RAID A

38 papers

YearTitle / Authors
201922nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019.
2019Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
Nir Sivan, Ron Bitton, Asaf Shabtai
2019Application level attacks on Connected Vehicle Protocols.
Ahmed Abdo, Sakib Md. Bin Malek, Zhiyun Qian, Qi Zhu, Matthew J. Barth, Nael B. Abu-Ghazaleh
2019Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications.
Yue Duan, Lian Gao, Jie Hu, Heng Yin
2019Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing.
Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song
2019COMA: Communication and Obfuscation Management Architecture.
Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan
2019Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers.
Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu
2019CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang
2019DECAF++: Elastic Whole-System Dynamic Taint Analysis.
Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin
2019DomainScouter: Understanding the Risks of Deceptive IDNs.
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama
2019DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.
Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III
2019Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC.
Wei Song, Peng Liu
2019Exploiting the Inherent Limitation of L0 Adversarial Examples.
Fei Zuo, Bokai Yang, Xiaopeng Li, Qiang Zeng
2019Exploring Syscall-Based Semantics Reconstruction of Android Applications.
Dario Nisi, Antonio Bianchi, Yanick Fratantonio
2019Fingerprinting SDN Applications via Encrypted Control Traffic.
Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han
2019Fingerprinting Tooling used for SSH Compromisation Attempts.
Vincent Ghiëtte, Harm Griffioen, Christian Doerr
2019Fluorescence: Detecting Kernel-Resident Malware in Clouds.
Richard Li, Min Du, David Johnson, Robert Ricci, Jacobus E. van der Merwe, Eric Eide
2019HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification.
Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Xinran Liu, Heng Liu
2019Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, Xiaofeng Wang
2019Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng
2019NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu
2019Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions.
Timothy Barron, Najmeh Miramirkhani, Nick Nikiforakis
2019On Design Inference from Binaries Compiled using Modern C++ Defenses.
Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash
2019PAtt: Physics-based Attestation of Control Systems.
Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz
2019PRO-ORAM: Practical Read-Only Oblivious RAM.
Shruti Tople, Yaoqi Jia, Prateek Saxena
2019Robust Optimization-Based Watermarking Scheme for Sequential Data.
Erman Ayday, Emre Yilmaz, Arif Yilmaz
2019S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks.
Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez
2019SGXJail: Defeating Enclave Malware via Confinement.
Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss
2019ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti
2019Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots.
Key-whan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas
2019TALON: An Automated Framework for Cross-Device Tracking Detection.
Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
2019The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici
2019Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries.
Wubing Wang, Yinqian Zhang, Zhiqiang Lin
2019Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection.
Chih-Yuan Lin, Simin Nadjm-Tehrani
2019Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna
2019Towards Large-Scale Hunting for Android Negative-Day Malware.
Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu
2019Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.
Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren
2019USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks.
Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda