RAID 2022 is going to be held in-person, only. 
        Instructions for traveling to Cyprus and reaching the venue can be found here  . 
         
 If you need an invitation letter for travelling to Cyprus, please, contact the Chairs at    raid2022@ucy.onmicrosoft.com  .
    Micro-architectural attacks: from CPU to browser
Clémentine Maurice
Abstract: Hardware is often considered as an abstract layer that behaves correctly, just executing instructions and outputing a result. However, the internal state of the hardware leaks information about the programs that are executing, paving the way for covert or side-channel attacks. Many micro-architecural components can be used for such attacks; in particular, the CPU cache has been a target highly studied in the last years. In this presentation, we will first cover the evolution of micro-architectural attacks, having a look at a historical recap of past attacks and how the field evolved in the last years. We will then focus on how to mount these attacks from web browsers. Indeed, micro-architectural attacks require precisely monitoring low-level hardware features. In contrast, browsers only provide high-level sandboxed languages with a limited set of functions. Porting these attacks to the web thus exposes a series of challenges.
| 8:30 - 9:00 | Registration | |
| 9:00 - 9:30 | Opening | |
| 9:30 - 10:30 | Keynote | |
| 10:30 - 11:00 | Break | |
| 11:00 - 12:30 | Software Security (Chair: Michalis Polychronakis) + | |
| 
                     Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients
                      | 
              ||
| 12:30 - 14:00 | Lunch | |
| 14:00 - 15:10 | (Un?)Trusted Hardware (Chair: Tudor Dumitraș) + | |
| 
                TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone 
                  | 
          ||
| 15:10 - 15:30 | Break | |
| 15:30 - 16:40 | Blockchain Security (Chair: Ghassan Karame) + | |
| 
                 Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
                  | 
          ||
| 16:40 | End of the day | |
| 18:30-20:00 | Welcome reception | |
| 9:00 - 10:30 | Privacy & Spoofing (Chair: Leyla Bilge) + | |
| 
                     Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework 
                        | 
                ||
| 10:30 - 11:00 | Break | |
| 11:00 - 12:30 | RTFFM (Rootkits, Forensics, Firmware, Mobile) (Chair: Davide Balzarotti) + | |
| 
                  
                  What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling 
                    | 
            ||
| 12:30 - 14:00 | Lunch | |
| 14:00 - 15:10 | Network Security (Chair: Salil Kanhere) + | |
| 
                
                Mirrors in the Sky: On the Potential of Clouds in DNS-based DDoS Attacks
                  | 
          ||
| 15:10 - 15:30 | Break | |
| 15:30 - 16:40 | Robust and Trustworthy ML & Models (Chair: Brendan Dolan Gavitt) + | |
| 
                
                Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems (remote)
                  | 
          ||
| 16:40 | End of the day | |
| 17:15 (Departure from hotel) | Social Dinner | |
| 9:00 - 10:30 | Program Analysis (Chair: Elias Athanasopoulos) + | |
| 
                              
                              BinProv: Binary Code Provenance Identification without Disassembly (remote)
                                | 
                        ||
| 10:30 - 11:00 | Break | |
| 11:00 - 12:30 | Web, Phishing and Authentication (Chair: Pierre Laperdix) + | |
| 
                          
                          Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites (remote)
                            | 
                    ||
| 12:30 - 14:00 | Lunch | |
| 14:00 - 15:10 | NIDS (Chair: Marc Dacier) + | |
| 
                        
                        CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic (remote) 
                         | 
                  ||
| 15:10 - 16:45 | Closure and Drinks | |