RAID A

32 papers

YearTitle / Authors
202023rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14-15, 2020
Manuel Egele, Leyla Bilge
2020A Framework for Software Diversification with ISA Heterogeneity.
Xiaoguang Wang, Sengming Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, Binoy Ravindran
2020An Object Detection based Solver for Google's Image reCAPTCHA v2.
Md. Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md. Nazmul Islam, Hui Cao, Xiali Hei
2020Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities.
Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre
2020BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu
2020Camera Fingerprinting Authentication Revisited.
Dominik Christian Maier, Henrik Erb, Patrick Mullan, Vincent Haupert
2020Confine: Automated System Call Policy Generation for Container Attack Surface Reduction.
Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, Michalis Polychronakis
2020Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network.
Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo
2020Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware.
Duha Ibdah, Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik
2020Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI.
Benjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang
2020Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service.
Patrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil
2020EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX.
Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang
2020Evaluating Changes to Fake Account Verification Systems.
Fedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov
2020Evasion Attacks against Banking Fraud Detection Systems.
Michele Carminati, Luca Santini, Mario Polino, Stefano Zanero
2020GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems.
Yanmao Man, Ming Li, Ryan M. Gerdes
2020HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection.
Ralph Palutke, Simon Ruderich, Matthias Wild, Felix C. Freiling
2020MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing.
Yaohui Chen, Mansour Ahmadi, Reza Mirzazade Farkhani, Boyu Wang, Long Lu
2020Mininode: Reducing the Attack Surface of Node.js Applications.
Igibek Koishybayev, Alexandros Kapravelos
2020Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners.
Andrea Valenza, Gabriele Costa, Alessandro Armando
2020PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants.
Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David K. Y. Yau, Linkang Du
2020Robust P2P Primitives Using SGX Enclaves.
Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
2020SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
Shu Wang, Jiahao Cao, Kun Sun, Qi Li
2020Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu
2020SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub.
Md Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos
2020SpecROP: Speculative Exploitation of ROP Chains.
Atri Bhattacharyya, Andrés Sánchez, Esmaeil Mohammadian Koruyeh, Nael B. Abu-Ghazaleh, Chengyu Song, Mathias Payer
2020The Limitations of Federated Learning in Sybil Settings.
Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh
2020Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue
2020WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS.
Marcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil
2020What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.
Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda
2020aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach.
Anthony Peterson, Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Cristina Nita-Rotaru
2020sysfilter: Automated System Call Filtering for Commodity Software.
Nicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis
2020μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability.
Majid Salehi, Danny Hughes, Bruno Crispo