About
The 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), previously known as Recent Advances in Intrusion Detection, aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. RAID 2018 will be held in Heraklion, Crete, Greece on 10-12 September 2018
Since its inception in 1997, RAID has established itself as a venue where leading researchers and practitioners are given the opportunity to present novel research in a unique venue to an engaged and lively community. Attendees are from prestigious universities, government, and high technology companies all over the world.
Attendees typically include:
- Researchers working in the field of computer and information security
- Academics studying the field of cyber security
- Incident response and security teams with responsibility for coordinating computer security
- Technical staff who determine security product needs and implement solutions
- Anyone wanting to learn more about computer security in general
IOSec 2018 (CIPSEC Workshop) and 1st SMESEC Workshop are co-located with RAID2018
Proceedings
Important Dates
Submission Deadline: |
|
Notification to Authors: | |
Camera Ready Deadline: | |
Conference: |
Call for papers
RAID 2018 is soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them, or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:
- Computer, network, and cloud computing security
- Malware and unwanted software
- Program analysis and reverse engineering
- Mobile Security
- Web security and privacy
- Vulnerability analysis techniques
- Usable security and privacy
- Intrusion detection and prevention
- Hardware security
- Cyber physical systems security and threats against critical infrastructures
- IoT security
- Statistical and adversarial learning for computer security
- Cyber crime and underground economies
- Denial-of-Service attacks
- Security measurement studies
- Digital forensics
The RAID conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.
Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.
Submission Guidelines
Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. Papers can be submitted on the following web site: https://raid18.syssec.rub.de/
Reviewing will be double-blind, meaning the authors’ identities will be hidden from the reviewers. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, and should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not anonymized will not be reviewed.
Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM (see http://www.acm.org/publications/policies/ ).
Papers accepted by the Program Committee will be presented at RAID 2018 and included in the Symposium’s proceedings published by Springer in its Lecture Notes in Computer Science series.
Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee co-chairs.
Authors, please remember that each paper must have a Regular registration associated with it.
In the same archive with the camera-ready version of your paper, you need to include a signed Consent to Publish Form for transferring the copyrights of your paper to the publisher. The form can be downloaded from this link
Committees
Organizing Committee
General Chair: | Sotiris Ioannidis, Foundation for Research and Technology - Hellas |
Program Committee Chair: | Michael Bailey, University of Illinois at Urbana Champaign |
Program Committee Co-Chair: | Thorsten Holz, Ruhr-Universität Bochum |
Publication & Travel Grant Chair: | Manolis Stamatogiannakis, Vrije Universiteit Amsterdam |
Publicity Chair: | Michalis Polychronakis, Stony Brook University |
Local Arrangement Chair: | Ioannis Askoxylakis, Foundation for Research and Technology - Hellas |
Sponsor Chair: | Ioannis Askoxylakis, Foundation for Research and Technology - Hellas |
Program Committee
Sadia Afroz | University of California at Berkeley |
Magnus Almgren | Chalmers University of Technology |
Johanna Amann | International Computer Science Institute |
Leyla Bilge | Symantec |
Srdjan Capkun | ETH Zurich |
Lorenzo Cavallaro | Royal Holloway, University of London |
Lucas Davi | University Duisburg-Essen |
Tudor Dumitras | University of Maryland |
Zakir Durumeric | Stanford University and Zcorp |
Manuel Egele | Boston University |
Roya Ensafi | University of Michigan |
Giulia Fanti | Carniegie Mellon University |
Carrie Gates | Securelytix |
Jon Giffin | Google LLC |
Guofei Gu | Texas A&M University |
Amin Kharraz | University of Illinois at Urbana-Champaign |
Tim Leek | MIT Lincoln Laboratory |
Corrado Leita | Lastline |
Bo Li | University of Illinois at Urbana-Champaign |
Fabian Monrose | University of North Carolina at Chapel Hill |
Benjamin Morin | French Network and Information Security Agency (ANSSI) |
Alina Oprea | Northeastern University |
Jason Polakis | University of Illinois at Chicago |
Christina Pöpper | New York University |
William Robertson | Northeastern University |
Brendan Saltaformaggio | Georgia Institute of Technology |
Angelos Stavrou | George Mason University |
Kurt Thomas | Google LLC |
Eric Wustrow | University of Colorado Boulder |
Dongyun Xu | Purdue University |
Vaibhav Rastogi | University of Wisconsin-Madison |
Steering Committee
Johanna Amann: | International Computer Science Institute |
Davide Balzarotti: | Eurecom Graduate School and Research Center |
Marc Dacier: | Eurecom Graduate School and Research Center |
Zhiqiang Lin: | University of Texas at Dallas |
Mathias Payer: | Purdue University |
Michalis Polychronakis: | Stony Brook University |
Salvatore Stolfo: | Columbia University |
Angelos Stavrou: | George Mason University |
Sponsorship
Sponsorship Opportunities
The 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID) seeks sponsorships for its upcoming event to be held in Heraklion, Crete, Greece on 10-12 September 2018. Well-attended and favorably reviewed, past symposiums have attracted more than 200 participants from around the world. Please contact the Sponsor Chair for sponsorship inquiries.
GrowthDevil is one of our sponsors. Growth Devil helping all Amazon & Walmart Sellers by proiving discount on Amazon FBA Tools Like Helium 10, Jungle Scout, Viral Launch. All Participants, Volunteers, Amazon Sellers can redeem 2022 Helium 10 Coupons & Jungle Scout Coupon from here.
Sponsorship Levels
Gold Sponsorships – Suggested donation USD 25,000.00
Gold sponsors receive exceptional visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.
Sponsorship benefits include:
- Logo featured prominently on the Symposium web site
- Advance access to attendees who opt-in for contact with supporters
- One table at poster event or similar marked with supporter’s name, logo, and promotional materials
- Tabletop exhibit space at the Symposium if desired
- All badges for attendees from the organization marked “Gold Supporter” (up to 10 people)
Silver Sponsorships – Suggested donation USD 10,000.00
Silver sponsors receive excellent visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.
Sponsorship benefits include:
- Logo featured on the Symposium web site
- Advance access to attendees who opt-in for contact with supporters
- One table at poster event or similar marked with supporter’s name, logo, and promotional materials
- All badges for attendees from the organization marked “Silver Donor” (up to 4 people)
Bronze Sponsorships – Suggested donation USD 5,000.00
Bronze sponsors receive excellent visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.
Sponsorship benefit include:
- Logo featured on the Symposium web site
- Advance access to attendees who opt-in for contact with supporters
- All badges for attendees from the organization marked “Bronze Donor” (up to 2 people)
Conference Program
A printable version can be downloaded from this link
08:00-08:45
Registration
08:45-09:00
Welcome remarks
09:00-10:30
Session 1: Attacks
Proteus: Detecting Android Emulators from Instruction-level Profiles
Onur Sahin,Ayse K. Coskun ,Manuel Egele (Boston University)
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews
laudio Rizzo, Johannes Kinder, Lorenzo Cavallaro (Royal Holloway, University of London)
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer
Andrei Tatar, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida (Vrije Universiteit Amsterdam)
10:30-11:00
Coffee Break
11:00-12:30
Session 2: Intrusion detection and prevention
Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails
Hugo Gascon (TU Braunschweig), Steffen Ulrich(Genua GmbH), Benjamin Stritter (University of Erlangen-Nuremberg ), Konrad Rieck( TU Braunschweig )
Backdoors: Definition, Deniability and Detection
Sam L. Thomas (University of Birmingham), Aurélien Francillon (EURECOM)
RWGuard: A Real-time Detection System Against Cryptographic Ransomware
Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino (Purdue University)
12:30-13:30
Lunch Break
13:30-15:00
Session 3: DDoS attacks
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives
Jonas Bushart, Christian Rossow( CISPA, Saarland University)
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures
Menghao Zhang, Guanyu Li, Jun Bi, Jiasong Bai (Tsinghua University), Lei Xu, Guofei Gu( Texas A&M; University)
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids
Johanna Ullrich, Nicholas Stifter,Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl (SBA Research)
15:00-15:30
Coffee Break
15:30-17:00
Session 4: Passwords, Accounts, and Users
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum
Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery, (University of Cambridge)
SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
Binghui Wang, Le Zhang, Neil Zhenqiang Gong (Iowa State University)
GuidedPass: Guiding users to create both more memorable and strong passwords
Simon S. Woo (SUNY-Korea), Jelena Mirkovic (USC/ISI)
09:30-10:30
Invited Talk
Quo Vadis? A Look at the Evolution of the Security of Web Applications
Engin Kirda, Northeastern University
10:30-11:00
Coffee Break
11:00-12:30
Session 5: Machine learning for computer security
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg (NYU)
Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic
Mayana Pereira, Bin Yu (Infoblox Inc.), Shaun Coleman, Martine DeCock, Anderson Nascimento (University of Washington, Tacoma)
OTTer: A Scalable High-resolution Encrypted Traffic Identification Engine
Eva Papadogiannaki (Niometrics, FORTH-ICS) Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas (Niometrics)
12:30-13:30
Lunch Break
13:30-15:00
Session 6: Hardware-assisted security
Hardware Assisted Randomization of Data
Brian Belleville, Joseph Michael Nash, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz ( University of California, Irvine ), Hyungon Moon, Jangseop Shin, Dongil Hwang, Seonhwa Jung, Yunheung Paek (ECE and ISRC, Seoul National University)
MicroStache: A Hardware Enforced Abstraction for Efficient Data Isolation
Lucian Mogosanu (University POLITEHNICA of Bucharest), Ashay Rane (University of Texas at Austin), Nathan Dautenhahn (University of Pennsylvania)
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices
Chen Cao, Le Guan (The Pennsylvania State University), Ning Zhang (Virginia Polytechnic Institute and State University), Neng Gao, Jingqiang Lin (Institute of Information Engineering, CAS), Bo Luo (The University of Kansas), Peng Liu (The Pennsylvania State University), Ji Xiang (Institute of Information Engineering, CAS), Wenjing Lou (Virginia Polytechnic Institute and State University)
15:00-15:30
Coffee Break
15:30-17:00
Session 7: Software Security
PartiSan: Fast and Flexible Sanitization via Run-time Partitioning
HJulian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, Michael Franz (University of California, Irvine)
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries
Paul Muntean, Matthias Fischer, Jens Grossklags, Claudia Eckert (Technical University of Munich), Gang Tan (Penn State University), Zhiqiang Lin (The Ohio State University)
Trusted Execution Path For Protecting Java Applications Against Deserialization of Untrusted Data
Cristalli Stefano, Vignati Edoardo, Bruschi Danilo, Andrea Lanzi (University of Milan)
19:30
Gala Dinner
Meeting point : outside of the north entrance of Megaron hotel (Efessou Str.)
09:00-10:30
Session 8: Malware
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
Jialong Zhang, Jiyong Jang, Marc Ph. Stoecklin, Jialong Zhang (IBM Research), Guofei Gu (Texas A&M; University), Xin Hu (Pinterest, Inc.)
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Ishai Rosenberg,Asaf Shabtai,Yuval Elovici, Lior Rokach (Software and Information Systems Engineering Department, Ben Gurion University of Israel)
Next Generation P2P Botnets: Monitoring under Adverse Conditions
Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser (Technische Universität Darmstadt), Shankar Karuppayah (Universiti Sains Malaysia)
10:30-11:00
Coffee Break
11:00-12:30
Session 9: IoT/CPS security
Malicious IoT Implants: Tampering with Serial Communication over the Internet
Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Before Toasters Rise Up: A View Into the Emerging IoT Threat Landscape
Pierre-Antoine Vervier, Yun Shen (Symantec Research Labs)
Statistical Similarity of Critical Infrastructure Network Traffic based on Nearest Neighbor Distances
Jeong-Han Yun, Woomyo Lee, Sin-Kyu Kim,Jeong-Han Yun (The Affiliated Institute of ETRI), Yoonho Hwang, Hee-Kap Ahn (Dept. of Computer Science and Engineering, POSTECH)
12:30-13:30
Lunch Break
13:30-14:00
Community Service Award
Prof. Marc Dacier
14:00-15:00
Session 10: Security measurements
PostScript Undead: Pwning the Web with a 35 year old Language
Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk (Ruhr-University Bochum)
Identifying Key Leakage of Bitcoin Users
Sichael Brengel, Christian Rossow (CISPA, Saarland University)
15:00-15:30
Coffee Break
15:30-17:00
Session 11: Defenses
Furnace: Self-Service Tenant VMI for the Cloud
Micah Bushouse, Douglas Reeves (North Carolina State University)
ShadowMonitor: An Effective in-VM Monitoring Framework with Hardware-enforced Isolation
Bin Shi (Beihang University)
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
zhi zhang (CSIRO and UNSW, Australia), Yueqiang Cheng(Baidu USA Xlab), Surya Nepal (CSIRO, Australia), Dongxi Liu (CSIRO, Australia), Fethi Rabhi (UNSW, Australia ), Qingni Shen (MoE Key Lab of Network and Software Assurance, Peking University)
17:00
Closing remarks
18:00
Visit to the Archaeological Museum of Heraklion
Venue
GDM Megaron hotel
9, D. Beaufort, 71202, Heraklion - Crete - Greece
Special rates are offered to RAID 2018 participants (subject to availability) trough the Conference registration process, which also provides accomodation requests by:
CCBS GREECE P.C. Cretan Conference and Business Services P.C
6 Pediados Str, 71201, Heraklion GR
Tel: +30 2810 331010, Fax: +30 2810 330606
How to get to Heraklion, Crete
- By air: The airport Nikos Kazantzakis (airport Code: HER http://www.heraklion-airport.info/) is the only one in Heraklion. Heraklion has about 5 direct flights per day from Athens (ATH) and 2 direct flights per day from Thessaloniki (SKG). You can go to city center by taxi (15min) or by Bus. There are also a number of car rental companies located in the airport.
- By sea: Heraklion harbor is located close to the city. There are two major shipping companies on the line: Athens-Heraklion. Minoan lines and ANEK lines provide daily service from and towards Crete. There are taxis available as well as buses near the harbor. If you would like to rent a car, you will find a number of rental agencies in the city center (15-20 minutes’ walk or 2 minutes by taxi).
Register
Regular
Student
Accepted payment methods are with credit/debit card (Visa or Mastercard only) or by bank transfer. A cancellation fee of €50 applies. No cancellation will be allowed after July 30th, 2018. If you cannot attend you may transfer the registration to another person.
Authors, please remember that each paper must have a Regular registration associated with it.
Raid2018 registars can also attend the co-located events.
Contact Us
Organizing Committee: | raid2018 [at] ics.forth.gr |
Program Committee Chairs: | raid2018-pc-chairs [at] ics.forth.gr |
Publication & Travel Grant Chair: | raid2018-publication-chair [at] ics.forth.gr |
Publicity Chair: | raid2018-publicity-chair [at] ics.forth.gr |
Sponsor Chair: | raid2018-sponsor-chair [at] ics.forth.gr |
Poster Chair: | raid2018-poster-chair [at] ics.forth.gr |