RAID A

36 papers

YearTitle / Authors
202225th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022
2022Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
Qingzhao Zhang, Xiao Zhu, Mu Zhang, Z. Morley Mao
2022BinProv: Binary Code Provenance Identification without Disassembly.
Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun
2022CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic.
Yebo Feng, Jun Li, Devkishen Sisodia
2022Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS.
Mashael Al Sabah, Mohamed Nabeel, Yazan Boshmaf, Euijin Choo
2022Context-Auditor: Context-sensitive Content Injection Mitigation.
Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé
2022Decap: Deprivileging Programs by Reducing Their Capabilities.
Md. Mehedi Hasan, Seyedhamed Ghavamnia, Michalis Polychronakis
2022Detection of Electromagnetic Signal Injection Attacks on Actuator Systems.
Youqian Zhang, Kasper Rasmussen
2022Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Christof Ferreira Torres, Hugo Jonker, Radu State
2022Encrypted Malware Traffic Detection via Graph-based Network Analysis.
Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan
2022Exploiting Metaobjects to Reinforce Data Leakage Attacks.
Hoyong Jeong, Hodong Kim, Junbeom Hur
2022Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients.
DaeHee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai, Taesoo Kim
2022HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors.
Anomadarshi Barua, Mohammad Abdullah Al Faruque
2022Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables.
Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser
2022IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems.
Konrad Wolsing, Eric Wagner, Antoine Saillard, Martin Henze
2022Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots.
Fabian Franzen, Tobias Holl, Manuel Andreas, Julian Kirsch, Jens Grossklags
2022LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework.
Menghan Sun, Zirui Song, Xiaoxi Ren, Daoyuan Wu, Kehuan Zhang
2022Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks.
Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker
2022New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy.
Baihe Ma, Xiaojie Lin, Xu Wang, Bin Liu, Ying He, Wei Ni, Ren Ping Liu
2022OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem.
Pieter Philippaerts, Davy Preuveneers, Wouter Joosen
2022Odile: A scalable tracing tool for non-rooted and on-device Android phones.
Alain Tchana, Lavoisier Lavoisier Wapet, Yérom-David Bromberg
2022On the Challenges of Detecting Side-Channel Attacks in SGX.
Jianyu Jiang, Claudio Soriente, Ghassan Karame
2022Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum.
Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan
2022RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64.
Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi
2022Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura
2022Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems.
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, Rhongho Jang, DaeHun Nyang, David Mohaisen
2022Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications.
Yang Shi, Junqing Liang, Mianhong Li, Tianchen Ma, Guodong Ye, Jiangfeng Li, Qinpei Zhao
2022Towards Deceptive Defense in Software Security with Chaff Bugs.
Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt
2022Transferable Graph Backdoor Attack.
Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere
2022TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone.
Fabian Schwarz
2022ULTRA: Ultimate Rootkit Detection over the Air.
Duy-Phuc Pham, Damien Marion, Annelie Heuser
2022Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework.
Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori
2022Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites.
Haoran Ou, Yong Fang, Yongyan Guo, Wenbo Guo, Cheng Huang
2022What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling.
Jun Yeon Won, Haohuang Wen, Zhiqiang Lin
2022Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs.
Jan Philipp Thoma, Tim Güneysu
2022Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications.
Jincheng Wang, Zhuohua Li, Mingshen Sun, John C. S. Lui