-
Notifications
You must be signed in to change notification settings - Fork 4
Files
/
Copy pathartifact.csv
Latest commit
117 lines (117 loc) · 13.6 KB
/
artifact.csv
1 | Paper Title | Has artifact? | Code Runs | Year | Has Code? | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2 | Increasing Adversarial Uncertainty to Scale Private Similarity Testing | 0 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
3 | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
4 | OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
5 | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
6 | ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models | 0 | 0 | 2022 | 5 | ||||||||||||||||||||||||||||
7 | PrivGuard: Privacy Regulation Compliance Made Easier | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
8 | DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
9 | Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
10 | Rendering Contention Channel Made Practical in Web Browsers | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
11 | “OK, Siri” or “Hey, Google”: Evaluating Voiceprint Distinctiveness via Content-based PROLE Score | 0 | -1 | 2022 | 4 | ||||||||||||||||||||||||||||
12 | Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
13 | On the Security Risks of AutoML | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
14 | Towards More Robust Keyword Spotting for Voice Assistants | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
15 | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
16 | Augmenting Decompiler Output with Learned Variable Names and Types | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
17 | Inference Attacks Against Graph Neural Networks | 0 | -1 | 2022 | 2 | ||||||||||||||||||||||||||||
18 | Synthetic Data – Anonymisation Groundhog Day | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
19 | WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
20 | Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
21 | Automating Cookie Consent and GDPR Violation Detection | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
22 | Dos and Don’ts of Machine Learning in Computer Security | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
23 | Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
24 | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX | 0 | -1 | 2022 | 8 | ||||||||||||||||||||||||||||
25 | Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
26 | Secure Poisson Regression | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
27 | Watching the Watchers: Practical Video Identification Attack in LTE Networks | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
28 | Automated Side Channel Analysis of Media Software with Manifold Learning | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
29 | FOAP: Fine-Grained Open-World Android App Fingerprinting | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
30 | SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
31 | Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
32 | Label Inference Attacks Against Vertical Federated Learning | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
33 | Simc: ML Inference Secure Against Malicious Clients at Semi-Honest Cost | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
34 | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
35 | 99% False Positives: A Qualitative Study of SOC Analysts’ Perspectives on Security Alarms | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
36 | Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference | 1 | 1 | 2022 | 3 | ||||||||||||||||||||||||||||
37 | Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach | 0 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
38 | PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
39 | Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
40 | Khaleesi: Breaker of Advertising and Tracking Request Chains | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
41 | DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
42 | Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
43 | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
44 | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
45 | Automated Detection of Automated Traffic | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
46 | Transferring Adversarial Robustness Through Robust Representation Matching | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
47 | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
48 | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
49 | Membership Inference Attacks and Defenses in Neural Network Pruning | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
50 | Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
51 | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
52 | Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models | 1 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
53 | How Machine Learning Is Solving the Binary Function Similarity Problem | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
54 | FLAME: Taming Backdoors in Federated Learning | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
55 | Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks | 0 | 1 | 2022 | 1 | ||||||||||||||||||||||||||||
56 | AutoDA: Automated Decision-based Iterative Adversarial Attacks | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
57 | Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
58 | Teacher Model Fingerprinting Attacks Against Transfer Learning | 0 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
59 | Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
60 | Piranha: A GPU Platform for Secure Computation | 1 | 0 | 2022 | 1 | ||||||||||||||||||||||||||||
61 | PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
62 | DnD: A Cross-Architecture Deep Neural Network Decompiler | 0 | 0 | 2022 | 2 | ||||||||||||||||||||||||||||
63 | How to Peel a Million: Validating and Expanding Bitcoin Clusters | 0 | -1 | 2022 | 0 | ||||||||||||||||||||||||||||
64 | SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants | 0 | 0 | 2020 | 1 | ||||||||||||||||||||||||||||
65 | SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies | 0 | 0 | 2020 | 1 | ||||||||||||||||||||||||||||
66 | Fawkes: Protecting Privacy against Unauthorized Deep Learning Models | 0 | 3 | 2020 | 3 | ||||||||||||||||||||||||||||
67 | FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning | 0 | 0 | 2020 | 1 | ||||||||||||||||||||||||||||
68 | On Training Robust PDF Malware Classifiers | 0 | 0 | 2020 | 1 | ||||||||||||||||||||||||||||
69 | Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer | 1 | 0 | 2020 | 1 | ||||||||||||||||||||||||||||
70 | PriSEC: A Privacy Settings Enforcement Controller | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
71 | Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications | 0 | -1 | 2021 | 8 | ||||||||||||||||||||||||||||
72 | Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices | 0 | 0 | 2020 | 1 | ||||||||||||||||||||||||||||
73 | Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security | 0 | 3 | 2021 | 0 | ||||||||||||||||||||||||||||
74 | Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing | 0 | -1 | 2021 | 8 | ||||||||||||||||||||||||||||
75 | Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
76 | Reducing Test Cases with Attention Mechanism of Neural Networks | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
77 | T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
78 | CADE: Detecting and Explaining Concept Drift Samples for Security Applications | 1 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
79 | SIGL: Securing Software Installations Through Deep Graph Learning | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
80 | SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
81 | ATLAS: A Sequence-based Learning Approach for Attack Investigation | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
82 | ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning | 0 | -1 | 2021 | 1 | ||||||||||||||||||||||||||||
83 | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
84 | Scalable Detection of Promotional Website Defacements in Black Hat SEO Campaigns | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
85 | Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
86 | Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
87 | Deep Entity Classification: Abusive Account Detection for Online Social Networks | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
88 | SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network | 0 | 1 | 2021 | 3 | ||||||||||||||||||||||||||||
89 | Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
90 | HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
91 | Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
92 | Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
93 | Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical | 1 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
94 | Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning | 1 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
95 | Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
96 | Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
97 | Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
98 | Systematic Evaluation of Privacy Risks of Machine Learning Models | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
99 | SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution | 1 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
100 | Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
101 | Entangled Watermarks as a Defense against Model Extraction | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
102 | Blind Backdoors in Deep Learning Models | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
103 | Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA | 0 | 3 | 2021 | 1 | ||||||||||||||||||||||||||||
104 | Graph Backdoor | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
105 | Adversarial Policy Training against Deep Reinforcement Learning | 1 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
106 | Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
107 | SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
108 | Dompteur: Taming Audio Adversarial Examples | 0 | 2 | 2021 | 1 | ||||||||||||||||||||||||||||
109 | You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
110 | Cost-Aware Robust Tree Ensembles for Security Applications | 0 | 1 | 2021 | 1 | ||||||||||||||||||||||||||||
111 | WaveGuard: Understanding and Mitigating Audio Adversarial Examples | 0 | 3 | 2021 | 1 | ||||||||||||||||||||||||||||
112 | Poisoning the Unlabeled Dataset of Semi-Supervised Learning | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
113 | PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking | 0 | 3 | 2021 | 1 | ||||||||||||||||||||||||||||
114 | Muse: Secure Inference Resilient to Malicious Clients | 1 | 2 | 2021 | 3 | ||||||||||||||||||||||||||||
115 | Double-Cross Attacks: Subverting Active Learning Systems | 0 | -1 | 2021 | 0 | ||||||||||||||||||||||||||||
116 | Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code | 0 | 0 | 2021 | 1 | ||||||||||||||||||||||||||||
117 | GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference | 0 | 1 | 2021 | 3 |