default search action
22nd RAID 2019: Beijing, China
- 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019. USENIX Association 2019
Software Security
- Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. 1-15 - Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash:
On Design Inference from Binaries Compiled using Modern C++ Defenses. 15-30 - Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin:
DECAF++: Elastic Whole-System Dynamic Taint Analysis. 31-45
Understanding Attacks
- Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. 47-60 - Vincent Ghiëtte, Harm Griffioen, Christian Doerr:
Fingerprinting Tooling used for SSH Compromisation Attempts. 61-71 - Chih-Yuan Lin, Simin Nadjm-Tehrani:
Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. 73-88
Defenses
- Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. 89-103 - Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. 105-120 - Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti:
ScaRR: Scalable Runtime Remote Attestation for Complex Systems. 121-134
Embedded Security
- Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. 135-150 - Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang:
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. 151-164 - Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz:
PAtt: Physics-based Attestation of Control Systems. 165-180 - Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan:
COMA: Communication and Obfuscation Management Architecture. 181-195
Privacy Enhancing Techniques
- Shruti Tople, Yaoqi Jia, Prateek Saxena:
PRO-ORAM: Practical Read-Only Oblivious RAM. 197-211 - Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici:
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. 213-225 - Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:
TALON: An Automated Framework for Cross-Device Tracking Detection. 227-241
Android Security I
- Nir Sivan, Ron Bitton, Asaf Shabtai:
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. 243-260 - Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. 261-275 - Yue Duan, Lian Gao, Jie Hu, Heng Yin:
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. 277-292
Machine Learning & Watermarking
- Fei Zuo, Bokai Yang, Xiaopeng Li, Qiang Zeng:
Exploiting the Inherent Limitation of L0 Adversarial Examples. 293-307 - Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. 309-321 - Erman Ayday, Emre Yilmaz, Arif Yilmaz:
Robust Optimization-Based Watermarking Scheme for Sequential Data. 323-336
Malware
- Key-whan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas:
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. 337-351 - Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss:
SGXJail: Defeating Enclave Malware via Confinement. 353-366 - Richard Li, Min Du, David Johnson, Robert Ricci, Jacobus E. van der Merwe, Eric Eide:
Fluorescence: Detecting Kernel-Resident Malware in Clouds. 367-382
DNS Security
- Timothy Barron, Najmeh Miramirkhani, Nick Nikiforakis:
Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions. 383-397 - Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Xinran Liu, Heng Liu:
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. 399-412 - Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. 413-426
Attacks
- Wei Song, Peng Liu:
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. 427-442 - Wubing Wang, Yinqian Zhang, Zhiqiang Lin:
Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. 443-457 - Ahmed Abdo, Sakib Md. Bin Malek, Zhiyun Qian, Qi Zhu, Matthew J. Barth, Nael B. Abu-Ghazaleh:
Application level attacks on Connected Vehicle Protocols. 459-471
Security in Data Centers and the Cloud
- Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. 473-485 - Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu:
Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. 487-500 - Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. 501-515
Android Security II
- Dario Nisi, Antonio Bianchi, Yanick Fratantonio:
Exploring Syscall-Based Semantics Reconstruction of Android Applications. 517-531 - Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu:
Towards Large-Scale Hunting for Android Negative-Day Malware. 533-545 - Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III:
DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction. 547-559
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.