RAID 2022 论文录用列表
2022-10-31 23:32:21 Author: 安全学术圈(查看原文) 阅读量:145 收藏

攻击、入侵和防御研究国际研讨会(RAID, International Symposium on Research in Attacks, Intrusions and Defenses)属于CCF B类会议,尤其在网络攻防方面行业认可非常高。RAID 2022年共收到论文139篇(2021:138, 2019:166, 2018:145),录取35篇,其中包含15篇返修后接收(2021:32, 2020:31, 2019:37, 2018:32),录用率为25.18% (2021:23%, 2019:22.29%, 2018:22.07%),在2022年有一些变动:

  • 自2019年以来第一次线下办会;
  • RAID程序委员会中有1/3的新人,邀请中70%都接收加入委员会,导致57位委员会来自于12个国家;
  • 投稿论文中包含498位作者,29个国家;
  • 新增了最佳实用论文奖,奖金2000欧元。

国内包含四川大学、香港中文大学、香港大学、同济大学、清华大学等高校都有录用论文,部分小编感兴趣的论文标题已经标红:

Detection of Electromagnetic Signal Injection Attacks on Actuator Systems

  • Youqian Zhang, University of Oxford
  • Kasper Rasmussen, University of Oxford

Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs

  • Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum
  • Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum

A scalable tracing tool for non-rooted and off-the-shelf Android phones

  • Alain Tchana, ENS Lyon, France
  • Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA
  • Lavoisier Wapet, ENS Lyon, France

Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites

  • Haoran Ou, School of Cyber Science and Engineering, Sichuan University
  • Yong Fang, School of Cyber Science and Engineering, Sichuan University
  • Wenbo Guo, School of Cyber Science and Engineering, Sichuan University
  • Yongyan Guo, School of Cyber Science and Engineering, Sichuan University
  • Cheng Huang, School of Cyber Science and Engineering, Sichuan University

Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications

  • Jincheng Wang, The Chinese University of Hong Kong
  • Zhuohua Li, The Chinese University of Hong Kong
  • Mingshen Sun, Baidu
  • John C. S. Lui, The Chinese University of Hong Kong

Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems

  • Qingzhao Zhang, University of Michigan
  • Xiao Zhu, University of Michigan
  • Mu Zhang, University of Utah
  • Z. Morley Mao, University of Michigan and Google

OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem

  • Pieter Philippaerts, imec-DistriNet, KU Leuven
  • Davy Preuveneers, imec-DistriNet, KU Leuven
  • Wouter Joosen, imec-DistriNet, KU Leuven

BinProv: Binary Code Provenance Identification without Disassembly

  • Xu He, George Mason University
  • Shu Wang, George Mason University
  • Yunlong Xing, George Mason University
  • Pengbin Feng, George Mason University
  • Haining Wang, Virginia Tech
  • Qi Li, Tsinghua University
  • Songqing Chen, George Mason University
  • Kun Sun, George Mason University

What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling

  • Jun Yeon Won, Ohio State University
  • Haohuang Wen, Ohio State University
  • Zhiqiang Lin, Ohio State University

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS

  • Mashael Al-Sabah, Qatar Computing Research Institute
  • Mohamed Nabeel, Qatar Computing Research Institute
  • Euijin Choo, Qatar Computing Research Institute
  • Yazan Boshmaf, Qatar Computing Research Institute, HBKU

Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks

  • Ramin Yazdani, University of Twente
  • Alden Hilton, Brigham Young University
  • Jeroen van der Ham, University of Twente and NCSC
  • Roland van Rijswijk-Deij, University of Twente
  • Casey Deccio, Brigham Young University
  • Anna Sperotto, University of Twente
  • Mattijs Jonker, University of Twente

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

  • Ahmed Abusnaina, University of Central Florida
  • Afsah Anwar, Northeastern University
  • Sultan Alshamrani, University of Central Florida
  • Abdulrahman Alabduljabbar, University of Central Florida
  • RhongHo Jang, Wayne State University
  • DaeHun Nyang, Ewha Womans University
  • David Mohaisen, University of Central Florida

TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone

  • Fabian Schwarz, CISPA Helmholtz Center for Information Security

ULTRA: Ultimate Rootkit Detection over the Air

  • Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France
  • Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France
  • Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum

  • Dabao Wang, Monash University
  • Hang FENG, Zhejiang University
  • Siwei Wu, Zhejiang University
  • Yajin Zhou, Zhejiang University
  • Lei Wu, Zhejiang University
  • Xingliang YUAN, Monash University

HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors

  • Anomadarshi Barua, University of California, Irvine
  • Mohammad Abdullah Al Faruque, University of California, Irvine

Exploiting Metaobjects to Reinforce Data Leakage Attacks

  • Hoyong Jeong, KAIST
  • Hodong Kim, Korea University
  • Junbeom Hur, Korea University

LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework

  • Menghan Sun, The Chinese University of Hong Kong
  • Zirui SONG, The Chinese University of Hong Kong
  • Xiaoxi REN, Hunan University
  • Daoyuan Wu, The Chinese University of Hong Kong
  • Kehuan Zhang, The Chinese University of Hong Kong

Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables

  • Nicolaas Weideman, University of Southern California - Information Sciences Institute
  • Haoda Wang, University of Southern California - Information Sciences Institute
  • Tyler Kann, Information Sciences Institute, University of Southern California
  • Spencer Zahabizadeh, Information Sciences Institute, University of Southern California
  • Wei-Cheng Wu, Information Sciences Institute, University of Southern California
  • Rajat Tandon, University of Southern California
  • Jelena Mirkovic, USC
  • Christophe Hauser, Information Sciences Institute, University of Southern California

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

  • Konrad Wolsing, Fraunhofer FKIE / RWTH Aachen University
  • Eric Wagner, Fraunhofer FKIE / RWTH Aachen University
  • Antoine Saillard, RWTH Aachen University / Fraunhofer FKIE
  • Martin Henze, RWTH Aachen University / Fraunhofer FKIE

Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks

  • Toshinori Usui, NTT Social Informatics Laboratories
  • Yuto Otsuki, NTT Security (Japan) KK
  • Yuhei Kawakoya, NTT Social Informatics Laboratories
  • Makoto Iwamura, NTT Social Informatics Laboratories
  • Kanta Matsuura, Institute of Industrial Science, The University of Tokyo

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework

  • Atsuko Natatsuka, Waseda University
  • Ryo Iijima, Waseda University
  • Takuya Watanabe, NTT Social Informatics Laboratories
  • Mitsuaki Akiyama, NTT Social Informatics Laboratories
  • Tetsuya Sakai, Waseda University
  • Tatsuya Mori, Waseda University / NICT / RIKEN AIP

[email protected]: Distributed Fuzzing on Untrusted Heterogeneous Clients

  • Daehee Jang, Sungshin W. University
  • Ammar Askar, Georgia Institute of Technology
  • Insu Yun, KAIST
  • Stephen Tong, Georgia Institute of Technology
  • Yiqin Cai, Georgia Institute of Technology
  • Taesoo Kim, Georgia Institute of Technology

On the Challenges of Detecting Side-Channel Attacks in SGX

  • Jianyu Jiang, The University of Hong Kong
  • Claudio Soriente, NEC Laboratories Europe
  • Ghassan Karame, Ruhr University Bochum

CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic

  • Yebo Feng, University of Oregon
  • Jun Li, University of Oregon
  • Devkishen Sisodia, University of Oregon

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64

  • Tobias Cloosters, University of Duisburg-Essen
  • David Paaßen, University of Duisburg-Essen
  • Jianqiang Wang, Technical University of Darmstadt
  • Oussama Draissi, University of Duisburg-Essen
  • Patrick Jauernig, Technical University of Darmstadt
  • Emmanuel Stapf, Technical University of Darmstadt
  • Lucas Davi, University of Duisburg-Essen
  • Ahmad-Reza Sadeghi, Technical University of Darmstadt

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts

  • Christof Ferreira Torres, University of Luxembourg
  • Hugo Jonker, Open University of the Netherlands
  • Radu State, University of Luxembourg

Transferable Graph Backdoor Attack

  • Shuiqiao Yang, The University of New South Wales
  • Bao Doan, The University of Adelaide
  • Paul Montague, Defence Science and Technology Group
  • Olivier De Vel, Defence Science and Technology Group
  • Tamas Abraham, Defence Science and Technology Group
  • Seyit Camtepe, CSIRO Data61, Australia
  • Damith C. Ranasinghe, The University of Adelaide
  • Salil S. Kanhere, UNSW, Sydney, Australia

Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications

  • Yang Shi, Tongji University
  • Junqing Liang , Tongji University
  • Mianhong Li, Tongji University
  • Tianchen Ma, Tongji University
  • Guodong Ye, Guangdong Ocean University
  • Jiangfeng Li, Tongji University
  • Qinpei Zhao, Tongji University

Decap: Deprivileging Programs by Reducing Their Capabilities

  • Md Mehedi Hasan, Stony Brook University
  • Seyedhamed Ghavamnia, Stony Brook University
  • Michalis Polychronakis, Stony Brook University

Context-Auditor: Context-sensitive Content Injection Mitigation

  • Faezeh Kalantari, Arizona State University
  • Mehrnoosh Zaeifi, Arizona State University
  • Tiffany Bao, Arizona State University
  • Ruoyu Wang, Arizona State University
  • Yan Shoshitaishvili, Arizona State University
  • Adam Doupé, Arizona State University

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots

  • Fabian Franzen, Technical University of Munich
  • Tobias Holl, Technical University of Munich
  • Manuel Andreas, Technical University of Munich
  • Julian Kirsch, Technical University of Munich
  • Jens Grossklags, Technical University of Munich

Towards Deceptive Defense in Software Security with Chaff Bugs

  • Zhenghao Hu, New York University
  • Yu Hu, New York University
  • Brendan Dolan-Gavitt, New York University

New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy

  • Baihe Ma, University of Technology Sydney
  • Xiaojie Lin, University of Technology Sydney
  • Xu Wang, University of Technology Sydney
  • Bin Liu, University of Technology Sydney
  • Ying He, University of Technology Sydney
  • Wei Ni, CSIRO
  • Ren Ping Liu, University of Technology Sydney

Encrypted Malware Traffic Detection via Graph-based Network Analysis

  • Zhuoqun Fu, Tsinghua University
  • Mingxuan Liu, Tsinghua University
  • Yue Qin, Indiana University Bloomington
  • Jia Zhang, Tsinghua University
  • Yuan Zou, Tsinghua University; GeekSec Security Group
  • Qilei Yin, Tsinghua University
  • Qi Li, Tsinghua University
  • Haixin Duan, Tsinghua University; Qi An Xin Group Corp

论文下载:https://dl.acm.org/doi/proceedings/10.1145/3545948 

会议主页:https://raid2022.cs.ucy.ac.cy/

历年会议

安全学术圈招募队友-ing
有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247488241&idx=1&sn=316eee5da1f870237d04c945ed6b9dc8&chksm=fe2eed7ac959646c30275091393e105940c2827075d0374010de8c98f30db4bb4fd1554ad7a1#rd
如有侵权请联系:admin#unsafe.sh