The 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), previously known as Recent Advances in Intrusion Detection, aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. RAID 2018 will be held in Heraklion, Crete, Greece on 10-12 September 2018

Since its inception in 1997, RAID has established itself as a venue where leading researchers and practitioners are given the opportunity to present novel research in a unique venue to an engaged and lively community. Attendees are from prestigious universities, government, and high technology companies all over the world.

Attendees typically include:

  • Researchers working in the field of computer and information security
  • Academics studying the field of cyber security
  • Incident response and security teams with responsibility for coordinating computer security
  • Technical staff who determine security product needs and implement solutions
  • Anyone wanting to learn more about computer security in general

IOSec 2018 (CIPSEC Workshop) and 1st SMESEC Workshop are co-located with RAID2018


RAID 2018 proceedings are published by Springer in the Lecture Notes in Computer Science series (LNCS, volume 11050). You can access the online version by clicking the proceedings cover image.




Travel Grant Sponsor

Important Dates

Submission Deadline: March 28 extended to April 3, 2018, 7:59:59am EDT
Notification to Authors: May 29, 2021
Camera Ready Deadline: June 29, 2021
Conference: September 10-12, 2018

Call for papers

RAID 2018 is soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them, or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:

  • Computer, network, and cloud computing security
  • Malware and unwanted software
  • Program analysis and reverse engineering
  • Mobile Security
  • Web security and privacy
  • Vulnerability analysis techniques
  • Usable security and privacy
  • Intrusion detection and prevention
  • Hardware security
  • Cyber physical systems security and threats against critical infrastructures
  • IoT security
  • Statistical and adversarial learning for computer security
  • Cyber crime and underground economies
  • Denial-of-Service attacks
  • Security measurement studies
  • Digital forensics

The RAID conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.

Submission Guidelines

Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. Papers can be submitted on the following web site: https://raid18.syssec.rub.de/

Reviewing will be double-blind, meaning the authors’ identities will be hidden from the reviewers. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, and should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not anonymized will not be reviewed.

Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM (see http://www.acm.org/publications/policies/ ).

Papers accepted by the Program Committee will be presented at RAID 2018 and included in the Symposium’s proceedings published by Springer in its Lecture Notes in Computer Science series.

Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee co-chairs.

Authors, please remember that each paper must have a Regular registration associated with it.

In the same archive with the camera-ready version of your paper, you need to include a signed Consent to Publish Form for transferring the copyrights of your paper to the publisher. The form can be downloaded from this link

Co-located Events

International workshop on Information & Operational Technology (IT & OT) security systems

IOSec 2018

More Info

SMESec workshop
1st SMESEC Workshop
More Info


Organizing Committee

General Chair: Sotiris Ioannidis, Foundation for Research and Technology - Hellas
Program Committee Chair: Michael Bailey, University of Illinois at Urbana Champaign
Program Committee Co-Chair: Thorsten Holz, Ruhr-Universität Bochum
Publication & Travel Grant Chair: Manolis Stamatogiannakis, Vrije Universiteit Amsterdam
Publicity Chair: Michalis Polychronakis, Stony Brook University
Local Arrangement Chair: Ioannis Askoxylakis, Foundation for Research and Technology - Hellas
Sponsor Chair: Ioannis Askoxylakis, Foundation for Research and Technology - Hellas

Program Committee

Sadia Afroz University of California at Berkeley
Magnus Almgren Chalmers University of Technology
Johanna Amann International Computer Science Institute
Leyla Bilge Symantec
Srdjan Capkun ETH Zurich
Lorenzo Cavallaro Royal Holloway, University of London
Lucas Davi University Duisburg-Essen
Tudor Dumitras University of Maryland
Zakir Durumeric Stanford University and Zcorp
Manuel Egele Boston University
Roya Ensafi University of Michigan
Giulia Fanti Carniegie Mellon University
Carrie Gates Securelytix
Jon Giffin Google LLC
Guofei Gu Texas A&M University
Amin Kharraz University of Illinois at Urbana-Champaign
Tim Leek MIT Lincoln Laboratory
Corrado Leita Lastline
Bo Li University of Illinois at Urbana-Champaign
Fabian Monrose University of North Carolina at Chapel Hill
Benjamin Morin French Network and Information Security Agency (ANSSI)
Alina Oprea Northeastern University
Jason Polakis University of Illinois at Chicago
Christina Pöpper New York University
William Robertson Northeastern University
Brendan Saltaformaggio Georgia Institute of Technology
Angelos Stavrou George Mason University
Kurt Thomas Google LLC
Eric Wustrow University of Colorado Boulder
Dongyun Xu Purdue University
Vaibhav Rastogi University of Wisconsin-Madison

Steering Committee

Johanna Amann: International Computer Science Institute
Davide Balzarotti: Eurecom Graduate School and Research Center
Marc Dacier: Eurecom Graduate School and Research Center
Zhiqiang Lin: University of Texas at Dallas
Mathias Payer: Purdue University
Michalis Polychronakis: Stony Brook University
Salvatore Stolfo: Columbia University
Angelos Stavrou: George Mason University


Sponsorship Opportunities

The 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID) seeks sponsorships for its upcoming event to be held in Heraklion, Crete, Greece on 10-12 September 2018. Well-attended and favorably reviewed, past symposiums have attracted more than 200 participants from around the world. Please contact the Sponsor Chair for sponsorship inquiries.

GrowthDevil is one of our sponsors. Growth Devil helping all Amazon & Walmart Sellers by proiving discount on Amazon FBA Tools Like Helium 10, Jungle Scout, Viral Launch. All Participants, Volunteers, Amazon Sellers can redeem 2022 Helium 10 Coupons & Jungle Scout Coupon from here.

Sponsorship Levels

Gold Sponsorships – Suggested donation USD 25,000.00

Gold sponsors receive exceptional visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.

Sponsorship benefits include:

  • Logo featured prominently on the Symposium web site
  • Advance access to attendees who opt-in for contact with supporters
  • One table at poster event or similar marked with supporter’s name, logo, and promotional materials
  • Tabletop exhibit space at the Symposium if desired
  • All badges for attendees from the organization marked “Gold Supporter” (up to 10 people)

Silver Sponsorships – Suggested donation USD 10,000.00

Silver sponsors receive excellent visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.

Sponsorship benefits include:

  • Logo featured on the Symposium web site
  • Advance access to attendees who opt-in for contact with supporters
  • One table at poster event or similar marked with supporter’s name, logo, and promotional materials
  • All badges for attendees from the organization marked “Silver Donor” (up to 4 people)

Bronze Sponsorships – Suggested donation USD 5,000.00

Bronze sponsors receive excellent visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.

Sponsorship benefit include:

  • Logo featured on the Symposium web site
  • Advance access to attendees who opt-in for contact with supporters
  • All badges for attendees from the organization marked “Bronze Donor” (up to 2 people)

Conference Program

A printable version can be downloaded from this link




Welcome remarks


Session 1: Attacks

Proteus: Detecting Android Emulators from Instruction-level Profiles

Onur Sahin,Ayse K. Coskun ,Manuel Egele (Boston University)

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

laudio Rizzo, Johannes Kinder, Lorenzo Cavallaro (Royal Holloway, University of London)

Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer

Andrei Tatar, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida (Vrije Universiteit Amsterdam)


Coffee Break


Session 2: Intrusion detection and prevention

Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails

Hugo Gascon (TU Braunschweig), Steffen Ulrich(Genua GmbH), Benjamin Stritter (University of Erlangen-Nuremberg ), Konrad Rieck( TU Braunschweig )

Backdoors: Definition, Deniability and Detection

Sam L. Thomas (University of Birmingham), Aurélien Francillon (EURECOM)

RWGuard: A Real-time Detection System Against Cryptographic Ransomware

Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino (Purdue University)


Lunch Break


Session 3: DDoS attacks

DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives

Jonas Bushart, Christian Rossow( CISPA, Saarland University)

Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures

Menghao Zhang, Guanyu Li, Jun Bi, Jiasong Bai (Tsinghua University), Lei Xu, Guofei Gu( Texas A&M; University)

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids

Johanna Ullrich, Nicholas Stifter,Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl (SBA Research)


Coffee Break


Session 4: Passwords, Accounts, and Users

Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum

Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery, (University of Cambridge)

SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels

Binghui Wang, Le Zhang, Neil Zhenqiang Gong (Iowa State University)

GuidedPass: Guiding users to create both more memorable and strong passwords

Simon S. Woo (SUNY-Korea), Jelena Mirkovic (USC/ISI)



Welcome Event will take place at Veneto Cafe


Invited Talk

Quo Vadis? A Look at the Evolution of the Security of Web Applications

Engin Kirda, Northeastern University


Coffee Break


Session 5: Machine learning for computer security

Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg (NYU)

Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic

Mayana Pereira, Bin Yu (Infoblox Inc.), Shaun Coleman, Martine DeCock, Anderson Nascimento (University of Washington, Tacoma)

OTTer: A Scalable High-resolution Encrypted Traffic Identification Engine

Eva Papadogiannaki (Niometrics, FORTH-ICS) Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas (Niometrics)


Lunch Break


Session 6: Hardware-assisted security

Hardware Assisted Randomization of Data

Brian Belleville, Joseph Michael Nash, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz ( University of California, Irvine ), Hyungon Moon, Jangseop Shin, Dongil Hwang, Seonhwa Jung, Yunheung Paek (ECE and ISRC, Seoul National University)

MicroStache: A Hardware Enforced Abstraction for Efficient Data Isolation

Lucian Mogosanu (University POLITEHNICA of Bucharest), Ashay Rane (University of Texas at Austin), Nathan Dautenhahn (University of Pennsylvania)

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices

Chen Cao, Le Guan (The Pennsylvania State University), Ning Zhang (Virginia Polytechnic Institute and State University), Neng Gao, Jingqiang Lin (Institute of Information Engineering, CAS), Bo Luo (The University of Kansas), Peng Liu (The Pennsylvania State University), Ji Xiang (Institute of Information Engineering, CAS), Wenjing Lou (Virginia Polytechnic Institute and State University)


Coffee Break


Session 7: Software Security

PartiSan: Fast and Flexible Sanitization via Run-time Partitioning

HJulian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, Michael Franz (University of California, Irvine)

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries

Paul Muntean, Matthias Fischer, Jens Grossklags, Claudia Eckert (Technical University of Munich), Gang Tan (Penn State University), Zhiqiang Lin (The Ohio State University)

Trusted Execution Path For Protecting Java Applications Against Deserialization of Untrusted Data

Cristalli Stefano, Vignati Edoardo, Bruschi Danilo, Andrea Lanzi (University of Milan)


Gala Dinner

At 19.30(sharp), all participants will be taken by bus from the meeting venue to the dinner location at Almyra Seaside food & Cocktails. At the end of the dinner, buses will take participants back to the meeting venue.
Meeting point : outside of the north entrance of Megaron hotel (Efessou Str.)


Session 8: Malware

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence

Jialong Zhang, Jiyong Jang, Marc Ph. Stoecklin, Jialong Zhang (IBM Research), Guofei Gu (Texas A&M; University), Xin Hu (Pinterest, Inc.)

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

Ishai Rosenberg,Asaf Shabtai,Yuval Elovici, Lior Rokach (Software and Information Systems Engineering Department, Ben Gurion University of Israel)

Next Generation P2P Botnets: Monitoring under Adverse Conditions

Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser (Technische Universität Darmstadt), Shankar Karuppayah (Universiti Sains Malaysia)


Coffee Break


Session 9: IoT/CPS security

Malicious IoT Implants: Tampering with Serial Communication over the Internet

Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg)

Before Toasters Rise Up: A View Into the Emerging IoT Threat Landscape

Pierre-Antoine Vervier, Yun Shen (Symantec Research Labs)

Statistical Similarity of Critical Infrastructure Network Traffic based on Nearest Neighbor Distances

Jeong-Han Yun, Woomyo Lee, Sin-Kyu Kim,Jeong-Han Yun (The Affiliated Institute of ETRI), Yoonho Hwang, Hee-Kap Ahn (Dept. of Computer Science and Engineering, POSTECH)


Lunch Break


Community Service Award

Prof. Marc Dacier


Session 10: Security measurements

PostScript Undead: Pwning the Web with a 35 year old Language

Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk (Ruhr-University Bochum)

Identifying Key Leakage of Bitcoin Users

Sichael Brengel, Christian Rossow (CISPA, Saarland University)


Coffee Break


Session 11: Defenses

Furnace: Self-Service Tenant VMI for the Cloud

Micah Bushouse, Douglas Reeves (North Carolina State University)

ShadowMonitor: An Effective in-VM Monitoring Framework with Hardware-enforced Isolation

Bin Shi (Beihang University)

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

zhi zhang (CSIRO and UNSW, Australia), Yueqiang Cheng(Baidu USA Xlab), Surya Nepal (CSIRO, Australia), Dongxi Liu (CSIRO, Australia), Fethi Rabhi (UNSW, Australia ), Qingni Shen (MoE Key Lab of Network and Software Assurance, Peking University)


Closing remarks


Visit to the Archaeological Museum of Heraklion


GDM Megaron hotel

9, D. Beaufort, 71202, Heraklion - Crete - Greece

Special rates are offered to RAID 2018 participants (subject to availability) trough the Conference registration process, which also provides accomodation requests by:

CCBS GREECE P.C. Cretan Conference and Business Services P.C
6 Pediados Str, 71201, Heraklion GR
Tel: +30 2810 331010, Fax: +30 2810 330606

How to get to Heraklion, Crete

  • By air: The airport Nikos Kazantzakis (airport Code: HER http://www.heraklion-airport.info/) is the only one in Heraklion. Heraklion has about 5 direct flights per day from Athens (ATH) and 2 direct flights per day from Thessaloniki (SKG). You can go to city center by taxi (15min) or by Bus. There are also a number of car rental companies located in the airport.
  • By sea: Heraklion harbor is located close to the city. There are two major shipping companies on the line: Athens-Heraklion. Minoan lines and ANEK lines provide daily service from and towards Crete. There are taxis available as well as buses near the harbor. If you would like to rent a car, you will find a number of rental agencies in the city center (15-20 minutes’ walk or 2 minutes by taxi).


400 Early registration (before 22/07/18)
500 Late registration (after 22/07/18)


200 Early registration (before 22/07/18)
300 Late registration (after 22/07/18)


Accepted payment methods are with credit/debit card (Visa or Mastercard only) or by bank transfer. A cancellation fee of €50 applies. No cancellation will be allowed after July 30th, 2018. If you cannot attend you may transfer the registration to another person.

Authors, please remember that each paper must have a Regular registration associated with it.

Raid2018 registars can also attend the co-located events.

Contact Us

Organizing Committee: raid2018 [at] ics.forth.gr
Program Committee Chairs: raid2018-pc-chairs [at] ics.forth.gr
Publication & Travel Grant Chair: raid2018-publication-chair [at] ics.forth.gr
Publicity Chair: raid2018-publicity-chair [at] ics.forth.gr
Sponsor Chair: raid2018-sponsor-chair [at] ics.forth.gr
Poster Chair: raid2018-poster-chair [at] ics.forth.gr