Papers

Search results

    ConferenceTitleAuthor(s)
    RAID 2020PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control InvariantsZeyu Yang, Liang He, Peng Cheng, Jiming Chen, David K.Y. Yau, Linkang Du
    RAID 2020A Framework for Software Diversification with ISA HeterogeneityXiaoguang Wang, SengMing Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, Binoy Ravindran
    RAID 2020Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted FirmwareDuha Ibdah, Nada Lachtar, Abdulrahman Abu Elkhail, Anys Bacha, Hafiz Malik
    RAID 2020Confine: Automated System Call Policy Generation for Container Attack Surface ReductionSeyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, Michalis Polychronakis
    RAID 2020Software-based Realtime Recovery from Sensor Attacks on Robotic VehiclesHongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu
    RAID 2020GhostImage: Remote Perception Attacks against Camera-based Image Classification SystemsYanmao Man, Ming Li, Ryan Gerdes
    RAID 2020BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy NetworksJianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu
    RAID 2020SIEVE: Secure In-Vehicle Automatic Speech Recognition SystemsShu Wang, Jiahao Cao, Kun Sun, Qi Li
    RAID 2020μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault ObservabilityMajid Salehi, Danny Hughes, Bruno Crispo
    RAID 2020sysfilter: Automated System Call Filtering for Commodity SoftwareNicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis
    RAID 2020EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGXYun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang
    RAID 2020Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional NetworkJun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo
    RAID 2020HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor InjectionRalph Palutke, Simon Ruderich, Matthias Wild, Felix Freiling
    RAID 2020Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem ServicePatrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil
    RAID 2020aBBRate: Automating BBR Attack Exploration Using a Model-Based ApproachAnthony Peterson, Samuel Jero, Endadul Hoque, David Choffnes, Cristina Nita-Rotaru
    RAID 2020Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AIBenjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang
    RAID 2020An Object Detection based Solver for Google’s Image reCAPTCHA v2Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei
    RAID 2020Robust P2P Primitives Using SGX EnclavesYaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
    RAID 2020Evasion Attacks against Banking Fraud Detection SystemsMichele Carminati, Luca Santini, Mario Polino, Stefano Zanero
    RAID 2020The Limitations of Federated Learning in Sybil SettingsClement Fung, Chris J. M. Yoon, Ivan Beschastnikh
    RAID 2020What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation TechniquesAhmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda
    RAID 2020Mininode: Reducing the Attack Surface of Node.js ApplicationsIgibek Koishybayev, Alexandros Kapravelos
    RAID 2020MEUZZ: Smart Seed Scheduling for Hybrid FuzzingYaohui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu
    RAID 2020Evaluating Changes to Fake Account Verification SystemsFedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov
    RAID 2020Never Trust Your Victim: Weaponizing Vulnerabilities in Security ScannersAndrea Valenza, Gabriele Costa, Alessandro Armando

Pages