攻击、入侵和防御研究国际研讨会(RAID, International Symposium on Research in Attacks, Intrusions and Defenses)属于CCF B类会议,尤其在网络攻防方面行业认可非常高。RAID 2022年共收到论文139
篇(2021:138, 2019:166, 2018:145),录取35
篇,其中包含15篇返修后接收(2021:32, 2020:31, 2019:37, 2018:32),录用率为25.18
% (2021:23%, 2019:22.29%, 2018:22.07%),在2022年有一些变动:
- RAID程序委员会中有1/3的新人,邀请中70%都接收加入委员会,导致57位委员会来自于12个国家;
国内包含四川大学、香港中文大学、香港大学、同济大学、清华大学
等高校都有录用论文,部分小编感兴趣的论文标题已经标红:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
- Youqian Zhang, University of Oxford
- Kasper Rasmussen, University of Oxford
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs
- Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum
- Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum
A scalable tracing tool for non-rooted and off-the-shelf Android phones
- Alain Tchana, ENS Lyon, France
- Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA
- Lavoisier Wapet, ENS Lyon, France
Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites
- Haoran Ou, School of Cyber Science and Engineering, Sichuan University
- Yong Fang, School of Cyber Science and Engineering, Sichuan University
- Wenbo Guo, School of Cyber Science and Engineering, Sichuan University
- Yongyan Guo, School of Cyber Science and Engineering, Sichuan University
- Cheng Huang, School of Cyber Science and Engineering, Sichuan University
Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications
- Jincheng Wang, The Chinese University of Hong Kong
- Zhuohua Li, The Chinese University of Hong Kong
- John C. S. Lui, The Chinese University of Hong Kong
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems
- Qingzhao Zhang, University of Michigan
- Xiao Zhu, University of Michigan
- Mu Zhang, University of Utah
- Z. Morley Mao, University of Michigan and Google
OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem
- Pieter Philippaerts, imec-DistriNet, KU Leuven
- Davy Preuveneers, imec-DistriNet, KU Leuven
- Wouter Joosen, imec-DistriNet, KU Leuven
BinProv: Binary Code Provenance Identification without Disassembly
- Xu He, George Mason University
- Shu Wang, George Mason University
- Yunlong Xing, George Mason University
- Pengbin Feng, George Mason University
- Haining Wang, Virginia Tech
- Qi Li, Tsinghua University
- Songqing Chen, George Mason University
- Kun Sun, George Mason University
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling
- Jun Yeon Won, Ohio State University
- Haohuang Wen, Ohio State University
- Zhiqiang Lin, Ohio State University
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
- Mashael Al-Sabah, Qatar Computing Research Institute
- Mohamed Nabeel, Qatar Computing Research Institute
- Euijin Choo, Qatar Computing Research Institute
- Yazan Boshmaf, Qatar Computing Research Institute, HBKU
Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks
- Ramin Yazdani, University of Twente
- Alden Hilton, Brigham Young University
- Jeroen van der Ham, University of Twente and NCSC
- Roland van Rijswijk-Deij, University of Twente
- Casey Deccio, Brigham Young University
- Anna Sperotto, University of Twente
- Mattijs Jonker, University of Twente
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
- Ahmed Abusnaina, University of Central Florida
- Afsah Anwar, Northeastern University
- Sultan Alshamrani, University of Central Florida
- Abdulrahman Alabduljabbar, University of Central Florida
- RhongHo Jang, Wayne State University
- DaeHun Nyang, Ewha Womans University
- David Mohaisen, University of Central Florida
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone
- Fabian Schwarz, CISPA Helmholtz Center for Information Security
ULTRA: Ultimate Rootkit Detection over the Air
- Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France
- Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France
- Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
- Dabao Wang, Monash University
- Hang FENG, Zhejiang University
- Siwei Wu, Zhejiang University
- Yajin Zhou, Zhejiang University
- Lei Wu, Zhejiang University
- Xingliang YUAN, Monash University
HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors
- Anomadarshi Barua, University of California, Irvine
- Mohammad Abdullah Al Faruque, University of California, Irvine
Exploiting Metaobjects to Reinforce Data Leakage Attacks
- Hodong Kim, Korea University
- Junbeom Hur, Korea University
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework
- Menghan Sun, The Chinese University of Hong Kong
- Zirui SONG, The Chinese University of Hong Kong
- Xiaoxi REN, Hunan University
- Daoyuan Wu, The Chinese University of Hong Kong
- Kehuan Zhang, The Chinese University of Hong Kong
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
- Nicolaas Weideman, University of Southern California - Information Sciences Institute
- Haoda Wang, University of Southern California - Information Sciences Institute
- Tyler Kann, Information Sciences Institute, University of Southern California
- Spencer Zahabizadeh, Information Sciences Institute, University of Southern California
- Wei-Cheng Wu, Information Sciences Institute, University of Southern California
- Rajat Tandon, University of Southern California
- Christophe Hauser, Information Sciences Institute, University of Southern California
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
- Konrad Wolsing, Fraunhofer FKIE / RWTH Aachen University
- Eric Wagner, Fraunhofer FKIE / RWTH Aachen University
- Antoine Saillard, RWTH Aachen University / Fraunhofer FKIE
- Martin Henze, RWTH Aachen University / Fraunhofer FKIE
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks
- Toshinori Usui, NTT Social Informatics Laboratories
- Yuto Otsuki, NTT Security (Japan) KK
- Yuhei Kawakoya, NTT Social Informatics Laboratories
- Makoto Iwamura, NTT Social Informatics Laboratories
- Kanta Matsuura, Institute of Industrial Science, The University of Tokyo
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework
- Atsuko Natatsuka, Waseda University
- Ryo Iijima, Waseda University
- Takuya Watanabe, NTT Social Informatics Laboratories
- Mitsuaki Akiyama, NTT Social Informatics Laboratories
- Tetsuya Sakai, Waseda University
- Tatsuya Mori, Waseda University / NICT / RIKEN AIP
[email protected]: Distributed Fuzzing on Untrusted Heterogeneous Clients
- Daehee Jang, Sungshin W. University
- Ammar Askar, Georgia Institute of Technology
- Stephen Tong, Georgia Institute of Technology
- Yiqin Cai, Georgia Institute of Technology
- Taesoo Kim, Georgia Institute of Technology
On the Challenges of Detecting Side-Channel Attacks in SGX
- Jianyu Jiang, The University of Hong Kong
- Claudio Soriente, NEC Laboratories Europe
- Ghassan Karame, Ruhr University Bochum
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
- Yebo Feng, University of Oregon
- Jun Li, University of Oregon
- Devkishen Sisodia, University of Oregon
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64
- Tobias Cloosters, University of Duisburg-Essen
- David Paaßen, University of Duisburg-Essen
- Jianqiang Wang, Technical University of Darmstadt
- Oussama Draissi, University of Duisburg-Essen
- Patrick Jauernig, Technical University of Darmstadt
- Emmanuel Stapf, Technical University of Darmstadt
- Lucas Davi, University of Duisburg-Essen
- Ahmad-Reza Sadeghi, Technical University of Darmstadt
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
- Christof Ferreira Torres, University of Luxembourg
- Hugo Jonker, Open University of the Netherlands
- Radu State, University of Luxembourg
Transferable Graph Backdoor Attack
- Shuiqiao Yang, The University of New South Wales
- Bao Doan, The University of Adelaide
- Paul Montague, Defence Science and Technology Group
- Olivier De Vel, Defence Science and Technology Group
- Tamas Abraham, Defence Science and Technology Group
- Seyit Camtepe, CSIRO Data61, Australia
- Damith C. Ranasinghe, The University of Adelaide
- Salil S. Kanhere, UNSW, Sydney, Australia
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications
- Yang Shi, Tongji University
- Junqing Liang , Tongji University
- Mianhong Li, Tongji University
- Tianchen Ma, Tongji University
- Guodong Ye, Guangdong Ocean University
- Jiangfeng Li, Tongji University
- Qinpei Zhao, Tongji University
Decap: Deprivileging Programs by Reducing Their Capabilities
- Md Mehedi Hasan, Stony Brook University
- Seyedhamed Ghavamnia, Stony Brook University
- Michalis Polychronakis, Stony Brook University
Context-Auditor: Context-sensitive Content Injection Mitigation
- Faezeh Kalantari, Arizona State University
- Mehrnoosh Zaeifi, Arizona State University
- Tiffany Bao, Arizona State University
- Ruoyu Wang, Arizona State University
- Yan Shoshitaishvili, Arizona State University
- Adam Doupé, Arizona State University
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots
- Fabian Franzen, Technical University of Munich
- Tobias Holl, Technical University of Munich
- Manuel Andreas, Technical University of Munich
- Julian Kirsch, Technical University of Munich
- Jens Grossklags, Technical University of Munich
Towards Deceptive Defense in Software Security with Chaff Bugs
- Zhenghao Hu, New York University
- Yu Hu, New York University
- Brendan Dolan-Gavitt, New York University
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy
- Baihe Ma, University of Technology Sydney
- Xiaojie Lin, University of Technology Sydney
- Xu Wang, University of Technology Sydney
- Bin Liu, University of Technology Sydney
- Ying He, University of Technology Sydney
- Ren Ping Liu, University of Technology Sydney
Encrypted Malware Traffic Detection via Graph-based Network Analysis
- Zhuoqun Fu, Tsinghua University
- Mingxuan Liu, Tsinghua University
- Yue Qin, Indiana University Bloomington
- Jia Zhang, Tsinghua University
- Yuan Zou, Tsinghua University; GeekSec Security Group
- Qilei Yin, Tsinghua University
- Qi Li, Tsinghua University
- Haixin Duan, Tsinghua University; Qi An Xin Group Corp
论文下载:https://dl.acm.org/doi/proceedings/10.1145/3545948
会议主页:https://raid2022.cs.ucy.ac.cy/