| 2022 | 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022 |
| 2022 | Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems. Qingzhao Zhang, Xiao Zhu, Mu Zhang, Z. Morley Mao |
| 2022 | BinProv: Binary Code Provenance Identification without Disassembly. Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun |
| 2022 | CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic. Yebo Feng, Jun Li, Devkishen Sisodia |
| 2022 | Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS. Mashael Al Sabah, Mohamed Nabeel, Yazan Boshmaf, Euijin Choo |
| 2022 | Context-Auditor: Context-sensitive Content Injection Mitigation. Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé |
| 2022 | Decap: Deprivileging Programs by Reducing Their Capabilities. Md. Mehedi Hasan, Seyedhamed Ghavamnia, Michalis Polychronakis |
| 2022 | Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. Youqian Zhang, Kasper Rasmussen |
| 2022 | Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts. Christof Ferreira Torres, Hugo Jonker, Radu State |
| 2022 | Encrypted Malware Traffic Detection via Graph-based Network Analysis. Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan |
| 2022 | Exploiting Metaobjects to Reinforce Data Leakage Attacks. Hoyong Jeong, Hodong Kim, Junbeom Hur |
| 2022 | Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients. DaeHee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai, Taesoo Kim |
| 2022 | HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors. Anomadarshi Barua, Mohammad Abdullah Al Faruque |
| 2022 | Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser |
| 2022 | IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze |
| 2022 | Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots. Fabian Franzen, Tobias Holl, Manuel Andreas, Julian Kirsch, Jens Grossklags |
| 2022 | LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework. Menghan Sun, Zirui Song, Xiaoxi Ren, Daoyuan Wu, Kehuan Zhang |
| 2022 | Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker |
| 2022 | New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy. Baihe Ma, Xiaojie Lin, Xu Wang, Bin Liu, Ying He, Wei Ni, Ren Ping Liu |
| 2022 | OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. Pieter Philippaerts, Davy Preuveneers, Wouter Joosen |
| 2022 | Odile: A scalable tracing tool for non-rooted and on-device Android phones. Alain Tchana, Lavoisier Lavoisier Wapet, Yérom-David Bromberg |
| 2022 | On the Challenges of Detecting Side-Channel Attacks in SGX. Jianyu Jiang, Claudio Soriente, Ghassan Karame |
| 2022 | Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan |
| 2022 | RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi |
| 2022 | Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks. Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura |
| 2022 | Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen |
| 2022 | Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications. Yang Shi, Junqing Liang, Mianhong Li, Tianchen Ma, Guodong Ye, Jiangfeng Li, Qinpei Zhao |
| 2022 | Towards Deceptive Defense in Software Security with Chaff Bugs. Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt |
| 2022 | Transferable Graph Backdoor Attack. Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere |
| 2022 | TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone. Fabian Schwarz |
| 2022 | ULTRA: Ultimate Rootkit Detection over the Air. Duy-Phuc Pham, Damien Marion, Annelie Heuser |
| 2022 | Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework. Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori |
| 2022 | Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites. Haoran Ou, Yong Fang, Yongyan Guo, Wenbo Guo, Cheng Huang |
| 2022 | What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. Jun Yeon Won, Haohuang Wen, Zhiqiang Lin |
| 2022 | Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs. Jan Philipp Thoma, Tim Güneysu |
| 2022 | Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications. Jincheng Wang, Zhuohua Li, Mingshen Sun, John C. S. Lui |