| 2025 | 28th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2025, Gold Coast, Australia, October 19-22, 2025 |
| 2025 | A Comprehensive Quantification of Inconsistencies in Memory Dumps. Andrea Oliveri, Davide Balzarotti |
| 2025 | A Longitudinal Analysis of LockBit 3.0's Extortion Lifecycle and Response to Law Enforcement. Yin Minn Pa Pa, Yuji Sekine, Yamato Kawaguchi, Tatsuki Yogo, Kelvin Lubbertsen, Rolf van Wegberg, Michel van Eeten, Katsunari Yoshioka |
| 2025 | ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection. Md Tanvirul Alam, Aritran Piplai, Nidhi Rastogi |
| 2025 | Activation Functions Considered Harmful: Recovering Neural Network Weights through Controlled Channels. Jesse Spielman, David F. Oswald, Mark Dermot Ryan, Jo Van Bulck |
| 2025 | Active Attack Resilience in 5G: A New Take on Authentication and Key Agreement. Nazatul H. Sultan, Xinlong Guan, Josef Pieprzyk, Wei Ni, Sharif Abuadbba, Hajime Suzuki |
| 2025 | An In-model Spy in Edge Intelligence. Fengxu Yang, Paizhuo Chen, Yihui Yan, Zhice Yang |
| 2025 | BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning. Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen |
| 2025 | BadLogo: A Physically Realizable Adversarial Sticker for Evaluating the Robustness of Face Recognition Models. Fuqi Qi, Haichang Gao, Boling Li, Shiping Guo, Yuming Zheng, Bingqian Zhou |
| 2025 | Carbon Filter: Scalable, Efficient, and Secure Alert Triage for Endpoint Detection & Response. Muhammad Adil Inam, Jonathan Oliver, Raghav Batta, Adam Bates |
| 2025 | Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant Messengers. Gabriel K. Gegenhuber, Maximilian Günther, Markus Maier, Aljosha Judmayer, Florian Holzbauer, Philipp É. Frenzel, Johanna Ullrich |
| 2025 | CasinoLimit: An Offensive Dataset Labeled with MITRE ATT&CK Techniques. Sébastien Kilian, Valérie Viet Triem Tong, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, Natan Talon, Pierre-Victor Besson, Helene Orsini, Pierre Lledo, Pierre-François Gimenez |
| 2025 | DEPHP: A Source Code Recovery Method for PHP Bytecode with Improved Structural Analysis. Shiwu Zhao, Ningjun Zheng, Haoyu Li, Ruizhi Feng, Xingchen Chen, Ru Tan, Qixu Liu |
| 2025 | Deception Meets Diagnostics: Deception-based Real-Time Threat Detection in Healthcare Web Systems. Zeeshan Zulkifl Shah, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar |
| 2025 | Deep Learning-Based Attacks on Traditional Watermarking Systems in Real-Time Live Video Streams. Huixin Wang, Amin Sakzad, Stuart W. Hall |
| 2025 | DeepFW: A DNN-Based Firmware Version Identification Framework for Online IoT Devices. Zhen Lei, Nian Xue, Zhen Li, Dan Yu, Xin Huang, Yongle Chen |
| 2025 | Demystifying Feature Engineering in Malware Analysis of API Call Sequences. Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li |
| 2025 | Detecting and Adapting to Stealthy Label-Inversion Drifts via Conditional Distribution Inference. Xiaoli Zhang, Yue Xiao, Qilei Yin, Zhengyang Li, Xinyan Wang, Jianrong Zhang, Ke Xu, Qi Li, Xu-Cheng Yin |
| 2025 | Developing a Strong CPS Defender: An Evolutionary Approach. Qingyuan Hu, Christopher M. Poskitt, Jun Sun, Yuqi Chen |
| 2025 | Evaluating LLM-Based Detection of Malicious Package Updates in npm. Elizabeth Wyss, Dominic Tassio, Lorenzo De Carli, Drew Davidson |
| 2025 | EventHunter: Dynamic Clustering and Ranking of Security Events from Hacker Forum Discussions. Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Jaafar Chbili |
| 2025 | Exploring Runtime Evolution in Android: A Cross-Version Analysis and Its Implications for Memory Forensics. Babangida Bappah, Lauren G. Bristol, Lamine Noureddine, Sideeq Bello, Umar Farooq, Aisha I. Ali-Gombe |
| 2025 | FedSIG: Privacy-Preserving Federated Recommendation via Synthetic Interaction Generation. Thirasara Ariyarathna, Salil S. Kanhere, Meisam Mohammady, Hye-Young Paik |
| 2025 | From Concealment to Exposure: Understanding the Lifecycle and Infrastructure of APT Domains. Athanasios Avgetidis, Aaron Faulkenberry, Boladji Vinny Adjibi, Tillson Galloway, Panagiotis Kintis, Omar Alrawi, Zane Ma, Fabian Monrose, Angelos D. Keromytis, Roberto Perdisci, Manos Antonakakis |
| 2025 | From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction. Ahmed Lekssays, Husrev Taha Sencar, Ting Yu |
| 2025 | Functional Encryption in Secure Neural Network Training: Data Leakage and Practical Mitigations. Alexandru Ionita, Andreea Ionita |
| 2025 | Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on Vertical Dataset. Anxiao Song, Shujie Cui, Jianli Bai, Ke Cheng, Yulong Shen, Giovanni Russello |
| 2025 | H2Fuzz: Guided, Black-box, Differential Fuzzing for HTTP/2-to-HTTP/1 Conversion Anomalies. Anthony Gavazzi, Weixin Kong, Engin Kirda |
| 2025 | Malware and Vulnerability Analysis using Graph-synchronized Language Model. Paventhan Vivekanandan, Alexander Shroyer, Martin Swany |
| 2025 | MotionDecipher: General Video-assisted Passcode Inference In Virtual Reality. Guanchong Huang, Yan He, Shangqing Zhao, Yi Wu, Song Fang |
| 2025 | MuSAR: Multi-Step Attack Reconstruction from Lightweight Security Logs via Event-Level Semantic Association in Multi-Host Environments. Yang Liu, Zisen Xu, Zian Luo, Jin'ao Shang, Shilong Zhang, Haichuan Zhang, Ting Liu |
| 2025 | NIDP: Solving Feature Distribution Shifts in Network Intrusion Detection via Neural Pruning. Jiangtao Ding, Junli Zheng, Chengyang Mo, Zhicheng Xu, Hongbing Cheng |
| 2025 | On the Effectiveness of Custom Transformers for Binary Analysis. Xuezixiang Li, Lian Gao, Sheng Yu, Yu Qu, Heng Yin |
| 2025 | Overlapping IPv4, IPv6, and TCP data: exploring errors, test case context, and multiple overlaps inside network stacks and NIDSes with Pyrolyse. Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier |
| 2025 | PRIV-HFL: Privacy-Preserving and Robust Federated Learning for Heterogeneous Clients Against Data Reconstruction Attacks. Mohammadreza Najafi, Hooman Alavizadeh, Ahmad Salehi Shahraki, A. S. M. Kayes, Wenny Rahayu |
| 2025 | Perry: A High-level Framework for Accelerating Cyber Deception Experimentation. Brian Singer, Yusuf Saquib, Lujo Bauer, Vyas Sekar |
| 2025 | Portal: Enabling Accurate Siemens PLC Rehosting via Peripheral Proxying and Proactive Interrupt Synchronization. Haoran Li, Dakun Shen, Wenbo Shen, Zhen Zhu |
| 2025 | RBAClock: Contain RBAC Permissions through Secure Scheduling. Qingwang Chen, Ru Tan, Xinyu Liu, Yuqi Shu, Zhou Tong, Haoqiang Wang, Ze Jin, Qixu Liu |
| 2025 | RF-Eye-D: Probing Feasibility of CMOS Camera Watermarking with Radio-Frequency Injection. Hui Zhuang, Yan Long, Kevin Fu |
| 2025 | Re-examine Federated Rank Learning: Analyzing Its Robustness Against Poisoning Attacks. Xiaofei Huang, Xiaojie Zhu, Chi Chen, Paulo Esteves Veríssimo |
| 2025 | Reconstruction of Differentially Private Text Sanitization via Large Language Models. Shuchao Pang, Zhigang Lu, Haichen Wang, Peng Fu, Yongbin Zhou, Minhui Xue |
| 2025 | Red-Teaming LLMs with Token Control Score: Efficient, Universal, and Transferable Jailbreaks. Leo Hyun Park, Taekyoung Kwon |
| 2025 | Revealing Informed Scanners by Colocating Reactive and Passive Telescopes. Dario Ferrero, Georgios Smaragdakis, Harm Griffioen |
| 2025 | Robust Cross-Modal Deepfake Detection via Facial UV Maps and Momentum Contrastive Learning. Yuesen Tang, Yuanyang Zhang, Wangxiao Mao, Li Yao |
| 2025 | SH3ARS: Privilege Reduction for ARMv8.0-A Secure Monitors. Jonas Röckl, Julian Funk, Matti Schulze, Tilo Müller |
| 2025 | STGraph: Spatio-Temporal Graph Mining for Anomaly Detection in Distributed System Logs. Teng Li, Shengkai Zhang, Yebo Feng, Jiahua Xu, Zexu Dang, Yang Liu, Jianfeng Ma |
| 2025 | Scalable Active Directory Defense with α-Metagraph. Nhu Long Nguyen, Nickolas J. G. Falkner, Hung Nguyen |
| 2025 | Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces. Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment |
| 2025 | Semantic Heat Guided Relational Privacy Inference Based on Panoptic Scene Graph. Qi Hao, Jie Huang, Changhao Ding, Zeping Zhang |
| 2025 | ShuffleV: A Microarchitectural Defense Strategy against Electromagnetic Side-Channel Attacks in Microprocessors. Nuntipat Narkthong, Yukui Luo, Xiaolin Xu |
| 2025 | SyzGrapher: Resource-Centric Graph-Based Kernel Fuzzing. Marius Fleischer, Harrison Green, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
| 2025 | SyzRetrospector: A Large-Scale Retrospective Study of Syzbot. Joseph Bursey, Ardalan Amiri Sani, Zhiyun Qian |
| 2025 | TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home Systems. Qixiao Lin, Jian Mao, Ziwen Liu, Zhenkai Liang |
| 2025 | The Adaptive Arms Race: Redefining Robustness in AI Security. Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen |
| 2025 | The Persistent Threat of DGA-Domains Used by Botnets. Arthur Drichel, Ulrike Meyer |
| 2025 | TypeFlexer: Type Directed Flexible Program Partitioning. Arunkumar Bhattar, Liyi Li, Mingwei Zhu, Le Chang, Aravind Machiry |
| 2025 | Uncontained Danger: Quantifying Remote Dependencies in Containerized Applications. Chris Tsoukaladelis, Roberto Perdisci, Nick Nikiforakis |
| 2025 | Unsupervised Backdoor Detection and Mitigation for Spiking Neural Networks. Jiachen Li, Bang Wu, Xiaoyu Xia, Xiaoning Liu, Xun Yi, Xiuzhen Zhang |
| 2025 | ViDToken: A Video-Transformer-Based Latent Token Defense for Adversarial Video Detection. Wei Song, Yulei Sui, Zhenchang Xing, Liming Zhu, Jingling Xue |
| 2025 | VulCodeMark: Adaptive Watermarking for Vulnerability Datasets Protection. Di Cao, Shigang Liu, Jun Zhang, Yang Xiang |
| 2025 | When (Inter)actions Speak Louder Than (Pass)words: Task-Based Evaluation of Implicit Authentication in Virtual Reality. Woojin Jeon, Chaejin Lim, Hyoungshick Kim |
| 2025 | Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving. Anna Pätschke, Jan Wichelmann, Thomas Eisenbarth |
| 2025 | {{alert('CSTI')}}: Large-Scale Detection of Client-Side Template Injection. Lorenzo Pisu, Davide Balzarotti, Davide Maiorca, Giorgio Giacinto |