


default search action
27th RAID 2024: Padua, Italy
- Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:

The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3
Web Security and Privacy
- Franco Terranova

, Abdelkader Lahmadi
, Isabelle Chrisment
:
Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation. 1-16 - Bogdan Cebere

, Christian Rossow
:
Understanding Web Fingerprinting with a Protocol-Centric Approach. 17-34 - Udesh Kumarasinghe

, Mohamed Nabeel
, Charitha Elvitigala
:
Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure. 35-48 - Zhibo Sun

, Faris Bugra Kokulu
, Penghui Zhang
, Adam Oest
, Gianluca Stringhini
, Tiffany Bao
, Ruoyu Wang
, Yan Shoshitaishvili
, Adam Doupé
, Gail-Joon Ahn
:
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. 49-64 - Matteo Golinelli

, Bruno Crispo
:
Hidden Web Caches Discovery. 65-76
Malware & Unwanted Software
- Marcus Botacin

:
What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments. 77-96 - Marcus Botacin

, Heitor Murilo Gomes
:
Cross-Regional Malware Detection via Model Distilling and Federated Learning. 97-113 - Aakanksha Saha

, Jorge Blasco
, Lorenzo Cavallaro
, Martina Lindorfer
:
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files. 114-129 - Ilias Tsingenopoulos

, Jacopo Cortellazzi
, Branislav Bosanský
, Simone Aonzo
, Davy Preuveneers
, Wouter Joosen
, Fabio Pierazzi
, Lorenzo Cavallaro
:
How to Train your Antivirus: RL-based Hardening through the Problem Space. 130-146 - Bogdan-Constantin Cebere

, Jonathan Lasse Bennet Flueren
, Silvia Sebastián
, Daniel Plohmann
, Christian Rossow
:
Down to earth! Guidelines for DGA-based Malware Detection. 147-165 - Richard August See

, Kevin Röbert
, Mathias Fischer
:
Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation. 166-180 - Diogo Barradas

, Carlos Novo
, Bernardo Portela
, Sofia Romeiro
, Nuno Santos
:
Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware. 181-196 - Kevin Stevens

, Mert Erdemir
, Hang Zhang
, Taesoo Kim
, Paul Pearce
:
BluePrint: Automatic Malware Signature Generation for Internet Scanning. 197-214
IDS and Network Security
- Fahad M. Alotaibi

, Sergio Maffeis
:
Mateen: Adaptive Ensemble Learning for Network Anomaly Detection. 215-234 - Bahruz Jabiyev

, Anthony Gavazzi
, Kaan Onarlioglu
, Engin Kirda
:
Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies. 235-247 - Anyuan Sang

, Yuchen Wang
, Li Yang
, Junbo Jia
, Lu Zhou
:
Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior. 248-262 - Hongbin Sun

, Su Wang
, Zhiliang Wang
, Zheyu Jiang
, Dongqi Han
, Jiahai Yang
:
AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection. 263-277 - Franka Schuster

, Hartmut König
:
No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge. 278-297
Cyber Crime and Security Measurements
- Mengya Zhang

, Xiaokuan Zhang
, Yinqian Zhang
, Zhiqiang Lin
:
Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. 298-316 - Mario Kahlhofer

, Stefan Achleitner
, Stefan Rass
, René Mayrhofer
:
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. 317-336 - Thomas Geras

, Thomas Schreck
:
The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence. 337-352 - Mohammad Hammas Saeed

, Shiza Ali
, Pujan Paudel
, Jeremy Blackburn
, Gianluca Stringhini
:
Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter. 353-367 - Tommaso Paladini

, Lara Ferro
, Mario Polino
, Stefano Zanero
, Michele Carminati
:
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence. 368-383
Software Security
- Bonan Ruan

, Jiahao Liu
, Chuqi Zhang
, Zhenkai Liang
:
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities. 384-402 - Ahmad Hazimeh

, Duo Xu
, Qiang Liu
, Yan Wang
, Mathias Payer
:
Tango: Extracting Higher-Order Feedback through State Inference. 403-418 - Florian Kasten

, Philipp Zieris
, Julian Horsch
:
Integrating Static Analyses for High-Precision Control-Flow Integrity. 419-434 - Yu Wang

, Yue Xu
:
Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing. 435-449 - Tai Yue

, Yibo Jin
, Fengwei Zhang
, Zhenyu Ning
, Pengfei Wang
, Xu Zhou
, Kai Lu
:
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. 450-464
ML and Adversarial Learning for Security
- Atharva Haldankar

, Arman Riasi
, Hoang-Dung Nguyen
, Tran Phuong
, Thang Hoang
:
Breaking Privacy in Model-Heterogeneous Federated Learning. 465-479 - Hualong Ma

, Peizhuo Lv
, Kai Chen
, Jiachen Zhou
:
KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs. 480-495 - Gang Yan

, Hao Wang
, Xu Yuan
, Jian Li
:
Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods. 496-512 - Jonas Ricker

, Dennis Assenmacher
, Thorsten Holz
, Asja Fischer
, Erwin Quiring
:
AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images. 513-530
CPS / IoT / Critical Infrastructure Security
- Chun-Yu (Daniel) Chen

, Kang G. Shin
, Soodeh Dadras
:
Context-Aware Anomaly Detection Using Vehicle Dynamics. 531-545 - Zeyu Yang

, Hongyi Pu
, Liang He
, Chengtao Yao
, Jianying Zhou
, Peng Cheng
, Jiming Chen
:
Deception-Resistant Stochastic Manufacturing for Automated Production Lines. 546-560 - Carlotta Tagliaro, Martina Komsic, Andrea Continella

, Kevin Borgolte, Martina Lindorfer:
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols. 561-578 - Jianing Wang

, Shanqing Guo
, Wenrui Diao
, Yue Liu
, Haixin Duan
, Yichen Liu
, Zhenkai Liang
:
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning. 579-593 - Robert Lorch

, Daniel Larraz
, Cesare Tinelli
, Omar Chowdhury
:
A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework. 594-612
Mobile and Hardware Security
- Lukas Arnold

, Matthias Hollick
, Jiska Classen
:
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database. 613-629 - Mabon Ninan

, Evan Nimmo
, Shane Reilly
, Channing Smith
, Wenhai Sun
, Boyang Wang
, John Marty Emmert
:
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces. 630-643 - Luis Gerhorst

, Henriette Herzog
, Peter Wägemann
, Maximilian Ott
, Rüdiger Kapitza
, Timo Hönig
:
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions. 644-659 - Wenfan Song

, Jianwei Liu
, Yajie Liu
, Jinsong Han
:
Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations. 660-673 - Ziyi Huang

, Ding Wang
, Yunkai Zou
:
Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times. 674-692 - Alexander J. Ross, Bradley Reaves, Yomna Nasser, Gil Cukierman, Roger Piqueras Jover:

Fixing Insecure Cellular System Information Broadcasts For Good. 693-708

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














