| 2024 | A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework. Robert Lorch, Daniel Larraz, Cesare Tinelli, Omar Chowdhury |
| 2024 | A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces. Mabon Ninan, Evan Nimmo, Shane Reilly, Channing Smith, Wenhai Sun, Boyang Wang, John Marty Emmert |
| 2024 | ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files. Aakanksha Saha, Jorge Blasco, Lorenzo Cavallaro, Martina Lindorfer |
| 2024 | AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images. Jonas Ricker, Dennis Assenmacher, Thorsten Holz, Asja Fischer, Erwin Quiring |
| 2024 | AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection. Hongbin Sun, Su Wang, Zhiliang Wang, Zheyu Jiang, Dongqi Han, Jiahai Yang |
| 2024 | Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing. Yu Wang, Yue Xu |
| 2024 | Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure. Udesh Kumarasinghe, Mohamed Nabeel, Charitha Elvitigala |
| 2024 | BluePrint: Automatic Malware Signature Generation for Internet Scanning. Kevin Stevens, Mert Erdemir, Hang Zhang, Taesoo Kim, Paul Pearce |
| 2024 | Breaking Privacy in Model-Heterogeneous Federated Learning. Atharva Haldankar, Arman Riasi, Hoang-Dung Nguyen, Tran Phuong, Thang Hoang |
| 2024 | Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database. Lukas Arnold, Matthias Hollick, Jiska Classen |
| 2024 | Context-Aware Anomaly Detection Using Vehicle Dynamics. Chun-Yu (Daniel) Chen, Kang G. Shin, Soodeh Dadras |
| 2024 | Cross-Regional Malware Detection via Model Distilling and Federated Learning. Marcus Botacin, Heitor Murilo Gomes |
| 2024 | CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning. Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang |
| 2024 | Deception-Resistant Stochastic Manufacturing for Automated Production Lines. Zeyu Yang, Hongyi Pu, Liang He, Chengtao Yao, Jianying Zhou, Peng Cheng, Jiming Chen |
| 2024 | Down to earth! Guidelines for DGA-based Malware Detection. Bogdan-Constantin Cebere, Jonathan Lasse Bennet Flueren, Silvia Sebastián, Daniel Plohmann, Christian Rossow |
| 2024 | Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. Tai Yue, Yibo Jin, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu |
| 2024 | Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation. Richard August See, Kevin Röbert, Mathias Fischer |
| 2024 | Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods. Gang Yan, Hao Wang, Xu Yuan, Jian Li |
| 2024 | Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware. Diogo Barradas, Carlos Novo, Bernardo Portela, Sofia Romeiro, Nuno Santos |
| 2024 | Fixing Insecure Cellular System Information Broadcasts For Good. Alexander J. Ross, Bradley Reaves, Yomna Nasser, Gil Cukierman, Roger Piqueras Jover |
| 2024 | From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
| 2024 | Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies. Bahruz Jabiyev, Anthony Gavazzi, Kaan Onarlioglu, Engin Kirda |
| 2024 | Hidden Web Caches Discovery. Matteo Golinelli, Bruno Crispo |
| 2024 | Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. Mario Kahlhofer, Stefan Achleitner, Stefan Rass, René Mayrhofer |
| 2024 | How to Train your Antivirus: RL-based Hardening through the Problem Space. Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro |
| 2024 | Integrating Static Analyses for High-Precision Control-Flow Integrity. Florian Kasten, Philipp Zieris, Julian Horsch |
| 2024 | KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs. Hualong Ma, Peizhuo Lv, Kai Chen, Jiachen Zhou |
| 2024 | KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities. Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang |
| 2024 | Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols. Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer |
| 2024 | Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation. Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment |
| 2024 | Mateen: Adaptive Ensemble Learning for Network Anomaly Detection. Fahad M. Alotaibi, Sergio Maffeis |
| 2024 | No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge. Franka Schuster, Hartmut König |
| 2024 | Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior. Anyuan Sang, Yuchen Wang, Li Yang, Junbo Jia, Lu Zhou |
| 2024 | Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times. Ziyi Huang, Ding Wang, Yunkai Zou |
| 2024 | Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations. Wenfan Song, Jianwei Liu, Yajie Liu, Jinsong Han |
| 2024 | Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin |
| 2024 | Tango: Extracting Higher-Order Feedback through State Inference. Ahmad Hazimeh, Duo Xu, Qiang Liu, Yan Wang, Mathias Payer |
| 2024 | The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence. Thomas Geras, Thomas Schreck |
| 2024 | The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024 Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio |
| 2024 | Understanding Web Fingerprinting with a Protocol-Centric Approach. Bogdan Cebere, Christian Rossow |
| 2024 | Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter. Mohammad Hammas Saeed, Shiza Ali, Pujan Paudel, Jeremy Blackburn, Gianluca Stringhini |
| 2024 | VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions. Luis Gerhorst, Henriette Herzog, Peter Wägemann, Maximilian Ott, Rüdiger Kapitza, Timo Hönig |
| 2024 | What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments. Marcus Botacin |
| 2024 | You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence. Tommaso Paladini, Lara Ferro, Mario Polino, Stefano Zanero, Michele Carminati |