb84bfb",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/tang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Detecting Logical Bugs of DBMS with Coverage-based Guidance",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/psu-security-universe/sqlright-artifact/tree/57978e5ce697e13414a2bca871d2ef874e77158d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/liang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Faster Yet Safer: Logging System Via Fixed-Key Blockcipher",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/TsongW/QuickLog/tree/1d1cb65ace83308306c1ae80e884a1f4ed68facd",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/hoang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Half-Double: Hammering From the Next Row Over",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/halfdouble/tree/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kogler-half-double",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/manuelbrack/VulnerabilityLifetimes/tree/usenix_v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/alexopoulos",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SAPIC+: protocol verifiers of the world, unite!",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://hub.docker.com/layers/sapicplusplatform/robertkuennemann/sapicplusplatform/latest/images/sha256-69b9a11f3a14e27c73b589a9d3fa2eda2b7cc27eec830ab0749ae3bfba23babc",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/cheval",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
    "badges": [
      "Badges: Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/gu-jinyu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mimicji/FlowMatrix/tree/c4a809f6c76ac447d0baf542db9e04b8d4600436",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/ji",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final27.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7023642",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/garbelini",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/leakuidatorplusteam/artifacts/tree/78bae165e0dbcdeb245b19a1f5b75a191de92fc3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/zaheri",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/6677235#.YrH-o3jMJes",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kondracki",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "AutoDA: Automated Decision-based Iterative Adversarial Attacks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Fugoes/AutoDA/tree/257cf85e1c0c1d129a50a274764ed6bc893ccde5",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/fu-qi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/ampfuzz/releases/tag/usenix22_ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/krupp",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final33.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.25835/wg7xhqmh",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/kaur",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final35.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/uni-due-syssec/sgxfuzz/tree/usenix2022",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/cloosters",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "PISTIS: Trusted Computing Architecture for Low-end Embedded Systems",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MicheleGrisafi/PISTIS_AE/releases/tag/Artefact.v1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/grisafi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final37.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-SysSec/loki/tree/86134c1318347547debaf9b77e867d5b16d79d1d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/schloegel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/spring-epfl/WebGraph/releases/tag/usenix-artifacts-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/siby",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final39.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks",
    "badges": [
      "Badges: Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/townley",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final40.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Measurement by Proxy: On the Accuracy of Online Marketplace Measurements",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/aledcuevas/dnm-simulation/releases/tag/v0.2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/cuevas",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final41.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Why Users (Don't) Use Password Managers at a Large Educational Institution",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gwusec/2022-USENIX-Password-Managers/releases/tag/v1.1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/mayer",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final42.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "RETBLEED: Arbitrary Speculative Code Execution with Return Instructions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/comsec-group/retbleed/releases/tag/sec22-artifact-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/wikner",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final43.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Piranha: A GPU Platform for Secure Computation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ucbrise/piranha/tree/ddfb646f6f0e37e20194e4437e0d8e303fd89e4c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/watson",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final44.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Batched Differentially Private Information Retrieval",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/multiparty/DP-PIR/tree/usenix2022",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/albab",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final45.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tls-attacker/TLS-Anvil/releases/tag/v1.0.3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/maehren",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final46.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "SWAPP: A New Programmable Playground for Web Application Security",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.6860277",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/chinprutthiwong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final47.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "\"They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/domesticworkerprivacy/domesticworkerprivacy.github.io/tree/33fc93f2a192378180a5f6eb235f384d07c67ced",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/slupska-vulnerability",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final48.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "Creating a Secure Underlay for the Internet",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/scion-backbone/sbas/tree/80044509e5ac1681e8d970a09e4b3187439a0938",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/birge-lee",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final49.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2022,
    "title": "GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/6692160",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity22/presentation/harrity",
    "appendix_url": "https://secartifacts.github.io/usenixsec2022/appendix-files/sec22winterae-final50.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fuzztruction/fuzztruction/tree/91ba684d2b8fa21ae19e403496b507f3729c4ff5",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/bars",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "The Impostor Among US(B): Off-Path Injection Attacks on USB Communications",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/0xADE1A1DE/USB-Injection/releases/tag/PosSec23AE",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/dumitru",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Improving Logging to Reduce Permission Over-Granting Mistakes",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/byshen/seclog_ae/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/shen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/mwait/tree/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhangruiyi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SpaceNaN/fuzzjit/tree/a3d3f6da7f7f8577476892d6135eee6c50afc7ad",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wangjunjie",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "PUMM: Preventing Use-After-Free Using Execution Unit Partitioning",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/carter-yagemann/PUMM/tree/91e58cd5d929e25d0b83fdfd0ec3c5517e2a32e7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yagemann",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7356538",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/gierlings",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Security and Privacy Failures in Popular 2FA Apps",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/blues-lab/totp-app-analysis-public/releases/tag/usenix-sec23-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/gilsenan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final13.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/TheNetAdmin/NVLeak/tree/588567e6ec30f2df9f260e60385031c94e94c75e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wangzixuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Linear Private Set Union from Multi-Query Reverse Private Membership Test",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/alibaba-edu/mpc4j/releases/tag/v1.0.4",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhangcong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Device Tracking via Linux's New TCP Source Port Selection Algorithm",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/0xkol/rfc6056-device-tracker/tree/09dd6ab68e10566eb6ca7760ef78d4689c7e2b85",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/kol",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Every Signature is Broken: On the Insecurity of Microsoft Office\u2019s OOXML Signatures",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-NDS/OOXML_Signature_Security/releases/tag/Artifact_Evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/rohlmann",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Automated Security Analysis of Exposure Notification Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.21304305",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/morio",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
    "badges": [
      "Badges: Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/prokos",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ahenzinger/simplepir/tree/438b4590aceedf76c7588b03125dfc0db39e361f",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/henzinger",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Decompiling x86 Deep Neural Network Executables",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/monkbai/DNN-decompiler/tree/b4f64783846b85cac4b0eb6c7a5595535cc858d3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/liuzhibo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.20022893.v1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/liwen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Are Consumers Willing to Pay for Security and Privacy of IoT Devices?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pemamina/USENIX23_MonteryValueSP_Artifact/tree/e88e7eb5630996756f14335bf32abc4e9298e97a",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/emami-naeini",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Reassembly is Hard: A Reflection on Challenges and Strategies",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SoftSec-KAIST/Reassessor/tree/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/kimhyungseok",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "A comprehensive, formal and automated analysis of the EDHOC protocol",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://hub.docker.com/layers/protocolanalysis/lake-edhoc/draft-14/images/sha256-68203cf018eb659859b367c7830190a68bfd970b4bee6db5984dcfd1196e06a8?context=explore",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/jacomme",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23summerae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/multifactor/MFKDF/tree/1427224a709b77312b1b03cfa79ebed7bed316ea",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/nair",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "HOLMES: Efficient Distribution Testing for Secure Collaborative Learning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/holmes-inputcheck/holmes-library/tree/e80bd38dc32dbe3c988090d96a20e70af31311d8",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/chang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final4.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://git-crysp.uwaterloo.ca/avadapal/duoram/src/usenixsec23_artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/vadapalli",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ShaniBenAtya/dnssim/tree/1.4",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/afek",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UzL-ITS/cipherfix/tree/0d05fcbe48498acc827ad0373cd7244c590b27c4",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/brave-experiments/pool-party-artifact/releases/tag/usenix-2023",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/snyder",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/H0w1/CISB-dataset/tree/aac22565c96744a13f0786854b3257d64421acef",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/xujianhao",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/yuske/silent-spring/tree/2c7cfab",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/shcherbakov",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Eos: Efficient Private Delegation of zkSNARK Provers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://drive.google.com/file/d/13j2UKKgyPy2ChuMzs5g8VCQ_3sKMrgK2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/chiesa",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Trojan Source: Invisible Vulnerabilities",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/nickboucher/trojan-source/tree/e3dc153fcf465f4a84424ea874ff39be29adb1f7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/boucher",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/TRUST-TUDa/argus-data/tree/606d5a5ebe78f602e27b9f2c48ea103348463eeb",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/rieger",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Educators\u2019 Perspectives of Using (or Not Using) Online Exam Proctoring",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gwusec/2023-USENIX-Educator-Perspectives-of-Exam-Proctoring/tree/10b55097bd807eb0cf3e6a41b154fe4e4e235f43",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/balash",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SPIN-UMass/FRL/tree/4cf2550972e0e6299f61f682579f10b8e32c39d7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/mozaffari",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Side-Channel Attacks on Optane Persistent Memory",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Systems-ShiftLab/optane_sec23_ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/liusihang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/privruler/PrivRuler-Public/tree/8ff0ae9c8d2611072fde0b112e71b8f662fb2507",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wangxueqiang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BUseclab/Minimalist/releases/tag/v1.0.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/jahanshahi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "An Efficient Design of Intelligent Network Data Plane",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IDP-code/NetBeacon",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhouguangmeng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "AutoFR: Automated Filter Rule Generation for Adblocking",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UCI-Networking-Group/AutoFR/releases/tag/v1.0.0-artifact-review",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/le",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wjl123wjl/Aegis.git",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wangjialai",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gfw-report/usenixsecurity23-artifact/commit/ad45e63b4a708bda5ce39f48fc25ebbae013ee51",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wu-mingshi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seclab-fudan/TEFuzz",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhaoyudi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Capstone: A Capability-based Foundation for Trustless Secure Memory Access",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jasonyu1996/capstone/tree/a4ab0e9d2a9020147d79915f6bced223965bbe88",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yujason",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ARMore: Pushing Love Back Into Binaries",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7707863",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/bartolomeo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "USLH: Taking Speculative Load Hardening to the Next Level",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/0xADE1A1DE/USLH/tree/e5a91d824e5c8004ff5433356429a8b861fec744",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhangzhiyuan-slh",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "BunnyHop: Exploiting the Instruction Prefetcher",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/0xADE1A1DE/BunnyHop/tree/f137d17d31c655f6216c117dcafd6cc4e3758ad6",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhangzhiyuan-bunnyhop",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sesame-symbolic-model/sesame-model/tree/%E2%80%9Csesame-model-v1%E2%80%9D",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/cremers-sessionhandling",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final31.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Formal Analysis of SPDM: Security Protocol and Data Model version 1.2",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FormalAnalysisOf/SPDM/tree/V1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/cremers-spdm",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/EspressoSystems/veri-zexe/tree/42657f254c7f1353914b098dc78f5fb97408bfcd",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/xiong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/brown-ssl/ivysyn/-/tree/4b3d26dda0ddea11282c2658e28090a738dfd6c7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/christou",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sourav1547/htadkg/commit/0d221e8965c5cf6b18823d894ef48c0fabc34b6e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/das",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final37.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BUseclab/FirmSolo/tree/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/angelakopoulos",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7187358",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/sandoval",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final39.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ruoxi-jia-group/Meta-Sift/releases/tag/artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zeng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final40.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sbaresearch/mobile-atlas/tree/usenix-sec23-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/gegenhuber",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final41.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ACon2: Adaptive Conformal Consensus for Provable Blockchain Oracles",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sslab-gatech/ACon2/tree/AEStableVersion",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/park",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final42.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "autofz: Automated Fuzzer Composition at Runtime",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sslab-gatech/autofz/tree/b9a795dda252aa37406d593434b710b0fbedd177",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/fuyufu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final43.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CyFI-Lab-Public/MARSEA/tree/fc53c4629065eeaad78258a11d950265cb059c5d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yaomingxuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final44.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Authenticated private information retrieval",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dedis/apir-code/tree/af3202e3776d4cb880256372dd51613ee34532ba",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/colombo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final45.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Understand Users\u2019 Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7707330#.ZAh0q3bMIQ8",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/caizekun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final48.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/xiaoyue10131748/Lalaine/tree/LalaineStable",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/xiaoyue",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final50.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Controlled Data Races in Enclaves: Attacks and Detection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/OSUSecLab/SGXRacer/tree/61784f220b94a621255ed16434d3c45351cbb981",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/chensanchuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final51.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Prime Match: A Privacy Preserving Inventory Matching System",
    "badges": [
      "Badges: Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/polychroniadou",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final53.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "The Gates of Time: Improving Cache Attacks with Transient Execution",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/0xADE1A1DE/GoT/commit/883a080f94cc15592d9665656c9e3923d5a9e46d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/katzman",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final54.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "TreeSync: Authenticated Group Management for Messaging Layer Security",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Inria-Prosecco/treesync/tree/7ea27ead0abc4e6bf47033f35a7eada233ac244e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wallez",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final55.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/momalab/ICSPatch/tree/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/rajput",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23fallae-final56.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/proteus-core/prospect/tree/usenix_artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/daniel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/HexHive/FishFuzz/commit/911637cdf7448b97eccf1c9664ef318aff884b63",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zheng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sycuricon/MorFuzz/releases/tag/usenix23",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/xu-jinyan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "TAP: Transparent and Privacy-Preserving Data Services",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tap-group/transparent-data-service/tree/9e97cd42e12fb2941253b0960d4689bf944889a0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/reijsbergen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final4.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/KULeuven-COSIC/SpectrEM/tree/87c91a9ae397c48d207bc2ddc8673b85b8caccf0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/de-meulemeester",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/purplewall1206/PET",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wang-zicheng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vicTorKd/HorusEye/releases/tag/v1.0.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/dong-yutao",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tls-attacker/We-Really-Need-to-Talk-About-Session-Tickets/tree/886880ec702e14c52df076cfc876a4ad530ab67b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/hebrok",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/8013704",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/klischies",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dilawer11/va-fingerprinting/tree/0dd1ec3a65e843e366e81ffd29721593bc8043b1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed-dilawer",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tls-attacker/Exploring-the-Unknown-DTLS-Universe/tree/563b9ca12920eed26b00f518fe7465b2b833024e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/erinola",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CactiLab/code-xNIDS/releases/tag/v2023.1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wei-feng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-SysSec/adversarial-papers/tree/01fc915612c7ca72481b50ab7700dde1e0fa6188",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/eisenhofer",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final13.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/purs3lab/Argus_artifacts/commit/c8a208634bb87201ba8d4c534f46adf8b8634325",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/muralee",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UCI-Networking-Group/PoliGraph/tree/USENIX-AE-v1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/cui",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/christoftorres/Web3-Privacy/commit/d5884c73dba5783ea3dc419433680596ea90e882",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/torres",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fuzzware-fuzzer/hoedur-experiments/releases/tag/sec23-ae-submission",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/scharnowski",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "SANDDRILLER: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vdata1/SandDriller/releases/tag/1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/alhamdan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7935034",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/nair-identification",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Auditory Eyesight: Demystifying \u03bcs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/auditoryeye/auditoryeye_artifact/releases/tag/20230809",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/tu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Mitigating Security Risks in Linux with KLAUS -- A Method for Evaluating Patch Correctness",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wupco/KLAUS",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wu-yuhang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ya0guang/PoBF/tree/usenix-sec-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/chen-hongbo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "DAFL: Directed Grey-box Fuzzing guided by Data Dependency",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/8219904",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/kim-tae-eun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "WaterBear: Asynchronous BFT with Information-Theoretic Security and Quantum Security",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fififish/waterbear/releases/tag/usenixsec",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-haibin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Forming Faster Firmware Fuzzers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/8223055",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/seidel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/DistriNet/BugHog/tree/usenix23-artifact-stable",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/franken",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RIT-CHAOS-SEC/ACFA/tree/9cf65504dc1b7dcdae0638f3cdaec57c21c10c07",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/caulfield",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Remote Direct Memory Introspection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/aladinggit/RDMI/tree/7b8b15cf9ac081534b6283fb5aa9d334f2600dbb",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/liu-hongyi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seclab-yonsei/bokasan/tree/usenix-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/shi-ji",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final31.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/waugustus/CarpetFuzz/tree/b1352edce60b2037549258b48af9d13756273c5f",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wang-dawei",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "ARI: Attestation of Real-time Mission Execution Integrity",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WUSTL-CSPL/ARI",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wang-jinwen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Guarding Serverless Applications with Kalium",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/multifacet/kalium_artifact/tree/83110fcfd091d9f8bd164007b1570742e0ad107c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/jegan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final37.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Uncontained: Uncovering Container Confusion in the Linux Kernel",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/uncontained/releases/tag/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/koschel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "HECO: Fully Homomorphic Encryption Compiler",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MarbleHE/HECO/tree/artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/viand",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final39.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.25835/xfc2h3pg",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/krause",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final40.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CISPA-SysSec/mua_fuzzer_bench/tree/b3cc3815f9dce9371eb5d461bb5beb888c032327",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/gorz",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final41.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lambdapioneer/powering-privacy/tree/aec-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/hugenroth",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final42.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Inception: Exposing New Attack Surfaces with Training in Transient Execution",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/comsec-group/inception/tree/usenix-23-ae-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/trujillo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final43.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/floatzone/releases/tag/ae-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/gorter",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final44.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Cookie Crumbles: Breaking and Fixing Web Session Integrity",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8220368",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/squarcina",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final45.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/8062035",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yuan-yuanyuan-cacheql",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final46.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Precise and Generalized Robustness Certification for Neural Networks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/8062051",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yuan-yuanyuan-certification",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final47.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IBM/URET/tree/8bd1b4f4d78ac19f026e862b31ae933983c99551",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/eykholt",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final48.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BHui97/PrivateFL",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yang-yuchen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final49.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "How Effective is Multiple-Vantage-Point Domain Control Validation?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/routing-aware-dns/tree/23194fc824633122cbfb79206a62ac662389f63c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/cimaszewski",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final50.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ICL-ml4csec/SQIRL/tree/966bf8642284ccb834450dae552eaa6dd34b84b0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/al-wahaibi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final51.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Unispac/Fight-Poison-With-Poison/tree/f2f02c2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/qi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final52.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "TVA: A multi-party computation system for secure and expressive time series analytics",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CASP-Systems-BU/tva/tree/stable",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/faisal",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final53.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/iaik/collidepower/tree/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/kogler",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final54.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.8217895",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/tay",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final55.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "McFIL: Model Counting Functionality-Inherent Leakage",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/maxzinkus/McFIL-Release/releases/tag/release",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zinkus",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final56.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/um-dsp/DeResistor",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/amich",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final57.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dlgroupuoft/Calpric/commit/3aeb59745b396285a3593ff22fe808a741bbf616",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/qiu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final59.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "EnigMap: External-Memory Oblivious Map for Secure Enclaves",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/odslib/EnigMap/tree/usenix-artifacts",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/tinoco",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final60.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Erebus: Access Control for Augmented Reality Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Ethos-lab/erebus-AR_access_control/tree/artifact-final-release-v2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/kim-yoonsang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final61.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SecureAIAutonomyLab/uGuard/tree/dbd98a38611af486d992b36024f78a96f99d43cc",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/bethany",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final62.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ymirsky/VulChecker",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/mirsky",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final64.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/SpeculationAtFault-AE/tree/cf2fa27ff5145a2dedfa8d4302a16d6e32aa5581",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/hofmann",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final65.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/AutomatedAnalysisOf/AEADProtocols/tree/V1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/cremers-protocols",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final66.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Smart Learning to Find Dumb Contracts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://hub.docker.com/u/dlva",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/abdelaziz",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final67.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/GaloisInc/cheesecloth/tree/usenix-2023-artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/cuellar",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final69.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/the-ok-is-not-enough/.github/blob/32b904b4e21c45b345bc1b9cbfd84f6661177b6b/profile/README.md",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/koch",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final70.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/OSUSecLab/3DScan/releases/tag/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/zuo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final72.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WUSTL-CSPL/XCheck/commits/5ee4b4820671fc215795ccb09daa70670a29e4f3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yu-zhiyuan-xcheck",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final73.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "SMACK: Semantically Meaningful Adversarial Audio Attack",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WUSTL-CSPL/SMACK/commits/895f19b35350c5aded3362508c4a770f5e36342f",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/yu-zhiyuan-smack",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final74.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/OSUSecLab/APIDiff/tree/f65137b3f8dc037021773134db40b1d384d542b7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/wang-chao",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final76.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kaist-hacking/BaseComp/tree/cd6d118950e7c41990dd9fff84ea7c6de586d574",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/kim-eunsoo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final78.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/salmanyam/DPP/tree/53cbccb6e6eaab6eaabbb06ea21fd31dd83e6eff",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed-salman",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final79.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Security Analysis of MongoDB Queryable Encryption",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/mongodbqe/mongo/-/commit/4e9fc09377f26e1760fb510a0b998f777fd9e0f4",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/gui",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final80.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/syssec-utd/provninja/releases/tag/USENIX_23",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/mukherjee",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final81.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "BotScreen: Trust Everybody, but Cut the Aimbots Yourself",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SoftSec-KAIST/BotScreen/tree/8ad88322f6abbcff6de1974103b275940a839028",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/choi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final82.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "GigaDORAM: Breaking the Billion Address Barrier",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jacob14916/GigaDORAM-USENIX23-Artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/falk",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final84.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "SAFER: Efficient and Error-Tolerant Binary Instrumentation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "http://seclab.cs.sunysb.edu/seclab/safer",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/priyadarshan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final85.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Curve Trees: Practical and Transparent Zero-Knowledge Accumulators",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/simonkamp/curve-trees/tree/4467be81737732a5b2794b5ad70459681b3bd19c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/campanelli",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final88.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2023,
    "title": "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vanhoefm/vpnleaks",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity23/presentation/xue",
    "appendix_url": "https://secartifacts.github.io/usenixsec2023/appendix-files/sec23winterae-final90.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fkie-cad/amides/releases/tag/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/uetz",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final1.pdf",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Yoruko-Tang/ModelGuard/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/tang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Cascade: CPU Fuzzing via Intricate Program Generation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/comsec-group/cascade-artifacts/tree/2b797b546629a2df6010abd96e293044cd3cd285",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/solt",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/leodec/VeriSimplePIR/tree/3643bb7cbaae02da98a195c4d004d4d083e3ab88",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/de-castro",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sectrs-acai/acai/tree/490966daf6f3be8798db2de99e2ecdce4deccd0e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/sridhara",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kaiming-uw/AR_UI_Security/tree/5d7deddf46c3bd949972924a7028c2dd147b15e0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/cheng-kaiming",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cla7aye15I4nd/CAMP/tree/a74a3069adb4aeff2426bba1fd6391c7d1fbb405",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mahaloz/sailr-eval/tree/e1af48353c1c5b32cc53cbaa015722d57767bd6e",
    "artifact_urls": [
      "https://github.com/mahaloz/sailr-eval/tree/e1af48353c1c5b32cc53cbaa015722d57767bd6e",
      "https://github.com/mahaloz/angr-sailr/tree/be3855762a84983137696aa14efe2431a86a7e97"
    ],
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/basque",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gconeice/improved-zk-ram/tree/d7f6b56e9c630484d3d93a8073fabd7e538c5f9a",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/yang-yibin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/mojomojo52/multibank_hammer/tree/da08966041a11af6c440b1ee06694b448715154c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/kang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/f7ed/hmmpc-public/tree/b7d65e9d43bc3eb1610fc0000e895b8664df8b66",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/liu-fengrun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/usrgroup/USENIX24-pakistancreators/tree/d2a29e7e506824b4cc23e7cf1fb5ee2c7958164c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/gr%C3%B6ber-content-creators",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pranav-dahiya/numpy/tree/USENIX_final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/dahiya",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24summerae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Princeton-Cabernet/SmartCookie-Artifact/releases/tag/v1.0.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/yoo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/martonbognar/ipe-exposure/tree/usenix24-artifact",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/bognar",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CMU-SAFARI/ABACuS/tree/7491a667fd1a667b556ef81a8eaa035f69461644",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/olgun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Towards Privacy-Preserving Social-Media SDKs on Android",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/PESP-privacy-preserving-social-SDK/PESP/tree/4d5b699f40f18ebdb61118e435bd99d0d3d46907",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lu-haoran",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Ji-Peng/eng25519_artifact/tree/usenix_security2024",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-jipeng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-NDS/Artifacts-With-Great-Power-Come-Great-Side-Channels/tree/e1cb08804029775cc0f19a2ace2fd2d65d8a8eff",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/dunsche",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SabaEskandarian/Shared_Franking/tree/ba9e81644ba9879e4fcfe57d39842b2aa5076f45",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/eskandarian",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Inference of Error Specifications and Bug Detection Using Structural Similarities",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.10843435",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/dossche",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final13.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Practical Data-Only Attack Generation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/einstein/releases/tag/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/johannesmeyer",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/inspectre-gadget/releases/tag/v1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wiebing",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ObliviousMessageRetrieval/ObliviousMessageRetrieval/tree/58c696df7b107ed9a9efdee4d345c7f11673b205",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/liu-zeyu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/osf.io/c7fks",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/sb",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "False Claims against Model Ownership Resolution",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ssg-research/Falseclaims/releases/tag/v0.0.2_ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/liu-jian",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vusec/safefetch-ae/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/duta",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final20.pdf",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WUSTL-CSPL/LLMJailbreak/tree/e8cf5196077ea7de8b75364d31af58a265b674cf",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/yu-zhiyuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ubc-systopia/netshaper/tree/AE_v2.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/sabzi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/VoodooChild99/perry/tree/sec24-ae-accepted",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lei",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/kuang22/FraudWhistler/releases/tag/v1.3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wang-kun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/notus-project/rsa_accumulator/tree/v0.1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/xin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SecPriv/web-platform-threats/tree/201bda9cca58064e61c3d13cae592e4688585f94",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/bernardo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ErJedermann/RECORD/tree/usenix24",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/jedermann",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/NSSL-SJTU/HermesSim/tree/a8fee0d218519826dd4a7a9799077eff",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/he-haojie",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/11143400",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/fourne",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RUB-NDS/Terrapin-Artifacts/tree/9907c80fa7e4184a29ceac352947ea51a49dce6a",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/b%C3%A4umer",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final31.pdf",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/gyp2847399255/PolyFRIM/tree/9beb37f643e9c43beea81771d77f4f6235ff7f7c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-zongyang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sefcom/operation-mango-public/tree/ff15727d3d9f7016e91e3f07a983e81090a62b3d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/gibbs",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final33.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/purseclab/D-helix/tree/691c162ec5d4a967adae395546edc13eb3285798",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zou",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/PP-FM/ZKSMT-pub/tree/Usenix2024",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/luick",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final35.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sys-ris3/ML_Extraction_Sok/tree/0d19edab5b5bd4bad4562543f4c1457be3c30852",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/nayan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24fallae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ResolverFuzz/ResolverFuzz/tree/v1.1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-qifan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MichalSha/KerberosSmartcardPaddingOracleAttack/releases/tag/EvalFinal",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/shagam",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/NemoYuan2008/MD-ML/releases/tag/v0.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/yuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jgharehchamani/DSE-with-IO-Locality/tree/fc5942b0d24b7fdc5d8ee4045876d583c812382e",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/mondal",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final4.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/casys-kaist/BUDAlloc/tree/9adddb369c2e74e86431459c627417f2f57cadbb",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/ahn",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final5.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/eniac/Reef/releases/tag/v1.0.0-baseline",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/angel",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final6.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://git.noc.ruhr-uni-bochum.de/miranmfx/swooshuae/-/tree/477a06ba19b84ccf5e0994bed0a2e20de97acb87",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/gajland",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final7.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13117816",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/ye",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "MUSES: Efficient Multi-User Searchable Encrypted Database",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/vt-asaplab/MUSES/tree/USENIX_2024",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/le",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/KTH-LangSec/ghunter/tree/23abc1188b32868981b268e59058b6d96f2c421b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/cornelissen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Bending microarchitectural weird machines towards practicality",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/joeywang4/Flexo/tree/00186b46205497e87db78add5f2c86e69593a2e7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wang-ping-lun",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BEESLab/Arcanum/releases/tag/1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/xie-qinge",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "YPIR: High-Throughput Single-Server PIR with Silent Preprocessing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13117988",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/menon",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final13.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CyFI-Lab-Public/DVa/tree/623337245d2588a6b87bc9bb7791497c4251d787",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/xu-haichuan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pps-lab/arc/tree/ae_final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lycklama",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pixelindigo/arachnarium/tree/sec24",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/stafeev",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final16.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Spider-Scents/dbfuzz/releases/tag/v0.3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/olsson",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MCUSec/RealworldFirmware/releases/tag/usenixae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/nino",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final18.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "BeeBox: Hardening BPF against Transient Execution Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.com/brown-ssl/beebox-ae/-/tree/be43784928ba43f09eeb31f98cff70b9fc1e4a3d/",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/jin-di",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Formal Security Analysis of Widevine through the W3C EME Standard",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Avalonswanderer/eme_widevine_formal_verification/releases/tag/v1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/delaune",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PURE: Payments with UWB RElay-protection",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/pure-uwb/pure-poc/tree/f73633f9716e42d0b8917912c72c912b479f3153",
    "artifact_urls": [
      "https://github.com/pure-uwb/pure-poc/tree/f73633f9716e42d0b8917912c72c912b479f3153",
      "https://github.com/pure-uwb/pure-sec-rel/tree/77cc1792f79bec02b59168ee922dfe335c972ad3",
      "https://github.com/pure-uwb/pure-models/tree/8aef1c0254642b476d9736ae5770c1992e620b27"
    ],
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/coppola",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/CacheWarp/tree/ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-ruiyi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/endokernel/test/tree/after-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/yang-fangfei",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/owenlly/Indirector_Artifact/tree/1926f7284486827b96fc5c1493b867d95c3145ed",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/li-luyi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final24.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SoK: Security of Programmable Logic Controllers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/efrenlopezm/plc-sok-dataset/tree/ebeb195e5969d99061302950bb173c6d997be30e",
    "artifact_urls": [
      "https://github.com/efrenlopezm/plc-sok-dataset/tree/ebeb195e5969d99061302950bb173c6d997be30e",
      "https://github.com/efrenlopezm/ics2matrix/tree/e60ba236a45483bec81b16677b8c71314267f235"
    ],
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lopez-morales",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/a8stract-lab/SeaK/tree/v1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wang-zicheng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Mart1i1n/Staircase-Attack/tree/85c772ece91965130d290eb1df6b489a6ba59af5",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-mingfei",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final27.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/spf-measurement/spf-measurement.github.io/tree/fc0c37cfc4b770d1ab557ec1819dcbcaf3e3d358",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/ashiq",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cla7aye15I4nd/shadowbound/tree/1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/yu-zheng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final29.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://huggingface.co/collections/ppaudel/contrastive-textual-deviation-65e20c48680724cc9a809062",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/paudel-enabling",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.12570381",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/paudel-pixelmod",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final31.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Malla: Demystifying Real-world Large Language Model Integrated Malicious Services",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/idllresearch/malicious-gpt/tree/3666c8b9e5116b4a55c8f0dcd11f6242b7ca8053",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lin-zilong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Adversarial Illusions in Multi-Modal Embeddings",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ebagdasa/adversarial_illusions/tree/10c9d22c4ae6475ecaa13ba22c93f33be0293bca",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-tingwei",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final33.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WUSTL-CSPL/OP-DFI/tree/00edcc646099516f9014bbae67f4050ea1b793e0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wang-yujie",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SyNSec-den/5GBaseChecker/tree/cb9b3d37740d288e2737c337cc5eb4154d561ac8",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/tu",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final35.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.11351913",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/longo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CyFI-Lab-Public/AiP/tree/aip-stable",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/oygenblik",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final37.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/rahultgeorge/OptiSan/tree/e6c8a2c81d8d6a24fd0620226de10a7c05125609",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/george",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/WUSTL-CSPL/ChkUp/tree/973a9ecc81a320e0537a4f6625fda8704f0bf7fc",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wu-yuhao",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final39.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PURL: Safe and Effective Sanitization of Link Decoration",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/shaoormunir/purl/tree/0bf3b05de6b0f2805eaf4e34d5402e473438f731",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/munir",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final40.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Towards an Effective Method of ReDoS Detection for Non-backtracking Engines",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.12270846",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/su-weihao",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final41.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/microsoft/dpsgd-calculator/tree/f0222fa9308e6b65b006ea15680698da70e08951/submission-code",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/cherubin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final42.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SEAL-IIT-KGP/shesha/releases/tag/v2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/chakraborty",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final43.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/hqc-attack/divide-and-surrender/tree/2d2d66c99736674e964cf162c40e226e90637f71",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/schr%C3%B6der",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final44.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/SnailLoad/tree/93612789e8a69d1340a4bf426fe3c42a6ebafb06",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/gast",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final45.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "EL3XIR: Fuzzing COTS Secure Monitors",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/HexHive/EL3XIR/tree/ae-sec24-accepted",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lindenmeier",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final46.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/0xdd96/Racing-code/releases/tag/artifact-evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/xu-dandan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final47.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/HexHive/spill_the_tea/tree/sec-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/busch-tea",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final48.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "GlobalConfusion: TrustZone Trusted Application 0-Days by Design",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/HexHive/GlobalConfusion/tree/sec-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/busch-globalconfusion",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final49.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SIMurai: Slicing Through the Complexity of SIM Card Security Research",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/tomasz-lisowski/simurai-usenixsec2024-ae/tree/usenixsec2024-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lisowski",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final50.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/s3team/DeepType/tree/AE",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/xia",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final51.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "A Flushing Attack on the DNS Cache",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://hub.docker.com/r/shohamd/cacheflushsimulator",
    "artifact_urls": [
      "https://hub.docker.com/r/shohamd/cacheflushsimulator",
      "https://github.com/shohamda/CacheFlushSimulator"
    ],
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/afek",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final52.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CellularLint/cellularlint-codes/releases/tag/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/rahman",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final53.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.inria.fr/oideli/oideli-artifact/-/releases/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/cortier",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final54.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/SLUBStick/tree/artifact-evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/maar-slubstick",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final55.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/IAIK/DefectsInDepth/tree/artifact-evaluation",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/maar-defects",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final56.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jd89j12dsa/ddse/tree/AEversion",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/liu-dongli",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final60.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SSRF-vs-Developers/.github/tree/ed093a0443fefd4a8a2d8c134df813e80a6dfa5a/profile",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wessels",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final61.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/polyxss/bxss/tree/4f5f2d1db0480c84f20206066ccf09afd937a307",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/kirchner",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final62.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/UBSec/UGCG-Guard/tree/1072d5c51a0e7bae2290da08e957e5b1d86cd7b6",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/guo-keyan",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final63.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.12211080",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/ghafourian",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final64.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.26068909.v6",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wang-yibo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final65.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zqzqz/AdvCollaborativePerception/tree/8a6a93b15db5fa43f35bad37e790883107f3bfdc",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/zhang-qingzhao",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final66.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SamihaShimmi/VulSim/tree/f08ab42dc8131b97887ee6e6d547df2a7915ee02",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/shimmi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final67.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/JigsawAttack/JigsawAttack/tree/AEStableVersion2",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/nie",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final68.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Toward Unbiased Multiple-Target Fuzzing with Path Diversity",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Mem2019/AFLRun/tree/3af5f11b564422387995e5c819c4ffe35d4fe9fd",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/rong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final69.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/inspire-group/PatchCURE/tree/40695a870e018b76cf5ec105ab36346c780e756d",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/xiang-chong",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final70.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/12260307",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/deng",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final71.pdf",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "A Formal Analysis of SCTP: Attack Synthesis and Patch Verification",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sctpfm/sctpfm/tree/usenix",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/ginesin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final73.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "CO3: Concolic Co-execution for Firmware",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Lawliar/CO3/releases/tag/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/liu-changming",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final74.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Invisibility Cloak: Proactive Defense Against Visual Game Cheating",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/GamesecInvisicloak/Invisibility-Cloak/tree/a54a6fa3bf16f617ac7c367201b5978ce91c2265",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/sun-chenxin",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final75.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.12216074",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/wang-xingkai",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final76.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "MOAT: Towards Safe BPF Kernel Extension",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jwnhy/MOAT-Open/tree/b1cfea3114ddf237c2100bc1bdc53f4030f4780b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/lu-hongyi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final77.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Secure Account Recovery for a Privacy-Preserving Web Service",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ryanjlittle/kpop-oprf/tree/ae6c354d84ed3d74d47d25cf31484c7d6f9edaf4",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/little",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final78.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sbaresearch/vowifi-epdg-scanning/releases/tag/usenix-sec24-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/gegenhuber",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final79.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Automated Large-Scale Analysis of Cookie Notice Compliance",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bouhoula/alsacnc/releases/tag/v1.0.3",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/bouhoula",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final81.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Argus: All your (PHP) Injection-sinks are belong to us.",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/12811284",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/jahanshahi",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final82.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SunnierLee/DP-ImaGen/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/li-kecen",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final83.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Current Deepfake Media Datasets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/SethLayton/SoKTheGoodTheBadandTheUnbalanced/tree/753d89beb64929371f7460ead16c770888c4ae4b",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/layton",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final84.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Near-Optimal Constrained Padding for Object Retrievals with Dependencies",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.13119687",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/jain",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final85.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Enhancing Network Attack Detection with Distributed and In-Network Data Collection System",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/NIDS-LAB/ISDC/tree/90b1bbe813d8711004e967d7cfabed4566135fe7",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/mirnajafizadeh",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final86.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "\"I just hated it and I want my money back\": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Mainack/switch-vpn-datacode-sec24/tree/c9c2e77d9bb5a0f402137b7fd557ad9ecf316dbc",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/raj",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final87.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/13216329",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/de-pasquale",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final88.pdf",
    "award": "Distinguished Artifact Award"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/asmitaj08/FuzzingBusyBox_LLM/tree/v1.1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/asmita",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final89.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/rpai0005/Questionable-Simulation-Tools/releases/tag/usenixae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/fuller",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final90.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Stateful Least Privilege Authorization for the Cloud",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/earlence-security/stateful-auth/tree/a48dabad03e18cb70e225e12b2a9bc228dd87203",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/cao-leo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final91.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Pandawan: Quantifying Progress in Linux-based Firmware Rehosting",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/BUseclab/Pandawan/tree/v1.0.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/angelakopoulos",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final93.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/MultiFuzz/MultiFuzz-benchmarks/tree/usenix2024-ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/chesser",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final94.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Trust Me If You Can - How Usable Is Trusted Types In Practice?",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/cispa/trust-me-if-you-can/tree/618e02a220843db03dce4fd19220d9a796de9c04",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/roth",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final95.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/royweiss1/GPT_Keylogger/tree/v1",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/weiss",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final96.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Huangzirui1206/UBA-Inf/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/huang-zirui",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final97.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wspr-ncsu/FV8/tree/57fc2b2699563316958603934aba572907171162",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/pantelaios",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final98.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://projects.cispa.saarland/lea.groeber/usenix24-sh-prevalence/-/tree/a82ca06181c1e922e70f638f8b422f17ec78f222",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/gr%C3%B6ber-private-clouds",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final99.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seccompgeek/trust23-metsafe24/tree/v0.1.0",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/kayondo",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final100.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/spotproxy-project/spotproxy/tree/1abbfe79ef8358afe81c0db491e4ec528a42773f",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/kon",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final101.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/avirkud/endpoint-detection-mitreattack/releases/tag/sec24-ae-final",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/virkud",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final102.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://gitlab.limos.fr/dhmahmoud/usenix24-632/-/tree/a877ffca4339b09ae0b674074aa3186e6508230c",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/dreier",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final104.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FPSG-UIUC/GoFetch/releases/tag/usenix2024ae",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/chen-boru",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final106.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/rchtsang/ffxe/tree/17adcd8",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/tsang",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final108.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2024,
    "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CISPA-SysSec/brand_impersonation/tree/6c58e42b1ab30f6c475f5b1b0648777daea65cbb",
    "paper_url": "https://www.usenix.org/conference/usenixsecurity24/presentation/acharya",
    "appendix_url": "https://secartifacts.github.io/usenixsec2024/appendix-files/sec24winterae-final111.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14639575",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14723606"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Dormant: Defending against Pose-driven Human Image Animation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14725876"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14643448"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Efficient 2PC for Constant Round Secure Equality Testing and Comparisons",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14580231"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14721125"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14699610"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14650954",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14656479"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14630472"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14726532"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14643448"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14672008"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736361",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://archive.softwareheritage.org/browse/origin/directory/?origin_url=https://github.com/Eyanee/Code-for-PoiSAFL"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14642350"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15209966",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final31.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "How Researchers De-identify Data in Practice",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/4tgpv/"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Further Study on Frequency Estimation under Local Differential Privacy",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14715748",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final33.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14732690",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14643155",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final37.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15114114",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14644258"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14643877"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14644655"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GPC Web Crawler",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14729170",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final42.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Distributional Private Information Retrieval",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14642111",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final43.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Practical Mempool Privacy via One-time Setup Batched Threshold Encryption",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14642466"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14642722"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14648338",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final46.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Following Devils\u2019 Footprint: Towards Real-time Detection of Price Manipulation Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/online_resource/SMARTCAT_Artifact/28192028"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14629454",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final48.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "VoiceWukong: Benchmarking Deepfake Voice Detection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/13731918"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14677002"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Catch-22: Uncovering Compromised Hosts using SSH Public Keys",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://edmond.mpg.de/dataset.xhtml?persistentId=doi%3A10.17617%2F3.LVPCS6",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final51.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14664723",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final53.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Characterizing the MrDeepFakes Sexual Deepfake Marketplace",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14662933?preview=1&token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImY5N2U2MjcyLWQzNzYtNGFkNS1hOWY5LTViMDJiMWFmMDAxNCIsImRhdGEiOnt9LCJyYW5kb20iOiJhOTBiYmVlMTk2YTYzZjE0YTUxODNmMGNhMTM5ZjI3MCJ9.h7l2Mp_hNmKlJbQEKq2kcsqK_8ZLIcsSNVOQk3dLj-sRevyvrZraH5t36KxjGDhXkgAJ4nkvjj8Z2iy-yuoyGA"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14729613",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final55.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: On Gradient Leakage in Federated Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14664682"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14668073",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final57.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14718794",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final58.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Current Affairs: A Security Measurement Study of CCS EV Charging Deployments",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14712106",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final59.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14640970",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final60.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Endangered Privacy: Large-Scale Monitoring of Video Streaming Services",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14676526",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final61.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14641606",
    "artifact_urls": [
      "https://zenodo.org/records/14641606",
      "https://zenodo.org/records/14641608"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14732884",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final64.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Efficient Ranking, Order Statistics, and Sorting under CKKS",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14673904",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final66.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15123146",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final67.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14675832?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImY3ODk0ZGF%5B%E2%80%A6%5DIQ1CNdjCqd1D4NC7ldSWtrYyVog-sJusoe9Ma2tfu82NEJv2sJo4UO8bpOBcpEw",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final68.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14676377"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14682405",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final71.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of \u00b5m-level HDD Vibrations",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14649224"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Dorami: Privilege Separating Security Monitor on RISC-V TEEs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14677522"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Artifacts for BarraCUDA: Edge GPUs do leak DNN weights",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14678147"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14677749?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImI0NjE1ZWVkLWQ2MTgtNDEwNy1hMjFmLTg0MmQ0ZWE4MWE5NyIsImRhdGEiOnt9LCJyYW5kb20iOiIzM2QzYTM5ZjQ5ZWZkZjM2NTE1ZjllYjkzODA1NmU4ZiJ9.2y5WljMWenkgkxJCZVOilnGeMY1EkbeyZtph-2tu6W3Srh4LOGX7jxre8bZtooAkX8TRVScfV-HWA7THJ9ofpQ",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final77.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "\u201cThat\u2019s my perspective from 30 years of doing this\u201d: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.25975120"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14557763"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14729675",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final81.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A limited technical background is suf\ufb01cient for attack-defense tree acceptability",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14717343",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final82.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14723474",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final83.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Detecting Compromise of Passkey Storage on the Cloud",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://archive.softwareheritage.org/swh:1:dir:108a16dbb953d71bf228236ec09f6c3c3c967dad;origin=https://github.com/islamazhar/CASPER;visit=swh:1:snp:5391b3dcf274e1af676dbac4a806059629509081;anchor=swh:1:rev:a22bef38e16a2263da9688fc1a27ac1cd71e3b39"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL\u00b7E Text-to-Image Pipelines",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14735417",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final86.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "ttps://doi.org/10.5281/zenodo.14694832",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final87.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14726862",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final88.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14649847"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A Framework for Designing Provably Secure Steganography",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14737116",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final90.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Serverless Functions Made Confidential and Efficient with Split Containers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/CoFunc_Artifacts/28234346?file=51843599",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final91.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14718582",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final92.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14673783"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14676762",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.14676762",
      "https://doi.org/10.5281/zenodo.14676842"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "RangeSanitizer: Detecting Memory Errors with Efficient Range Checks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14701524",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final97.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14630948?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjljNTAwMmQwLWQwNzMtNGMzNC1hNjFhLTM2OWQ1NDRhYjdmYiIsImRhdGEiOnt9LCJyYW5kb20iOiI4NTdjNDc2OTlmNDMzYWQ5NzYzZmEyYjc1NzE4ZDc2OCJ9.DhZ2f8Gsaq6NCvKL8Fd0iJfcS1TiQrPJU4co8AhdjNcVK25qub808qGUBNpPe65UvxR78ryx1B5UaMa6aljTxg"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14726326",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final100.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15009743",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final102.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14709768"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14729099"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14710570"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14735639",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final106.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14713022",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final107.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14712667"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736725",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final109.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "MAESTRO: Multi-party AES using Lookup Tables",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14719154",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final110.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "\"Threat modeling is very formal, it\u2019s very technical, and also very hard to do correctly\": Investigating Threat Modeling Practices in Open-Source Software Projects",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/kn5pb/?view_only=d82c73d6ca5749c38fad348806703642"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14714504",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final112.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "\"I\u2019m trying to learn. . . and I\u2019m shooting myself in the foot\": Beginners\u2019 Struggles When Solving Binary Exploitation Exercises",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/y6xew/",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final113.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736885",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final114.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AudioMarkNet: Audio Watermarking for Deepfake Speech Detection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14722182"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15120571",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final116.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14738544",
    "artifact_urls": [
      "https://zenodo.org/records/14738544",
      "https://audiowatermark.github.io/"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15091772",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final118.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Security Implications of Malicious G-Codes in 3D Printing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14719309"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14718828"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14840447",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final123.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14713949"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Gotta Detect \u2019Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14720824",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final125.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14728440",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final126.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14720651"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14723002",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final128.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14724513",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final129.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14722434",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final130.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14722605"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14722866"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14718601",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final134.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14723855"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A Formal Analysis of Apple\u2019s iMessage PQ3 Protocol",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14710688",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final136.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14723872",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final137.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Oblivious Digital Tokens",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737533?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjQxYTgyZWU2LTk1YWEtNGEzOS05MjM1LWM0NzYwZjY1ZmFjNiIsImRhdGEiOnt9LCJyYW5kb20iOiI5MDBlMjg0OTg2NGJhOGVkNzE4NzBmZTU5YTRhOTM3YyJ9.h8Z2HxamuZDdBiTIVuEy1U-g4ef0S8nAOikKMxm_XSspAQ-h7fMpoE-ZxCJ0IIF-oDX7IIKPRPs77dvPlwPGjg",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final138.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14725129",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.14725129",
      "https://doi.org/10.5281/zenodo.14725139",
      "https://doi.org/10.5281/zenodo.14725141"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14725520",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final140.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14732712"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14725233"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/hjdk2/"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14722574?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImJkYTRiZjlmLWQxOTItNDU3Zi04OGZjLTcxNDQwZWYxYmU2ZSIsImRhdGEiOnt9LCJyYW5kb20iOiJjMDUwMmM3YThkNmU4NDcxMzBkNTRiOWQwN2EwMzg2OSJ9.qnVVhaa-qs-9LBS-fECgnloBQAiVc4z4vXM0gbNCb4AuorvarMFDcVLxRpWj-H_QFmWauAgKheJpGw6M-Rlnlg"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14729436",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final145.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Attacker Control and Bug Prioritization",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14699098",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final146.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736478?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImQzOGExZGFmLTY2ZmYtNGNmYS05YTI1LWI5ZjA2N2E4N2I4NiIsImRhdGEiOnt9LCJyYW5kb20iOiJmMDUwMDg2NzBkYzBiMTJiYTM0MDVmM2ExODFjN2RjNSJ9.63km8trNlAK4djWk4r7nHbOYfbjPM9wWiNa-0RNmv1dOKuz-dvzb1WFAtxh2E_6w9lgLEa4Ltq5EHX22557dlQ",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final147.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736908?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImZkNjYyMWI4LTI0YjAtNDczNy1hMDdlLTg5Njk5ZjgxMGE1MCIsImRhdGEiOnt9LCJyYW5kb20iOiJlODFhNzkzYzIwMGI3MzkzYWVhNGRmMDVlNTYxNjNlZiJ9.x_e057dGV9GISOkLvXkySfCF6w7ST6p9LfoDXjaElAv_gXLTzehCt3OChiJPrqJz43I7_rCf2YC0-W1nwEkYWw"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14725819"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14698371",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final150.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Membership Inference Attacks Against Vision-Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14567468"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15128481",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final152.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A Comprehensive Formal Security Analysis of OPC UA",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://archive.softwareheritage.org/swh:1:rev:2f94c84f6125b7c07884369ba88e35a32032475b;origin=https://github.com/vdh-anssi/opc-ua_security",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final153.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14726711",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final154.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GenHuzz: An Efficient Generative Hardware Fuzzer",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14727632"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Lemon: Network-wide DDoS Detection with Routing-Oblivious Per-flow Measurement",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736990"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "LLMmap: Fingerprinting for Large Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737353"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CoVault: Secure, Scalable Analytics of Personal Data",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736568",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final158.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Robustifying ML-powered Network Classifiers with PANTS",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14728507",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final159.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Evaluating LLM-based Personal Information Extraction and Countermeasures",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737200",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final160.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ZK-GPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14727819"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Persistent Backdoor Attacks in Continual Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14728872"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "zk-promises: Anonymous Moderation, Reputation, and Blocking",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14728077"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/DISPATCH/28256150"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "An Industry Interview Study of Software Signing for Supply Chain Security",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14660194"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CertPHash: Towards Certified Perceptual Hashing via Robust Training",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14740844",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final166.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736864",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final167.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14680908"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14741018",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final169.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14862485",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final170.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14728530",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final171.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What minimizes losses?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14728686",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final172.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14737144",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final173.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14738628"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14728879"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14728863",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final176.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.13691327"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Third Party Private Set Operations",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14729416"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14735481"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14729410"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Cyber-Physical Deception Through Coordinated IoT Honeypots",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14729799"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737141"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737003"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14730889"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736535"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14730651",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final186.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737139"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Easy As Child\u2019s Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14676162",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final188.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14738152",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final189.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Distributed Private Aggregation in Graph Neural Networks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14710401",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final190.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15205897",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final191.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Questionnaire Data \u2013 Digital Security Perceptions & Practices in 12 Countries",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.60517/ZW12Z533J"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Systematic Evaluation of Randomized Cache Designs against Occupancy Attack",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15198048",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final193.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14732807",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final194.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution: Artifacts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14732551",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final195.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Learning from Functionality Outputs: Private Join and Compute in the Real World",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15147738",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final196.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15043603",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final197.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14732150",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final198.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Characterizing and Detecting Propaganda-Spreading Accounts on Telegram",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736756",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final199.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14742809",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final200.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14719752"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14731665",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final202.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Come Together \u2013 Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14732979"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "EvilEDR: Repurposing EDR as an Offensive Tool",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15116409",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final204.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Analyzing the AI Nudification Application Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/figure/Codebook_used_during_Nudification_Application_Walkthrough/28278992?file=51919583"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14735789",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final206.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Principled and Automated Approach for Investigating AR/VR Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736507?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjhmNDEwNjI1LTgwOGQtNDEzOS05NGZhLWE0N2FmYTllNTU1NyIsImRhdGEiOnt9LCJyYW5kb20iOiIyMjBjYmUyMjQwOGIwMzVmMGI5MzdiNGZmNDJmZDYxMCJ9.-LKxtMV0q3zDffQIs_Y3szpKmQ3m5jHR5xeJ_N56TIkd5S0n-retVchfiUVQoIQKtfxfRdhQ_gQO0dNz5czpGQ"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Pretender: Universal Active Defense against Diffusion Finetuning Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14733676"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "More is Less: Extra Features in Contactless Payments Break Security",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://archive.softwareheritage.org/browse/origin/directory/?origin_url=https://gitlab.com/anonym_123/anon_payments"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/uploads/14732956?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImMyNDY2NTU3LTk3OTctNDM1OC05ZDgyLTQzOTM2ZWEzYWRlMyIsImRhdGEiOnt9LCJyYW5kb20iOiI5NmIzYzNkMjBhMmFlODVkYmRiMWFhMTAxODgxMGM2MiJ9.53uXu-dQ7DmGMirz8J5YvKiHlqLVc5UbYQqIRx760j5oPTp0-bz0FuKkqsXMk9chXbCdDAvAGtfOvfnTbdy1IQ",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final210.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GNSS-WASP: GNSS Wide Area SPoofing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14734238"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Shadowed Realities: An Investigation of UI Attacks in WebXR",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.28271207"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14738503",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final214.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737894"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Towards Effective Security Patch Generation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14743413"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14715394"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14735820",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final218.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14736967",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.14736967",
      "https://doi.org/10.5281/zenodo.14870218"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final219.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Synthesis of Code-Reuse Attacks from p-code Programs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14738160",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final221.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "LightShed: Defeating Perturbation-based Image Copyright Protections",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14727581"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Secure Caches for Compartmentalized Software",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736160"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736347",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final224.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15133677",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final225.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Qelect: Lattice-based Single Secret Leader Election Made Practical",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14735800",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final226.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Recover from Excessive Faults in Partially-Synchronous BFT SMR",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15133737",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final227.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": " The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15054169",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final228.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Software Availability Protection in Cyber-Physical Systems",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14743885",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final229.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737431"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15118529",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final231.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "URL Inspection Tasks: Helping Users Detect Phishing Links in Emails",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14737023"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14736879"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14733196",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final234.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14738587"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14711220",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final236.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14738036?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImNkZGY5ODAxLTAyMjUtNGE4MC04MzJmLTg0M2Q5OGRiMmEwMSIsImRhdGEiOnt9LCJyYW5kb20iOiI5NjY2ZWI2NWFmNzJlNTFjZTlkZjZlYWQxZjhjZTUyOCJ9.J7bS0HP1heXRpctmsk4YnB8S0bKEeX-7ymHADj8fUB5MBdgjfG3p7l5IVaJmhClghEhqqVEpV4xROoiP0EnbPA",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final237.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14738722?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImNhOGY4OTliLTVjYjYtNGZmOC1iNTkyLWVlNDQ0MTU5MTViYyIsImRhdGEiOnt9LCJyYW5kb20iOiIwZTNiYzdmNDM1MzUwMDZlNDdmMmNjZDViNDEwZDIzMyJ9.kTKRGiA0g9vtq0yDhx8InDSBH72a8gaKNdPt29ByeB2WgRoiTrgX_pEc8Kbe6bcXTzZxCoQv22b9fTcxk0FwmQ",
    "artifact_urls": [
      "https://zenodo.org/records/14738722?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImNhOGY4OTliLTVjYjYtNGZmOC1iNTkyLWVlNDQ0MTU5MTViYyIsImRhdGEiOnt9LCJyYW5kb20iOiIwZTNiYzdmNDM1MzUwMDZlNDdmMmNjZDViNDEwZDIzMyJ9.kTKRGiA0g9vtq0yDhx8InDSBH72a8gaKNdPt29ByeB2WgRoiTrgX_pEc8Kbe6bcXTzZxCoQv22b9fTcxk0FwmQ",
      "https://zenodo.org/records/14738853?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjZiMzUwYjMwLWY1OTItNDVhMS04NTc2LTYxMmE0ZTRhZmUyYyIsImRhdGEiOnt9LCJyYW5kb20iOiJmMzViY2QxNWZkMDBiNDhkYzFmNzVlNDIwMTdlMjljMyJ9.QSmiC3hgGNSLXF5pgkrMCmrBMW7Vo8ZzMUV9v_4JrUt6jW5C-NISefClFEAmJKN9PQk7lMRwSIAfcoqeq7KzZw"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "FIXX: FInding eXploits from eXamples",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14738531",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final240.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Security and Privacy Advice for UPI Users in India",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14735675"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14745291"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.14636810",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle1ae-final62.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PatchAgent: A Practical Program Repair Agent Mimicking Human Expertise",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/8k2ac"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15468400",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final1.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Narrowbeer: A Practical Replay Attack Against the Widevine DRM",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/16751313",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15474656",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final3.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.29150726",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final4.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15540310",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.15540310",
      "https://doi.org/10.5281/zenodo.15528780",
      "https://doi.org/10.5281/zenodo.15532579",
      "https://doi.org/10.5281/zenodo.15568798"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15490109"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15569395",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final9.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15543846",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final10.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15586856",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final11.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: So, You Think You Know All About Secure Randomized Caches?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15529618",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final12.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15590097"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15532982",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final15.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15536637?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImM3MDZiNjY3LTk2MGEtNGQyMi04OTNiLTM2OTllNTU3YTNlNyIsImRhdGEiOnt9LCJyYW5kb20iOiIzNjdkOTZlNDc1ZmZiODBjNGFmZjRlYzIxMTcxNGRhMiJ9.jw2HJW9lUT03Mk-6SJCyJD6FLVQcEZ9xlfjbTpBl6pv1v9AaD1rpX_ebbuYx4fUxGAEo4YEU8QyAM72c5B1J8g"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15580922",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final17.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "HubBub: Contention-Based Side-channel Attacks on USB Hubs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15581471"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards Internet-Based State Learning of TLS State Machines",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15520932",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final19.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "I have no idea how to make it safer: Studying Security and Privacy Mindsets of Browser Extension Developers",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15550089",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final20.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15541361"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15523434",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final23.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15582959"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15523769",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final25.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15603122",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15527227"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "My ZIP isn\u2019t your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15526863",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final28.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "FastLloyd: Federated, Accurate, Secure, and Tunable kk-Means Clustering with Differential Privacy",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15530592",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.15530592",
      "https://doi.org/10.5281/zenodo.15530617"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TapTrap: Animation-Driven Tapjacking on Android",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15519676",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final30.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15605329",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final32.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15532456"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15533203",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final34.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15551650"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15544879"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "\u201cHelps me Take the Post With a Grain of Salt:\u201d Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.17605/OSF.IO/PJ895",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final38.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Levenshtein-trinary: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15871491",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final41.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Context Matters: Qualitative Insights into Developers Approaches and Challenges with Software Composition Analysis",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15537121?preview=1&token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImRlMDZjMDQ1LWQ1N2EtNDlkNy05NWJjLTQ2NWM2YWMxNWUwNCIsImRhdGEiOnt9LCJyYW5kb20iOiIxZWM1ZDM2ZWI5MzY0YTY5Y2RkN2NmODAwNGFhNjYzZSJ9.1OfXlerFZXjOwuEM4gvZFaA-nzGthryJhW16h5Nb_LXJ2ycspaqMYOHECrD9SY7_aFT_reQMKDA-jRxZD99Kbw"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15706733",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final45.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15544639"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15550470"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15586635",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final49.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15852608",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final50.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "On the Atomicity and Efficiency Blockchain Payment Channels",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15559636"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Navigating Cookie Consent Violations Across the Globe",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15566976"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A Tale of Two Worlds, a Formal Story of WireGuard Hybridization",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15551056",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final53.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15695418",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final54.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15601101",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final55.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15592036",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final56.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15579424"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16722573",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final58.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.13753906"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15568948"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GPUHammer: Rowhammer Attacks on GPU Memories are Practical",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612689",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final61.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15571277",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final62.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15571694",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final63.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Shortcut Measurement Codes",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15522800",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final64.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Self-interpreting Adversarial Images",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/Self-interpreting_Adversarial_Images/29219051?file=56929889",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final65.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15594020"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15600623"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/Unsafe_Scene_Detection/28260395"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15580292",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final70.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16594863",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final71.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15534623",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final72.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.4121/71c038e7-e991-4dcd-9729-47dd0d9250c6"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "General-Purpose ff-DP Estimation and Auditing in a Black-Box Setting",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15599462",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final74.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15576928",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final75.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TEEcorrelate: An Information-Preserving Defense against Performance Counter Attacks on TEEs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15699920",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final76.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs\u2019 Ethical Boundaries",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15578502"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15577630",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final78.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Understanding How Users Prepare for and React to Smartphone Theft",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15576155"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Treebeard: A Scalable and Fault Tolerant ORAM Datastore",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/treebeard_zip/29230676?file=55094552",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final81.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16748364",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final82.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TETD: Trusted Execution in Trust Domains",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.29262146.v1"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15582110"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15582836"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Exploiting Inaccurate Branch History in Side-Channel Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15612187",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final86.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Blockchain Address Poisoning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://kilthub.cmu.edu/articles/dataset/Blockchain_Address_Poisoning_Companion_Dataset_/29212703/1"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15601571"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Hercules Droidot and the murder on the JNI Express",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15586319",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final89.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Mitigating Injection Attacks against Encrypted Applications via View-Based Partitioning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15586638"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15588237",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final92.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PolySys: an Algebraic Leakage Attack Engine",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15610353"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15603773",
    "artifact_urls": [
      "https://zenodo.org/records/15603773",
      "https://zenodo.org/records/16732430"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final94.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15545824"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15589806",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final96.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15591819",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final98.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Lets Move2EVM",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15591737",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final100.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15588740?preview=1&token=eyJhbGciOiJIUzUxMiIsImlhdCI6MTc0OTA1MDI0NiwiZXhwIjoxNzY3MTM5MTk5fQ.eyJpZCI6IjRjOTc1YzIxLWMzYWUtNDg2Yi05ODc4LWEwMzU5OGJhZDg3NCIsImRhdGEiOnt9LCJyYW5kb20iOiJiZTYwZmM1NGViZTk0NDQ0MWZhMDIwY2MzZWQxNjI5MSJ9.mUlhqytiXRiCWXenmvLt0TV0g0X2C3KqfIOhcUv2_StXusX-HCJnqzRMclTpCGvMr6TI_JmuVOAQ78eccjZWHg",
    "artifact_urls": [
      "https://zenodo.org/records/15588740?preview=1&token=eyJhbGciOiJIUzUxMiIsImlhdCI6MTc0OTA1MDI0NiwiZXhwIjoxNzY3MTM5MTk5fQ.eyJpZCI6IjRjOTc1YzIxLWMzYWUtNDg2Yi05ODc4LWEwMzU5OGJhZDg3NCIsImRhdGEiOnt9LCJyYW5kb20iOiJiZTYwZmM1NGViZTk0NDQ0MWZhMDIwY2MzZWQxNjI5MSJ9.mUlhqytiXRiCWXenmvLt0TV0g0X2C3KqfIOhcUv2_StXusX-HCJnqzRMclTpCGvMr6TI_JmuVOAQ78eccjZWHg",
      "https://zenodo.org/records/15579566?preview=1&token=eyJhbGciOiJIUzUxMiIsImlhdCI6MTc0OTA1MjEyOSwiZXhwIjoxNzY3MTM5MTk5fQ.eyJpZCI6ImNkOGVkZTQ3LTczNzgtNGIxNi1hMjE3LTc2YWZjZWNjMDY2MiIsImRhdGEiOnt9LCJyYW5kb20iOiI0MmRhZGRhYzM2YWI3YjdlMjNmMjdlZjdlZTc2MjMwZiJ9.GLiLT2YnxuqaOBxDFxH-HDjzvQ_CSOmHigZJJ_Bq1lI5rTxKaKY69QNIF9dfUb9F8hclEyhEdXA1vFB9ORAJqg",
      "https://zenodo.org/records/15581150?preview=1&token=eyJhbGciOiJIUzUxMiIsImlhdCI6MTc0OTA1MTc3NCwiZXhwIjoxNzY3MTM5MTk5fQ.eyJpZCI6Ijk5N2U3YWM4LWM2OTMtNDM1Mi05ODBjLTFkZDRmMzIwYWZhZSIsImRhdGEiOnt9LCJyYW5kb20iOiIxZDc2Y2NhZWEzNzBkOTgzOWE3YWRhMmZjY2I2ZGMzMSJ9.S-KodhpXPyBv0vT5nZrHsub0bLpy7Mze4YgF9hgFXoUElcghZir-4sUAzzhPyf3tEqM9AQu2tAA0RU-m19G-hQ",
      "https://zenodo.org/records/15580030?preview=1&token=eyJhbGciOiJIUzUxMiIsImlhdCI6MTc0OTA1NzI4NSwiZXhwIjoxNzY3MTM5MTk5fQ.eyJpZCI6IjNhMDQ2NzdiLTRmNzgtNDM0YS05NjUwLTEwZGI4NGIxZTZiNiIsImRhdGEiOnt9LCJyYW5kb20iOiI1NjhiNGQ3MTI1OWQ5YjdiYWJiZWVjNTA3Njc3MzFkZCJ9.8v5GWr49Z3HW9HMNrRA0cfnAk784tRZTUOXI440EBLm6d5bFfMB0-IUimTIy3slgBk8fUjjZEo8w-q0r7E3tsA"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15602651",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final102.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15587623"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15594622",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final105.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15594022"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15595739"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Replication Package of ELFuzz",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16741080",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final110.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15596322"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A First Look at Governments Enterprise Security Guidance",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612457",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final112.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15572895"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TracLLM: A Generic Framework for Attributing Long Context LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15377790"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611391"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15605318",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final116.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609121"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16740884",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final118.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15832783",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final119.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum\u2019s Approve-TransferFrom Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15599087"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611161"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15479538"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15600564"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15600641",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final124.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609410",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final125.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Automated TTP Extraction from CTI Reports \u2013 Are We There Yet?",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15608555",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final126.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards a Re-evaluation of Data Forging Attacks in Practice",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15601518"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Prompt Obfuscation for Large Language Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15601914",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final128.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Approximation Enforced Execution of Untrusted Linux Kernel Extensions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609051",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final130.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15603060"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15606165",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final132.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15530229",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final133.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Cloak, Honey, Trap: Proactive Defenses Against LLM Agents",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15601740",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final134.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Preventing Automated Monitoring on Voice Data",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15603263",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final135.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611905",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final136.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15603931"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TRex: Practical Type Reconstruction for Binary Code",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611994",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final138.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15605391"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15590214"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611103",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final141.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15606061"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15605465",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final143.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15601773",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final144.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15580726"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15606363"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "\u201cIt\u2019s not my responsibility to write them\u201d: An Empirical Study of Software Product Managers and Security Requirements",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.29234525"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Transparent Attested DNS for Confidential Computing Services",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611255",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final148.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15607879",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final149.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Machine Learning for Misinformation Detection",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15613696",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final150.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15609776"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Hobbit: Space-Efficient zkSNARK with Optimal Prover Time",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15608317"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609870",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.15609870",
      "https://doi.org/10.5281/zenodo.15612137",
      "https://doi.org/10.5281/zenodo.15545615",
      "https://doi.org/10.5281/zenodo.15545623",
      "https://doi.org/10.5281/zenodo.15545629",
      "https://doi.org/10.5281/zenodo.15545638",
      "https://doi.org/10.5281/zenodo.15545642",
      "https://doi.org/10.5281/zenodo.15545648",
      "https://doi.org/10.5281/zenodo.15545656",
      "https://doi.org/10.5281/zenodo.15553243",
      "https://doi.org/10.5281/zenodo.15549646"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15541311",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final156.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Password Guessing Using Large Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15612295"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15603408"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Lancet: A Formalization Framework for Crash and Exploit Pathology",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15611790",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final159.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609883",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final160.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15608186"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15610905"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609595",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final163.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Censorship Evasion with Unidentified Protocol Generation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15491977"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609905",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final166.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "DNS FLaRE: A Flush-Reload Attack on DNS Forwarders",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15519987?preview=1&token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjVmMDk5NGM0LTc0ZTgtNDcxOC04MjY5LTMyZmIwNTdmYjI1MSIsImRhdGEiOnt9LCJyYW5kb20iOiIwZjRhNzc0NDc0ZmRhMjk1YWE3MzI5Yjk4NzBiOGQzZCJ9.X6Gtdi7uup0fWa4dX-zsuAoRgMnOtmRL7g8Lvzi6uCv65Pw_bIoVSf-Fm0F_41u2C2JQGhZuo-Lycx8k2zxc9Q"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15571866"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15614211",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final169.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play\u2019s App Account Deletion Requirements",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15610829",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final170.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15610687"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "I Cannot Write This Because It Violates Our Content Policy: Understanding Content Moderation Policies and User Experiences in Generative AI Products",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.29257187.v1"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15610915",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final173.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15610191"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15595719",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final175.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Please don\u2019t send that bot anything: Mixed-methods Study of Personal Impersonation Attacks to Steal Digital Payments on Social Media",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15611471",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.15611471",
      "https://doi.org/10.5281/zenodo.15611502"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.29260229"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612284",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.15612284",
      "https://doi.org/10.5281/zenodo.15612193"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final178.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15613620"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15614359"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "CloudFlow Framework and CloudBench Suite",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15609299",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final181.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15616188"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612037"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612143",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.15612143",
      "https://doi.org/10.5281/zenodo.15646753"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final184.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "BGP Vortex: Update Message Floods Can Create Internet Instabilities",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612433",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final185.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15606159",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final186.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15612788",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final187.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15612259"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15605704"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Backdooring Bias ((B^2)) into Diffusion Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15612673?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjZjYWQ3NWRmLWMyZTctNGRkMy1iNDBjLWVkZmY1NGM4NzI1MyIsImRhdGEiOnt9LCJyYW5kb20iOiI0OTk3NGIxZjhmMjYxYjRjYThmODAxMjE1ZjNjM2RlYSJ9.hRiipjswsKwSrgmM_z_Tgw87kInlyxxoQoeDzc9cPZ3yalWJy5WEHA7ktyWHEv7hc4fYqnuChyk5HrF-H7R4Jw"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15612436?preview=1&token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjYwZGUwMTY5LWYzNGMtNDEwMS04OTI1LWY3Yzg5MmI1M2M4MCIsImRhdGEiOnt9LCJyYW5kb20iOiIzNjI5NzZkYTVjOTI2YmY2MzBhYmNjZDgyNGMyMWVhNCJ9.zutPibX6ta0aUUrhAeGoUcfWaQP5TBpdHMO5dtH0FJ5W3f6V6j19qhKeZg1xrxd3WlDi93mgypzvY72BKXNIhQ"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15613562"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15614377",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final194.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Save what must be saved: Secure context switching with Sailor",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15613680",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final195.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15613816"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15614095",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final197.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15614373"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "I wasn\u2019t sure if this is indeed a security risk: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15614029"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16902911"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Addressing Sensitivity Distinction in Local Differential Privacy : A General Utility-Optimized Framework",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15614307",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final201.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "No, I Cant Be a Security Personnel on Your Phone: Security and Privacy Threats From Sharing Infrastructure in Rural Ghana",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/fvs97/files/osfstorage?view_only=d1916a62678d474d923ea629e7e6338c"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15615045"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "SoK: Towards a Unified Approach of Applied Replicability for Computer Security",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15616973"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Privacy Solution or Menace? Investigating Perceptions of Radio Frequency Sensing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/6wamz/?view_only=72093eb73d0343edb65cb9c374a2e7d4"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15621762",
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final206.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2025,
    "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/14738608",
    "artifact_urls": [
      "https://zenodo.org/records/14738608",
      "https://zenodo.org/records/14760016",
      "https://zenodo.org/records/14738289"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2025/appendix-files/sec25cycle2ae-final207.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Imitative Membership Inference Attack",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17885393"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "VeCT: Secure and Efficient Constant-Time Code Rewriting with Vector Extensions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17822446",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final2.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Hydrangea: Optimistic Two-Round Partial Synchrony with Improved Fault Resilience",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17823671"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "From Easy to Hard++: Promoting Differentially Private Image Synthesis Through Spatial-Frequency Curriculum",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17836341",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final4.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Opossum Attack: Application Layer Desynchronization using Opportunistic TLS",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17855525"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "DaLens: Charting DNS Self-Amplification Threats at Large",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17832418?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjcwODJiYTc3LTM0NGQtNDM4Yy1iYTViLTUyNGZiNWIyNWMxYSIsImRhdGEiOnt9LCJyYW5kb20iOiJlMjJmNjljNTY1ZjhlYjJkMzc4NjZmYWM1ZTE4MzU1YSJ9.sPg2-LLE5v8W7qpHYgR_XfLdD01t0NJr7erzGAYetwo-Z1YZdlcHNS0gWhF4XlcwO39IBUtnfPA95q3D__mNhg"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "FABRICKED: Misconfiguring Infinity Fabric to Break AMD SEV-SNP",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17830021?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjJjNWQ1NjNiLTBhNmYtNGFkNC1hZTc1LTBkNzhiZTM5NWE4MiIsImRhdGEiOnt9LCJyYW5kb20iOiI4NjNiYTllZDUzYjdlZWVhMGVkOWViY2FjZmFiOTYxMyJ9.AKbLNlVmhYXwQB1PXsnV10wQ1CSRKlk010zBUm3F_BkZIy3UTvBFufFp2rvvy_mS5N_HadOWdj1EJKLtcz5l8Q"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Quantifying Large Language Model Attacks Through the Lens of Model Cognition",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17875176",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final8.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "A Midsummer Meme\u2019s Dream: Investigating Market Manipulations in the Meme Coin Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17830943"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Arguzz: Testing zkVMs for Soundness and Completeness Bugs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.16939845"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "WILD Attack: Stealthy Undermining of Wi-Fi-Based Geolocation Through Remote Crowdsourced Data Injection",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17834160"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Distributed Vector Commitments and Their Applications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17863157"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Logos: Robust Sharding Blockchain With Fast Processing and Optimal Cross-Shard Overhead",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17855927"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "mmCipher: Batching Post-Quantum Public Key Encryption Made Bandwidth-Optimal",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17849532",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final14.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "XGuardian: Towards Explainable and Generalized AI Anti-Cheat on FPS Games",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17845613"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Overcoming the Retrieval Barrier: Indirect Prompt Injection in the Wild for LLM Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17968523"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "A Distortion-minimization Watermarking Framework for Large Language Models: Larger Capacity, Stronger Robustness and Higher Quality",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.18242631"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Jailbreaking the AMD Secure Processor: Enabling Live Analysis of SEV-SNPs Undocumented Security Boundaries",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17865002?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjUyZTI0YmM4LTRjM2UtNDA0MC04YWZhLWE4OGYzODQyYzZmNCIsImRhdGEiOnt9LCJyYW5kb20iOiIzODUzODNmM2RhNGVhMzk4YjRiZTgxNmU2N2VhOTNlZCJ9.lvetSy26gHlQ0thGQwDgr0Ira1FFPZ8DLn3hfoyQWpVE-bWoCWNKh_i2am8sEfjTLnZGxcoZoKCrNVG32kK3_w"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Sirens Whisper: Inaudible Near-Ultrasonic Jailbreaks of Speech-Driven LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17851194"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "CuSafe: Capturing Memory Corruption on NVIDIA GPUs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.30821396"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Interpolation-Based Optimization for Enforcing lp-Norm Metric Differential Privacy in Continuous and Fine-Grained Domains",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17851733",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final21.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "KernelRCA: Facilitating Root Cause Analysis of Memory Corruptions in Linux Kernel with Contextual Causality Chain",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/18410035",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final22.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Behind Bars: A Side-Channel Attack on NVIDIA MIG Cache Partitioning Using Memory Barriers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17861917"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Cracks in the Walled Garden: Dissecting the Gray-Market of Unauthorized iOS App Distribution via Ad Hoc Sideloading",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17850998",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.17850998",
      "https://doi.org/10.5281/zenodo.17846379"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Shred-to-Shine Metamorphosis of (Distributed) Polynomial Commitments",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17867141",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final26.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "TIMESLICE-SANDWICH: A GPU Side-Channel Attack Exploiting Time-Sliced Scheduling",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17987226"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "A Large-Scale Study of Personalized Phishing using Large Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17882184"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Identifying Provenance of Generative Text-to-Image Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17870201"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Residual-PAC Privacy: Automatic Privacy Control Beyond the Gaussian Barrier",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17871622"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Inconsistent, Incomplete, and Insecure: A Survey of Account Security Interfaces",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17880685"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Distributed Synthesis of Differentially Private Tabular Datasets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.18218427",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final33.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Bridges to Self: Silent Web-to-App Tracking on Mobile via Localhost",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17880051"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "M-Step: A Single-Stepping Framework for Side-Channel Analysis on TrustZone-M",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17910184",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final35.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "The State of Passkeys: Studying the Adoption and Security of Passkeys on the Web",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17898769",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final36.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "FABS: Fast Attribute-Based Signatures",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17882304"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Transparent Dictionaries from Polynomial Commitments",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17901509"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "MULCOTAINT: Towards Efficient Multi-tag Dynamic Taint Analysis via Hardware/Software Co-design",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.17939551"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Quorus: Efficient, Scalable Threshold ML-DSA Signatures from MPC",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17888654",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final42.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "E2E-AKMA: An End-to-End Secure and Privacy-Enhancing AKMA Protocol Against the Anchor Function Compromise",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17972924"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "LPG: Raise Your Location Privacy Game in Direct-to-Cell LEO Satellite Networks",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17906146",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.17906146",
      "https://doi.org/10.5281/zenodo.18428501"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final46.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "The Art of Hide and Seek: Making Pickle-Based Model Supply Chain Poisoning Stealthy Again",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17895474"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Sy-FAR: Symmetry-based Fair Adversarial Robustness",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17878074"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Static Detection of TOCTOU Bugs Caused by Kernel Races",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17898451"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "WAVED: Principled Identification of Off-Path Exploitable Weak Verifications within the TCP/IP Protocol Suite",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17896119",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final50.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "TrojPix: Electromagnetic Covert Channels via Imperceptible Pixel Modulation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17905407"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17880120"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "From Mirai to Gorilla: Deep Dive into a Long-Lasting DDoS-for-Hire Botnet",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17886098"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Unlocking the True Potential of Decryption Failure Oracles: A Hybrid Adaptive-LDPC Attack on ML-KEM Using Imperfect Oracles",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17899501"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Fend for Yourself! Backdoor Purification in Federated Graph Learning with an Evolving Knowledge Anchor",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17898577",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final58.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17974657",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final59.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17970155"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Differential Trust: Dynamic Multi-Authority Anonymous Credentials with Epoch-Weighted Updates",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17905110"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Can we estimate privacy vulnerability of individual records? Towards Mitigating Attribute Inference Attacks on ML Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17905132",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final66.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Trustworthy and Confidential SBOM Exchange",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17906622",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.17906622",
      "https://doi.org/10.5281/zenodo.17859760"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final67.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Provable Secure Steganography Based on Adaptive Dynamic Sampling",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17906788"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Anonymous Tokens with Designated-Reader Metadata Bit",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17946122",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final71.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "ZipPIR: High-throughput Single-server PIR without Client-side Storage",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17907224",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final72.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint Auditing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17908629"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Streaming Function Secret Sharing and Its Applications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17910080"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Silicon Heist: (Ransom) Attacks for Cloud FPGAs via Privilege Escalation",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/16950451?preview=1&token=eyJhbGciOiJIUzUxMiIsImlhdCI6MTc2NTU1ODUxMiwiZXhwIjoxNzY5ODE3NTk5fQ.eyJpZCI6IjRkZGM5ZTlkLTYyZGYtNGI0MS05ZDBkLWVkYWE5OTkzMThjNyIsImRhdGEiOnt9LCJyYW5kb20iOiJjZGRiOWY0NTkxNmNkNzVjN2ZjZjQxMWY5YmNiNGFiMiJ9.MV3dodwYMOyc_EXrc26mJenL2yQU7qpS5tlBJ_LnFTSGh8rtFNujaqRqIEK8Utp77lsL-B3lOMBoQOXczI3fEA"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Membership Inference Attacks on Tokenizers of Large Language Models",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.18080228",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final79.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "VidLeaks: Membership Inference Attacks Against Text-to-Video Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17972831"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Scribe: Low-memory SNARKs via Read-Write Streaming",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/uploads/17957696"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "BADControl: Backdoor Attacks Against Control Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17932677"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "CompLeak: Deep Learning Model Compression Exacerbates Privacy Leakage",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/articles/software/CompLeak/30904289",
    "artifact_urls": [
      "https://figshare.com/articles/software/CompLeak/30904289",
      "https://doi.org/10.6084/m9.figshare.30904289"
    ],
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final83.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "The Prompt Stealing Fallacy: Rethinking Metrics, Attacks, and Defenses",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17934144?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6IjA5ZTI2NGZlLTY3MWItNGNjMS04NjJhLTRmODhkZDMzODhjYiIsImRhdGEiOnt9LCJyYW5kb20iOiJiMjVmMjg5NjlmZTViZWNlMWJiZjhlYjlkYjM2M2NkMCJ9.E2lMNJQraHOFiY4BPU3oTO5k5iBj-hIIqRpbbTsRz0jDA5JpVKWhVYafDyooiq6XLhzsDoFpCJOr4xnldRCM2Q"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Efficient and High-Accuracy Secure Two-Party Protocols for a Class of Functions with Real-number Inputs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17936337"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "From Texts to Rules: Generating Sigma Rules with Large Language Models from Cyber Threat Reports",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17970580"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Side-Channel Attacks on Open vSwitch",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17965902",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final88.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Efficient Threshold ML-DSA",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17963722"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "B-Privacy: Defining and Enforcing Privacy in Weighted Voting",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17965708"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "FIRA: Enabling Automatic Forensic Investigation of Unmanned Aerial Vehicles",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.18395925",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final91.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Nudge: A Private Recommendations Engine",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17968761"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "BatchBoot: Fast Batched Bootstrapping for TFHE scheme and Practical Applications",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17936945"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Inference Attacks Against Graph Generative Diffusion Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17946102"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Autonomy Comes with Costs: Detecting Denial-of-Service Vulnerabilities Caused by Resource Abusing in LLM-based Agents",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17947230"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Source Code: Assumption-Free Fuzzy PSI via Predicate Encryption",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17936990"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "DMGuard: Safeguarding Kernels from Physical-Page Use-After-Free Vulnerabilities",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17970502",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final97.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Secure Protocol Composition under Dynamic Corruption: Models and Proofs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.29958290",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final98.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "ARM MTE Performance in Practice",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17953065"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "'Abuse Risks are Often Inherent to Product Features': Exploring AI Vendors\u2019 Bug Bounty and Responsible Disclosure Policies",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17957266"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Hop: A Modern Transport and Remote Access Protocol",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17953396",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final101.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "CombiSan: Unifying Software Sanitizers for Comprehensive Fuzzing",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/16949365",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final102.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "TAT: Attesting Trajectory Integrity of Industrial Robotic Arms",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.18047962"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "VSG-Safe: Spotting NSFW Video through Cross-Frame Evidence",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.30902915"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "You Know Why, but Still Rely: The Impact of Explainable AI on Trust, Task Load, and Performance in Cybersecurity Decision-Making",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17920612",
    "artifact_urls": [
      "https://doi.org/10.5281/zenodo.17920612",
      "https://doi.org/10.5281/zenodo.17973504",
      "https://osf.io/qyrzb/overview?view_only=1ac2e8ebe8944a989acaf2ebdd8251a6",
      "https://osf.io/t6pwd/overview?view_only=cf8b97a191a04c5cb5b0275e4b6ecd2a"
    ]
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "End-to-End Encrypted Collaborative Documents",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17973972"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Chameleon Channels: Measuring YouTube Accounts Repurposed for Deception and Profit",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17955052",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final107.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Shadowfax: Hybrid Security and Deniability for AKEMs",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/18939418",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final108.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Bridging Bitcoin to Second Layers via BitVM2",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17949747",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final109.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Attacks on Approximate Caches in Text-to-Image Diffusion Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17957900"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17958466",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final111.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Invariant-Guided Logical Testing of Open RAN Controllers",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17969521"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "PANGOLIN: Fuzzing Multilingual IoT Firmware with LLM-Driven Code Analysis",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.30904379"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17960273"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Turn Your Face Into An Attack Surface: Screen Attack Using Facial Reflections in Video Conferencing",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/16925324"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "PICS: Private Intersection over Committed (and reusable) Sets",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17958838",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final117.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "On Evaluating the Robustness of Large Vision-Language Models via Untargeted Modality Alignment Breaking Adversarial Attack",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17958814"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17963095"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "V\u03b5rity: Verifiable Local Differential Privacy",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17959962"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Leveraging Cryptographic Simulator Synthesis for Formally Verifying the FOO E-Voting Protocol -- Artifacts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17880702",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final123.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Libra: Pattern-Scheduling Co-Optimization for Cross-Scheme FHE Code Generation over GPGPU",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17962002",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final124.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "InstantOMR: Oblivious Message Retrieval with Low Latency and Optimal Parallelizability",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17959835",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final125.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "PrivacyShield: Relaying BLE Beacons to Counter Unsolicited Tracking",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17964520",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final127.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "SoK: PHILTER: Uncovering Security and Functional Gaps in AI-based Phishing Website Detection Literature via an LLM-based Reasoning Framework",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17964375"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Lethe: Purifying Backdoored Large Language Models with Knowledge Dilution",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17960577"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "MASLeak: Investigating and Exposing Intellectual Property Leakage Vulnerabilities in Multi-Agent Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": ""
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Sliding into the Flight Deck\u2019s DMs: Practical Message Attacks on CPDLC",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17964693"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "SafeFFI: Efficient Sanitization at the Boundary Between Safe and Unsafe Code in Rust and Mixed-Language Applications",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17976648",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final132.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Cutting the Gordian Knot: Detecting Malicious PyPI Packages via a Knowledge-Mining Framework",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17929520"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "OS-Sanitizer: System-wide Latent Defect Inference in Linux Applications",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17979528",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final135.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "DDR-SSE: Duplicated Retrieval of Documents for System-wide Secure Searchable Symmetric Encryption",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17965794",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final136.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Security and Privacy Analysis of Tile\u2019s Location Tracking Protocol",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17966636?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImZhM2JkYWI5LTYzMGEtNDEwNy1iOWNkLTE2YzY5OTc0ODEzOCIsImRhdGEiOnt9LCJyYW5kb20iOiIyYWJlMGI3ZmI2MmI2NWZmYjMwOTU5MDIwYTkwOWY4MSJ9.bdRa0H3U9fKDIriW_Gi-Cb6Lx44LUV-0yyFiT2iZxsOxZtzUwpH4SdUXuOkhnrTqaXbCRa070Tp6cu7YQS21OQ"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "PROBE+DETECT+MITIGATE (PDM): Enabling Cloud Tenants to Self-Defend against Microarchitectural Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17967755"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "\"Your imaging may be stone-cold normal, but if they look sick, they\u2019re going to get admitted\": An Investigation of Clinicians\u2019 Perceptions of Impact & Likelihood of Security Failures",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/ahjp3/overview?view_only=8442f58f00ca4dfdbf2ed2dfa90baba0"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "HAMLOCK: HArdware-Model LOgically Combined attacK",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17980434"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Digital Risks and Coping Practices among Roblox Game Creators",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17926420"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Window-based Membership Inference Attacks Against Fine-tuned Large Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17968678"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "The Adverse Effects of Omitting Records in Differential Privacy: How Sampling and Suppression Degrade the Privacy\u2013Utility Tradeoff (USENIX Security 2026 Artifact)",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17977527",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final144.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Why Johnny Adopts Identity-Based Software Signing: A Usability Case Study of Sigstore",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17969423"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "IoT Product Page Data",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://figshare.com/s/1064824a8f2a72c0e4f5"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Unbalanced Fuzzy Private Set Intersection for $L_{\\infty}$ Distance: Achieving Sublinear Communication with Large Set Size",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17982106"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "NOIR: Privacy-Preserving Generation of Code with Open-Source LLMs",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://tinyurl.com/NOIR-Artifact"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Artifacts for BLE Theft Auto: Evaluating the Security of Aftermarket BLE-based Automotive Remote Control Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17970344"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "JailbreakScope: Interpreting Jailbreak Mechanism through Representation and Circuit Analyses",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17971644"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Patch-Guided Vulnerability Detection: Extracting Java API Security Rules via Attack\u2013Defense Cross-Analysis",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17972522"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Revealing the Dark Side of Smart Accounts: An Empirical Study of EIP-7702 Incurred Risks in Blockchain Ecosystem",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17895541"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Love, Lies, and Language Models: Investigating AI\u2019s Role in Romance-Baiting Scams",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17984568",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final154.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Khost: KVM-based Near Native MCU Firmware Rehosting",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17976459",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final155.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "kSFS: Repurposing a Microkernel-like Interface for Fast and Secure In-Kernel Linux File Systems",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17973522",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final157.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "ViPer Strike: Defeating Visual Reasoning CAPTCHAs via Structured Vision\u2013Language Inference",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/18191465"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Assessing LLM Response Quality in the Context of Technology-Facilitated Abuse",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://osf.io/cu253/overview?view_only=62000cfa88e846daba447a07be7cda96"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Tracegram: Framing Trace-Level Traffic Analysis with Temporally-Aware Multiple Instance Learning",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17978903"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "When Fun Turns Toxic: A First Look at Aggressive Advertising in Mini-games",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17974792"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "SMASH: Scalable Maliciously Secure Hybrid Multi-party Computation Framework for Privacy-Preserving Large Language Models",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17977209?token=eyJhbGciOiJIUzUxMiJ9.eyJpZCI6ImUzZjNiZDkzLTllM2ItNGQ1OC1iOTgzLTdjMjIwN2ViYjg0MiIsImRhdGEiOnt9LCJyYW5kb20iOiJkOTk4NmQ3YzBiZjgxYWJlNGU2ZGUzODdjMDk1ODdhMSJ9.7_h-Mt02nThtPUpWf6XfpYQtgrSOreTcFiA5Ogkd2eMdEzKEDL3SmfzphjLjnjW8RWkade-dMWahduhXN0wX6w"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "SoK: Security of Cyber-physical Systems Under Intentional Electromagnetic Interference Attacks",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.18019022"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Cracking Federated Privacy: Initialization-Resilient Gradient Inversion with Fine-Grained Reconstruction",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17979356"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Concretely efficient blind signatures based on VOLE-in-the-head proofs and the MAYO trapdoor",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17979640",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final166.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Estimating the amount of script-generated traffic in a mixture",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17980327"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17957733",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final168.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Heli: Heavy-Light Private Aggregation",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17980903",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final169.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Network-Level Prompt and Trait Leakage in Local Research Agents",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17981422"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Memclave: Secure In-Memory Enclave for Untrusted Hosts",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17986461",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final171.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "When Updates Backfire: A Black-Box Security Analysis of Desktop Software Update Mechanisms",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17982402"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Semantics Over Syntax: Uncovering Pre-Authentication 5G Baseband Vulnerabilities",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.17984911",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final173.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "TopFeaRe: Locating Critical State of Adversarial Resilience for Graphs Regarding Topology-Feature Entanglement",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17920432"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "United We Defend: Collaborative Membership Inference Defenses in Federated Learning",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.17982729",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final175.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "FirmReBugger: A Benchmark Framework for Monolithic Firmware Fuzzers",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.6084/m9.figshare.31205056",
    "appendix_url": "https://secartifacts.github.io/usenixsec2026/appendix-files/sec26cycle1ae-final176.pdf"
  },
  {
    "conference": "USENIXSEC",
    "category": "security",
    "year": 2026,
    "title": "Lost in Blockchain Address Misuse: Hidden Cross-Platform Risks and Their Security Impact",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/17984167"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2019,
    "title": "RISC-V: #AlphanumericShellcoding",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/RischardV/riscv-alphanumeric-shellcoding",
    "paper_url": "https://www.usenix.org/system/files/woot19-paper_barral.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2019,
    "title": "A better zip bomb",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://www.bamsoftware.com/hacks/zipbomb/",
    "paper_url": "https://www.usenix.org/system/files/woot19-paper_fifield_0.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2019,
    "title": "Automatic Wireless Protocol Reverse Engineering",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jopohl/urh/releases/tag/v2.7.3",
    "paper_url": "https://www.usenix.org/system/files/woot19-paper_pohl.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2019,
    "title": "D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/JithinPavithran/d-time",
    "paper_url": "https://www.usenix.org/system/files/woot19-paper_pavithran.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2019,
    "title": "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/fgsect/unicorefuzz",
    "paper_url": "https://www.usenix.org/system/files/woot19-paper_maier.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2019,
    "title": "Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms",
    "badges": [
      "Artifact Evaluated"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/system/files/woot19-paper_pervan.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2021,
    "title": "An In-memory Embedding of CPython for Offensive Use",
    "badges": [
      "ORO",
      "ROR-R"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/4638251",
    "paper_url": "https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/files/woot21-sharfuddin-slides.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2021,
    "title": "Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks",
    "badges": [
      "ORO",
      "ROR-R"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/4774692",
    "paper_url": "https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/files/woot21-bock-slides.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2021,
    "title": "Evaluation of the Executional Power in Windows using Return Oriented Programming",
    "badges": [
      "ORO",
      "ROR-R"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/reverseame/rop3",
    "paper_url": "https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/files/woot21-rodriguez-slides.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2021,
    "title": "undeSErVed trust",
    "badges": [
      "ORO",
      "ROR-R"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/4635706",
    "paper_url": "https://www.ieee-security.org/TC/SP2021/SPW2021/WOOT21/files/woot21-wilke-slides.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2022,
    "title": "Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/establishingsecurity/trustzone-rootkit",
    "paper_url": "https://security.inso.tuwien.ac.at/pdfs/woot22-preprint.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2022,
    "title": "AirTag of the Clones: Shenanigans with Liberated Item Finders",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/stacksmashing/airtag-glitcher,https://github.com/seemoo-lab/airtag",
    "paper_url": "https://github.com/seemoo-lab/airtag/blob/main/woot22-paper.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2022,
    "title": "DABANGG: A Case for Noise Resilient Flush Based Cache Attacks ",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/DABANGG-Attack/Source-Code",
    "paper_url": "https://eprint.iacr.org/2020/637.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2022,
    "title": "Exploring Widevine for Fun and Profit ",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Avalonswanderer/wideXtractor,https://github.com/Avalonswanderer/widevine_key_ladder",
    "paper_url": "https://arxiv.org/pdf/2204.09298"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2022,
    "title": "Hack the Heap: Heap Layout Manipulation made Easy",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/Usibre/hacktheheap-puzzlegen,https://hacktheheap.io/",
    "paper_url": "https://www.computer.org/csdl/proceedings-article/spw/2022/964300a289/1FiwVVvAR0Y"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2022,
    "title": "On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers",
    "badges": [],
    "repository_url": "",
    "artifact_url": "https://github.com/hen95/HTTPHeaderBrowserTesting",
    "paper_url": "https://www.computer.org/csdl/proceedings-article/spw/2022/964300a342/1FiwZHjFEHK"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode",
    "badges": [
      "ORO"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7728760",
    "paper_url": "https://wootconference.org/papers/woot23-paper7.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7804243",
    "paper_url": "https://wootconference.org/papers/woot23-paper17.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "Emoji shellcoding in RISC-V",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7733387",
    "paper_url": "https://wootconference.org/papers/woot23-paper5.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "ROPfuscator: Robust Obfuscation with ROP",
    "badges": [
      "ORO"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7749186",
    "paper_url": "https://wootconference.org/papers/woot23-paper4.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "The ghost is the machine: weird machines in transient execution",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7793427",
    "paper_url": "https://wootconference.org/papers/woot23-paper10.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "Divergent Representations: When Compiler Optimizations Enable Exploitation",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/wunused/divergent-representations-artifacts",
    "paper_url": "https://wootconference.org/papers/woot23-paper6.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7777331",
    "paper_url": "https://wootconference.org/papers/woot23-paper15.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "ASanity: On Bug Shadowing by Early ASan Exits",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/record/7808197",
    "paper_url": "https://wootconference.org/papers/woot23-paper34.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2023,
    "title": "ESPwn32: Hacking with ESP32 System-on-Chips",
    "badges": [
      "ORO",
      "ROR"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.7786224",
    "paper_url": "https://wootconference.org/papers/woot23-paper22.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "Exploiting Android\u2019s Hardened Memory Allocator",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/HexHive/scudo-exploitation/tree/woot24",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/mao",
    "appendix_url": "https://secartifacts.github.io/woot2024/appendix-files/woot24ae-final1.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "SoK: Where\u2019s the \u201cup\u201d?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/CactiLab/SoK-Cortex-M/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/tan"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "Introduction to Procedural Debugging through Binary Libification",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.11298208",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/brossard",
    "appendix_url": "https://secartifacts.github.io/woot2024/appendix-files/woot24ae-final3.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/FoRTE-Research/RIPencapsulation/tree/3dd345b79e541519bbfaec7c406f9745feec81e2",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/sah",
    "appendix_url": "https://secartifacts.github.io/woot2024/appendix-files/woot24ae-final4.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "The Power of Words: Generating PowerShell Attacks from Natural Language",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/dessertlab/powershell-offensive-code-generation/releases/tag/artifact-release",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/liguori"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "Attacking with Something That Does Not Exist: \"Proof of Non-Existence\" Can Exhaust DNS Resolver CPU",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.11352869",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/gruza"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "Basilisk: Remote Code Execution by Laser Excitation of P\u2013N Junctions Without Insider Assistance",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/jloughry/basilisk_artifacts/releases/tag/v.1",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/loughry",
    "appendix_url": "https://secartifacts.github.io/woot2024/appendix-files/woot24ae-final7.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/rais"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/doi/10.5281/zenodo.11085514",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/goeman"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2024,
    "title": "SoK: On the Effectiveness of Control-Flow Integrity in Practice",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/seemoo-lab/woot24_cfi_coverage_tools/releases/tag/woot-submission",
    "paper_url": "https://www.usenix.org/conference/woot24/presentation/becker"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "FUZZVPN: Finding Vulnerabilities in OpenVPN",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15476514",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/chen"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms\u2019 Typo Correction",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Botacin-s-Lab/EchoCrypt",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/ayati",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final2.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study",
    "badges": [
      "Badges: Available",
      "Functional",
      "Reproduced"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sgxgsx/BlueToolkit",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/zubkov",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final3.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "GlitchGl\u00fcck: Enabling Software Vulnerabilities through Guided Hardware Fault Injection",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/Secure-Embedded-Systems/woot2025-GlitchGluck/archive/refs/tags/woot25-artifact.tar.gz",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/liu",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final4.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/lee",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final5.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://zenodo.org/records/15675577",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/el-yadmani",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final6.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Extract: A PHP Foot-Gun Case Study",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15526425",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/hartung",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final7.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Stealth BGP Hijacks with uRPF Filtering",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/zsjstart/Stealthy-uRPF-Attack/tree/v1.1.0",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/schulmann",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final8.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/ias-tubs/Comma_Separated_Vulnerabilities/releases/tag/Woot25",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/karl"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/diao"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/lainy/rp2350-scripts/tree/5a5b2f3fea02ee570a56e68b5d34f21e7dc12b49",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/zonenberg"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Be Write Back: An in-depth Study of Fault Injection Effects on FRAM Technology",
    "badges": [
      "Badges: Functional"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/huber"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Security through Transparency: Tales from the RP2350 Hacking Challenge",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/bhamsec/woot25-rp2350-challenge/releases/tag/v1.0",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/muench",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final13.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp\u2019s Handshake Mechanism",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://github.com/sbaresearch/prekey-pogo/tree/woot25ae",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/gegenhuber",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final14.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "DeepRed: A Deep Learning\u2013Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
    "badges": [
      "Badges: Available",
      "Functional"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15668685",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/hajizadeh",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final15.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution",
    "badges": [
      "Badges: Available"
    ],
    "repository_url": "",
    "artifact_url": "https://doi.org/10.5281/zenodo.15524301",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/boyapally",
    "appendix_url": "https://secartifacts.github.io/woot2025/appendix-files/woot25ae-final16.pdf"
  },
  {
    "conference": "WOOT",
    "category": "security",
    "year": 2025,
    "title": "Oops, It Halted Again: Exploiting PLC Memory for Fun and Profit in Industrial Control Systems",
    "badges": [
      "Badges:"
    ],
    "repository_url": "",
    "artifact_url": "",
    "paper_url": "https://www.usenix.org/conference/woot25/presentation/jo"
  }
]