| 2019 | 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019. |
| 2019 | Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. Nir Sivan, Ron Bitton, Asaf Shabtai |
| 2019 | Application level attacks on Connected Vehicle Protocols. Ahmed Abdo, Sakib Md. Bin Malek, Zhiyun Qian, Qi Zhu, Matthew J. Barth, Nael B. Abu-Ghazaleh |
| 2019 | Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. Yue Duan, Lian Gao, Jie Hu, Heng Yin |
| 2019 | Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song |
| 2019 | COMA: Communication and Obfuscation Management Architecture. Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan |
| 2019 | Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu |
| 2019 | CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang |
| 2019 | DECAF++: Elastic Whole-System Dynamic Taint Analysis. Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin |
| 2019 | DomainScouter: Understanding the Risks of Deceptive IDNs. Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama |
| 2019 | DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction. Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III |
| 2019 | Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. Wei Song, Peng Liu |
| 2019 | Exploiting the Inherent Limitation of L0 Adversarial Examples. Fei Zuo, Bokai Yang, Xiaopeng Li, Qiang Zeng |
| 2019 | Exploring Syscall-Based Semantics Reconstruction of Android Applications. Dario Nisi, Antonio Bianchi, Yanick Fratantonio |
| 2019 | Fingerprinting SDN Applications via Encrypted Control Traffic. Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han |
| 2019 | Fingerprinting Tooling used for SSH Compromisation Attempts. Vincent Ghiëtte, Harm Griffioen, Christian Doerr |
| 2019 | Fluorescence: Detecting Kernel-Resident Malware in Clouds. Richard Li, Min Du, David Johnson, Robert Ricci, Jacobus E. van der Merwe, Eric Eide |
| 2019 | HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Xinran Liu, Heng Liu |
| 2019 | Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, Xiaofeng Wang |
| 2019 | Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng |
| 2019 | NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu |
| 2019 | Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions. Timothy Barron, Najmeh Miramirkhani, Nick Nikiforakis |
| 2019 | On Design Inference from Binaries Compiled using Modern C++ Defenses. Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash |
| 2019 | PAtt: Physics-based Attestation of Control Systems. Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz |
| 2019 | PRO-ORAM: Practical Read-Only Oblivious RAM. Shruti Tople, Yaoqi Jia, Prateek Saxena |
| 2019 | Robust Optimization-Based Watermarking Scheme for Sequential Data. Erman Ayday, Emre Yilmaz, Arif Yilmaz |
| 2019 | S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez |
| 2019 | SGXJail: Defeating Enclave Malware via Confinement. Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss |
| 2019 | ScaRR: Scalable Runtime Remote Attestation for Complex Systems. Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti |
| 2019 | Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. Key-whan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas |
| 2019 | TALON: An Automated Framework for Cross-Device Tracking Detection. Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis |
| 2019 | The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici |
| 2019 | Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. Wubing Wang, Yinqian Zhang, Zhiqiang Lin |
| 2019 | Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. Chih-Yuan Lin, Simin Nadjm-Tehrani |
| 2019 | Toward the Analysis of Embedded Firmware through Automated Re-hosting. Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna |
| 2019 | Towards Large-Scale Hunting for Android Negative-Day Malware. Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu |
| 2019 | Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren |
| 2019 | USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda |