![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
27th RAID 2024: Padua, Italy
- Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3
Web Security and Privacy
- Franco Terranova
, Abdelkader Lahmadi
, Isabelle Chrisment
:
Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation. 1-16 - Bogdan Cebere
, Christian Rossow
:
Understanding Web Fingerprinting with a Protocol-Centric Approach. 17-34 - Udesh Kumarasinghe
, Mohamed Nabeel
, Charitha Elvitigala
:
Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure. 35-48 - Zhibo Sun
, Faris Bugra Kokulu
, Penghui Zhang
, Adam Oest
, Gianluca Stringhini
, Tiffany Bao
, Ruoyu Wang
, Yan Shoshitaishvili
, Adam Doupé
, Gail-Joon Ahn
:
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. 49-64 - Matteo Golinelli
, Bruno Crispo
:
Hidden Web Caches Discovery. 65-76
Malware & Unwanted Software
- Marcus Botacin
:
What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments. 77-96 - Marcus Botacin
, Heitor Murilo Gomes:
Cross-Regional Malware Detection via Model Distilling and Federated Learning. 97-113 - Aakanksha Saha
, Jorge Blasco
, Lorenzo Cavallaro
, Martina Lindorfer
:
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files. 114-129 - Ilias Tsingenopoulos
, Jacopo Cortellazzi
, Branislav Bosanský
, Simone Aonzo
, Davy Preuveneers
, Wouter Joosen
, Fabio Pierazzi
, Lorenzo Cavallaro
:
How to Train your Antivirus: RL-based Hardening through the Problem Space. 130-146 - Bogdan-Constantin Cebere
, Jonathan Lasse Bennet Flueren
, Silvia Sebastián
, Daniel Plohmann
, Christian Rossow
:
Down to earth! Guidelines for DGA-based Malware Detection. 147-165 - Richard August See
, Kevin Röbert
, Mathias Fischer
:
Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation. 166-180 - Diogo Barradas
, Carlos Novo
, Bernardo Portela
, Sofia Romeiro
, Nuno Santos
:
Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware. 181-196 - Kevin Stevens
, Mert Erdemir
, Hang Zhang
, Taesoo Kim
, Paul Pearce
:
BluePrint: Automatic Malware Signature Generation for Internet Scanning. 197-214
IDS and Network Security
- Fahad Alotaibi
, Sergio Maffeis
:
Mateen: Adaptive Ensemble Learning for Network Anomaly Detection. 215-234 - Bahruz Jabiyev
, Anthony Gavazzi
, Kaan Onarlioglu
, Engin Kirda
:
Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies. 235-247 - Anyuan Sang
, Yuchen Wang
, Li Yang
, Junbo Jia
, Lu Zhou
:
Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior. 248-262 - Hongbin Sun
, Su Wang
, Zhiliang Wang
, Zheyu Jiang
, Dongqi Han
, Jiahai Yang
:
AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection. 263-277 - Franka Schuster
, Hartmut König
:
No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge. 278-297
Cyber Crime and Security Measurements
- Mengya Zhang
, Xiaokuan Zhang
, Yinqian Zhang
, Zhiqiang Lin
:
Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. 298-316 - Mario Kahlhofer
, Stefan Achleitner
, Stefan Rass
, René Mayrhofer
:
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. 317-336 - Thomas Geras
, Thomas Schreck
:
The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence. 337-352 - Mohammad Hammas Saeed
, Shiza Ali
, Pujan Paudel
, Jeremy Blackburn
, Gianluca Stringhini
:
Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter. 353-367 - Tommaso Paladini
, Lara Ferro
, Mario Polino
, Stefano Zanero
, Michele Carminati
:
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence. 368-383
Software Security
- Bonan Ruan
, Jiahao Liu
, Chuqi Zhang
, Zhenkai Liang
:
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities. 384-402 - Ahmad Hazimeh
, Duo Xu
, Qiang Liu
, Yan Wang
, Mathias Payer
:
Tango: Extracting Higher-Order Feedback through State Inference. 403-418 - Florian Kasten
, Philipp Zieris
, Julian Horsch
:
Integrating Static Analyses for High-Precision Control-Flow Integrity. 419-434 - Yu Wang
, Yue Xu
:
Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing. 435-449 - Tai Yue
, Yibo Jin
, Fengwei Zhang
, Zhenyu Ning
, Pengfei Wang
, Xu Zhou
, Kai Lu
:
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. 450-464
ML and Adversarial Learning for Security
- Atharva Haldankar
, Arman Riasi
, Hoang-Dung Nguyen
, Tran Phuong
, Thang Hoang
:
Breaking Privacy in Model-Heterogeneous Federated Learning. 465-479 - Hualong Ma
, Peizhuo Lv
, Kai Chen
, Jiachen Zhou
:
KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs. 480-495 - Gang Yan
, Hao Wang
, Xu Yuan
, Jian Li
:
Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods. 496-512 - Jonas Ricker
, Dennis Assenmacher
, Thorsten Holz
, Asja Fischer
, Erwin Quiring
:
AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images. 513-530
CPS / IoT / Critical Infrastructure Security
- Chun-Yu (Daniel) Chen
, Kang G. Shin
, Soodeh Dadras
:
Context-Aware Anomaly Detection Using Vehicle Dynamics. 531-545 - Zeyu Yang
, Hongyi Pu
, Liang He
, Chengtao Yao
, Jianying Zhou
, Peng Cheng
, Jiming Chen
:
Deception-Resistant Stochastic Manufacturing for Automated Production Lines. 546-560 - Carlotta Tagliaro, Martina Komsic, Andrea Continella, Kevin Borgolte, Martina Lindorfer:
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols. 561-578 - Jianing Wang
, Shanqing Guo
, Wenrui Diao
, Yue Liu
, Haixin Duan
, Yichen Liu
, Zhenkai Liang
:
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning. 579-593 - Robert Lorch
, Daniel Larraz
, Cesare Tinelli
, Omar Chowdhury
:
A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework. 594-612
Mobile and Hardware Security
- Lukas Arnold
, Matthias Hollick
, Jiska Classen
:
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database. 613-629 - Mabon Ninan
, Evan Nimmo
, Shane Reilly
, Channing Smith
, Wenhai Sun
, Boyang Wang
, John Marty Emmert
:
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces. 630-643 - Luis Gerhorst
, Henriette Herzog
, Peter Wägemann
, Maximilian Ott
, Rüdiger Kapitza
, Timo Hönig
:
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions. 644-659 - Wenfan Song
, Jianwei Liu
, Yajie Liu
, Jinsong Han
:
Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations. 660-673 - Ziyi Huang
, Ding Wang
, Yunkai Zou
:
Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times. 674-692 - Alexander J. Ross, Bradley Reaves, Yomna Nasser, Gil Cukierman, Roger Piqueras Jover:
Fixing Insecure Cellular System Information Broadcasts For Good. 693-708
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.