


default search action
26th RAID 2023: Hong Kong, SAR, China
- Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023. ACM 2023

IoT / Firmware / Binaries
- Joshua Bundt

, Michael Davinroy
, Ioannis Agadakos
, Alina Oprea
, William K. Robertson
:
Black-box Attacks Against Neural Binary Function Detection. 1-16 - Md Sakib Anwar

, Chaoshun Zuo
, Carter Yagemann
, Zhiqiang Lin
:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. 17-31 - Eric Gustafson

, Paul Grosen
, Nilo Redini
, Saagar Jha
, Andrea Continella
, Ruoyu Wang
, Kevin Fu
, Sara Rampazzi
, Christopher Kruegel
, Giovanni Vigna
:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. 32-45 - Xuening Xu

, Chenglong Fu
, Xiaojiang Du
:
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands. 46-62 - Zhixin Xie

, Chen Yan
, Xiaoyu Ji
, Wenyuan Xu
:
BitDance: Manipulating UART Serial Communication with IEMI. 63-76
IDS and Applied Crypto
- Isaiah J. King

, Xiaokui Shu
, Jiyong Jang
, Kevin Eykholt
, Taesung Lee
, H. Howie Huang
:
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection. 77-91 - Md Tanvirul Alam

, Dipkamal Bhusal
, Youngja Park
, Nidhi Rastogi
:
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI. 92-108 - Tong Cao

, Xin Li
:
Temporary Block Withholding Attacks on Filecoin's Expected Consensus. 109-122 - Harry W. H. Wong

, Jack P. K. Ma
, Hoover H. F. Yin
, Sherman S. M. Chow
:
How (Not) to Build Threshold EdDSA. 123-134 - Maxime Lanvin

, Pierre-François Gimenez
, Yufei Han
, Frédéric Majorczyk
, Ludovic Mé
, Eric Totel
:
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems. 135-150
Deep into Systems and Formats
- Zihan Xue

, Jinchi Han
, Wei Song
:
CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors. 151-163 - Connor Bolton

, Yan Long
, Jun Han
, Josiah D. Hester
, Kevin Fu
:
Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors. 164-178 - Jost Rossel

, Vladislav Mladenov
, Juraj Somorovsky
:
Security Analysis of the 3MF Data Format. 179-194 - Marco Alecci

, Luca Attanasio
, Alessandro Brighente
, Mauro Conti
, Eleonora Losiouk
, Hideki Ochiai
, Federico Turrin
:
Beware of Pickpockets: A Practical Attack against Blocking Cards. 195-206 - Mathé Hertogh

, Manuel Wiesinger
, Sebastian Österlund
, Marius Muench
, Nadav Amit
, Herbert Bos
, Cristiano Giuffrida
:
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. 207-221
ML (I): Inference and Toxicity
- Liwei Zhang

, Linghui Li
, Xiaoyong Li
, Binsi Cai
, Yali Gao
, Ruobin Dou
, Luying Chen
:
Efficient Membership Inference Attacks against Federated Learning via Bias Differences. 222-235 - Hyunjun Kim

, Yungi Cho
, Younghan Lee
, Ho Bae
, Yunheung Paek
:
Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack. 236-249 - Seung Ho Na

, Kwanwoo Kim
, Seungwon Shin
:
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy. 250-263 - Myeongseob Ko

, Xinyu Yang
, Zhengjie Ji
, Hoang Anh Just
, Peng Gao
, Anoop Kumar
, Ruoxi Jia
:
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models. 264-281 - Bocheng Chen

, Guangjing Wang
, Hanqing Guo
, Yuanda Wang
, Qiben Yan
:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. 282-296
ML (II): Adversarial, Robust and Explainable AI
- Zijun Hang

, Yuliang Lu
, Yongjie Wang
, Yi Xie
:
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification. 297-314 - Marco Alecci

, Mauro Conti
, Francesco Marchiori
, Luca Martinelli
, Luca Pajola
:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. 315-329 - Arthur Drichel

, Ulrike Meyer
:
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers. 330-345 - Xabier Sáez de Cámara

, Jose Luis Flores
, Cristóbal Arellano
, Aitor Urbieta
, Urko Zurutuza
:
Federated Explainability for Network Anomaly Characterization. 346-365 - Hanqing Guo

, Guangjing Wang
, Yuanda Wang
, Bocheng Chen
, Qiben Yan
, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. 366-380
Network and Cloud Security
- Noah Spahn

, Nils Hanke
, Thorsten Holz
, Christopher Kruegel
, Giovanni Vigna
:
Container Orchestration Honeypot: Observing Attacks in the Wild. 381-396 - Jaemin Park

, Brent ByungHoon Kang
:
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN. 397-411 - Jingting Chen

, Feng Li
, Qingfang Chen
, Ping Li
, Lili Xu
, Wei Huo
:
EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations. 412-425 - Abdullahi Chowdhury

, Hung X. Nguyen
:
CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. 426-439 - Qiuye He

, Song Fang
:
Phantom-CSI Attacks against Wireless Liveness Detection. 440-454
Malware and Fuzzing
- Haikuo Yin

, Brandon Lou
, Peter L. Reiher
:
A Method for Summarizing and Classifying Evasive Malware. 455-470 - Yuhei Kawakoya

, Shu Akabane
, Makoto Iwamura
, Takeshi Okamoto
:
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware. 471-484 - Donghui Yu

, Jianqiang Wang
, Haoran Fang
, Ya Fang
, Yuanyuan Zhang
:
SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis. 485-498 - Andrei Bytes

, Prashant Hari Narayan Rajput
, Constantine Doumanidis
, Michail Maniatakos
, Jianying Zhou
, Nils Ole Tippenhauer
:
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network. 499-512 - Arwa Abdulkarim Al Alsadi

, Kaichi Sameshima
, Katsunari Yoshioka
, Michel van Eeten
, Carlos Hernandez Gañán
:
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. 513-526
Software Security I
- Alexander J. Gaidis

, Joao Moreira
, Ke Sun
, Alyssa Milburn
, Vaggelis Atlidakis
, Vasileios P. Kemerlis
:
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. 527-546 - Sangbin Park

, Youngjoon Kim
, Dong Hoon Lee
:
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring. 547-563 - Zahra Tarkhani

, Anil Madhavapeddy
:
Information Flow Tracking for Heterogeneous Compartmentalized Software. 564-579 - Erick Bauman

, Jun Duan
, Kevin W. Hamlen
, Zhiqiang Lin
:
Renewable Just-In-Time Control-Flow Integrity. 580-594 - Yu Wang

, Jinting Wu
, Haodong Zheng
, Zhenyu Ning
, Boyuan He
, Fengwei Zhang
:
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V. 595-608
Software Security II
- Shengjie Xu

, Eric Liu
, Wei Huang
, David Lie
:
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking. 609-622 - Zeyu Chen

, Daiping Liu
, Jidong Xiao
, Haining Wang
:
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. 623-638 - Marco Abbadini

, Dario Facchinetti
, Gianluca Oldani
, Matthew Rossi
, Stefano Paraboschi
:
NatiSand: Native Code Sandboxing for JavaScript Runtimes. 639-653 - Yizheng Chen

, Zhoujie Ding
, Lamya Alowain
, Xinyun Chen
, David A. Wagner
:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. 654-668 - Taeyoung Kim

, Seonhye Park
, Hyoungshick Kim
:
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation. 669-685
Web Security and Authentication
- Lin Li

, Chao Chen
, Lei Pan
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. 686-699 - Nicholas Boucher

, Luca Pajola
, Ilia Shumailov
, Ross J. Anderson
, Mauro Conti
:
Boosting Big Brother: Attacking Search Engines with Encodings. 700-713 - Leon Trampert

, Ben Stock
, Sebastian Roth
:
Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild. 714-726 - Supraja Baskaran

, Lianying Zhao
, Mohammad Mannan
, Amr M. Youssef
:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. 727-743 - Rajat Tandon

, Haoda Wang
, Nicolaas Weideman
, Shushan Arakelyan
, Genevieve Bartlett
, Christophe Hauser
, Jelena Mirkovic
:
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications. 744-758

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














