default search action
25th RAID 2022: Limassol, Cyprus
- 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022. ACM 2022, ISBN 978-1-4503-9704-9
Software Security
- Daehee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai, Taesoo Kim:
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients. 1-16 - Hoyong Jeong, Hodong Kim, Junbeom Hur:
Exploiting Metaobjects to Reinforce Data Leakage Attacks. 17-29 - Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi:
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. 30-42 - Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt:
Towards Deceptive Defense in Software Security with Chaff Bugs. 43-55
(Un?)Trusted Hardware
- Fabian Schwarz:
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone. 56-71 - Jan Philipp Thoma, Tim Güneysu:
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs. 72-85 - Jianyu Jiang, Claudio Soriente, Ghassan Karame:
On the Challenges of Detecting Side-Channel Attacks in SGX. 86-98
Blockchain Security
- Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. 99-114 - Christof Ferreira Torres, Hugo Jonker, Radu State:
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts. 115-128 - Yang Shi, Junqing Liang, Mianhong Li, Tianchen Ma, Guodong Ye, Jiangfeng Li, Qinpei Zhao:
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications. 129-142
Privacy & Spoofing
- Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework. 143-159 - Baihe Ma, Xiaojie Lin, Xu Wang, Bin Liu, Ying He, Wei Ni, Ren Ping Liu:
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy. 160-170 - Youqian Zhang, Kasper Rasmussen:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. 171-184 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:
HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors. 185-199
RTFFM (Rootkits, Forensics, Firmware, Mobile)
- Jun Yeon Won, Haohuang Wen, Zhiqiang Lin:
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. 200-213 - Fabian Franzen, Tobias Holl, Manuel Andreas, Julian Kirsch, Jens Grossklags:
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots. 214-231 - Duy-Phuc Pham, Damien Marion, Annelie Heuser:
ULTRA: Ultimate Rootkit Detection over the Air. 232-251 - Alain Tchana, Lavoisier Lavoisier Wapet, Yérom-David Bromberg:
Odile: A scalable tracing tool for non-rooted and on-device Android phones. 252-262
Network Security
- Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. 263-275 - Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser:
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. 276-291 - Jincheng Wang, Zhuohua Li, Mingshen Sun, John C. S. Lui:
Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications. 292-307
Robust and Trustworthy ML & Models
- Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen:
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. 308-320 - Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. 321-332 - Qingzhao Zhang, Xiao Zhu, Mu Zhang, Z. Morley Mao:
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems. 333-349
Program Analysis
- Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun:
BinProv: Binary Code Provenance Identification without Disassembly. 350-363 - Menghan Sun, Zirui Song, Xiaoxi Ren, Daoyuan Wu, Kehuan Zhang:
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework. 364-379 - Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura:
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks. 380-394 - Md. Mehedi Hasan, Seyedhamed Ghavamnia, Michalis Polychronakis:
Decap: Deprivileging Programs by Reducing Their Capabilities. 395-408
Web, Phishing and Authentication
- Haoran Ou, Yong Fang, Yongyan Guo, Wenbo Guo, Cheng Huang:
Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites. 409-430 - Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
Context-Auditor: Context-sensitive Content Injection Mitigation. 431-445 - Mashael Al Sabah, Mohamed Nabeel, Yazan Boshmaf, Euijin Choo:
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS. 446-459 - Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. 460-481
NIDS
- Yebo Feng, Jun Li, Devkishen Sisodia:
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic. 482-494 - Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan:
Encrypted Malware Traffic Detection via Graph-based Network Analysis. 495-509 - Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze:
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. 510-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.