IEEE Euro S&P 2022 - Available Artifacts
The following papers have artifacts available (in accordance with our Open Science expectations).
All Papers · List By Authors · Institutions
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] Artifact: https://github.com/i-hossen/aaeCaptcha | Md Imran Hossen, Xiali Hei |
Captcha me if you can: Imitation Games with Reinforcement Learning Artifact: https://github.com/itsiggen/reCaptcha | Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen |
Compositional Information Flow Monitoring for Reactive Programs [Paper] Artifact: https://github.com/CompIFC/comp-model/releases/tag/eurosp22 | McKenna McCall, Abhishek Bichhawat, Limin Jia |
CostCO: An automatic cost modeling framework for secure multi-party computation Artifact: https://github.com/ucbrise/costco | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa |
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments Artifact: https://github.com/AVTC-paper | Yacov Manevich, Adi Akavia |
DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices Artifact: https://github.com/kartikp7/DNN-Model-Fingerprinting | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah |
Dynamic Backdoor Attacks Against Machine Learning Models [Paper] Artifact: https://github.com/AhmedSalem2/Dynamic-Backdoor | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang |
Dynamic Policies Revisited [Paper] Artifact: https://github.com/amir-ahmadian/jpf-dyncover | Amir M. Ahmadian, Musard Balliu |
Fuzzing with Data Dependency Information [Paper] Artifact: https://github.com/elManto/DDFuzz | Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti |
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] Artifact: https://github.com/ryan-feng/GRAPHITE | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash |
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions Artifact: https://github.com/ias-tubs/hand_sanitizer | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns |
HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers Artifact: https://github.com/MCUSec/HARM | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang |
Hide and Seek: Revisiting DNS-based User Tracking Artifact: https://github.com/dl-chang/ldpresolve | Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li |
HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] Artifact: https://github.com/PizzaWhisperer/HLLVuln | Kenneth G. Paterson, Mathilde Raynal |
ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis Artifact: https://github.com/iHeartGraph/Illuminati | Haoyu He, Yuede Ji, H. Howie Huang |
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection Artifact: https://github.com/GESS-code/GESS | Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert |
KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] Artifact: https://github.com/isplab-unil/kin-genomic-privacy | Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin |
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space Artifact: https://sites.google.com/view/laser-meager-listener/%20home | Payton Walker, Nitesh Saxena |
Lethe: Practical Data Breach Detection with Zero Persistent Secret State Artifact: https://bitbucket.org/srecgrp/lethe-public/ | Antreas Dionysiou, Elias Athanasopoulos |
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] Artifact: https://github.com/Mohannadcse/LMCAS_Demo | Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps |
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit Artifact: https://github.com/mertside/lockeddown | Mert Side, Fan Yao, Zhenkai Zhang |
Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] Artifact: https://bitbucket.csiro.au/projects/DECAAS/repos/emailgen | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey |
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] Artifact: https://github.com/mounir-khaled/SAUSAGE | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef |
Signature Correction Attack on Dilithium Signature Scheme [Paper] Artifact: https://github.com/vernamlab/SignatureCorrection | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar |
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward Artifact: https://gitlab.com/swsprec/sok-allornothing | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda |
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] Artifact: https://encrypto.de/code/LEAKER | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli |
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Artifact: https://github.com/hihey54/CEF-SsL | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova |
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations Artifact: https://github.com/karthikaS03/SW_Sec_Project | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci |
Towards Fair and Robust Classification Artifact: https://github.com/fatml-res/robustness-and-fairness | Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang |
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers Artifact: https://github.com/ReAbout/ShadowFuzzer | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu |
Transformer-based Extraction of Deep Image Models Artifact: https://github.com/Fraunhofer-SIT/ModExTransformer | Verena Battis, Alexander Penner |
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control Artifact: https://bitbucket.org/sts-lab/ tdifc/src/master/ | Jason Liu, Anant Kandikuppa, Adam Bates |
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] Artifact: https://github.com/ain-soph/trojanzoo | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang |
Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] Artifact: https://github.com/cleverhans-lab/unrolling-sgd | Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot |
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch Artifact: https://github.com/jacksturgess | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic |
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] Artifact: https://github.com/someoneapp/VDSSE_Schemes | Dandan Yuan, Shujie Cui, Giovanni Russello |
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] Artifact: https://github.com/rub-syssec/xTag | Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi |