Artifacts
To help support the reproducibility for research results, this year ACSAC encouraged authors of accepted papers to submit software they develop and datasets they use to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. We thank all the authors who participated in this new initiative!
- Decanter: Detection of Anomalous outbound HTTP traffic by passive application fingerprint
- Kakute, A Precise, Unified Information Flow Analysis System for Big-data Security
- Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans
- Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior
- A Secure Mobile Authentication Alternative to Biometrics
- Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors
- Efficient Component Authentication and Software Isolation for Automotive Control Networks
- Automated analysis of Secure Internet of Things Protocols
- Spinner: Semi-Automatic Detection of Pinning without Hostname Verification
- QUASAR: Quantitative Attack Space Analysis and Reasoning
- Grid Shock: Coordinated Load-Change Attacks on Power Grids
- Supplementing Modern Software Defenses with Stack-Pointer Sanity
As authors provide us with links to their repositories, they will be added above.
GitHub Web archive