Skip to main content


To help support the reproducibility for research results, ACSAC encourages authors of accepted papers to submit software they develop and datasets they use to perform their research and make them publicly available to the entire community. We believe that this is an important initiative that can help the entire community increase its reputation, and make research in the security field proceeds faster by taking advantage of systems previously built by other researchers. We thank all the authors who participated in this initiative, now in its third year!

For more details on the artifact evaluations process, please refer to the Call for Paper Artifacts.

Link Legend:      github GitHub       web Web archive

ACM Artifacts Evaluated Functional

The artifacts associated with the research are found to be documented, consistent, complete, exercisable, and include appropriate evidence of verification and validation.

  • ReCFA: Resilient Control-Flow Attestation github github
  • Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency github
  • Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification github web
  • Detecting Audio Adversarial Examples with Logit Noising github
  • CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech web
  • VIA: Analyzing Device Interfaces of Protected Virtual Machines github
  • A formal analysis of IKEv2's post-quantum extension github
  • RingRAM: A Unified Hardware Security Primitive for IoT Devices that Gets Better with Age github
  • Sipster: Settling IOU of Smart Meters Privately and Quickly github
  • Eluding ML-based Adblockers With Actionable Adversarial Examples web
  • What's in a Cyber Threat Intelligence sharing platform? A mixed-methods user experience investigation of MISP web

ACM Artifacts Evaluated Reusable

The artifacts associated with the paper are of a quality that significantly exceeds minimal functionality. That is, they have all the qualities of the Artifacts Evaluated – Functional level, but, in addition, they are very carefully documented and well-structured to the extent that reuse and repurposing is facilitated. In particular, norms and standards of the research community for artifacts of this type are strictly adhered to.

  • Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments github
  • They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors github
  • argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries github
  • LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems github
  • TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment github
  • FlexFilt: Towards Flexible Instruction Filtering for Security github
  • Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure github
  • Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization github
  • MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks github