| 2023 | A Method for Summarizing and Classifying Evasive Malware. Haikuo Yin, Brandon Lou, Peter L. Reiher |
| 2023 | All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang |
| 2023 | Beware of Pickpockets: A Practical Attack against Blocking Cards. Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin |
| 2023 | Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán |
| 2023 | BitDance: Manipulating UART Serial Communication with IEMI. Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu |
| 2023 | Black-box Attacks Against Neural Binary Function Detection. Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William K. Robertson |
| 2023 | Boosting Big Brother: Attacking Search Engines with Encodings. Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti |
| 2023 | CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors. Zihan Xue, Jinchi Han, Wei Song |
| 2023 | Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors. Connor Bolton, Yan Long, Jun Han, Josiah D. Hester, Kevin Fu |
| 2023 | CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. Abdullahi Chowdhury, Hung X. Nguyen |
| 2023 | Container Orchestration Honeypot: Observing Attacks in the Wild. Noah Spahn, Nils Hanke, Thorsten Holz, Christopher Kruegel, Giovanni Vigna |
| 2023 | DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner |
| 2023 | EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations. Jingting Chen, Feng Li, Qingfang Chen, Ping Li, Lili Xu, Wei Huo |
| 2023 | EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection. Isaiah J. King, Xiaokui Shu, Jiyong Jang, Kevin Eykholt, Taesung Lee, H. Howie Huang |
| 2023 | Efficient Membership Inference Attacks against Federated Learning via Bias Differences. Liwei Zhang, Linghui Li, Xiaoyong Li, Binsi Cai, Yali Gao, Ruobin Dou, Luying Chen |
| 2023 | EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN. Jaemin Park, Brent ByungHoon Kang |
| 2023 | Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack. Hyunjun Kim, Yungi Cho, Younghan Lee, Ho Bae, Yunheung Paek |
| 2023 | Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin |
| 2023 | False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers. Arthur Drichel, Ulrike Meyer |
| 2023 | Federated Explainability for Network Anomaly Characterization. Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza |
| 2023 | FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network. Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos, Jianying Zhou, Nils Ole Tippenhauer |
| 2023 | FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, Vasileios P. Kemerlis |
| 2023 | Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification. Zijun Hang, Yuliang Lu, Yongjie Wang, Yi Xie |
| 2023 | Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild. Leon Trampert, Ben Stock, Sebastian Roth |
| 2023 | How (Not) to Build Threshold EdDSA. Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow |
| 2023 | Information Flow Tracking for Heterogeneous Compartmentalized Software. Zahra Tarkhani, Anil Madhavapeddy |
| 2023 | Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications. Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic |
| 2023 | Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI. Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi |
| 2023 | MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking. Shengjie Xu, Eric Liu, Wei Huang, David Lie |
| 2023 | MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands. Xuening Xu, Chenglong Fu, Xiaojiang Du |
| 2023 | Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef |
| 2023 | NatiSand: Native Code Sandboxing for JavaScript Runtimes. Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi |
| 2023 | Phantom-CSI Attacks against Wireless Liveness Detection. Qiuye He, Song Fang |
| 2023 | PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao |
| 2023 | PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models. Myeongseob Ko, Xinyu Yang, Zhengjie Ji, Hoang Anh Just, Peng Gao, Anoop Kumar, Ruoxi Jia |
| 2023 | Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023 |
| 2023 | Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. Mathé Hertogh, Manuel Wiesinger, Sebastian Österlund, Marius Muench, Nadav Amit, Herbert Bos, Cristiano Giuffrida |
| 2023 | Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V. Yu Wang, Jinting Wu, Haodong Zheng, Zhenyu Ning, Boyuan He, Fengwei Zhang |
| 2023 | Renewable Just-In-Time Control-Flow Integrity. Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin |
| 2023 | SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring. Sangbin Park, Youngjoon Kim, Dong Hoon Lee |
| 2023 | SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis. Donghui Yu, Jianqiang Wang, Haoran Fang, Ya Fang, Yuanyuan Zhang |
| 2023 | Security Analysis of the 3MF Data Format. Jost Rossel, Vladislav Mladenov, Juraj Somorovsky |
| 2023 | Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna |
| 2023 | SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang |
| 2023 | Temporary Block Withholding Attacks on Filecoin's Expected Consensus. Tong Cao, Xin Li |
| 2023 | Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems. Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel |
| 2023 | Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan |
| 2023 | Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation. TaeYoung Kim, Seonhye Park, Hyoungshick Kim |
| 2023 | Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy. Seung Ho Na, Kwanwoo Kim, Seungwon Shin |
| 2023 | Xunpack: Cross-Architecture Unpacking for Linux IoT Malware. Yuhei Kawakoya, Shu Akabane, Makoto Iwamura, Takeshi Okamoto |
| 2023 | Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola |