RAID A

63 papers

YearTitle / Authors
202528th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2025, Gold Coast, Australia, October 19-22, 2025
2025A Comprehensive Quantification of Inconsistencies in Memory Dumps.
Andrea Oliveri, Davide Balzarotti
2025A Longitudinal Analysis of LockBit 3.0's Extortion Lifecycle and Response to Law Enforcement.
Yin Minn Pa Pa, Yuji Sekine, Yamato Kawaguchi, Tatsuki Yogo, Kelvin Lubbertsen, Rolf van Wegberg, Michel van Eeten, Katsunari Yoshioka
2025ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection.
Md Tanvirul Alam, Aritran Piplai, Nidhi Rastogi
2025Activation Functions Considered Harmful: Recovering Neural Network Weights through Controlled Channels.
Jesse Spielman, David F. Oswald, Mark Dermot Ryan, Jo Van Bulck
2025Active Attack Resilience in 5G: A New Take on Authentication and Key Agreement.
Nazatul H. Sultan, Xinlong Guan, Josef Pieprzyk, Wei Ni, Sharif Abuadbba, Hajime Suzuki
2025An In-model Spy in Edge Intelligence.
Fengxu Yang, Paizhuo Chen, Yihui Yan, Zhice Yang
2025BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning.
Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen
2025BadLogo: A Physically Realizable Adversarial Sticker for Evaluating the Robustness of Face Recognition Models.
Fuqi Qi, Haichang Gao, Boling Li, Shiping Guo, Yuming Zheng, Bingqian Zhou
2025Carbon Filter: Scalable, Efficient, and Secure Alert Triage for Endpoint Detection & Response.
Muhammad Adil Inam, Jonathan Oliver, Raghav Batta, Adam Bates
2025Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant Messengers.
Gabriel K. Gegenhuber, Maximilian Günther, Markus Maier, Aljosha Judmayer, Florian Holzbauer, Philipp É. Frenzel, Johanna Ullrich
2025CasinoLimit: An Offensive Dataset Labeled with MITRE ATT&CK Techniques.
Sébastien Kilian, Valérie Viet Triem Tong, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, Natan Talon, Pierre-Victor Besson, Helene Orsini, Pierre Lledo, Pierre-François Gimenez
2025DEPHP: A Source Code Recovery Method for PHP Bytecode with Improved Structural Analysis.
Shiwu Zhao, Ningjun Zheng, Haoyu Li, Ruizhi Feng, Xingchen Chen, Ru Tan, Qixu Liu
2025Deception Meets Diagnostics: Deception-based Real-Time Threat Detection in Healthcare Web Systems.
Zeeshan Zulkifl Shah, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar
2025Deep Learning-Based Attacks on Traditional Watermarking Systems in Real-Time Live Video Streams.
Huixin Wang, Amin Sakzad, Stuart W. Hall
2025DeepFW: A DNN-Based Firmware Version Identification Framework for Online IoT Devices.
Zhen Lei, Nian Xue, Zhen Li, Dan Yu, Xin Huang, Yongle Chen
2025Demystifying Feature Engineering in Malware Analysis of API Call Sequences.
Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li
2025Detecting and Adapting to Stealthy Label-Inversion Drifts via Conditional Distribution Inference.
Xiaoli Zhang, Yue Xiao, Qilei Yin, Zhengyang Li, Xinyan Wang, Jianrong Zhang, Ke Xu, Qi Li, Xu-Cheng Yin
2025Developing a Strong CPS Defender: An Evolutionary Approach.
Qingyuan Hu, Christopher M. Poskitt, Jun Sun, Yuqi Chen
2025Evaluating LLM-Based Detection of Malicious Package Updates in npm.
Elizabeth Wyss, Dominic Tassio, Lorenzo De Carli, Drew Davidson
2025EventHunter: Dynamic Clustering and Ranking of Security Events from Hacker Forum Discussions.
Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Jaafar Chbili
2025Exploring Runtime Evolution in Android: A Cross-Version Analysis and Its Implications for Memory Forensics.
Babangida Bappah, Lauren G. Bristol, Lamine Noureddine, Sideeq Bello, Umar Farooq, Aisha I. Ali-Gombe
2025FedSIG: Privacy-Preserving Federated Recommendation via Synthetic Interaction Generation.
Thirasara Ariyarathna, Salil S. Kanhere, Meisam Mohammady, Hye-Young Paik
2025From Concealment to Exposure: Understanding the Lifecycle and Infrastructure of APT Domains.
Athanasios Avgetidis, Aaron Faulkenberry, Boladji Vinny Adjibi, Tillson Galloway, Panagiotis Kintis, Omar Alrawi, Zane Ma, Fabian Monrose, Angelos D. Keromytis, Roberto Perdisci, Manos Antonakakis
2025From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction.
Ahmed Lekssays, Husrev Taha Sencar, Ting Yu
2025Functional Encryption in Secure Neural Network Training: Data Leakage and Practical Mitigations.
Alexandru Ionita, Andreea Ionita
2025Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on Vertical Dataset.
Anxiao Song, Shujie Cui, Jianli Bai, Ke Cheng, Yulong Shen, Giovanni Russello
2025H2Fuzz: Guided, Black-box, Differential Fuzzing for HTTP/2-to-HTTP/1 Conversion Anomalies.
Anthony Gavazzi, Weixin Kong, Engin Kirda
2025Malware and Vulnerability Analysis using Graph-synchronized Language Model.
Paventhan Vivekanandan, Alexander Shroyer, Martin Swany
2025MotionDecipher: General Video-assisted Passcode Inference In Virtual Reality.
Guanchong Huang, Yan He, Shangqing Zhao, Yi Wu, Song Fang
2025MuSAR: Multi-Step Attack Reconstruction from Lightweight Security Logs via Event-Level Semantic Association in Multi-Host Environments.
Yang Liu, Zisen Xu, Zian Luo, Jin'ao Shang, Shilong Zhang, Haichuan Zhang, Ting Liu
2025NIDP: Solving Feature Distribution Shifts in Network Intrusion Detection via Neural Pruning.
Jiangtao Ding, Junli Zheng, Chengyang Mo, Zhicheng Xu, Hongbing Cheng
2025On the Effectiveness of Custom Transformers for Binary Analysis.
Xuezixiang Li, Lian Gao, Sheng Yu, Yu Qu, Heng Yin
2025Overlapping IPv4, IPv6, and TCP data: exploring errors, test case context, and multiple overlaps inside network stacks and NIDSes with Pyrolyse.
Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier
2025PRIV-HFL: Privacy-Preserving and Robust Federated Learning for Heterogeneous Clients Against Data Reconstruction Attacks.
Mohammadreza Najafi, Hooman Alavizadeh, Ahmad Salehi Shahraki, A. S. M. Kayes, Wenny Rahayu
2025Perry: A High-level Framework for Accelerating Cyber Deception Experimentation.
Brian Singer, Yusuf Saquib, Lujo Bauer, Vyas Sekar
2025Portal: Enabling Accurate Siemens PLC Rehosting via Peripheral Proxying and Proactive Interrupt Synchronization.
Haoran Li, Dakun Shen, Wenbo Shen, Zhen Zhu
2025RBAClock: Contain RBAC Permissions through Secure Scheduling.
Qingwang Chen, Ru Tan, Xinyu Liu, Yuqi Shu, Zhou Tong, Haoqiang Wang, Ze Jin, Qixu Liu
2025RF-Eye-D: Probing Feasibility of CMOS Camera Watermarking with Radio-Frequency Injection.
Hui Zhuang, Yan Long, Kevin Fu
2025Re-examine Federated Rank Learning: Analyzing Its Robustness Against Poisoning Attacks.
Xiaofei Huang, Xiaojie Zhu, Chi Chen, Paulo Esteves Veríssimo
2025Reconstruction of Differentially Private Text Sanitization via Large Language Models.
Shuchao Pang, Zhigang Lu, Haichen Wang, Peng Fu, Yongbin Zhou, Minhui Xue
2025Red-Teaming LLMs with Token Control Score: Efficient, Universal, and Transferable Jailbreaks.
Leo Hyun Park, Taekyoung Kwon
2025Revealing Informed Scanners by Colocating Reactive and Passive Telescopes.
Dario Ferrero, Georgios Smaragdakis, Harm Griffioen
2025Robust Cross-Modal Deepfake Detection via Facial UV Maps and Momentum Contrastive Learning.
Yuesen Tang, Yuanyang Zhang, Wangxiao Mao, Li Yao
2025SH3ARS: Privilege Reduction for ARMv8.0-A Secure Monitors.
Jonas Röckl, Julian Funk, Matti Schulze, Tilo Müller
2025STGraph: Spatio-Temporal Graph Mining for Anomaly Detection in Distributed System Logs.
Teng Li, Shengkai Zhang, Yebo Feng, Jiahua Xu, Zexu Dang, Yang Liu, Jianfeng Ma
2025Scalable Active Directory Defense with α-Metagraph.
Nhu Long Nguyen, Nickolas J. G. Falkner, Hung Nguyen
2025Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces.
Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment
2025Semantic Heat Guided Relational Privacy Inference Based on Panoptic Scene Graph.
Qi Hao, Jie Huang, Changhao Ding, Zeping Zhang
2025ShuffleV: A Microarchitectural Defense Strategy against Electromagnetic Side-Channel Attacks in Microprocessors.
Nuntipat Narkthong, Yukui Luo, Xiaolin Xu
2025SyzGrapher: Resource-Centric Graph-Based Kernel Fuzzing.
Marius Fleischer, Harrison Green, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
2025SyzRetrospector: A Large-Scale Retrospective Study of Syzbot.
Joseph Bursey, Ardalan Amiri Sani, Zhiyun Qian
2025TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home Systems.
Qixiao Lin, Jian Mao, Ziwen Liu, Zhenkai Liang
2025The Adaptive Arms Race: Redefining Robustness in AI Security.
Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen
2025The Persistent Threat of DGA-Domains Used by Botnets.
Arthur Drichel, Ulrike Meyer
2025TypeFlexer: Type Directed Flexible Program Partitioning.
Arunkumar Bhattar, Liyi Li, Mingwei Zhu, Le Chang, Aravind Machiry
2025Uncontained Danger: Quantifying Remote Dependencies in Containerized Applications.
Chris Tsoukaladelis, Roberto Perdisci, Nick Nikiforakis
2025Unsupervised Backdoor Detection and Mitigation for Spiking Neural Networks.
Jiachen Li, Bang Wu, Xiaoyu Xia, Xiaoning Liu, Xun Yi, Xiuzhen Zhang
2025ViDToken: A Video-Transformer-Based Latent Token Defense for Adversarial Video Detection.
Wei Song, Yulei Sui, Zhenchang Xing, Liming Zhu, Jingling Xue
2025VulCodeMark: Adaptive Watermarking for Vulnerability Datasets Protection.
Di Cao, Shigang Liu, Jun Zhang, Yang Xiang
2025When (Inter)actions Speak Louder Than (Pass)words: Task-Based Evaluation of Implicit Authentication in Virtual Reality.
Woojin Jeon, Chaejin Lim, Hyoungshick Kim
2025Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving.
Anna Pätschke, Jan Wichelmann, Thomas Eisenbarth
2025{{alert('CSTI')}}: Large-Scale Detection of Client-Side Template Injection.
Lorenzo Pisu, Davide Balzarotti, Davide Maiorca, Giorgio Giacinto