


default search action
25th RAID 2022: Limassol, Cyprus
- 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022. ACM 2022, ISBN 978-1-4503-9704-9

Software Security
- Daehee Jang, Ammar Askar, Insu Yun, Stephen Tong, Yiqin Cai, Taesoo Kim:

Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients. 1-16 - Hoyong Jeong

, Hodong Kim, Junbeom Hur:
Exploiting Metaobjects to Reinforce Data Leakage Attacks. 17-29 - Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi

, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi:
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. 30-42 - Zhenghao Hu, Yu Hu, Brendan Dolan-Gavitt:

Towards Deceptive Defense in Software Security with Chaff Bugs. 43-55
(Un?)Trusted Hardware
- Fabian Schwarz

:
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone. 56-71 - Jan Philipp Thoma

, Tim Güneysu
:
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs. 72-85 - Jianyu Jiang, Claudio Soriente

, Ghassan Karame:
On the Challenges of Detecting Side-Channel Attacks in SGX. 86-98
Blockchain Security
- Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. 99-114 - Christof Ferreira Torres

, Hugo Jonker, Radu State:
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts. 115-128 - Yang Shi, Junqing Liang, Mianhong Li, Tianchen Ma, Guodong Ye, Jiangfeng Li, Qinpei Zhao:

Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications. 129-142
Privacy & Spoofing
- Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori:

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework. 143-159 - Baihe Ma

, Xiaojie Lin, Xu Wang
, Bin Liu
, Ying He
, Wei Ni, Ren Ping Liu:
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy. 160-170 - Youqian Zhang

, Kasper Rasmussen:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. 171-184 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:

HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors. 185-199
RTFFM (Rootkits, Forensics, Firmware, Mobile)
- Jun Yeon Won, Haohuang Wen

, Zhiqiang Lin:
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. 200-213 - Fabian Franzen

, Tobias Holl, Manuel Andreas, Julian Kirsch, Jens Grossklags:
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots. 214-231 - Duy-Phuc Pham, Damien Marion

, Annelie Heuser:
ULTRA: Ultimate Rootkit Detection over the Air. 232-251 - Alain Tchana, Lavoisier Lavoisier Wapet, Yérom-David Bromberg

:
Odile: A scalable tracing tool for non-rooted and on-device Android phones. 252-262
Network Security
- Ramin Yazdani

, Alden Hilton, Jeroen van der Ham
, Roland van Rijswijk-Deij
, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. 263-275 - Nicolaas Weideman, Haoda Wang

, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic, Christophe Hauser:
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables. 276-291 - Jincheng Wang, Zhuohua Li

, Mingshen Sun, John C. S. Lui:
Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications. 292-307
Robust and Trustworthy ML & Models
- Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang

, DaeHun Nyang, David Mohaisen
:
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems. 308-320 - Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:

Transferable Graph Backdoor Attack. 321-332 - Qingzhao Zhang, Xiao Zhu, Mu Zhang

, Z. Morley Mao:
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems. 333-349
Program Analysis
- Xu He, Shu Wang

, Yunlong Xing
, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun:
BinProv: Binary Code Provenance Identification without Disassembly. 350-363 - Menghan Sun, Zirui Song, Xiaoxi Ren, Daoyuan Wu

, Kehuan Zhang:
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework. 364-379 - Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura

:
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks. 380-394 - Md. Mehedi Hasan, Seyedhamed Ghavamnia, Michalis Polychronakis

:
Decap: Deprivileging Programs by Reducing Their Capabilities. 395-408
Web, Phishing and Authentication
- Haoran Ou, Yong Fang

, Yongyan Guo, Wenbo Guo, Cheng Huang:
Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites. 409-430 - Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:

Context-Auditor: Context-sensitive Content Injection Mitigation. 431-445 - Mashael Al Sabah, Mohamed Nabeel, Yazan Boshmaf, Euijin Choo:

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS. 446-459 - Pieter Philippaerts

, Davy Preuveneers, Wouter Joosen:
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem. 460-481
NIDS
- Yebo Feng

, Jun Li, Devkishen Sisodia:
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic. 482-494 - Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan

:
Encrypted Malware Traffic Detection via Graph-based Network Analysis. 495-509 - Konrad Wolsing

, Eric Wagner
, Antoine Saillard, Martin Henze
:
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. 510-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














