RAID 2015

Program

Program

The conference will take place at the Kyoto Terrsa.

Monday, November 2, 2015
Tuesday, November 3, 2015
Wednesday, November 4, 2015
Thursday, November 5, 2015
Monday, November 2, 2015

Registration
08:30 - 09:00 Registration
Opening
09:00 - 09:15 Youki Kadobayashi & Herbert Bos
Keynote
09:15 - 10:15 Speaker: Mark Seaborn, Google
Break
10:15 - 10:30 Coffee Break
Session 1: Cool Stuff You Can Do With Hardware
10:30 - 11:00 Ensemble Learning for Low-level Hardware-supported Malware Detection (Public Review) [Video]
Khaled N. Khasawneh; Meltem Ozsoy; Caleb Donovick; Nael Abu-Ghazaleh; Dmitry V. Ponomarev
11:00 - 11:30 Physical-layer Detection of Hardware Keyloggers (Public Review) [Video]
Ryan M. Gerdes; Saptarshi Mallick
11:30 - 12:00 Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters (Public Review) [Video]
Clémentine Maurice; Nicolas Le Scouarnec; Christoph Neumann; Olivier Heen; Aurélien Francillon
12:00 - 12:30 Hardware-Assisted Fine-Grained Code-Reuse Attack Detection (Public Review) [Video]
Pinghai Yuan; Xuhua Ding; Qingkai Zeng
Lunch
12:30 - 14:00 Lunch (on your own)
Session 2: Networks
14:00 - 14:30 Haetae: Scaling the Performance of Network Intrusion Detection with Many-core Processors (Public Review) [Video]
Jaehyun Nam; Muhammad Jamshed; Byungkwon Choi; Dongsu Han; KyoungSoo Park
14:30 - 15:00 Demystifying the IP Blackspace (Public Review) [Video]
Quentin Jacquemart; Pierre-Antoine Vervier; Guillaume Urvoy-Keller; Ernst Biersack
15:00 - 15:30 Providing Dynamic Control to Passive Network Security Monitoring (Public Review)
Johanna Amann; Robin Sommer
Break
15:30 - 16:00 Coffee Break
Session 3: Hardening
16:00 - 16:30 Probabilistic Inference on Integrity for Access Behavior Based Malware Detection (Public Review) [Video]
Weixuan Mao; Zhongmin Cai; Xiaohong Guan; Don Towsley
16:30 - 17:00 Counteracting Data-Only Malware with Code Pointer Examination (Public Review) [Video]
Thomas Kittel; Sebastian Vogl; Julian Kirsch; Claudia Eckert
17:00 - 17:30 Xede: Practical Exploit Early Detection (Public Review) [Video]
Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng
Banquet
19:00 - 21:00 Banquet at the SODOH
Tuesday, November 3, 2015

Registration
8:30 - 09:00 Registration
Session 4: Attack Detection I
09:00 - 09:30 Preventing Exploits in Microsoft Office Documents through Content Randomization (Public Review) [Video]
Charles Smutz; Angelos Stavrou
09:30 - 10:00 Improving accuracy of static integer overflow detection in binary (Public Review) [Video]
Yang Zhang; Xiaoshan Sun; Yi Deng; Liang Cheng; Shuke Zeng; Yu Fu; Dengguo Feng
10:00 - 10:30 A Formal Framework for Program Anomaly Detection (Public Review) [Video]
Xiaokui Shu; Danfeng (Daphne) Yao; Barbara G. Ryder
Break
10:30 - 11:00 Coffee Break
Session 5: Web and Net
11:00 - 11:30 jAEk: Using Dynamic Analysis to Crawl and Test Modern Web Applications (Public Review) [Video]
Giancarlo Pellegrino; Constantin Tschürtz; Eric Bodden; Christian Rossow
11:30 - 12:00 WYSISNWIV: What You Scan Is Not What I Visit (Public Review) [Video]
Qilang Yang; Dimitrios Damopoulos; Georgios Portokalidis
12:00 - 12:30 SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks (Public Review)
Christian Röpke; Thorsten Holz
Lunch
12:30 - 14:00 Lunch (on your own)
Session 6: Android
14:00 - 14:30 AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware (Public Review) [Video]
Wenbo Yang; Juanru Li; Bodong Li; Junliang Shu; Wenjun Hu; Yuanyuan Zhang; Dawu Gu
14:30 - 15:00 HelDroid: Dissecting and Detecting Android Ransomware (Public Review) [Video]
Federico Maggi; Nicolò Andronio; Stefano Zanero
15:00 - 15:30 Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users (Public Review) [Video]
Rahul Murmuria; Angelos Stavrou; Daniel Barbara; Dan Fleck
Break
15:30 - 16:00 Coffee Break
Session 7: Privacy
16:00 - 16:30 Privacy Risk Assessment on Online Photos (Public Review) [Video]
Haitao Xu; Haining Wang; Angelos Stavrou
16:30 - 17:00 Privacy is Not an Option: Attacking the IPv6 Privacy Extension (Public Review) [Video]
Johanna Ullrich; Edgar Weippl
Poster Session
17:00 - 18:30 A Day's Worth of Changes to Fully Qualified Domains On The Global Internet
Paul Vixie; Joe St Sauver
On the Detection of Targeted Attacks by Constructing Lateral Movement Graphs
Nobutaka Kawaguchi; Mamoru Tsuichihara; Kota Ideguchi; Yoshinobu Tanigawa; Hideyuki Tomimura
Revisiting discriminative power of identifying DGA-based domains
Sungryoul Lee
Investigating the Detection of Rootkits Using Hardware Performance Counters
Baljit Singh; Ryan Riley; Iliano Cervesato
Detecting malicious behaviors through analysis of user interaction sequences
Nizar Kheir; Ndeye-Seynabou Diop; Sok-Yen Loui; Vincent Frey
TouchLeak: A New Approach for Touch Loggers on Smartphones
Yisroel Mirsky; Simon Dzanashvili
Canvas Fingerprinting in the Wild: A Large-scale Measurement and Evaluation
Yumehisa Haga; Yuta Takata; Mitsuaki Akiyama; Tatsuya Mori; Shigeki Goto
Structural Resilience of Cyberphysical Systems Under Attack
Bhaskar Ramasubramanian; M.A. Rajan; M. Girish Chandra
Understanding the Origins of Similar Android Apps
Yuta Ishii; Takuya Watanabe; Mitsuaki Akiyama; Tatsuya Mori
Seeing is Believing? The analysis of unusual ratings and reviews on Android app store
Bo Sun; Takuya Watanabe; Mitsuaki Akiyama; Tatsuya Mori
Detecting Malicious Wireless APs: Methodology and Field Studies
Toshiaki Harada; Tatsuya Mori; Shigeki Goto
Observing Interaction between Java and JavaScript for privacy leakage detection in Android
Fumihiro Kanei; Mitsuaki Akiyama; Yuta Takata; Takeshi Yada
Analysis of Spam Mail Containing Malicious Attachments using Spamtrap
Masaki Shimura; Mitsuhiro Hatada; Tatsuya Mori; Shigeki Goto
Exploiting large-scale Webshells as a Botnet
AnXiaoYu
Privacy is Not an Option: Attacking the IPv6 Privacy Extension
Johanna Ullrich; Edgar Weippl
Security Logging Might Be Exploited: A Case of a Wireless Router
Heeju Yoon; Da Ran Park; Ji Hye Kim; Hae Young Lee
A Formal Framework for Program Anomaly Detection
Xiaokui Shu; Danfeng (Daphne) Yao; Barbara G. Ryder
Effective Malware Detection via Discriminative and Representative Feature Selection
Xiao-Yu Zhang; Shupeng Wang; Guangjun Wu
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
Pinghai Yuan; Qingkai Zeng; Xuhua Ding
Observation and Analysis of TCP-based Reflection DDoS Attacks Using Honeypot
Takashi Koide; Daisuke Makita; Katsunari Yoshioka; Tsutomu Matsumoto
Re-recognizing "Malicious Certificates" - A Measurement Study
Mingxin Cui; Zigang Cao; Gang Xiong; Yong Zhao
Xede: Practical Exploit Early Detection
Meining Nie; Purui Su; Qi Li; Zhi Wang; Lingyun Ying; Jinlong Hu; Dengguo Feng
Privacy Risk Assessment on Online Photos
Haitao Xu; Haining Wang; Angelos Stavrou
A Reduction Method for Program Trace Sizes for Deobfuscation
Seong-Kyun Mok; Hyeon-gu Jeon; Eun-Sun Cho
Ensemble Learning for Low-level Hardware-supported Malware Detection
Khaled N. Khasawneh; Meltem Ozsoy; Caleb Donovick; Nael Abu-Ghazaleh; Dmitry V. Ponomarev
Reception
19:00 - Reception
Wednesday, November 4, 2015

Registration
08:30 - 09:00 Registration
Session 8: Evaluating Solutions
09:00 - 09:30 Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection (Public Review) [Video]
Aleksandar Milenkoski; Bryan D. Payne; Nuno Antunes; Marco Vieira; Samuel Kounev; Alberto Avritzer; Matthias Luft
09:30 - 10:00 Security Analysis of PHP Bytecode Protection Mechanisms (Public Review) [Video]
Dario Weißer; Johannes Dahse; Thorsten Holz
10:00 - 10:30 Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks (Public Review) [Video]
Mohamed Elsabagh; Daniel Barbara; Daniel Fleck; Angelos Stavrou
10:30 - 11:00 Towards Automatic Inference of Kernel Object Semantics from Binary Code (Public Review) [Video]
Junyuan Zeng; Zhiqiang Lin
Break
11:00 - 11:30 Coffee Break
Session 9: Attack Detection II
11:30 - 12:00 BotWatcher: Transparent and Generic Botnet Tracking (Public Review) [Video]
Thomas Barabosch; Adrian Dombeck; Khaled Yakdan; Elmar Gerhards-Padilla
12:00 - 12:30 Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting (Public Review)
Yangyi Chen; Vincent Bindschaedler; Xiaofeng Wang; Stefan Berger; Dimitrios Pendarakis
12:30 - 13:00 AmpPot: Monitoring and Defending Against Amplification DDoS Attacks (Public Review) [Video]
Lukas Krämer; Johannes Krupp; Daisuke Makita; Tomomi Nishizoe; Takashi Koide; Katsunari Yoshioka; Christian Rossow
Closing
13:00 - 13:15