RAID A

51 papers

YearTitle / Authors
2023A Method for Summarizing and Classifying Evasive Malware.
Haikuo Yin, Brandon Lou, Peter L. Reiher
2023All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang
2023Beware of Pickpockets: A Practical Attack against Blocking Cards.
Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin
2023Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán
2023BitDance: Manipulating UART Serial Communication with IEMI.
Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu
2023Black-box Attacks Against Neural Binary Function Detection.
Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William K. Robertson
2023Boosting Big Brother: Attacking Search Engines with Encodings.
Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti
2023CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors.
Zihan Xue, Jinchi Han, Wei Song
2023Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors.
Connor Bolton, Yan Long, Jun Han, Josiah D. Hester, Kevin Fu
2023CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory.
Abdullahi Chowdhury, Hung X. Nguyen
2023Container Orchestration Honeypot: Observing Attacks in the Wild.
Noah Spahn, Nils Hanke, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
2023DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner
2023EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations.
Jingting Chen, Feng Li, Qingfang Chen, Ping Li, Lili Xu, Wei Huo
2023EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection.
Isaiah J. King, Xiaokui Shu, Jiyong Jang, Kevin Eykholt, Taesung Lee, H. Howie Huang
2023Efficient Membership Inference Attacks against Federated Learning via Bias Differences.
Liwei Zhang, Linghui Li, Xiaoyong Li, Binsi Cai, Yali Gao, Ruobin Dou, Luying Chen
2023EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN.
Jaemin Park, Brent ByungHoon Kang
2023Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack.
Hyunjun Kim, Yungi Cho, Younghan Lee, Ho Bae, Yunheung Paek
2023Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating.
Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin
2023False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers.
Arthur Drichel, Ulrike Meyer
2023Federated Explainability for Network Anomaly Characterization.
Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza
2023FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos, Jianying Zhou, Nils Ole Tippenhauer
2023FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking.
Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, Vasileios P. Kemerlis
2023Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification.
Zijun Hang, Yuliang Lu, Yongjie Wang, Yi Xie
2023Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild.
Leon Trampert, Ben Stock, Sebastian Roth
2023How (Not) to Build Threshold EdDSA.
Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow
2023Information Flow Tracking for Heterogeneous Compartmentalized Software.
Zahra Tarkhani, Anil Madhavapeddy
2023Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications.
Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic
2023Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI.
Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi
2023MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking.
Shengjie Xu, Eric Liu, Wei Huang, David Lie
2023MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands.
Xuening Xu, Chenglong Fu, Xiaojiang Du
2023Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef
2023NatiSand: Native Code Sandboxing for JavaScript Runtimes.
Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi
2023Phantom-CSI Attacks against Wireless Liveness Detection.
Qiuye He, Song Fang
2023PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.
Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao
2023PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.
Myeongseob Ko, Xinyu Yang, Zhengjie Ji, Hoang Anh Just, Peng Gao, Anoop Kumar, Ruoxi Jia
2023Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023
2023Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation.
Mathé Hertogh, Manuel Wiesinger, Sebastian Österlund, Marius Muench, Nadav Amit, Herbert Bos, Cristiano Giuffrida
2023Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V.
Yu Wang, Jinting Wu, Haodong Zheng, Zhenyu Ning, Boyuan He, Fengwei Zhang
2023Renewable Just-In-Time Control-Flow Integrity.
Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin
2023SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring.
Sangbin Park, Youngjoon Kim, Dong Hoon Lee
2023SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis.
Donghui Yu, Jianqiang Wang, Haoran Fang, Ya Fang, Yuanyuan Zhang
2023Security Analysis of the 3MF Data Format.
Jost Rossel, Vladislav Mladenov, Juraj Somorovsky
2023Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images.
Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna
2023SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang
2023Temporary Block Withholding Attacks on Filecoin's Expected Consensus.
Tong Cao, Xin Li
2023Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel
2023Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots.
Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan
2023Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation.
TaeYoung Kim, Seonhye Park, Hyoungshick Kim
2023Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy.
Seung Ho Na, Kwanwoo Kim, Seungwon Shin
2023Xunpack: Cross-Architecture Unpacking for Linux IoT Malware.
Yuhei Kawakoya, Shu Akabane, Makoto Iwamura, Takeshi Okamoto
2023Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola