Program

RAID 2022 is going to be held in-person, only. Instructions for traveling to Cyprus and reaching the venue can be found here .
If you need an invitation letter for traveling to Cyprus, please, contact the Chairs at chairs@raid2022.org .


Wednesday 26/10/2022

8:30 - 9:00 Registration
9:00 - 9:30 Opening
9:30 - 10:30 Keynote
10:30 - 11:00 Break
11:00 - 12:30 Software Security +

Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients

Exploiting Metaobjects to Reinforce Data Leakage Attacks

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64

Towards Deceptive Defense in Software Security with Chaff Bugs

12:30 - 14:00 Lunch
14:00 - 15:10 (Un?)Trusted Hardware +

TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone

Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs

On the Challenges of Detecting Side-Channel Attacks in SGX

15:10 - 15:30 Break
15:30 - 16:45 Blockchain Security +

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts

Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications

16:45 End of the day

Thursday 27/10/2022

9:00 - 10:30 Privacy & Spoofing +

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework

New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy

Detection of Electromagnetic Signal Injection Attacks on Actuator Systems

HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors

10:30 - 11:00 Break
11:00 - 12:30 RTFFM (Rootkits, Forensics, Firmware, Mobile) +

What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots

ULTRA: Ultimate Rootkit Detection over the Air

A scalable tracing tool for non-rooted and off-the-shelf Android phones

12:30 - 14:00 Lunch
14:00 - 15:10 Network Security +

Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks

Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables

Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications

15:10 - 15:30 Break
15:30 - 16:45 Robust and Trustworthy ML & Models +

Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems

Transferable Graph Backdoor Attack

Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems

16:45 End of the day
18:00 - 19:30 Social Dinner

Friday 28/10/2022

9:00 - 10:30 Program Analysis +

BinProv: Binary Code Provenance Identification without Disassembly

LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework

Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks

Decap: Deprivileging Programs by Reducing Their Capabilities

10:30 - 11:00 Break
11:00 - 12:30 Web, Phishing and Authentication +

Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites

Context-Auditor: Context-sensitive Content Injection Mitigation

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS

OAuch: Exploring the Weaknesses of the OAuth 2.0 Ecosystem

12:30 - 14:00 Lunch
14:00 - 15:10 NIDS +

CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic\

Encrypted Malware Traffic Detection via Graph-based Network Analysis

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

15:10 - 16:45 Closure and Drinks