Skip to main content


To help support the reproducibility for research results, ACSAC encourages authors of accepted papers to submit software they develop and datasets they use to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. We thank all the authors who participated in this initiative, now in its third year!

For more details on the artifact evaluations process, please refer to the Call for Paper Artifacts.

Link Legend:      github GitHub       web Web archive

ACM Artifacts Evaluated Functional

The artifacts associated with the research are found to be documented, consistent, complete, exercisable, and include appropriate evidence of verification and validation.

  • App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts github
  • Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems github
  • DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching github
  • Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns github
  • Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild web
  • Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems github
  • Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications github
  • On the Feasibility of Automating Stock Market Manipulation github
  • Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability github
  • Practical Over-Threshold Multi-Party Private Set Intersection github
  • Privacy-Preserving Production Process Parameter Exchange github
  • Quantifying measurement quality and load distribution in Tor web
  • Security Study of Service Worker Cross-Site Scripting web
  • Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication github
  • Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices github
  • ZeroAUDIT github

ACM Artifacts Evaluated Reusable

The artifacts associated with the paper are of a quality that significantly exceeds minimal functionality. That is, they have all the qualities of the Artifacts Evaluated – Functional level, but, in addition, they are very carefully documented and well-structured to the extent that reuse and repurposing is facilitated. In particular, norms and standards of the research community for artifacts of this type are strictly adhered to.

  • AVClass2: Massive Malware Tag Extraction from AV Labels github
  • Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing github
  • DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC github
  • Faulty Point Unit: ABI Poisoning Attacks on Intel SGX github
  • HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities github
  • Practical Fine-Grained Binary Code Randomization web
  • RusTEE: Developing Memory-Safe ARM TrustZone Applications github
  • SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers web
  • Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK web
  • Up2Dep: Android Tool Support to Fix Insecure Code Dependencies github