


default search action
22nd RAID 2019: Beijing, China
- 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019. USENIX Association 2019

Software Security
- Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:

Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. 1-15 - Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash:

On Design Inference from Binaries Compiled using Modern C++ Defenses. 15-30 - Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin:

DECAF++: Elastic Whole-System Dynamic Taint Analysis. 31-45
Understanding Attacks
- Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:

Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. 47-60 - Vincent Ghiëtte, Harm Griffioen, Christian Doerr:

Fingerprinting Tooling used for SSH Compromisation Attempts. 61-71 - Chih-Yuan Lin, Simin Nadjm-Tehrani:

Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. 73-88
Defenses
- Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:

USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. 89-103 - Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:

Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. 105-120 - Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti:

ScaRR: Scalable Runtime Remote Attestation for Complex Systems. 121-134
Embedded Security
- Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:

Toward the Analysis of Embedded Firmware through Automated Re-hosting. 135-150 - Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang:

CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. 151-164 - Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz:

PAtt: Physics-based Attestation of Control Systems. 165-180 - Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan:

COMA: Communication and Obfuscation Management Architecture. 181-195
Privacy Enhancing Techniques
- Shruti Tople, Yaoqi Jia, Prateek Saxena:

PRO-ORAM: Practical Read-Only Oblivious RAM. 197-211 - Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici:

The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. 213-225 - Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:

TALON: An Automated Framework for Cross-Device Tracking Detection. 227-241
Android Security I
- Nir Sivan, Ron Bitton, Asaf Shabtai:

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. 243-260 - Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li

, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. 261-275 - Yue Duan, Lian Gao, Jie Hu, Heng Yin:

Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. 277-292
Machine Learning & Watermarking
- Fei Zuo, Bokai Yang, Xiaopeng Li, Qiang Zeng:

Exploiting the Inherent Limitation of L0 Adversarial Examples. 293-307 - Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. 309-321 - Erman Ayday, Emre Yilmaz, Arif Yilmaz:

Robust Optimization-Based Watermarking Scheme for Sequential Data. 323-336
Malware
- Key-whan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas:

Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. 337-351 - Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss:

SGXJail: Defeating Enclave Malware via Confinement. 353-366 - Richard Li, Min Du, David Johnson, Robert Ricci, Jacobus E. van der Merwe, Eric Eide:

Fluorescence: Detecting Kernel-Resident Malware in Clouds. 367-382
DNS Security
- Timothy Barron, Najmeh Miramirkhani, Nick Nikiforakis:

Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions. 383-397 - Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Xinran Liu, Heng Liu:

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. 399-412 - Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:

DomainScouter: Understanding the Risks of Deceptive IDNs. 413-426
Attacks
- Wei Song, Peng Liu:

Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. 427-442 - Wubing Wang, Yinqian Zhang, Zhiqiang Lin:

Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. 443-457 - Ahmed Abdo, Sakib Md. Bin Malek, Zhiyun Qian, Qi Zhu, Matthew J. Barth, Nael B. Abu-Ghazaleh:

Application level attacks on Connected Vehicle Protocols. 459-471
Security in Data Centers and the Cloud
- Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:

S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. 473-485 - Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu:

Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. 487-500 - Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:

Fingerprinting SDN Applications via Encrypted Control Traffic. 501-515
Android Security II
- Dario Nisi, Antonio Bianchi, Yanick Fratantonio:

Exploring Syscall-Based Semantics Reconstruction of Android Applications. 517-531 - Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:

Towards Large-Scale Hunting for Android Negative-Day Malware. 533-545 - Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III:

DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction. 547-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














