Artifact Description of SCInfer Link to virtual machine (VM) image: http://sist.shanghaitech.edu.cn/faculty/songfu/Projects/SCInfer/ScInfer.zip SHA1 checksum of the artifact file (ScInfer.ova): 34219ee3fcaff18c0050eed31163740804b1a849 login: ˇ°cavˇ±, password: ˇ°aeˇ±. Image Information: Ubuntu 16.04.1 OS, 6428MB RAM, 3 Cores Host Platform Information: Windows 10 OS, 8.00 GB RAM, Intel 2.70GHz 4 Cores CPU Instructions for locating the full documentation for evaluating the artifact: http://sist.shanghaitech.edu.cn/faculty/songfu/Projects/SCInfer/ScInfer.pdf In the virtual machine, we have put all necessary files in a folder called ScInfer on desktop. Under ScInfer, there are an executable file ScInfer; three python scripts: file.py, big.py and samll.py; and the whole benchmarks P1-P17 in TestBenchmark.The description of file.py, big.py and samll.py refers to tool instruction (http://sist.shanghaitech.edu.cn/faculty/songfu/Projects/SCInfer/ScInfer.pdf) In each benchmark, there are four input files, listed as following: 1) code.cpp It is a C-like program that is required to test. 2) inSecList.txt A text file containing a list of all the Secret Key variables, separated by spaces. 3) inPubList.txt A text file containing a list of all the Public Text variables, separated by spaces. 4) inRandList.txt A text file containing a list of all the Random Bit variables, separated by spaces