攻击、入侵和防御研究国际研讨会(RAID, International Symposium on Research in Attacks, Intrusions and Defenses)属于CCF B类会议,尤其在网络攻防方面行业认可非常高。RAID 2022年共收到论文139篇(2021:138, 2019:166, 2018:145),录取35篇,其中包含15篇返修后接收(2021:32, 2020:31, 2019:37, 2018:32),录用率为25.18% (2021:23%, 2019:22.29%, 2018:22.07%),在2022年有一些变动:
自2019年以来第一次线下办会;
RAID程序委员会中有1/3的新人,邀请中70%都接收加入委员会,导致57位委员会来自于12个国家;
投稿论文中包含498位作者,29个国家;
新增了最佳实用论文奖,奖金2000欧元。
国内包含四川大学、香港中文大学、香港大学、同济大学、清华大学等高校都有录用论文,部分小编感兴趣的论文标题已经标红:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
Youqian Zhang, University of Oxford
Kasper Rasmussen, University of Oxford
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs
Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum
Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum
A scalable tracing tool for non-rooted and off-the-shelf Android phones
Alain Tchana, ENS Lyon, France
Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA
Lavoisier Wapet, ENS Lyon, France
Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites
Haoran Ou, School of Cyber Science and Engineering, Sichuan University
Yong Fang, School of Cyber Science and Engineering, Sichuan University
Wenbo Guo, School of Cyber Science and Engineering, Sichuan University
Yongyan Guo, School of Cyber Science and Engineering, Sichuan University
Cheng Huang, School of Cyber Science and Engineering, Sichuan University
Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications
Jincheng Wang, The Chinese University of Hong Kong
Zhuohua Li, The Chinese University of Hong Kong
Mingshen Sun, Baidu
John C. S. Lui, The Chinese University of Hong Kong
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems
Qingzhao Zhang, University of Michigan
Xiao Zhu, University of Michigan
Mu Zhang, University of Utah
Z. Morley Mao, University of Michigan and Google
OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem
Pieter Philippaerts, imec-DistriNet, KU Leuven
Davy Preuveneers, imec-DistriNet, KU Leuven
Wouter Joosen, imec-DistriNet, KU Leuven
BinProv: Binary Code Provenance Identification without Disassembly
Xu He, George Mason University
Shu Wang, George Mason University
Yunlong Xing, George Mason University
Pengbin Feng, George Mason University
Haining Wang, Virginia Tech
Qi Li, Tsinghua University
Songqing Chen, George Mason University
Kun Sun, George Mason University
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling
Jun Yeon Won, Ohio State University
Haohuang Wen, Ohio State University
Zhiqiang Lin, Ohio State University
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
Mashael Al-Sabah, Qatar Computing Research Institute
Mohamed Nabeel, Qatar Computing Research Institute
Euijin Choo, Qatar Computing Research Institute
Yazan Boshmaf, Qatar Computing Research Institute, HBKU
Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks
Ramin Yazdani, University of Twente
Alden Hilton, Brigham Young University
Jeroen van der Ham, University of Twente and NCSC
Roland van Rijswijk-Deij, University of Twente
Casey Deccio, Brigham Young University
Anna Sperotto, University of Twente
Mattijs Jonker, University of Twente
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
Ahmed Abusnaina, University of Central Florida
Afsah Anwar, Northeastern University
Sultan Alshamrani, University of Central Florida
Abdulrahman Alabduljabbar, University of Central Florida
RhongHo Jang, Wayne State University
DaeHun Nyang, Ewha Womans University
David Mohaisen, University of Central Florida
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone
Fabian Schwarz, CISPA Helmholtz Center for Information Security
ULTRA: Ultimate Rootkit Detection over the Air
Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France
Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France
Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
Dabao Wang, Monash University
Hang FENG, Zhejiang University
Siwei Wu, Zhejiang University
Yajin Zhou, Zhejiang University
Lei Wu, Zhejiang University
Xingliang YUAN, Monash University
HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors
Anomadarshi Barua, University of California, Irvine
Mohammad Abdullah Al Faruque, University of California, Irvine
Exploiting Metaobjects to Reinforce Data Leakage Attacks
Hoyong Jeong, KAIST
Hodong Kim, Korea University
Junbeom Hur, Korea University
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework
Menghan Sun, The Chinese University of Hong Kong
Zirui SONG, The Chinese University of Hong Kong
Xiaoxi REN, Hunan University
Daoyuan Wu, The Chinese University of Hong Kong
Kehuan Zhang, The Chinese University of Hong Kong
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
Nicolaas Weideman, University of Southern California - Information Sciences Institute
Haoda Wang, University of Southern California - Information Sciences Institute
Tyler Kann, Information Sciences Institute, University of Southern California
Spencer Zahabizadeh, Information Sciences Institute, University of Southern California
Wei-Cheng Wu, Information Sciences Institute, University of Southern California
Rajat Tandon, University of Southern California
Jelena Mirkovic, USC
Christophe Hauser, Information Sciences Institute, University of Southern California
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
Konrad Wolsing, Fraunhofer FKIE / RWTH Aachen University
Eric Wagner, Fraunhofer FKIE / RWTH Aachen University
Antoine Saillard, RWTH Aachen University / Fraunhofer FKIE
Martin Henze, RWTH Aachen University / Fraunhofer FKIE
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks
Toshinori Usui, NTT Social Informatics Laboratories
Yuto Otsuki, NTT Security (Japan) KK
Yuhei Kawakoya, NTT Social Informatics Laboratories
Makoto Iwamura, NTT Social Informatics Laboratories
Kanta Matsuura, Institute of Industrial Science, The University of Tokyo
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework
Atsuko Natatsuka, Waseda University
Ryo Iijima, Waseda University
Takuya Watanabe, NTT Social Informatics Laboratories
Mitsuaki Akiyama, NTT Social Informatics Laboratories
Tetsuya Sakai, Waseda University
Tatsuya Mori, Waseda University / NICT / RIKEN AIP
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
Daehee Jang, Sungshin W. University
Ammar Askar, Georgia Institute of Technology
Insu Yun, KAIST
Stephen Tong, Georgia Institute of Technology
Yiqin Cai, Georgia Institute of Technology
Taesoo Kim, Georgia Institute of Technology
On the Challenges of Detecting Side-Channel Attacks in SGX
Jianyu Jiang, The University of Hong Kong
Claudio Soriente, NEC Laboratories Europe
Ghassan Karame, Ruhr University Bochum
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
Yebo Feng, University of Oregon
Jun Li, University of Oregon
Devkishen Sisodia, University of Oregon
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64
Tobias Cloosters, University of Duisburg-Essen
David Paaßen, University of Duisburg-Essen
Jianqiang Wang, Technical University of Darmstadt
Oussama Draissi, University of Duisburg-Essen
Patrick Jauernig, Technical University of Darmstadt
Emmanuel Stapf, Technical University of Darmstadt
Lucas Davi, University of Duisburg-Essen
Ahmad-Reza Sadeghi, Technical University of Darmstadt
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
Christof Ferreira Torres, University of Luxembourg
Hugo Jonker, Open University of the Netherlands
Radu State, University of Luxembourg
Transferable Graph Backdoor Attack
Shuiqiao Yang, The University of New South Wales
Bao Doan, The University of Adelaide
Paul Montague, Defence Science and Technology Group
Olivier De Vel, Defence Science and Technology Group
Tamas Abraham, Defence Science and Technology Group
Seyit Camtepe, CSIRO Data61, Australia
Damith C. Ranasinghe, The University of Adelaide
Salil S. Kanhere, UNSW, Sydney, Australia
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications
Yang Shi, Tongji University
Junqing Liang , Tongji University
Mianhong Li, Tongji University
Tianchen Ma, Tongji University
Guodong Ye, Guangdong Ocean University
Jiangfeng Li, Tongji University
Qinpei Zhao, Tongji University
Decap: Deprivileging Programs by Reducing Their Capabilities
Md Mehedi Hasan, Stony Brook University
Seyedhamed Ghavamnia, Stony Brook University
Michalis Polychronakis, Stony Brook University
Context-Auditor: Context-sensitive Content Injection Mitigation
Faezeh Kalantari, Arizona State University
Mehrnoosh Zaeifi, Arizona State University
Tiffany Bao, Arizona State University
Ruoyu Wang, Arizona State University
Yan Shoshitaishvili, Arizona State University
Adam Doupé, Arizona State University
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots
Fabian Franzen, Technical University of Munich
Tobias Holl, Technical University of Munich
Manuel Andreas, Technical University of Munich
Julian Kirsch, Technical University of Munich
Jens Grossklags, Technical University of Munich
Towards Deceptive Defense in Software Security with Chaff Bugs
Zhenghao Hu, New York University
Yu Hu, New York University
Brendan Dolan-Gavitt, New York University
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy
Baihe Ma, University of Technology Sydney
Xiaojie Lin, University of Technology Sydney
Xu Wang, University of Technology Sydney
Bin Liu, University of Technology Sydney
Ying He, University of Technology Sydney
Wei Ni, CSIRO
Ren Ping Liu, University of Technology Sydney
Encrypted Malware Traffic Detection via Graph-based Network Analysis
Zhuoqun Fu, Tsinghua University
Mingxuan Liu, Tsinghua University
Yue Qin, Indiana University Bloomington
Jia Zhang, Tsinghua University
Yuan Zou, Tsinghua University; GeekSec Security Group
Qilei Yin, Tsinghua University
Qi Li, Tsinghua University
Haixin Duan, Tsinghua University; Qi An Xin Group Corp
论文下载:https://dl.acm.org/doi/proceedings/10.1145/3545948
会议主页:https://raid2022.cs.ucy.ac.cy/
转自:“安全学术圈”微信公众号
如有侵权,请联系本站删除!