RAID 2022 is going to be held in-person, only.
Instructions for traveling to Cyprus and reaching the venue can be found here .
If you need an invitation letter for travelling to Cyprus, please, contact the Chairs at raid2022@ucy.onmicrosoft.com .
Micro-architectural attacks: from CPU to browser
Clémentine Maurice
Abstract: Hardware is often considered as an abstract layer that behaves correctly, just executing instructions and outputing a result. However, the internal state of the hardware leaks information about the programs that are executing, paving the way for covert or side-channel attacks. Many micro-architecural components can be used for such attacks; in particular, the CPU cache has been a target highly studied in the last years. In this presentation, we will first cover the evolution of micro-architectural attacks, having a look at a historical recap of past attacks and how the field evolved in the last years. We will then focus on how to mount these attacks from web browsers. Indeed, micro-architectural attacks require precisely monitoring low-level hardware features. In contrast, browsers only provide high-level sandboxed languages with a limited set of functions. Porting these attacks to the web thus exposes a series of challenges.
8:30 - 9:00 | Registration | |
9:00 - 9:30 | Opening | |
9:30 - 10:30 | Keynote | |
10:30 - 11:00 | Break | |
11:00 - 12:30 | Software Security (Chair: Michalis Polychronakis) + | |
Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
|
||
12:30 - 14:00 | Lunch | |
14:00 - 15:10 | (Un?)Trusted Hardware (Chair: Tudor Dumitraș) + | |
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone
|
||
15:10 - 15:30 | Break | |
15:30 - 16:40 | Blockchain Security (Chair: Ghassan Karame) + | |
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
|
||
16:40 | End of the day | |
18:30-20:00 | Welcome reception |
9:00 - 10:30 | Privacy & Spoofing (Chair: Leyla Bilge) + | |
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework
|
||
10:30 - 11:00 | Break | |
11:00 - 12:30 | RTFFM (Rootkits, Forensics, Firmware, Mobile) (Chair: Davide Balzarotti) + | |
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling
|
||
12:30 - 14:00 | Lunch | |
14:00 - 15:10 | Network Security (Chair: Salil Kanhere) + | |
Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks
|
||
15:10 - 15:30 | Break | |
15:30 - 16:40 | Robust and Trustworthy ML & Models (Chair: Brendan Dolan Gavitt) + | |
Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems (remote)
|
||
16:40 | End of the day | |
17:15 (Departure from hotel) | Social Dinner |
9:00 - 10:30 | Program Analysis (Chair: Elias Athanasopoulos) + | |
BinProv: Binary Code Provenance Identification without Disassembly (remote)
|
||
10:30 - 11:00 | Break | |
11:00 - 12:30 | Web, Phishing and Authentication (Chair: Pierre Laperdix) + | |
Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites (remote)
|
||
12:30 - 14:00 | Lunch | |
14:00 - 15:10 | NIDS (Chair: Marc Dacier) + | |
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic (remote)
|
||
15:10 - 16:45 | Closure and Drinks |