Research Artifacts

Title Authors Artifact Badges DOI
Tracking and Transparency Mechanisms in the HbbTV Ecosystem Christian Böttger (Institute for Internet Security, Westphalian University of Applied Sciences); Henry Hosseini (University of Münster; Institute for Internet Security, Westphalian University of Applied Sciences); Christine Utz (Radboud University); Nurullah Demir (Institute for Internet Security, Westphalian University of Applied Sciences); Jan Hörnemann (AWARE7 GmbH); Christian Wressnegger (Karlsruhe Institute of Technology); Thomas Hupperich (University of Münster); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences); Matteo Große-Kampmann (Rhine-Waal University of Applied Sciences); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences)
10.5281/zenodo.15076439
Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory Konstantinos Kanellopoulos (ETH Zürich); Nisa Bostanci, Ataberk Olgun, Giray Yaglikci, Ismail Emir Yuksel, Nika Mansouri Ghiasi (ETH Zurich); Zülal Bingöl (Bilkent University); Mohammad Sadrosadati (ETH Zürich); Onur Mutlu (ETH Zurich)
10.5281/zenodo.15116851
LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection Ke He (University of Canterbury); Dan Dongseong Kim (The University of Queensland); Muhammad Rizwan Asghar (University of Surrey)
10.5281/zenodo.15066515
Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches Md Rashedul Hasan (University of Nebraska-Lincoln); Mohannad Alhanahnah (University of Wisconsin-Madison); Clay Stevens (Iowa State University); Hamid Bagheri (University of Nebraska-Lincoln)
10.6084/m9.figshare.28636109
A Human Study of Automatically Generated Decompiler Annotations Yuwei Yang, Skyler Grandel (Vanderbilt University); Jeremy Lacomis, Edward Schwartz, Bogdan Vasilescu, Claire Le Goues (Carnegie Mellon University); Kevin Leach (Vanderbilt University)
10.6084/m9.figshare.28696898
ammBoost: State Growth Control for AMMs Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh (University of Connecticut)
10.5281/zenodo.15065330
ReCraft: Split, Merge, and Membership Change of Raft Protocol Kezhi Xiong (Northeastern University); Soonwon Moon (Inha University); Joshua Kang, Bryant Curto (Northeastern University); Jieung Kim (Yonsei University); Ji-Yong Shin (Northeastern University)
10.5281/zenodo.15059499
Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov (Università Foscari Venezia); Aleksei Stafeev, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
10.5281/zenodo.14276533
ICSTRACKER: Backtracking Intrusions in Modern Industrial Control Systems Md Raihan Ahmed, Jainta Paul, Levi Taiji Li (University of Utah); Luis Garcia (University of Utah Kahlert School of Computing); Mu Zhang (University of Utah)
10.5281/zenodo.15109706
GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses Pierrick Philippe (University of Rennes, CNRS, IRISA); Mohamed Sabt, Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
10.5281/zenodo.15072003
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes Pasquale De Rosa, Simon Queyrut (University of Neuchâtel, Switzerland); Yérom-David Bromberg (University of Rennes, INRIA, France); Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland)
10.5281/zenodo.14260284
IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica); Ping-Ting Liu, Bo-Wei Lin (Department of Computer Science, National Yang Ming Chiao Tung University); Yennun Huang (Research Center for Information Technology Innovation, Academia Sinica)
10.6084/m9.figshare.27886677
Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers Qihang Peng (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Deliang Chang (QI-ANXIN Technology Research Institute); Jia Zhang (Tsinghua University; Zhongguancun Laboratory); Baojun Liu (Tsinghua University); Haixin Duan (Tsinghua University; Zhongguancun Laboratory; QI-ANXIN Technology Research Institute)
10.6084/m9.figshare.28942571
Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement Hanwen Feng (The University of Sydney); Zhenliang Lu (Nanyang Technological University); Tiancheng Mai, Qiang Tang (The University of Sydney)
10.5281/zenodo.15077424
An Analysis of Malicious Packages in Open-Source Software in the Wild Xiaoyan Zhou (Beijing JiaoTong University); Ying Zhang, Wenjia Niu, Jiqiang Liu (Beijing Jiaotong University); Haining Wang (Virginia Tech); Qiang Li (Beijing Jiaotong University)
10.5281/zenodo.15086580
ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers Minli Julie Liao (University of Cambridge); Sam Ainsworth (University of Edinburgh); Lev Mukhanov (Queen Mary University London); Adrian Barredo (Barcelona Supercomputing Center); Markos Kynigos (The University of Manchester); Timothy Jones (University of Cambridge)
10.5281/zenodo.15080018
Detecting Code Vulnerabilities using LLMs Yinghao Zhang, Djimon Jayasundera, Larry Huynh (The University of Western Australia); Woojin Jeon, Hyoungshick Kim (Sungkyunkwan University); Tingting Bi, Jin B. Hong (The University of Western Australia)
10.5281/zenodo.15108502
MalTAG: Encrypted Malware Traffic Detection via Graph Based Flow Interaction Mining Renjie Li (University of Chinese Academy of Sciences China, Institute of Information Engineering, Chinese Academy of Sciences); Zhou Zhou (Institute of Information Engineering, Chinese Academy of Sciences); Hao Miao, Fengyuan Shi (University of Chinese Academy of Sciences China, Institute of Information Engineering, Chinese Academy of Sciences); Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences)
10.5281/zenodo.15081214
Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy (Drexel University)
10.6084/m9.figshare.28665482
QUIC-Aware Load Balancing: Attacks and Mitigations Liliana Kistenmacher, Anum Talpur, Mathias Fischer (Universität Hamburg)
10.5281/zenodo.15078306
RAVAGE: Robotic Autonomous VehiclesÕ Attack Generation Engine Pritam Dash, Karthik Pattabiraman (University of British Columbia)
10.5281/zenodo.15073830
MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution Moein Ghaniyoun (The Ohio State University); Kristin Barber (Google); Yinqian Zhang (Southern University of Science and Technology); Radu Teodorescu (The Ohio State University)
10.5281/zenodo.15116052
Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains Yuqi Liu, Rui Xi, Karthik Pattabiraman (University of British Columbia)
10.5281/zenodo.15112728
On Security Vulnerabilities in Transportation IoT Devices Jason Yih (College of Computer, Mathematical, and Natural Sciences; University of Maryland, College Park, MD); Katerina Goseva-Popstojanova (Lane Department of Computer Science and Electrical Engineering; West Virginia University, Morgantown, WV); Michel Cukier (Department of Mechanical Engineering, University of Maryland, College Park, MD)
10.5281/zenodo.15115540
Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System Cheng Chen (Louisiana State University); Grant Xiao (University of Virginia); Daehyun Lee, Lishan Yang (George Mason University); Evgenia Smirni (William & Mary); Homa Alemzadeh (University of Virginia); Xugui Zhou (Louisiana State University)
10.6084/m9.figshare.28691090
Zero-Interference Containers: a Framework for Orchestrating Mixed-Criticality Applications Daniele Ottaviano (Technical University of Munich); Marco Barletta, Francesco Boccola (University of Naples Federico II, Italy)
10.5281/zenodo.15081498
ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation Carlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee (Korea University)
10.5281/zenodo.15089944
ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia)
10.6084/m9.figshare.28655300
Automatically Generating Rules of Malicious Software Packages via Large Language Model XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li (Beijing Jiaotong University)
10.5281/zenodo.15113130