


default search action
28th RAID 2025: Gold Coast, Australia
- 28th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2025, Gold Coast, Australia, October 19-22, 2025. IEEE 2025, ISBN 979-8-3315-6603-6

- Shuchao Pang, Zhigang Lu, Haichen Wang, Peng Fu, Yongbin Zhou, Minhui Xue:

Reconstruction of Differentially Private Text Sanitization via Large Language Models. 1-17 - Fengxu Yang, Paizhuo Chen, Yihui Yan, Zhice Yang:

An In-model Spy in Edge Intelligence. 18-34 - Di Cao, Shigang Liu, Jun Zhang, Yang Xiang:

VulCodeMark: Adaptive Watermarking for Vulnerability Datasets Protection. 35-49 - Jiachen Li, Bang Wu, Xiaoyu Xia, Xiaoning Liu, Xun Yi, Xiuzhen Zhang:

Unsupervised Backdoor Detection and Mitigation for Spiking Neural Networks. 50-64 - Alexandru Ionita, Andreea Ionita:

Functional Encryption in Secure Neural Network Training: Data Leakage and Practical Mitigations. 65-76 - Shiwu Zhao, Ningjun Zheng, Haoyu Li, Ruizhi Feng, Xingchen Chen, Ru Tan, Qixu Liu:

DEPHP: A Source Code Recovery Method for PHP Bytecode with Improved Structural Analysis. 77-91 - Joseph Bursey, Ardalan Amiri Sani, Zhiyun Qian:

SyzRetrospector: A Large-Scale Retrospective Study of Syzbot. 92-105 - Marius Fleischer, Harrison Green, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:

SyzGrapher: Resource-Centric Graph-Based Kernel Fuzzing. 106-121 - Jonas Röckl, Julian Funk, Matti Schulze, Tilo Müller:

SH3ARS: Privilege Reduction for ARMv8.0-A Secure Monitors. 122-137 - Arunkumar Bhattar, Liyi Li, Mingwei Zhu, Le Chang, Aravind Machiry:

TypeFlexer: Type Directed Flexible Program Partitioning. 138-157 - Brian Singer, Yusuf Saquib, Lujo Bauer, Vyas Sekar:

Perry: A High-level Framework for Accelerating Cyber Deception Experimentation. 158-173 - Muhammad Adil Inam, Jonathan Oliver, Raghav Batta, Adam Bates:

Carbon Filter: Scalable, Efficient, and Secure Alert Triage for Endpoint Detection & Response. 174-189 - Teng Li, Shengkai Zhang, Yebo Feng, Jiahua Xu, Zexu Dang, Yang Liu, Jianfeng Ma:

STGraph: Spatio-Temporal Graph Mining for Anomaly Detection in Distributed System Logs. 190-203 - Xiaoli Zhang, Yue Xiao, Qilei Yin, Zhengyang Li, Xinyan Wang, Jianrong Zhang, Ke Xu, Qi Li, Xu-Cheng Yin:

Detecting and Adapting to Stealthy Label-Inversion Drifts via Conditional Distribution Inference. 204-219 - Jiangtao Ding, Junli Zheng, Chengyang Mo, Zhicheng Xu, Hongbing Cheng:

NIDP: Solving Feature Distribution Shifts in Network Intrusion Detection via Neural Pruning. 220-232 - Zhen Lei, Nian Xue, Zhen Li, Dan Yu, Xin Huang, Yongle Chen:

DeepFW: A DNN-Based Firmware Version Identification Framework for Online IoT Devices. 233-247 - Qixiao Lin, Jian Mao, Ziwen Liu, Zhenkai Liang:

TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home Systems. 248-265 - Gabriel K. Gegenhuber, Maximilian Günther, Markus Maier, Aljosha Judmayer, Florian Holzbauer, Philipp É. Frenzel, Johanna Ullrich:

Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant Messengers. 266-283 - Woojin Jeon, Chaejin Lim, Hyoungshick Kim:

When (Inter)actions Speak Louder Than (Pass)words: Task-Based Evaluation of Implicit Authentication in Virtual Reality. 284-297 - Guanchong Huang, Yan He, Shangqing Zhao, Yi Wu, Song Fang:

MotionDecipher: General Video-assisted Passcode Inference In Virtual Reality. 298-313 - Andrea Oliveri, Davide Balzarotti:

A Comprehensive Quantification of Inconsistencies in Memory Dumps. 314-328 - Yang Liu, Zisen Xu, Zian Luo, Jin'ao Shang, Shilong Zhang, Haichuan Zhang, Ting Liu:

MuSAR: Multi-Step Attack Reconstruction from Lightweight Security Logs via Event-Level Semantic Association in Multi-Host Environments. 329-348 - Babangida Bappah, Lauren G. Bristol, Lamine Noureddine, Sideeq Bello, Umar Farooq, Aisha I. Ali-Gombe:

Exploring Runtime Evolution in Android: A Cross-Version Analysis and Its Implications for Memory Forensics. 349-362 - Lorenzo Pisu, Davide Balzarotti, Davide Maiorca, Giorgio Giacinto:

{{alert('CSTI')}}: Large-Scale Detection of Client-Side Template Injection. 363-377 - Huixin Wang, Amin Sakzad, Stuart W. Hall:

Deep Learning-Based Attacks on Traditional Watermarking Systems in Real-Time Live Video Streams. 378-390 - Zeeshan Zulkifl Shah, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar:

Deception Meets Diagnostics: Deception-based Real-Time Threat Detection in Healthcare Web Systems. 391-410 - Xuezixiang Li, Lian Gao, Sheng Yu, Yu Qu, Heng Yin:

On the Effectiveness of Custom Transformers for Binary Analysis. 411-424 - Qingyuan Hu, Christopher M. Poskitt, Jun Sun, Yuqi Chen:

Developing a Strong CPS Defender: An Evolutionary Approach. 425-439 - Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment:

Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces. 440-457 - Ahmed Lekssays, Husrev Taha Sencar, Ting Yu:

From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction. 458-473 - Qi Hao, Jie Huang, Changhao Ding, Zeping Zhang:

Semantic Heat Guided Relational Privacy Inference Based on Panoptic Scene Graph. 474-487 - Athanasios Avgetidis, Aaron Faulkenberry, Boladji Vinny Adjibi, Tillson Galloway, Panagiotis Kintis, Omar Alrawi, Zane Ma, Fabian Monrose, Angelos D. Keromytis, Roberto Perdisci, Manos Antonakakis:

From Concealment to Exposure: Understanding the Lifecycle and Infrastructure of APT Domains. 488-505 - Arthur Drichel, Ulrike Meyer:

The Persistent Threat of DGA-Domains Used by Botnets. 506-522 - Sébastien Kilian, Valérie Viet Triem Tong, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, Natan Talon, Pierre-Victor Besson, Helene Orsini, Pierre Lledo, Pierre-François Gimenez:

CasinoLimit: An Offensive Dataset Labeled with MITRE ATT&CK Techniques. 523-537 - Yin Minn Pa Pa, Yuji Sekine, Yamato Kawaguchi, Tatsuki Yogo, Kelvin Lubbertsen, Rolf van Wegberg, Michel van Eeten, Katsunari Yoshioka:

A Longitudinal Analysis of LockBit 3.0's Extortion Lifecycle and Response to Law Enforcement. 538-551 - Yasir Ech-Chammakhy, Anas Motii, Anass Rabii, Jaafar Chbili:

EventHunter: Dynamic Clustering and Ranking of Security Events from Hacker Forum Discussions. 552-565 - Wei Song, Yulei Sui, Zhenchang Xing, Liming Zhu, Jingling Xue:

ViDToken: A Video-Transformer-Based Latent Token Defense for Adversarial Video Detection. 566-582 - Yuesen Tang, Yuanyang Zhang, Wangxiao Mao, Li Yao:

Robust Cross-Modal Deepfake Detection via Facial UV Maps and Momentum Contrastive Learning. 583-596 - Fuqi Qi, Haichang Gao, Boling Li, Shiping Guo, Yuming Zheng, Bingqian Zhou:

BadLogo: A Physically Realizable Adversarial Sticker for Evaluating the Robustness of Face Recognition Models. 597-610 - Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen:

The Adaptive Arms Race: Redefining Robustness in AI Security. 611-628 - Leo Hyun Park, Taekyoung Kwon:

Red-Teaming LLMs with Token Control Score: Efficient, Universal, and Transferable Jailbreaks. 629-647 - Paventhan Vivekanandan, Alexander Shroyer, Martin Swany:

Malware and Vulnerability Analysis using Graph-synchronized Language Model. 648-663 - Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li:

Demystifying Feature Engineering in Malware Analysis of API Call Sequences. 664-677 - Elizabeth Wyss, Dominic Tassio, Lorenzo De Carli, Drew Davidson:

Evaluating LLM-Based Detection of Malicious Package Updates in npm. 678-692 - Md Tanvirul Alam, Aritran Piplai, Nidhi Rastogi:

ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection. 693-712 - Dario Ferrero, Georgios Smaragdakis, Harm Griffioen:

Revealing Informed Scanners by Colocating Reactive and Passive Telescopes. 713-727 - Mohammadreza Najafi, Hooman Alavizadeh, Ahmad Salehi Shahraki, A. S. M. Kayes, Wenny Rahayu:

PRIV-HFL: Privacy-Preserving and Robust Federated Learning for Heterogeneous Clients Against Data Reconstruction Attacks. 728-740 - Anxiao Song, Shujie Cui, Jianli Bai, Ke Cheng, Yulong Shen, Giovanni Russello:

Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on Vertical Dataset. 741-756 - Xiaofei Huang, Xiaojie Zhu, Chi Chen, Paulo Esteves Veríssimo:

Re-examine Federated Rank Learning: Analyzing Its Robustness Against Poisoning Attacks. 757-772 - Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen:

BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning. 773-788 - Thirasara Ariyarathna, Salil S. Kanhere, Meisam Mohammady, Hye-Young Paik:

FedSIG: Privacy-Preserving Federated Recommendation via Synthetic Interaction Generation. 789-800 - Haoran Li, Dakun Shen, Wenbo Shen, Zhen Zhu:

Portal: Enabling Accurate Siemens PLC Rehosting via Peripheral Proxying and Proactive Interrupt Synchronization. 801-814 - Jesse Spielman, David F. Oswald, Mark Dermot Ryan, Jo Van Bulck:

Activation Functions Considered Harmful: Recovering Neural Network Weights through Controlled Channels. 815-834 - Anna Pätschke, Jan Wichelmann, Thomas Eisenbarth:

Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving. 835-849 - Hui Zhuang, Yan Long, Kevin Fu:

RF-Eye-D: Probing Feasibility of CMOS Camera Watermarking with Radio-Frequency Injection. 850-865 - Nuntipat Narkthong, Yukui Luo, Xiaolin Xu:

ShuffleV: A Microarchitectural Defense Strategy against Electromagnetic Side-Channel Attacks in Microprocessors. 866-885 - Lucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier:

Overlapping IPv4, IPv6, and TCP data: exploring errors, test case context, and multiple overlaps inside network stacks and NIDSes with Pyrolyse. 886-904 - Nazatul H. Sultan, Xinlong Guan, Josef Pieprzyk, Wei Ni, Sharif Abuadbba, Hajime Suzuki:

Active Attack Resilience in 5G: A New Take on Authentication and Key Agreement. 905-919 - Anthony Gavazzi, Weixin Kong, Engin Kirda:

H2Fuzz: Guided, Black-box, Differential Fuzzing for HTTP/2-to-HTTP/1 Conversion Anomalies. 920-934 - Chris Tsoukaladelis, Roberto Perdisci, Nick Nikiforakis:

Uncontained Danger: Quantifying Remote Dependencies in Containerized Applications. 935-949 - Qingwang Chen, Ru Tan, Xinyu Liu, Yuqi Shu, Zhou Tong, Haoqiang Wang, Ze Jin, Qixu Liu:

RBAClock: Contain RBAC Permissions through Secure Scheduling. 950-965 - Nhu Long Nguyen, Nickolas J. G. Falkner, Hung Nguyen:

Scalable Active Directory Defense with α-Metagraph. 966-985

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














