Papers

Search results

    ConferenceTitleAuthor(s)
    RAID 2020GhostImage: Remote Perception Attacks against Camera-based Image Classification SystemsYanmao Man, Ming Li, Ryan Gerdes
    RAID 2020BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy NetworksJianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu
    RAID 2020SIEVE: Secure In-Vehicle Automatic Speech Recognition SystemsShu Wang, Jiahao Cao, Kun Sun, Qi Li
    RAID 2020μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault ObservabilityMajid Salehi, Danny Hughes, Bruno Crispo
    RAID 2020sysfilter: Automated System Call Filtering for Commodity SoftwareNicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis
    RAID 2020EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGXYun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang
    RAID 2020Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional NetworkJun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo
    RAID 2020HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor InjectionRalph Palutke, Simon Ruderich, Matthias Wild, Felix Freiling
    RAID 2020Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem ServicePatrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil
    RAID 2020aBBRate: Automating BBR Attack Exploration Using a Model-Based ApproachAnthony Peterson, Samuel Jero, Endadul Hoque, David Choffnes, Cristina Nita-Rotaru
    RAID 2020Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AIBenjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang
    RAID 2020An Object Detection based Solver for Google’s Image reCAPTCHA v2Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei
    RAID 2020Robust P2P Primitives Using SGX EnclavesYaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
    RAID 2020Evasion Attacks against Banking Fraud Detection SystemsMichele Carminati, Luca Santini, Mario Polino, Stefano Zanero
    RAID 2020The Limitations of Federated Learning in Sybil SettingsClement Fung, Chris J. M. Yoon, Ivan Beschastnikh
    RAID 2020What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation TechniquesAhmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda
    RAID 2020Mininode: Reducing the Attack Surface of Node.js ApplicationsIgibek Koishybayev, Alexandros Kapravelos
    RAID 2020MEUZZ: Smart Seed Scheduling for Hybrid FuzzingYaohui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu
    RAID 2020Evaluating Changes to Fake Account Verification SystemsFedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov
    RAID 2020Never Trust Your Victim: Weaponizing Vulnerabilities in Security ScannersAndrea Valenza, Gabriele Costa, Alessandro Armando
    RAID 2020Camera Fingerprinting Authentication RevisitedDominik Maier, Henrik Erb, Patrick Mullan, Vincent Haupert
    RAID 2020SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHubMd Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos
    RAID 2020Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue
    RAID 2020WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OSMarcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil
    RAID 2020Binary-level Directed Fuzzing for Use-After-Free VulnerabilitiesManh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre

Pages