Papers

Search results

    ConferenceTitleAuthor(s)
    RAID 2019Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile DevicesNir Sivan, Ron Bitton, Asaf Shabtai
    RAID 2019Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang
    RAID 2019Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android ApplicationsYue Duan, Lian Gao, Jie Hu, Heng Yin
    RAID 2019Exploiting the Inherent Limitation of L0 Adversarial ExamplesFei Zuo, Bokai Yang, Xiaopeng Li, Qiang Zeng
    RAID 2019NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function IdentificationJianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu
    RAID 2019Robust Optimization-Based Watermarking Scheme for Sequential DataErman Ayday, Emre Yilmaz, Arif Yilmaz
    RAID 2019Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical RobotsKeywhan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas
    RAID 2019SGXJail: Defeating Enclave Malware via ConfinementSamuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss
    RAID 2019Fluorescence: Detecting Kernel-Resident Malware in CloudsRichard Li, Min Du, David Johnson, Robert Ricci, Jacobus Van der Merwe, Eric Eide
    RAID 2019Now You See It, Now You Don’t: A Large-scale Analysis of Early Domain DeletionsTimothy Barron, Najmeh Miramirkhani, Nick Nikiforakis
    RAID 2019HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive ClassificationXiaoqing Sun, Mingkai Tong, Jiahai Yang, Liu Xinran, Liu Heng
    RAID 2019DomainScouter: Understanding the Risks of Deceptive IDNsDaiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama
    RAID 2019Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC Wei Song, Peng Liu
    RAID 2019Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave BinariesWubing Wang, Yinqian Zhang, Zhiqiang Lin
    RAID 2019Application level attacks on Connected Vehicle ProtocolsAhmed Abdo, Sakib Md Bin Malek, Zhiyun Qian, Qi Zhu, Matthew Barth, Nael Abu-Ghazaleh
    RAID 2019S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center NetworksAbdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong Kang, Anya Kim, Alexander Velazquez
    RAID 2019Container-IMA: A privacy-preserving Integrity Measurement Architecture for ContainersWu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu
    RAID 2019Fingerprinting SDN Applications via Encrypted Control TrafficJiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han
    RAID 2019Exploring Syscall-Based Semantics Reconstruction of Android ApplicationsDario Nisi, Antonio Bianchi, Yanick Fratantonio
    RAID 2019Towards Large-Scale Hunting for Android Negative-Day MalwareLun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, Sencun Zhu
    RAID 2019DroidScraper: A Tool for Android In-Memory Object Recovery and ReconstructionAisha Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III
    RAID 2019TALON: An Automated Framework for Cross-Device Tracking DetectionKonstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
    USENIX Security '19Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser FingerprintingShujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang
    USENIX Security '19Fuzzification: Anti-Fuzzing TechniquesJinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim
    USENIX Security '19AntiFuzz: Impeding Fuzzing Audits of Binary ExecutablesEmre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz

Pages