researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
analysis
classification
context-aware
data-flow
data-flow analysis
database
discovery
e-science
meta-model
meta-objects
mobile
modeling
protocol
rule-based
security
systematic-approach
testing
web applications
Filter by Author
[+]
OR
AND
NOT
1
Ahmad-Reza Sadeghi
Angelos Stavrou
Christian Rossow
Christopher Kruegel
Davide Balzarotti
Engin Kirda
Giovanni Vigna
Guofei Gu
Herbert Bos
Hervé Debar
Jonathon T. Giffin
Karl N. Levitt
Michael K. Reiter
Michalis Polychronakis
Salvatore J. Stolfo
Thorsten Holz
Wenke Lee
William K. Robertson
Xuxian Jiang
Zhiqiang Lin
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
anomaly
attack
attacks
automated
data
detecting
detection
international
intrusion
malware
network
networks
raid
security
symposium
system
systems
using
web
Recent Advances in Intrusion Detection (raid)
Editions
Publications
Viewing Publication 1 - 100 from 723
2024
Deception-Resistant Stochastic Manufacturing for Automated Production Lines
Zeyu Yang 0001
,
Hongyi Pu
,
Liang He 0002
,
Chengtao Yao
,
Jianying Zhou 0001
,
Peng Cheng 0001
,
Jiming Chen 0001
.
raid 2024
:
546-560
[doi]
Mateen: Adaptive Ensemble Learning for Network Anomaly Detection
Fahad Alotaibi
,
Sergio Maffeis
.
raid 2024
:
215-234
[doi]
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database
Lukas Arnold
,
Matthias Hollick
,
Jiska Classen
.
raid 2024
:
613-629
[doi]
Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware
Diogo Barradas
,
Carlos Novo
,
Bernardo Portela
,
Sofia Romeiro
,
Nuno Santos 0001
.
raid 2024
:
181-196
[doi]
What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments
Marcus Botacin
.
raid 2024
:
77-96
[doi]
Cross-Regional Malware Detection via Model Distilling and Federated Learning
Marcus Botacin
,
Heitor Murilo Gomes
.
raid 2024
:
97-113
[doi]
Down to earth! Guidelines for DGA-based Malware Detection
Bogdan-Constantin Cebere
,
Jonathan Lasse Bennet Flueren
,
Silvia Sebastián
,
Daniel Plohmann
,
Christian Rossow
.
raid 2024
:
147-165
[doi]
Understanding Web Fingerprinting with a Protocol-Centric Approach
Bogdan Cebere
,
Christian Rossow
.
raid 2024
:
17-34
[doi]
Context-Aware Anomaly Detection Using Vehicle Dynamics
Chun-Yu Chen
,
Kang G. Shin
,
Soodeh Dadras
.
raid 2024
:
531-545
[doi]
The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence
Thomas Geras
,
Thomas Schreck
.
raid 2024
:
337-352
[doi]
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
Luis Gerhorst
,
Henriette Herzog
,
Peter Wägemann
,
Maximilian Ott
,
RĂĽdiger Kapitza
,
Timo Hönig
.
raid 2024
:
644-659
[doi]
Hidden Web Caches Discovery
Matteo Golinelli
,
Bruno Crispo
.
raid 2024
:
65-76
[doi]
Breaking Privacy in Model-Heterogeneous Federated Learning
Atharva Haldankar
,
Arman Riasi
,
Hoang-Dung Nguyen
,
Tran-Phuong
,
Thang Hoang
.
raid 2024
:
465-479
[doi]
Tango: Extracting Higher-Order Feedback through State Inference
Ahmad Hazimeh
,
Duo Xu
,
Qiang Liu 0034
,
Yan Wang
,
Mathias Payer
.
raid 2024
:
403-418
[doi]
Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times
Ziyi Huang
,
Ding Wang 0002
,
Yunkai Zou
.
raid 2024
:
674-692
[doi]
Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies
Bahruz Jabiyev
,
Anthony Gavazzi
,
Kaan Onarlioglu
,
Engin Kirda
.
raid 2024
:
235-247
[doi]
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires
Mario Kahlhofer
,
Stefan Achleitner
,
Stefan Rass
,
René Mayrhofer
.
raid 2024
:
317-336
[doi]
Integrating Static Analyses for High-Precision Control-Flow Integrity
Florian Kasten
,
Philipp Zieris
,
Julian Horsch
.
raid 2024
:
419-434
[doi]
Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure
Udesh Kumarasinghe
,
Mohamed Nabeel
,
Charitha Elvitigala
.
raid 2024
:
35-48
[doi]
A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework
Robert Lorch
,
Daniel Larraz
,
Cesare Tinelli
,
Omar Chowdhury
.
raid 2024
:
594-612
[doi]
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024
Eleonora Losiouk
,
Alessandro Brighente
,
Mauro Conti
,
Yousra Aafer
,
Yanick Fratantonio
, editors,
ACM,
2024.
[doi]
KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs
Hualong Ma
,
Peizhuo Lv
,
Kai Chen 0012
,
Jiachen Zhou
.
raid 2024
:
480-495
[doi]
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces
Mabon Ninan
,
Evan Nimmo
,
Shane Reilly
,
Channing Smith
,
Wenhai Sun
,
Boyang Wang
,
John Marty Emmert
.
raid 2024
:
630-643
[doi]
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence
Tommaso Paladini
,
Lara Ferro
,
Mario Polino
,
Stefano Zanero
,
Michele Carminati
.
raid 2024
:
368-383
[doi]
AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images
Jonas Ricker
,
Dennis Assenmacher
,
Thorsten Holz
,
Asja Fischer
,
Erwin Quiring
.
raid 2024
:
513-530
[doi]
Fixing Insecure Cellular System Information Broadcasts For Good
Alexander J. Ross
,
Bradley Reaves
,
Yomna Nasser
,
Gil Cukierman
,
Roger Piqueras Jover
.
raid 2024
:
693-708
[doi]
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Bonan Ruan
,
Jiahao Liu
,
Chuqi Zhang
,
Zhenkai Liang
.
raid 2024
:
384-402
[doi]
Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter
Mohammad Hammas Saeed
,
Shiza Ali
,
Pujan Paudel
,
Jeremy Blackburn
,
Gianluca Stringhini
.
raid 2024
:
353-367
[doi]
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files
Aakanksha Saha
,
Jorge Blasco
,
Lorenzo Cavallaro
,
Martina Lindorfer
.
raid 2024
:
114-129
[doi]
Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior
Anyuan Sang
,
Yuchen Wang
,
Li Yang 0005
,
Junbo Jia
,
Lu Zhou
.
raid 2024
:
248-262
[doi]
No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge
Franka Schuster
,
Hartmut König
.
raid 2024
:
278-297
[doi]
Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation
Richard August See
,
Kevin Röbert
,
Mathias Fischer 0001
.
raid 2024
:
166-180
[doi]
Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations
Wenfan Song
,
Jianwei Liu 0008
,
Yajie Liu
,
Jinsong Han
.
raid 2024
:
660-673
[doi]
BluePrint: Automatic Malware Signature Generation for Internet Scanning
Kevin Stevens
,
Mert Erdemir
,
Hang Zhang
,
Taesoo Kim
,
Paul Pearce
.
raid 2024
:
197-214
[doi]
AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection
Hongbin Sun
,
Su Wang
,
Zhiliang Wang
,
Zheyu Jiang
,
Dongqi Han
,
Jiahai Yang 0001
.
raid 2024
:
263-277
[doi]
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
Zhibo Sun
,
Faris Bugra Kokulu
,
Penghui Zhang
,
Adam Oest
,
Gianluca Stringhini
,
Tiffany Bao
,
Ruoyu Wang 0001
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
.
raid 2024
:
49-64
[doi]
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Carlotta Tagliaro
,
Martina Komsic
,
Andrea Continella
,
Kevin Borgolte
,
Martina Lindorfer
.
raid 2024
:
561-578
[doi]
Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation
Franco Terranova
,
Abdelkader Lahmadi
,
Isabelle Chrisment
.
raid 2024
:
1-16
[doi]
How to Train your Antivirus: RL-based Hardening through the Problem Space
Ilias Tsingenopoulos
,
Jacopo Cortellazzi
,
Branislav BosanskĂ˝
,
Simone Aonzo
,
Davy Preuveneers
,
Wouter Joosen
,
Fabio Pierazzi
,
Lorenzo Cavallaro
.
raid 2024
:
130-146
[doi]
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning
Jianing Wang
,
Shanqing Guo
,
Wenrui Diao
,
Yue Liu
,
Haixin Duan
,
Yichen Liu
,
Zhenkai Liang
.
raid 2024
:
579-593
[doi]
Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing
Yu Wang
,
Yue Xu
.
raid 2024
:
435-449
[doi]
Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods
Gang Yan
,
Hao Wang 0022
,
Xu Yuan 0001
,
Jian Li 0008
.
raid 2024
:
496-512
[doi]
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing
Tai Yue
,
Yibo Jin 0006
,
Fengwei Zhang
,
Zhenyu Ning
,
Pengfei Wang 0010
,
Xu Zhou
,
Kai Lu
.
raid 2024
:
450-464
[doi]
Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems
Mengya Zhang
,
Xiaokuan Zhang
,
Yinqian Zhang
,
Zhiqiang Lin
.
raid 2024
:
298-316
[doi]
2023
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection
Yizheng Chen 0001
,
Zhoujie Ding
,
Lamya Alowain
,
Xinyun Chen
,
David A. Wagner 0001
.
raid 2023
:
654-668
[doi]
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023
ACM,
2023.
[doi]
NatiSand: Native Code Sandboxing for JavaScript Runtimes
Marco Abbadini
,
Dario Facchinetti
,
Gianluca Oldani
,
Matthew Rossi
,
Stefano Paraboschi
.
raid 2023
:
639-653
[doi]
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Md Tanvirul Alam
,
Dipkamal Bhusal
,
Youngja Park
,
Nidhi Rastogi
.
raid 2023
:
92-108
[doi]
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
Marco Alecci
,
Mauro Conti
,
Francesco Marchiori
,
Luca Martinelli
,
Luca Pajola
.
raid 2023
:
315-329
[doi]
Beware of Pickpockets: A Practical Attack against Blocking Cards
Marco Alecci
,
Luca Attanasio
,
Alessandro Brighente
,
Mauro Conti
,
Eleonora Losiouk
,
Hideki Ochiai
,
Federico Turrin
.
raid 2023
:
195-206
[doi]
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries
Arwa Abdulkarim Al Alsadi
,
Kaichi Sameshima
,
Katsunari Yoshioka
,
Michel van Eeten
,
Carlos Hernandez Gañán
.
raid 2023
:
513-526
[doi]
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating
Md Sakib Anwar
,
Chaoshun Zuo
,
Carter Yagemann
,
Zhiqiang Lin
.
raid 2023
:
17-31
[doi]
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case
Supraja Baskaran
,
Lianying Zhao
,
Mohammad Mannan
,
Amr M. Youssef
.
raid 2023
:
727-743
[doi]
Renewable Just-In-Time Control-Flow Integrity
Erick Bauman
,
Jun Duan
,
Kevin W. Hamlen
,
Zhiqiang Lin
.
raid 2023
:
580-594
[doi]
Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors
Connor Bolton
,
Yan Long
,
Jun Han 0001
,
Josiah D. Hester
,
Kevin Fu
.
raid 2023
:
164-178
[doi]
Boosting Big Brother: Attacking Search Engines with Encodings
Nicholas Boucher
,
Luca Pajola
,
Ilia Shumailov
,
Ross J. Anderson
,
Mauro Conti
.
raid 2023
:
700-713
[doi]
Black-box Attacks Against Neural Binary Function Detection
Joshua Bundt
,
Michael Davinroy
,
Ioannis Agadakos
,
Alina Oprea
,
William K. Robertson
.
raid 2023
:
1-16
[doi]
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network
Andrei Bytes
,
Prashant Hari Narayan Rajput
,
Constantine Doumanidis
,
Michail Maniatakos
,
Jianying Zhou 0001
,
Nils Ole Tippenhauer
.
raid 2023
:
499-512
[doi]
Temporary Block Withholding Attacks on Filecoin's Expected Consensus
Tong Cao
,
Xin Li
.
raid 2023
:
109-122
[doi]
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability
Zeyu Chen
,
Daiping Liu
,
Jidong Xiao
,
Haining Wang
.
raid 2023
:
623-638
[doi]
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots
Bocheng Chen
,
Guangjing Wang 0001
,
Hanqing Guo
,
Yuanda Wang
,
Qiben Yan
.
raid 2023
:
282-296
[doi]
EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations
Jingting Chen
,
Feng Li
,
Qingfang Chen
,
Ping Li
,
Lili Xu
,
Wei Huo
.
raid 2023
:
412-425
[doi]
CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory
Abdullahi Chowdhury
,
Hung X. Nguyen
.
raid 2023
:
426-439
[doi]
Federated Explainability for Network Anomaly Characterization
Xabier Sáez de Cámara
,
Jose Luis Flores 0001
,
CristĂłbal Arellano
,
Aitor Urbieta
,
Urko Zurutuza
.
raid 2023
:
346-365
[doi]
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers
Arthur Drichel
,
Ulrike Meyer
.
raid 2023
:
330-345
[doi]
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking
Alexander J. Gaidis
,
Joao Moreira
,
Ke Sun
,
Alyssa Milburn
,
Vaggelis Atlidakis
,
Vasileios P. Kemerlis
.
raid 2023
:
527-546
[doi]
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
,
Guangjing Wang 0001
,
Yuanda Wang
,
Bocheng Chen
,
Qiben Yan
,
Li Xiao 0001
.
raid 2023
:
366-380
[doi]
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
Eric Gustafson
,
Paul Grosen
,
Nilo Redini
,
Saagar Jha
,
Andrea Continella
,
Ruoyu Wang 0001
,
Kevin Fu
,
Sara Rampazzi
,
Christopher Kruegel
,
Giovanni Vigna
.
raid 2023
:
32-45
[doi]
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification
Zijun Hang
,
Yuliang Lu
,
YongJie Wang
,
Yi Xie
.
raid 2023
:
297-314
[doi]
Phantom-CSI Attacks against Wireless Liveness Detection
Qiuye He
,
Song Fang
.
raid 2023
:
440-454
[doi]
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation
Mathé Hertogh
,
Manuel Wiesinger
,
Sebastian Ă–sterlund
,
Marius Muench
,
Nadav Amit
,
Herbert Bos
,
Cristiano Giuffrida
.
raid 2023
:
207-221
[doi]
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware
Yuhei Kawakoya
,
Shu Akabane
,
Makoto Iwamura
,
Takeshi Okamoto
.
raid 2023
:
471-484
[doi]
Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack
Hyunjun Kim
,
Yungi Cho
,
YoungHan Lee
,
Ho Bae
,
Yunheung Paek
.
raid 2023
:
236-249
[doi]
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation
Taeyoung Kim
,
Seonhye Park
,
Hyoungshick Kim
.
raid 2023
:
669-685
[doi]
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection
Isaiah J. King
,
Xiaokui Shu
,
Jiyong Jang
,
Kevin Eykholt
,
Taesung Lee
,
H. Howie Huang
.
raid 2023
:
77-91
[doi]
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models
Myeongseob Ko
,
Xinyu Yang
,
Zhengjie Ji
,
Hoang Anh Just
,
Peng Gao 0008
,
Anoop Kumar
,
Ruoxi Jia
.
raid 2023
:
264-281
[doi]
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems
Maxime Lanvin
,
Pierre-François Gimenez
,
Yufei Han
,
Frédéric Majorczyk
,
Ludovic MĂ©
,
Eric Totel
.
raid 2023
:
135-150
[doi]
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display
Lin Li
,
Chao Chen
,
Lei Pan
,
Leo Yu Zhang
,
Jun Zhang
,
Yang Xiang 0001
.
raid 2023
:
686-699
[doi]
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy
Seung Ho Na
,
KwanWoo Kim
,
Seungwon Shin
.
raid 2023
:
250-263
[doi]
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
Sangbin Park
,
Youngjoon Kim
,
Dong-Hoon Lee
.
raid 2023
:
547-563
[doi]
EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and Practical Performance of Data Plane for Security-Enhanced Cloud VPN
Jaemin Park
,
Brent ByungHoon Kang
.
raid 2023
:
397-411
[doi]
Security Analysis of the 3MF Data Format
Jost Rossel
,
Vladislav Mladenov
,
Juraj Somorovsky
.
raid 2023
:
179-194
[doi]
Container Orchestration Honeypot: Observing Attacks in the Wild
Noah Spahn
,
Nils Hanke
,
Thorsten Holz
,
Christopher Kruegel
,
Giovanni Vigna
.
raid 2023
:
381-396
[doi]
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications
Rajat Tandon
,
Haoda Wang
,
Nicolaas Weideman
,
Shushan Arakelyan
,
Genevieve Bartlett
,
Christophe Hauser
,
Jelena Mirkovic
.
raid 2023
:
744-758
[doi]
Information Flow Tracking for Heterogeneous Compartmentalized Software
Zahra Tarkhani
,
Anil Madhavapeddy
.
raid 2023
:
564-579
[doi]
Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild
Leon Trampert
,
Ben Stock
,
Sebastian Roth
.
raid 2023
:
714-726
[doi]
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V
Yu Wang
,
Jinting Wu
,
Haodong Zheng
,
Zhenyu Ning
,
Boyuan He
,
Fengwei Zhang
.
raid 2023
:
595-608
[doi]
How (Not) to Build Threshold EdDSA
Harry W. H. Wong
,
Jack P. K. Ma
,
Hoover H. F. Yin
,
Sherman S. M. Chow
.
raid 2023
:
123-134
[doi]
BitDance: Manipulating UART Serial Communication with IEMI
Zhixin Xie
,
Chen Yan 0001
,
Xiaoyu Ji 0001
,
Wenyuan Xu 0001
.
raid 2023
:
63-76
[doi]
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands
Xuening Xu
,
Chenglong Fu 0002
,
Xiaojiang Du
.
raid 2023
:
46-62
[doi]
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking
Shengjie Xu
,
Eric Liu
,
Wei Huang 0027
,
David Lie
.
raid 2023
:
609-622
[doi]
CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors
Zihan Xue
,
Jinchi Han
,
Wei Song 0002
.
raid 2023
:
151-163
[doi]
A Method for Summarizing and Classifying Evasive Malware
Haikuo Yin
,
Brandon Lou
,
Peter L. Reiher
.
raid 2023
:
455-470
[doi]
SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis
Donghui Yu
,
Jianqiang Wang
,
Haoran Fang
,
Ya Fang
,
Yuanyuan Zhang 0002
.
raid 2023
:
485-498
[doi]
Efficient Membership Inference Attacks against Federated Learning via Bias Differences
Liwei Zhang
,
Linghui Li
,
Xiaoyong Li 0003
,
Binsi Cai
,
Yali Gao
,
Ruobin Dou
,
Luying Chen
.
raid 2023
:
222-235
[doi]
2022
25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022
ACM,
2022.
[doi]
Context-Auditor: Context-sensitive Content Injection Mitigation
Faezeh Kalantari
,
Mehrnoosh Zaeifi
,
Tiffany Bao
,
Ruoyu Wang 0001
,
Yan Shoshitaishvili
,
Adam Doupé
.
raid 2022
:
431-445
[doi]
ULTRA: Ultimate Rootkit Detection over the Air
Duy-Phuc Pham
,
Damien Marion 0001
,
Annelie Heuser
.
raid 2022
:
232-251
[doi]
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone
Fabian Schwarz
.
raid 2022
:
56-71
[doi]
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks
Toshinori Usui
,
Yuto Otsuki
,
Yuhei Kawakoya
,
Makoto Iwamura
,
Kanta Matsuura
.
raid 2022
:
380-394
[doi]
Sign in
or
sign up
to see more results.