Program
The Proceedings of RAID 2020 are now posted and publicly available on the USENIX website:
https://www.usenix.org/conference/raid2020
All the times listed below are in Central European Summer Time (CEST). Each paper presentation is 30 minutes inclusive of Q&A.
Wednesday, 14 October 2020
8:30 – 9:00
Welcome
Attacks
Session chair: Adrian Dabrowski, UCI
9:00 – 9:30
SpecROP: Speculative Exploitation of ROP Chains
9:30 – 10:00
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners
10:00 – 10:30
Camera Fingerprinting Authentication Revisited
Break
Dynamic Program Analysis
Session chair: Chao Zhang, Tsinghua
11:00 – 11:30
Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities
11:30 – 12:00
WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS
12:00 – 12:30
MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing
Break
Web Security
Session chair: Lorenzo De Carli, WPI
13:30 – 14:00
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
14:00 – 14:30
What’s in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques
14:30 – 15:00
Mininode: Reducing the Attack Surface of Node.js Applications
15:00 – 15:30
Evaluating Changes to Fake Account Verification Systems
Break
Keynote
16:00 – 17:00
Malware & PUP: Keep them separate, if you can
Juan Caballero
Thursday, 15 October 2020
Malware
Session chair: Johannes Kinder, UniBwM
9:00 – 9:30
SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub
9:30 – 10:00
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection
10:00 – 10:30
Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service
Break
Network & Cloud Security
Session chair: Leyla Bilge, NortonLifeLock
11:00 – 11:30
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX
11:30 – 12:00
Robust P2P Primitives Using SGX Enclaves
12:00 – 12:30
aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach
Break
ML-Based Security
Session chair: Amin Kharraz, FIU
14:00 – 14:30
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network
14:30 – 15:00
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI
15:00 – 15:30
An Object Detection based Solver for Google’s Image reCAPTCHA v2
Break
Breaking ML
Session chair: Michael Weissbacher, Square
16:00 – 16:30
Evasion Attacks against Banking Fraud Detection Systems
16:30 – 17:00
The Limitations of Federated Learning in Sybil Settings
17:00 – 17:30
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems
Friday, 16 October 2020
CPS Security
Session chair: Lorenzo Cavallaro, KCL
9:00 – 9:30
PLC-Sleuth: Detecting and Localizing PLC Intrusions Using Control Invariants
9:30 – 10:00
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles
10:00 – 10:30
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems
Break
Firmware & Low Level Security
Session chair: William Robertson, Northeastern
11:00 – 11:30
μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability
11:30 – 12:00
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks
12:00 – 12:30
Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware
Break
Systems Security
Session chair: Ruoyu “Fish” Wang, ASU
13:30 – 14:00
A Framework for Software Diversification with ISA Heterogeneity
14:00 – 14:30
Confine: Automated System Call Policy Generation for Container Attack Surface Reduction
14:30 – 15:00
sysfilter: Automated System Call Filtering for Commodity Software
15:00 – 15:30
Closing remarks