RAID A

44 papers

YearTitle / Authors
2024A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework.
Robert Lorch, Daniel Larraz, Cesare Tinelli, Omar Chowdhury
2024A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces.
Mabon Ninan, Evan Nimmo, Shane Reilly, Channing Smith, Wenhai Sun, Boyang Wang, John Marty Emmert
2024ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
Aakanksha Saha, Jorge Blasco, Lorenzo Cavallaro, Martina Lindorfer
2024AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images.
Jonas Ricker, Dennis Assenmacher, Thorsten Holz, Asja Fischer, Erwin Quiring
2024AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection.
Hongbin Sun, Su Wang, Zhiliang Wang, Zheyu Jiang, Dongqi Han, Jiahai Yang
2024Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing.
Yu Wang, Yue Xu
2024Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure.
Udesh Kumarasinghe, Mohamed Nabeel, Charitha Elvitigala
2024BluePrint: Automatic Malware Signature Generation for Internet Scanning.
Kevin Stevens, Mert Erdemir, Hang Zhang, Taesoo Kim, Paul Pearce
2024Breaking Privacy in Model-Heterogeneous Federated Learning.
Atharva Haldankar, Arman Riasi, Hoang-Dung Nguyen, Tran Phuong, Thang Hoang
2024Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database.
Lukas Arnold, Matthias Hollick, Jiska Classen
2024Context-Aware Anomaly Detection Using Vehicle Dynamics.
Chun-Yu (Daniel) Chen, Kang G. Shin, Soodeh Dadras
2024Cross-Regional Malware Detection via Model Distilling and Federated Learning.
Marcus Botacin, Heitor Murilo Gomes
2024CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning.
Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang
2024Deception-Resistant Stochastic Manufacturing for Automated Production Lines.
Zeyu Yang, Hongyi Pu, Liang He, Chengtao Yao, Jianying Zhou, Peng Cheng, Jiming Chen
2024Down to earth! Guidelines for DGA-based Malware Detection.
Bogdan-Constantin Cebere, Jonathan Lasse Bennet Flueren, Silvia Sebastián, Daniel Plohmann, Christian Rossow
2024Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing.
Tai Yue, Yibo Jin, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu
2024Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation.
Richard August See, Kevin Röbert, Mathias Fischer
2024Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods.
Gang Yan, Hao Wang, Xu Yuan, Jian Li
2024Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware.
Diogo Barradas, Carlos Novo, Bernardo Portela, Sofia Romeiro, Nuno Santos
2024Fixing Insecure Cellular System Information Broadcasts For Good.
Alexander J. Ross, Bradley Reaves, Yomna Nasser, Gil Cukierman, Roger Piqueras Jover
2024From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn
2024Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies.
Bahruz Jabiyev, Anthony Gavazzi, Kaan Onarlioglu, Engin Kirda
2024Hidden Web Caches Discovery.
Matteo Golinelli, Bruno Crispo
2024Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires.
Mario Kahlhofer, Stefan Achleitner, Stefan Rass, René Mayrhofer
2024How to Train your Antivirus: RL-based Hardening through the Problem Space.
Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro
2024Integrating Static Analyses for High-Precision Control-Flow Integrity.
Florian Kasten, Philipp Zieris, Julian Horsch
2024KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs.
Hualong Ma, Peizhuo Lv, Kai Chen, Jiachen Zhou
2024KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.
Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang
2024Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols.
Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer
2024Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation.
Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment
2024Mateen: Adaptive Ensemble Learning for Network Anomaly Detection.
Fahad M. Alotaibi, Sergio Maffeis
2024No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge.
Franka Schuster, Hartmut König
2024Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior.
Anyuan Sang, Yuchen Wang, Li Yang, Junbo Jia, Lu Zhou
2024Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times.
Ziyi Huang, Ding Wang, Yunkai Zou
2024Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations.
Wenfan Song, Jianwei Liu, Yajie Liu, Jinsong Han
2024Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
2024Tango: Extracting Higher-Order Feedback through State Inference.
Ahmad Hazimeh, Duo Xu, Qiang Liu, Yan Wang, Mathias Payer
2024The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence.
Thomas Geras, Thomas Schreck
2024The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024
Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio
2024Understanding Web Fingerprinting with a Protocol-Centric Approach.
Bogdan Cebere, Christian Rossow
2024Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter.
Mohammad Hammas Saeed, Shiza Ali, Pujan Paudel, Jeremy Blackburn, Gianluca Stringhini
2024VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions.
Luis Gerhorst, Henriette Herzog, Peter Wägemann, Maximilian Ott, Rüdiger Kapitza, Timo Hönig
2024What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments.
Marcus Botacin
2024You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence.
Tommaso Paladini, Lara Ferro, Mario Polino, Stefano Zanero, Michele Carminati