Papers

Search results

    ConferenceTitleAuthor(s)
    RAID 2020MEUZZ: Smart Seed Scheduling for Hybrid FuzzingYaohui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu
    RAID 2020Confine: Automated System Call Policy Generation for Container Attack Surface ReductionSeyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, Michalis Polychronakis
    RAID 2020Evaluating Changes to Fake Account Verification SystemsFedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov
    RAID 2020Software-based Realtime Recovery from Sensor Attacks on Robotic VehiclesHongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu
    RAID 2020Never Trust Your Victim: Weaponizing Vulnerabilities in Security ScannersAndrea Valenza, Gabriele Costa, Alessandro Armando
    RAID 2020aBBRate: Automating BBR Attack Exploration Using a Model-Based ApproachAnthony Peterson, Samuel Jero, Endadul Hoque, David Choffnes, Cristina Nita-Rotaru
    RAID 2020GhostImage: Remote Perception Attacks against Camera-based Image Classification SystemsYanmao Man, Ming Li, Ryan Gerdes
    RAID 2020BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy NetworksJianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu
    RAID 2020SIEVE: Secure In-Vehicle Automatic Speech Recognition SystemsShu Wang, Jiahao Cao, Kun Sun, Qi Li
    RAID 2020Camera Fingerprinting Authentication RevisitedDominik Maier, Henrik Erb, Patrick Mullan, Vincent Haupert
    RAID 2020Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AIBenjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang
    RAID 2020SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHubMd Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos
    RAID 2020μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault ObservabilityMajid Salehi, Danny Hughes, Bruno Crispo
    RAID 2020An Object Detection based Solver for Google’s Image reCAPTCHA v2Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei
    RAID 2020sysfilter: Automated System Call Filtering for Commodity SoftwareNicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis
    RAID 2020Robust P2P Primitives Using SGX EnclavesYaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
    RAID 2020Evasion Attacks against Banking Fraud Detection SystemsMichele Carminati, Luca Santini, Mario Polino, Stefano Zanero
    RAID 2020Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue
    RAID 2020The Limitations of Federated Learning in Sybil SettingsClement Fung, Chris J. M. Yoon, Ivan Beschastnikh
    RAID 2020WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OSMarcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil
    RAID 2020Binary-level Directed Fuzzing for Use-After-Free VulnerabilitiesManh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre
    USENIX Security '20Civet: An Efficient Java Partitioning Framework for Hardware EnclavesChia-Che Tsai, Jeongseok Son, Bhushan Jain, John McAvey, Raluca Ada Popa, Donald E. Porter
    USENIX Security '20"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive ApplicationsTaslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan Semaan
    USENIX Security '20Delphi: A Cryptographic Inference Service for Neural NetworksPratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
    USENIX Security '20PHMon: A Programmable Hardware Monitor and Its Security Use CasesLeila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, Manuel Egele

Pages