default search action
24th RAID 2021: San Sebastian, Spain
- Leyla Bilge, Tudor Dumitras:
RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021. ACM 2021, ISBN 978-1-4503-9058-3
1) Internet of Robots or Things?
- Yuan Xu, Tianwei Zhang, Yungang Bao:
Analysis and Mitigation of Function Interaction Risks in Robot Apps. 1-16 - Gelei Deng, Yuan Zhou, Yuan Xu, Tianwei Zhang, Yang Liu:
An Investigation of Byzantine Threats in Multi-Robot Systems. 17-32 - Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu, Xiao Fu, Bin Luo:
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes. 33-47
2) What is all the fuzz about?
- Dominik Christian Maier, Fabian Toepfer:
BSOD: Binary-only Scalable fuzzing Of device Drivers. 48-61 - Xianya Mi, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. 62-77 - Jin Huang, Junjie Zhang, Jialun Liu, Chuang Li, Rui Dai:
UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis. 78-90
3) At the core of everything
- Sandeep Kumar, Smruti R. Sarangi:
SecureFS: A Secure File System for Intel SGX. 91-102 - Jan Philipp Thoma, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein:
BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster. 103-118 - Spyridoula Gravani, Mohammad Hedayati, John Criswell, Michael L. Scott:
Fast Intra-kernel Isolation and Security with IskiOS. 119-134 - Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. 135-147
4) Reverse like you mean it!
- Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael B. Abu-Ghazaleh, Manu Sridharan:
DisCo: Combining Disassemblers for Improved Performance. 148-161 - Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. 162-176 - Dario Nisi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Lost in the Loader: The Many Faces of the Windows PE File Format. 177-192
5) Detect it already!
- Junnan Wang, Qixu Liu, Di Wu, Ying Dong, Xiang Cui:
Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL. 193-204 - Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. 205-219 - Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi:
GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks. 220-234
6) IoT everywhere anywhere
- John Henry Castellanos, Martín Ochoa, Alvaro A. Cárdenas, Owen Arden, Jianying Zhou:
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis. 235-250 - Shaohu Zhang, Anupam Das:
HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal. 251-265 - Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Anthony Skjellum, Moti Yung:
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files. 266-281 - Yangyong Zhang, Sunpreet S. Arora, Maliheh Shirvanian, Jianwei Huang, Guofei Gu:
Practical Speech Re-use Prevention in Voice-driven Services. 282-295
7) Doesn't exist if I don't see it (!)
- Nick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis, Mathias Payer, Adam Bates, Jonathan M. Smith, André DeHon, Nathan Dautenhahn:
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. 296-311 - Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Yangyong Zhang, Guofei Gu:
The Service Worker Hiding in Your Browser: The Next Web Attack Target? 312-323 - Imani N. Sherman, Jack W. Stokes, Elissa M. Redmiles:
Designing Media Provenance Indicators to Combat Fake Media. 324-339
8) Let's measure a little!
- Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini:
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. 340-353 - Dennis Tatang, Florian Zettl, Thorsten Holz:
The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws. 354-369 - Xhelal Likaj, Soheil Khodayari, Giancarlo Pellegrino:
Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks. 370-385
9) Minestrone
- Zicheng Zhang:
On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps. 386-398 - Jack Cable, Drew Mylander Gregory, Liz Izhikevich, Zakir Durumeric:
Stratosphere: Finding Vulnerable Cloud Storage Buckets. 399-411 - Tianxi Ji, Emre Yilmaz, Erman Ayday, Pan Li:
The Curse of Correlations for Robust Fingerprinting of Relational Databases. 412-427
10) Artificial or Organic Intelligence?
- Aolin Ding, Praveen Murthy, Luis Garcia, Pengfei Sun, Matthew Chan, Saman A. Zonouz:
Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing. 428-441 - Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. 442-455 - Nicola Ruaro, Kyle Zeng, Lukas Dresel, Mario Polino, Tiffany Bao, Andrea Continella, Stefano Zanero, Christopher Kruegel, Giovanni Vigna:
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. 456-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.