投稿问答最小化  关闭

万维书刊APP下载

RAID 2022 论文录用列表

2022/11/14 15:44:44  阅读:472 发布者:

攻击、入侵和防御研究国际研讨会(RAID, International Symposium on Research in Attacks, Intrusions and Defenses)属于CCF B类会议,尤其在网络攻防方面行业认可非常高。RAID 2022年共收到论文139(2021138, 2019:166, 2018:145),录取35篇,其中包含15篇返修后接收(202132, 2020:31, 2019:37, 2018:32),录用率为25.18% (2021:23%, 2019:22.29%, 2018:22.07%),在2022年有一些变动:

2019年以来第一次线下办会;

RAID程序委员会中有1/3的新人,邀请中70%都接收加入委员会,导致57位委员会来自于12个国家;

投稿论文中包含498位作者,29个国家;

新增了最佳实用论文奖,奖金2000欧元。

国内包含四川大学、香港中文大学、香港大学、同济大学、清华大学等高校都有录用论文,部分小编感兴趣的论文标题已经标红:

Detection of Electromagnetic Signal Injection Attacks on Actuator Systems

Youqian Zhang, University of Oxford

Kasper Rasmussen, University of Oxford

Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs

Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum

Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum

A scalable tracing tool for non-rooted and off-the-shelf Android phones

Alain Tchana, ENS Lyon, France

Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA

Lavoisier Wapet, ENS Lyon, France

Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites

Haoran Ou, School of Cyber Science and Engineering, Sichuan University

Yong Fang, School of Cyber Science and Engineering, Sichuan University

Wenbo Guo, School of Cyber Science and Engineering, Sichuan University

Yongyan Guo, School of Cyber Science and Engineering, Sichuan University

Cheng Huang, School of Cyber Science and Engineering, Sichuan University

Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications

Jincheng Wang, The Chinese University of Hong Kong

Zhuohua Li, The Chinese University of Hong Kong

Mingshen Sun, Baidu

John C. S. Lui, The Chinese University of Hong Kong

Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems

Qingzhao Zhang, University of Michigan

Xiao Zhu, University of Michigan

Mu Zhang, University of Utah

Z. Morley Mao, University of Michigan and Google

OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem

Pieter Philippaerts, imec-DistriNet, KU Leuven

Davy Preuveneers, imec-DistriNet, KU Leuven

Wouter Joosen, imec-DistriNet, KU Leuven

BinProv: Binary Code Provenance Identification without Disassembly

Xu He, George Mason University

Shu Wang, George Mason University

Yunlong Xing, George Mason University

Pengbin Feng, George Mason University

Haining Wang, Virginia Tech

Qi Li, Tsinghua University

Songqing Chen, George Mason University

Kun Sun, George Mason University

What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling

Jun Yeon Won, Ohio State University

Haohuang Wen, Ohio State University

Zhiqiang Lin, Ohio State University

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS

Mashael Al-Sabah, Qatar Computing Research Institute

Mohamed Nabeel, Qatar Computing Research Institute

Euijin Choo, Qatar Computing Research Institute

Yazan Boshmaf, Qatar Computing Research Institute, HBKU

Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks

Ramin Yazdani, University of Twente

Alden Hilton, Brigham Young University

Jeroen van der Ham, University of Twente and NCSC

Roland van Rijswijk-Deij, University of Twente

Casey Deccio, Brigham Young University

Anna Sperotto, University of Twente

Mattijs Jonker, University of Twente

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

Ahmed Abusnaina, University of Central Florida

Afsah Anwar, Northeastern University

Sultan Alshamrani, University of Central Florida

Abdulrahman Alabduljabbar, University of Central Florida

RhongHo Jang, Wayne State University

DaeHun Nyang, Ewha Womans University

David Mohaisen, University of Central Florida

TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone

Fabian Schwarz, CISPA Helmholtz Center for Information Security

ULTRA: Ultimate Rootkit Detection over the Air

Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France

Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France

Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum

Dabao Wang, Monash University

Hang FENG, Zhejiang University

Siwei Wu, Zhejiang University

Yajin Zhou, Zhejiang University

Lei Wu, Zhejiang University

Xingliang YUAN, Monash University

HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors

Anomadarshi Barua, University of California, Irvine

Mohammad Abdullah Al Faruque, University of California, Irvine

Exploiting Metaobjects to Reinforce Data Leakage Attacks

Hoyong Jeong, KAIST

Hodong Kim, Korea University

Junbeom Hur, Korea University

LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework

Menghan Sun, The Chinese University of Hong Kong

Zirui SONG, The Chinese University of Hong Kong

Xiaoxi REN, Hunan University

Daoyuan Wu, The Chinese University of Hong Kong

Kehuan Zhang, The Chinese University of Hong Kong

Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables

Nicolaas Weideman, University of Southern California - Information Sciences Institute

Haoda Wang, University of Southern California - Information Sciences Institute

Tyler Kann, Information Sciences Institute, University of Southern California

Spencer Zahabizadeh, Information Sciences Institute, University of Southern California

Wei-Cheng Wu, Information Sciences Institute, University of Southern California

Rajat Tandon, University of Southern California

Jelena Mirkovic, USC

Christophe Hauser, Information Sciences Institute, University of Southern California

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

Konrad Wolsing, Fraunhofer FKIE / RWTH Aachen University

Eric Wagner, Fraunhofer FKIE / RWTH Aachen University

Antoine Saillard, RWTH Aachen University / Fraunhofer FKIE

Martin Henze, RWTH Aachen University / Fraunhofer FKIE

Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks

Toshinori Usui, NTT Social Informatics Laboratories

Yuto Otsuki, NTT Security (Japan) KK

Yuhei Kawakoya, NTT Social Informatics Laboratories

Makoto Iwamura, NTT Social Informatics Laboratories

Kanta Matsuura, Institute of Industrial Science, The University of Tokyo

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework

Atsuko Natatsuka, Waseda University

Ryo Iijima, Waseda University

Takuya Watanabe, NTT Social Informatics Laboratories

Mitsuaki Akiyama, NTT Social Informatics Laboratories

Tetsuya Sakai, Waseda University

Tatsuya Mori, Waseda University / NICT / RIKEN AIP

Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients

Daehee Jang, Sungshin W. University

Ammar Askar, Georgia Institute of Technology

Insu Yun, KAIST

Stephen Tong, Georgia Institute of Technology

Yiqin Cai, Georgia Institute of Technology

Taesoo Kim, Georgia Institute of Technology

On the Challenges of Detecting Side-Channel Attacks in SGX

Jianyu Jiang, The University of Hong Kong

Claudio Soriente, NEC Laboratories Europe

Ghassan Karame, Ruhr University Bochum

CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic

Yebo Feng, University of Oregon

Jun Li, University of Oregon

Devkishen Sisodia, University of Oregon

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64

Tobias Cloosters, University of Duisburg-Essen

David Paaßen, University of Duisburg-Essen

Jianqiang Wang, Technical University of Darmstadt

Oussama Draissi, University of Duisburg-Essen

Patrick Jauernig, Technical University of Darmstadt

Emmanuel Stapf, Technical University of Darmstadt

Lucas Davi, University of Duisburg-Essen

Ahmad-Reza Sadeghi, Technical University of Darmstadt

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts

Christof Ferreira Torres, University of Luxembourg

Hugo Jonker, Open University of the Netherlands

Radu State, University of Luxembourg

Transferable Graph Backdoor Attack

Shuiqiao Yang, The University of New South Wales

Bao Doan, The University of Adelaide

Paul Montague, Defence Science and Technology Group

Olivier De Vel, Defence Science and Technology Group

Tamas Abraham, Defence Science and Technology Group

Seyit Camtepe, CSIRO Data61, Australia

Damith C. Ranasinghe, The University of Adelaide

Salil S. Kanhere, UNSW, Sydney, Australia

Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications

Yang Shi, Tongji University

Junqing Liang , Tongji University

Mianhong Li, Tongji University

Tianchen Ma, Tongji University

Guodong Ye, Guangdong Ocean University

Jiangfeng Li, Tongji University

Qinpei Zhao, Tongji University

Decap: Deprivileging Programs by Reducing Their Capabilities

Md Mehedi Hasan, Stony Brook University

Seyedhamed Ghavamnia, Stony Brook University

Michalis Polychronakis, Stony Brook University

Context-Auditor: Context-sensitive Content Injection Mitigation

Faezeh Kalantari, Arizona State University

Mehrnoosh Zaeifi, Arizona State University

Tiffany Bao, Arizona State University

Ruoyu Wang, Arizona State University

Yan Shoshitaishvili, Arizona State University

Adam Doupé, Arizona State University

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots

Fabian Franzen, Technical University of Munich

Tobias Holl, Technical University of Munich

Manuel Andreas, Technical University of Munich

Julian Kirsch, Technical University of Munich

Jens Grossklags, Technical University of Munich

Towards Deceptive Defense in Software Security with Chaff Bugs

Zhenghao Hu, New York University

Yu Hu, New York University

Brendan Dolan-Gavitt, New York University

New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy

Baihe Ma, University of Technology Sydney

Xiaojie Lin, University of Technology Sydney

Xu Wang, University of Technology Sydney

Bin Liu, University of Technology Sydney

Ying He, University of Technology Sydney

Wei Ni, CSIRO

Ren Ping Liu, University of Technology Sydney

Encrypted Malware Traffic Detection via Graph-based Network Analysis

Zhuoqun Fu, Tsinghua University

Mingxuan Liu, Tsinghua University

Yue Qin, Indiana University Bloomington

Jia Zhang, Tsinghua University

Yuan Zou, Tsinghua University; GeekSec Security Group

Qilei Yin, Tsinghua University

Qi Li, Tsinghua University

Haixin Duan, Tsinghua University; Qi An Xin Group Corp

论文下载:https://dl.acm.org/doi/proceedings/10.1145/3545948

会议主页:https://raid2022.cs.ucy.ac.cy/

转自:“安全学术圈”微信公众号

如有侵权,请联系本站删除!


  • 万维QQ投稿交流群    招募志愿者

    版权所有 Copyright@2009-2015豫ICP证合字09037080号

     纯自助论文投稿平台    E-mail:eshukan@163.com