default search action
26th RAID 2023: Hong Kong, SAR, China
- Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023. ACM 2023
IoT / Firmware / Binaries
- Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William K. Robertson:
Black-box Attacks Against Neural Binary Function Detection. 1-16 - Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. 17-31 - Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. 32-45 - Xuening Xu, Chenglong Fu, Xiaojiang Du:
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands. 46-62 - Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
BitDance: Manipulating UART Serial Communication with IEMI. 63-76
IDS and Applied Crypto
- Isaiah J. King, Xiaokui Shu, Jiyong Jang, Kevin Eykholt, Taesung Lee, H. Howie Huang:
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection. 77-91 - Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi:
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI. 92-108 - Tong Cao, Xin Li:
Temporary Block Withholding Attacks on Filecoin's Expected Consensus. 109-122 - Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
How (Not) to Build Threshold EdDSA. 123-134 - Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems. 135-150
Deep into Systems and Formats
- Zihan Xue, Jinchi Han, Wei Song:
CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors. 151-163 - Connor Bolton, Yan Long, Jun Han, Josiah D. Hester, Kevin Fu:
Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors. 164-178 - Jost Rossel, Vladislav Mladenov, Juraj Somorovsky:
Security Analysis of the 3MF Data Format. 179-194 - Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. 195-206 - Mathé Hertogh, Manuel Wiesinger, Sebastian Österlund, Marius Muench, Nadav Amit, Herbert Bos, Cristiano Giuffrida:
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. 207-221
ML (I): Inference and Toxicity
- Liwei Zhang, Linghui Li, Xiaoyong Li, Binsi Cai, Yali Gao, Ruobin Dou, Luying Chen:
Efficient Membership Inference Attacks against Federated Learning via Bias Differences. 222-235 - Hyunjun Kim, Yungi Cho, Younghan Lee, Ho Bae, Yunheung Paek:
Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack. 236-249 - Seung Ho Na, Kwanwoo Kim, Seungwon Shin:
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy. 250-263 - Myeongseob Ko, Xinyu Yang, Zhengjie Ji, Hoang Anh Just, Peng Gao, Anoop Kumar, Ruoxi Jia:
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models. 264-281 - Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. 282-296
ML (II): Adversarial, Robust and Explainable AI
- Zijun Hang, Yuliang Lu, Yongjie Wang, Yi Xie:
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification. 297-314 - Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. 315-329 - Arthur Drichel, Ulrike Meyer:
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers. 330-345 - Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza:
Federated Explainability for Network Anomaly Characterization. 346-365 - Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. 366-380
Network and Cloud Security
- Noah Spahn, Nils Hanke, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
Container Orchestration Honeypot: Observing Attacks in the Wild. 381-396 - Jaemin Park, Brent ByungHoon Kang:
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN. 397-411 - Jingting Chen, Feng Li, Qingfang Chen, Ping Li, Lili Xu, Wei Huo:
EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations. 412-425 - Abdullahi Chowdhury, Hung X. Nguyen:
CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. 426-439 - Qiuye He, Song Fang:
Phantom-CSI Attacks against Wireless Liveness Detection. 440-454
Malware and Fuzzing
- Haikuo Yin, Brandon Lou, Peter L. Reiher:
A Method for Summarizing and Classifying Evasive Malware. 455-470 - Yuhei Kawakoya, Shu Akabane, Makoto Iwamura, Takeshi Okamoto:
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware. 471-484 - Donghui Yu, Jianqiang Wang, Haoran Fang, Ya Fang, Yuanyuan Zhang:
SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis. 485-498 - Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos, Jianying Zhou, Nils Ole Tippenhauer:
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network. 499-512 - Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán:
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. 513-526
Software Security I
- Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, Vasileios P. Kemerlis:
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. 527-546 - Sangbin Park, Youngjoon Kim, Dong Hoon Lee:
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring. 547-563 - Zahra Tarkhani, Anil Madhavapeddy:
Information Flow Tracking for Heterogeneous Compartmentalized Software. 564-579 - Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin:
Renewable Just-In-Time Control-Flow Integrity. 580-594 - Yu Wang, Jinting Wu, Haodong Zheng, Zhenyu Ning, Boyuan He, Fengwei Zhang:
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V. 595-608
Software Security II
- Shengjie Xu, Eric Liu, Wei Huang, David Lie:
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking. 609-622 - Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang:
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. 623-638 - Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi:
NatiSand: Native Code Sandboxing for JavaScript Runtimes. 639-653 - Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. 654-668 - Taeyoung Kim, Seonhye Park, Hyoungshick Kim:
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation. 669-685
Web Security and Authentication
- Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. 686-699 - Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. 700-713 - Leon Trampert, Ben Stock, Sebastian Roth:
Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild. 714-726 - Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. 727-743 - Rajat Tandon, Haoda Wang, Nicolaas Weideman, Shushan Arakelyan, Genevieve Bartlett, Christophe Hauser, Jelena Mirkovic:
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications. 744-758
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.