攻击、入侵和防御研究国际研讨会(RAID, International Symposium on Research in Attacks, Intrusions and Defenses)属于CCF B类会议,尤其在网络攻防方面行业认可非常高。RAID 2022年共收到论文139
篇(2021:138, 2019:166, 2018:145),录取35
篇,其中包含15篇返修后接收(2021:32, 2020:31, 2019:37, 2018:32),录用率为25.18
% (2021:23%, 2019:22.29%, 2018:22.07%),在2022年有一些变动:
自2019年以来第一次线下办会; RAID程序委员会中有1/3的新人,邀请中70%都接收加入委员会,导致57位委员会来自于12个国家; 投稿论文中包含498位作者,29个国家; 新增了 最佳实用论文奖
,奖金2000欧元。
国内包含四川大学、香港中文大学、香港大学、同济大学、清华大学
等高校都有录用论文,部分小编感兴趣的论文标题已经标红:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
Youqian Zhang, University of Oxford Kasper Rasmussen, University of Oxford
Write Me and I’ll Tell You Secrets – Write-After-Write Effects On Intel CPUs
Jan Philipp Thoma, Horst Görtz Institute for IT-Security, Ruhr University Bochum Tim Güneysu , Horst Görtz Institute for IT-Security, Ruhr University Bochum
A scalable tracing tool for non-rooted and off-the-shelf Android phones
Alain Tchana, ENS Lyon, France Yérom-David Bromberg, Univ. Rennes, Inria, CNRS, IRISA Lavoisier Wapet, ENS Lyon, France
Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites
Haoran Ou, School of Cyber Science and Engineering, Sichuan University Yong Fang, School of Cyber Science and Engineering, Sichuan University Wenbo Guo, School of Cyber Science and Engineering, Sichuan University Yongyan Guo, School of Cyber Science and Engineering, Sichuan University Cheng Huang, School of Cyber Science and Engineering, Sichuan University
Zigbee’s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications
Jincheng Wang, The Chinese University of Hong Kong Zhuohua Li, The Chinese University of Hong Kong Mingshen Sun, Baidu John C. S. Lui, The Chinese University of Hong Kong
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems
Qingzhao Zhang, University of Michigan Xiao Zhu, University of Michigan Mu Zhang, University of Utah Z. Morley Mao, University of Michigan and Google
OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem
Pieter Philippaerts, imec-DistriNet, KU Leuven Davy Preuveneers, imec-DistriNet, KU Leuven Wouter Joosen, imec-DistriNet, KU Leuven
BinProv: Binary Code Provenance Identification without Disassembly
Xu He, George Mason University Shu Wang, George Mason University Yunlong Xing, George Mason University Pengbin Feng, George Mason University Haining Wang, Virginia Tech Qi Li, Tsinghua University Songqing Chen, George Mason University Kun Sun, George Mason University
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling
Jun Yeon Won, Ohio State University Haohuang Wen, Ohio State University Zhiqiang Lin, Ohio State University
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
Mashael Al-Sabah, Qatar Computing Research Institute Mohamed Nabeel, Qatar Computing Research Institute Euijin Choo, Qatar Computing Research Institute Yazan Boshmaf, Qatar Computing Research Institute, HBKU
Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks
Ramin Yazdani, University of Twente Alden Hilton, Brigham Young University Jeroen van der Ham, University of Twente and NCSC Roland van Rijswijk-Deij, University of Twente Casey Deccio, Brigham Young University Anna Sperotto, University of Twente Mattijs Jonker, University of Twente
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems
Ahmed Abusnaina, University of Central Florida Afsah Anwar, Northeastern University Sultan Alshamrani, University of Central Florida Abdulrahman Alabduljabbar, University of Central Florida RhongHo Jang, Wayne State University DaeHun Nyang, Ewha Womans University David Mohaisen, University of Central Florida
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone
Fabian Schwarz, CISPA Helmholtz Center for Information Security
ULTRA: Ultimate Rootkit Detection over the Air
Duy-Phuc Pham, Univ Rennes, Inria, CNRS, IRISA, France Damien Marion, Univ Rennes, Inria, CNRS, IRISA, France Annelie Heuser, Univ Rennes, Inria, CNRS, IRISA, France
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
Dabao Wang, Monash University Hang FENG, Zhejiang University Siwei Wu, Zhejiang University Yajin Zhou, Zhejiang University Lei Wu, Zhejiang University Xingliang YUAN, Monash University
HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors
Anomadarshi Barua, University of California, Irvine Mohammad Abdullah Al Faruque, University of California, Irvine
Exploiting Metaobjects to Reinforce Data Leakage Attacks
Hoyong Jeong, KAIST Hodong Kim, Korea University Junbeom Hur, Korea University
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework
Menghan Sun, The Chinese University of Hong Kong Zirui SONG, The Chinese University of Hong Kong Xiaoxi REN, Hunan University Daoyuan Wu, The Chinese University of Hong Kong Kehuan Zhang, The Chinese University of Hong Kong
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
Nicolaas Weideman, University of Southern California – Information Sciences Institute Haoda Wang, University of Southern California – Information Sciences Institute Tyler Kann, Information Sciences Institute, University of Southern California Spencer Zahabizadeh, Information Sciences Institute, University of Southern California Wei-Cheng Wu, Information Sciences Institute, University of Southern California Rajat Tandon, University of Southern California Jelena Mirkovic, USC Christophe Hauser, Information Sciences Institute, University of Southern California
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
Konrad Wolsing, Fraunhofer FKIE / RWTH Aachen University Eric Wagner, Fraunhofer FKIE / RWTH Aachen University Antoine Saillard, RWTH Aachen University / Fraunhofer FKIE Martin Henze, RWTH Aachen University / Fraunhofer FKIE
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks
Toshinori Usui, NTT Social Informatics Laboratories Yuto Otsuki, NTT Security (Japan) KK Yuhei Kawakoya, NTT Social Informatics Laboratories Makoto Iwamura, NTT Social Informatics Laboratories Kanta Matsuura, Institute of Industrial Science, The University of Tokyo
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework
Atsuko Natatsuka, Waseda University Ryo Iijima, Waseda University Takuya Watanabe, NTT Social Informatics Laboratories Mitsuaki Akiyama, NTT Social Informatics Laboratories Tetsuya Sakai, Waseda University Tatsuya Mori, Waseda University / NICT / RIKEN AIP
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
Daehee Jang, Sungshin W. University Ammar Askar, Georgia Institute of Technology Insu Yun, KAIST Stephen Tong, Georgia Institute of Technology Yiqin Cai, Georgia Institute of Technology Taesoo Kim, Georgia Institute of Technology
On the Challenges of Detecting Side-Channel Attacks in SGX
Jianyu Jiang, The University of Hong Kong Claudio Soriente, NEC Laboratories Europe Ghassan Karame, Ruhr University Bochum
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
Yebo Feng, University of Oregon Jun Li, University of Oregon Devkishen Sisodia, University of Oregon
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64
Tobias Cloosters, University of Duisburg-Essen David Paaßen, University of Duisburg-Essen Jianqiang Wang, Technical University of Darmstadt Oussama Draissi, University of Duisburg-Essen Patrick Jauernig, Technical University of Darmstadt Emmanuel Stapf, Technical University of Darmstadt Lucas Davi, University of Duisburg-Essen Ahmad-Reza Sadeghi, Technical University of Darmstadt
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
Christof Ferreira Torres, University of Luxembourg Hugo Jonker, Open University of the Netherlands Radu State, University of Luxembourg
Transferable Graph Backdoor Attack
Shuiqiao Yang, The University of New South Wales Bao Doan, The University of Adelaide Paul Montague, Defence Science and Technology Group Olivier De Vel, Defence Science and Technology Group Tamas Abraham, Defence Science and Technology Group Seyit Camtepe, CSIRO Data61, Australia Damith C. Ranasinghe, The University of Adelaide Salil S. Kanhere, UNSW, Sydney, Australia
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications
Yang Shi, Tongji University Junqing Liang , Tongji University Mianhong Li, Tongji University Tianchen Ma, Tongji University Guodong Ye, Guangdong Ocean University Jiangfeng Li, Tongji University Qinpei Zhao, Tongji University
Decap: Deprivileging Programs by Reducing Their Capabilities
Md Mehedi Hasan, Stony Brook University Seyedhamed Ghavamnia, Stony Brook University Michalis Polychronakis, Stony Brook University
Context-Auditor: Context-sensitive Content Injection Mitigation
Faezeh Kalantari, Arizona State University Mehrnoosh Zaeifi, Arizona State University Tiffany Bao, Arizona State University Ruoyu Wang, Arizona State University Yan Shoshitaishvili, Arizona State University Adam Doupé, Arizona State University
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots
Fabian Franzen, Technical University of Munich Tobias Holl, Technical University of Munich Manuel Andreas, Technical University of Munich Julian Kirsch, Technical University of Munich Jens Grossklags, Technical University of Munich
Towards Deceptive Defense in Software Security with Chaff Bugs
Zhenghao Hu, New York University Yu Hu, New York University Brendan Dolan-Gavitt, New York University
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy
Baihe Ma, University of Technology Sydney Xiaojie Lin, University of Technology Sydney Xu Wang, University of Technology Sydney Bin Liu, University of Technology Sydney Ying He, University of Technology Sydney Wei Ni, CSIRO Ren Ping Liu, University of Technology Sydney
Encrypted Malware Traffic Detection via Graph-based Network Analysis
Zhuoqun Fu, Tsinghua University Mingxuan Liu, Tsinghua University Yue Qin, Indiana University Bloomington Jia Zhang, Tsinghua University Yuan Zou, Tsinghua University; GeekSec Security Group Qilei Yin, Tsinghua University Qi Li, Tsinghua University Haixin Duan, Tsinghua University; Qi An Xin Group Corp
论文下载:https://dl.acm.org/doi/proceedings/10.1145/3545948
会议主页:https://raid2022.cs.ucy.ac.cy/
历年会议
安全学术圈招募队友-ing 有兴趣加入学术圈的请联系secdr#qq.com