RAID 2018 论文录用列表

image

攻击、入侵和防御研究国际研讨会(RAID, International Symposium on Research in Attacks, Intrusions and Defenses)属于CCF B类会议,尤其在网络攻防方面行业认可非常高。RAID 2018年共收到145篇论文,录取32篇论文,录用率为22.07%。国内录用论文的单位集中在清华大学、北京航空航天大学、中国科学院信息工程研究所、北京大学等高校。同时录取论文中有很多是来自安全公司或者互联网企业的从业人员,可以说这些论文具有很强的实践性。小编将录用论文标题列举如下:

Session 1: Attacks

  • Proteus: Detecting Android Emulators from Instruction-level Profiles

    Onur Sahin,Ayse K. Coskun ,Manuel Egele (Boston University)

  • BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    laudio Rizzo, Johannes Kinder, Lorenzo Cavallaro (Royal Holloway, University of London)

  • Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer

    Andrei Tatar, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida (Vrije Universiteit Amsterdam)

Session 2: Intrusion detection and prevention

  • Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails

    Hugo Gascon (TU Braunschweig), Steffen Ulrich(Genua GmbH), Benjamin Stritter (University of Erlangen-Nuremberg ), Konrad Rieck( TU Braunschweig )

  • Backdoors: Definition, Deniability and Detection

    Sam L. Thomas (University of Birmingham), Aurélien Francillon (EURECOM)

  • RWGuard: A Real-time Detection System Against Cryptographic Ransomware

    Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino (Purdue University)

Session 3: DDoS attacks

  • DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives

    Jonas Bushart, Christian Rossow( CISPA, Saarland University)

  • Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures

    Menghao Zhang, Guanyu Li, Jun Bi, Jiasong Bai (Tsinghua University), Lei Xu, Guofei Gu( Texas A&M University)

  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids

    Johanna Ullrich, Nicholas Stifter,Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl (SBA Research)

Session 4: Passwords, Accounts, and Users

  • Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum

    Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery, (University of Cambridge)

  • SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels

    Binghui Wang, Le Zhang, Neil Zhenqiang Gong (Iowa State University)

  • GuidedPass: Guiding users to create both more memorable and strong passwords

    Simon S. Woo (SUNY-Korea), Jelena Mirkovic (USC/ISI)

Session 5: Machine learning for computer security

  • Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

    Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg (NYU)

  • Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic

    Mayana Pereira, Bin Yu (Infoblox Inc.), Shaun Coleman, Martine DeCock, Anderson Nascimento (University of Washington, Tacoma)

  • OTTer: A Scalable High-resolution Encrypted Traffic Identification Engine

    Eva Papadogiannaki (Niometrics, FORTH-ICS) Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas (Niometrics)

Session 6: Hardware-assisted security

  • Hardware Assisted Randomization of Data

    Brian Belleville, Joseph Michael Nash, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz ( University of California, Irvine ), Hyungon Moon, Jangseop Shin, Dongil Hwang, Seonhwa Jung, Yunheung Paek (ECE and ISRC, Seoul National University)

  • MicroStache: A Hardware Enforced Abstraction for Efficient Data Isolation

    Lucian Mogosanu (University POLITEHNICA of Bucharest), Ashay Rane (University of Texas at Austin), Nathan Dautenhahn (University of Pennsylvania)

  • CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices

    Chen Cao, Le Guan (The Pennsylvania State University), Ning Zhang (Virginia Polytechnic Institute and State University), Neng Gao, Jingqiang Lin (Institute of Information Engineering, CAS), Bo Luo (The University of Kansas), Peng Liu (The Pennsylvania State University), Ji Xiang (Institute of Information Engineering, CAS), Wenjing Lou (Virginia Polytechnic Institute and State University)

Session 7: Software Security

  • PartiSan: Fast and Flexible Sanitization via Run-time Partitioning

    HJulian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, Michael Franz (University of California, Irvine)

  • τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries

    Paul Muntean, Matthias Fischer, Jens Grossklags, Claudia Eckert (Technical University of Munich), Gang Tan (Penn State University), Zhiqiang Lin (The Ohio State University)

  • Trusted Execution Path For Protecting Java Applications Against Deserialization of Untrusted Data

    Cristalli Stefano, Vignati Edoardo, Bruschi Danilo, Andrea Lanzi (University of Milan)

Session 8: Malware

  • Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence

    Jialong Zhang, Jiyong Jang, Marc Ph. Stoecklin, Jialong Zhang (IBM Research), Guofei Gu (Texas A&M University), Xin Hu (Pinterest, Inc.)

  • Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    Ishai Rosenberg,Asaf Shabtai,Yuval Elovici, Lior Rokach (Software and Information Systems Engineering Department, Ben Gurion University of Israel)

  • Next Generation P2P Botnets: Monitoring under Adverse Conditions

    Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser (Technische Universität Darmstadt), Shankar Karuppayah (Universiti Sains Malaysia)

Session 9: IoT/CPS security

  • Malicious IoT Implants: Tampering with Serial Communication over the Internet

    Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg)

  • Before Toasters Rise Up: A View Into the Emerging IoT Threat Landscape

    Pierre-Antoine Vervier, Yun Shen (Symantec Research Labs)

  • Statistical Similarity of Critical Infrastructure Network Traffic based on Nearest Neighbor Distances

    Jeong-Han Yun, Woomyo Lee, Sin-Kyu Kim,Jeong-Han Yun (The Affiliated Institute of ETRI), Yoonho Hwang, Hee-Kap Ahn (Dept. of Computer Science and Engineering, POSTECH)

Session 10: Security measurements

  • PostScript Undead: Pwning the Web with a 35 year old Language

    Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk (Ruhr-University Bochum)

  • Identifying Key Leakage of Bitcoin Users

    Sichael Brengel, Christian Rossow (CISPA, Saarland University)

Session 11: Defenses

  • Furnace: Self-Service Tenant VMI for the Cloud

    Micah Bushouse, Douglas Reeves (North Carolina State University)

  • ShadowMonitor: An Effective in-VM Monitoring Framework with Hardware-enforced Isolation

    Bin Shi (Beihang University)

  • KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

    zhi zhang (CSIRO and UNSW, Australia), Yueqiang Cheng(Baidu USA Xlab), Surya Nepal (CSIRO, Australia), Dongxi Liu (CSIRO, Australia), Fethi Rabhi (UNSW, Australia ), Qingni Shen (MoE Key Lab of Network and Software Assurance, Peking University)

image

会议论文下载:

https://www.raid2018.org/

安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com


为您推荐了相关的技术文章:

  1. Python实现逻辑回归(Logistic Regression in Python)
  2. 收到“大学录取通知书”之后…
  3. EuroS&P 2018 论文录用列表
  4. ICWSM 2018 论文录用列表
  5. AI Challenger - 全球AI挑战赛

原文链接: mp.weixin.qq.com