Non-reproducible single occurrences are of no significance to science.
CheckReseach.org is a community effort to validate and preserve scientific research in computer science. Users can pick a scientific publication, try to reproduce or replicate the results independently and share the outcome. CheckResearch.org provides a structured approach to preserve these reproductions and shares them with the public.
Furthermore, authors of original research have the opportunity to provide their publications (and artifacts) in a FAIR way.
In either case, the benefits are:
- scientific work is checked in terms of reproducibility,
- artifacts to reproduce the scientific research are tested,
- each step is systematically explained,
- new insights can be gained from these alternative setups,
- and authors of original research have a channel to provide their artifacts in a re-usable way.
For more information visit our About reproducibility page. We also have a short description on how to use CheckResearch.org.
Latest finished experiments
|Polyglot and Ambiguous Files||Paul Kalauner||5/21/2020||Original Research||The same results||Details|
|SoK: Exploiting Network Printers.||Jens Müller 0007, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk||Electronic edition via DOI||DBLP entry||2/25/2020||Reproduction||Similar results||Details|
|Deterministic Browser.||Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu||Electronic edition via DOI||DBLP entry||2/25/2020||Reproduction||Similar results||Details|
|Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX.||Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean M. Tullsen||DBLP entry||2/25/2020||Reproduction||Similar results||Details|
|(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.||Michael Backes 0001, Aniket Kate, Sebastian Meiser 0001, Esfandiar Mohammadi||Electronic edition via DOI||DBLP entry||5/13/2019||Reproduction||Similar results||Details|
|Your Choice MATor(s).||Michael Backes 0001, Sebastian Meiser 0001, Marcin Slowik||DBLP entry||5/13/2019||Reproduction||Similar results||Details|
|Measuring HTTPS Adoption on the Web.||Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, Parisa Tabriz||DBLP entry||3/4/2019||Reproduction||Similar results||Details|
|Tracking Certificate Misissuance in the Wild||Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael Bailey||Electronic edition via DOI||2/15/2019||Reproduction||Similar results||Details|
|"schizophrenic" and "polyglotte" files||Ange Albertini||6/26/2018||Reproduction||The same results||Details|
|Mind Your Keys? A Security Evaluation of Java Keystores||Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Graham Steel, Mauro Tempesta||Electronic edition via DOI||6/20/2018||Reproduction||Similar results||Details|
|The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.||Matús Nemec, Marek Sýs, Petr Svenda, Dusan Klinec, Vashek Matyas||Electronic edition via DOI||DBLP entry||6/13/2018||Reproduction||The same results||Details|