


default search action
24th RAID 2021: San Sebastian, Spain
- Leyla Bilge, Tudor Dumitras:

RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021. ACM 2021, ISBN 978-1-4503-9058-3
1) Internet of Robots or Things?
- Yuan Xu

, Tianwei Zhang, Yungang Bao:
Analysis and Mitigation of Function Interaction Risks in Robot Apps. 1-16 - Gelei Deng, Yuan Zhou, Yuan Xu

, Tianwei Zhang, Yang Liu
:
An Investigation of Byzantine Threats in Multi-Robot Systems. 17-32 - Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu, Xiao Fu, Bin Luo:

SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes. 33-47
2) What is all the fuzz about?
- Dominik Christian Maier, Fabian Toepfer:

BSOD: Binary-only Scalable fuzzing Of device Drivers. 48-61 - Xianya Mi, Sanjay Rawat, Cristiano Giuffrida

, Herbert Bos
:
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. 62-77 - Jin Huang, Junjie Zhang, Jialun Liu, Chuang Li, Rui Dai:

UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis. 78-90
3) At the core of everything
- Sandeep Kumar, Smruti R. Sarangi:

SecureFS: A Secure File System for Intel SGX. 91-102 - Jan Philipp Thoma

, Jakob Feldtkeller
, Markus Krausz
, Tim Güneysu
, Daniel J. Bernstein:
BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster. 103-118 - Spyridoula Gravani

, Mohammad Hedayati, John Criswell
, Michael L. Scott
:
Fast Intra-kernel Isolation and Security with IskiOS. 119-134 - Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:

Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. 135-147
4) Reverse like you mean it!
- Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael B. Abu-Ghazaleh, Manu Sridharan:

DisCo: Combining Disassemblers for Improved Performance. 148-161 - Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:

iTOP: Automating Counterfeit Object-Oriented Programming Attacks. 162-176 - Dario Nisi

, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Lost in the Loader: The Many Faces of the Windows PE File Format. 177-192
5) Detect it already!
- Junnan Wang, Qixu Liu, Di Wu, Ying Dong, Xiang Cui:

Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL. 193-204 - Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil

, Wendy Hui Wang
, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. 205-219 - Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi:

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks. 220-234
6) IoT everywhere anywhere
- John Henry Castellanos, Martín Ochoa, Alvaro A. Cárdenas

, Owen Arden, Jianying Zhou:
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis. 235-250 - Shaohu Zhang

, Anupam Das:
HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal. 251-265 - Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Anthony Skjellum, Moti Yung:

What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files. 266-281 - Yangyong Zhang, Sunpreet S. Arora, Maliheh Shirvanian, Jianwei Huang, Guofei Gu:

Practical Speech Re-use Prevention in Voice-driven Services. 282-295
7) Doesn't exist if I don't see it (!)
- Nick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis

, Mathias Payer, Adam Bates
, Jonathan M. Smith, André DeHon, Nathan Dautenhahn:
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. 296-311 - Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Yangyong Zhang, Guofei Gu:

The Service Worker Hiding in Your Browser: The Next Web Attack Target? 312-323 - Imani N. Sherman, Jack W. Stokes, Elissa M. Redmiles:

Designing Media Provenance Indicators to Combat Fake Media. 324-339
8) Let's measure a little!
- Colin C. Ife, Yun Shen, Steven J. Murdoch

, Gianluca Stringhini:
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. 340-353 - Dennis Tatang, Florian Zettl, Thorsten Holz:

The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws. 354-369 - Xhelal Likaj, Soheil Khodayari

, Giancarlo Pellegrino:
Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks. 370-385
9) Minestrone
- Zicheng Zhang

:
On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps. 386-398 - Jack Cable, Drew Mylander Gregory, Liz Izhikevich, Zakir Durumeric:

Stratosphere: Finding Vulnerable Cloud Storage Buckets. 399-411 - Tianxi Ji

, Emre Yilmaz, Erman Ayday, Pan Li
:
The Curse of Correlations for Robust Fingerprinting of Relational Databases. 412-427
10) Artificial or Organic Intelligence?
- Aolin Ding, Praveen Murthy, Luis Garcia, Pengfei Sun, Matthew Chan, Saman A. Zonouz:

Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing. 428-441 - Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:

Living-Off-The-Land Command Detection Using Active Learning. 442-455 - Nicola Ruaro

, Kyle Zeng, Lukas Dresel, Mario Polino, Tiffany Bao, Andrea Continella
, Stefano Zanero, Christopher Kruegel, Giovanni Vigna:
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. 456-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














