RAID 2020 | μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability | Majid Salehi, Danny Hughes, Bruno Crispo |
RAID 2020 | sysfilter: Automated System Call Filtering for Commodity Software | Nicholas DeMarinis, Kent Williams-King, Di Jin, Rodrigo Fonseca, Vasileios P. Kemerlis |
RAID 2020 | EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX | Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang |
RAID 2020 | Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network | Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo |
RAID 2020 | HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection | Ralph Palutke, Simon Ruderich, Matthias Wild, Felix Freiling |
RAID 2020 | Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service | Patrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil |
RAID 2020 | aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach | Anthony Peterson, Samuel Jero, Endadul Hoque, David Choffnes, Cristina Nita-Rotaru |
RAID 2020 | Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI | Benjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang |
RAID 2020 | An Object Detection based Solver for Google’s Image reCAPTCHA v2 | Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei |
RAID 2020 | Robust P2P Primitives Using SGX Enclaves | Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang |
RAID 2020 | Evasion Attacks against Banking Fraud Detection Systems | Michele Carminati, Luca Santini, Mario Polino, Stefano Zanero |
RAID 2020 | The Limitations of Federated Learning in Sybil Settings | Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh |
RAID 2020 | What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques | Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda |
RAID 2020 | Mininode: Reducing the Attack Surface of Node.js Applications | Igibek Koishybayev, Alexandros Kapravelos |
RAID 2020 | MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing | Yaohui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu |
RAID 2020 | Evaluating Changes to Fake Account Verification Systems | Fedor Kozlov, Isabella Yuen, Jakub Kowalczyk, Daniel Bernhardt, David Freeman, Paul Pearce, Ivan Ivanov |
RAID 2020 | Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners | Andrea Valenza, Gabriele Costa, Alessandro Armando |
RAID 2020 | Camera Fingerprinting Authentication Revisited | Dominik Maier, Henrik Erb, Patrick Mullan, Vincent Haupert |
RAID 2020 | SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub | Md Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos |
RAID 2020 | Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs? | Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue |
RAID 2020 | WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS | Marcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil |
RAID 2020 | Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities | Manh-Dung Nguyen, Sébastien Bardin, Richard Bonichon, Roland Groz, Matthieu Lemerre |
RAID 2020 | SpecROP: Speculative Exploitation of ROP Chains | Atri Bhattacharyya, Andrés Sánchez, Esmaeil M. Koruyeh, Nael Abu-Ghazaleh, Chengyu Song, Mathias Payer |
USENIX Security '20 | AURORA: Statistical Crash Analysis for Automated Root Cause Explanation | Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz |
USENIX Security '20 | Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web | Frank Li |