default search action
23rd RAID 2020: San Sebastian, Spain
- Manuel Egele, Leyla Bilge:
23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14-15, 2020. USENIX Association 2020, ISBN 978-1-939133-18-2
Attacks
- Atri Bhattacharyya, Andrés Sánchez, Esmaeil Mohammadian Koruyeh, Nael B. Abu-Ghazaleh, Chengyu Song, Mathias Payer:
SpecROP: Speculative Exploitation of ROP Chains. 1-16 - Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. 17-29 - Dominik Christian Maier, Henrik Erb, Patrick Mullan, Vincent Haupert:
Camera Fingerprinting Authentication Revisited. 31-46
Dynamic Program Analysis
- Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre:
Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities. 47-62 - Marcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil:
WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS. 63-75 - Yaohui Chen, Mansour Ahmadi, Reza Mirzazade Farkhani, Boyu Wang, Long Lu:
MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. 77-92
Web Security
- Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue:
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? 93-106 - Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda:
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. 107-120 - Igibek Koishybayev, Alexandros Kapravelos:
Mininode: Reducing the Attack Surface of Node.js Applications. 121-134 - Fedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov:
Evaluating Changes to Fake Account Verification Systems. 135-148
Malware
- Md Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos:
SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub. 149-163 - Ralph Palutke, Simon Ruderich, Matthias Wild, Felix C. Freiling:
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection. 165-179 - Patrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil:
Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service. 181-194
Network & Cloud Security
- Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. 195-208 - Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. 209-224 - Anthony Peterson, Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Cristina Nita-Rotaru:
aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach. 225-240
ML-Based Security
- Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo:
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network. 241-256 - Benjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang:
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI. 257-268 - Md. Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md. Nazmul Islam, Hui Cao, Xiali Hei:
An Object Detection based Solver for Google's Image reCAPTCHA v2. 269-284
Breaking ML
- Michele Carminati, Luca Santini, Mario Polino, Stefano Zanero:
Evasion Attacks against Banking Fraud Detection Systems. 285-300 - Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh:
The Limitations of Federated Learning in Sybil Settings. 301-316 - Yanmao Man, Ming Li, Ryan M. Gerdes:
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems. 317-332
CPS Security
- Zeyu Yang, Liang He, Peng Cheng, Jiming Chen, David K. Y. Yau, Linkang Du:
PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants. 333-348 - Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. 349-364 - Shu Wang, Jiahao Cao, Kun Sun, Qi Li:
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. 365-379
Firmware and Low Level Security
- Majid Salehi, Danny Hughes, Bruno Crispo:
μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability. 381-395 - Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu:
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 397-411 - Duha Ibdah, Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik:
Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware. 413-426
Systems Security
- Xiaoguang Wang, Sengming Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, Binoy Ravindran:
A Framework for Software Diversification with ISA Heterogeneity. 427-442 - Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, Michalis Polychronakis:
Confine: Automated System Call Policy Generation for Container Attack Surface Reduction. 443-458 - Nicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis:
sysfilter: Automated System Call Filtering for Commodity Software. 459-474
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.