The 21st International Symposium on Research in Attacks, Intrusions and Defenses

10-12 September 2018 - Heraklion, Crete, Greece


About

The 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), previously known as Recent Advances in Intrusion Detection, aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. RAID 2018 will be held in Heraklion, Crete, Greece on 10-12 September 2018

Since its inception in 1997, RAID has established itself as a venue where leading researchers and practitioners are given the opportunity to present novel research in a unique venue to an engaged and lively community. Attendees are from prestigious universities, government, and high technology companies all over the world.

Attendees typically include:

  • Researchers working in the field of computer and information security

  • Academics studying the field of cyber security Incident response and security teams with responsibility for coordinating computer security

  • Technical staff who determine security product needs and implement solutions

  • Anyone wanting to learn more about computer security in general

IOSec 2018 (CIPSEC Workshop) and 1st SMESEC Workshop are co-located with RAID2018

Proceedings

RAID 2018 proceedings are published by Springer in the Lecture Notes in Computer Science series (LNCS, volume 11050). You can access the online version by clicking the proceedings cover image.

Sponsors

Gold

Bronze

Travel Grant Sponsor

Others

Important Dates

Call for papers

Call for papersRAID 2018 is soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them, or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:

  • Computer, network, and cloud computing security

  • Malware and unwanted software

  • Program analysis and reverse engineering

  • Mobile SecurityWeb security and privacy

  • Vulnerability analysis techniques

  • Usable security and privacyIntrusion detection and prevention

  • Hardware security

  • Cyber physical systems security and threats against critical infrastructures

  • IoT security

  • Statistical and adversarial learning for computer security

  • Cyber crime and underground economies

  • Denial-of-Service attacks

  • Security measurement studies

  • Digital forensics

The RAID conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results.

Submission Guidelines

Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. Papers can be submitted on the following web site: https://raid18.syssec.rub.de/

Reviewing will be double-blind, meaning the authors’ identities will be hidden from the reviewers. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, and should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not anonymized will not be reviewed.

Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM (see http://www.acm.org/publications/policies/ ).

Papers accepted by the Program Committee will be presented at RAID 2018 and included in the Symposium’s proceedings published by Springer in its Lecture Notes in Computer Science series.

Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee co-chairs.

Authors, please remember that each paper must have a Regular registration associated with it.

In the same archive with the camera-ready version of your paper, you need to include a signed Consent to Publish Form for transferring the copyrights of your paper to the publisher. The form can be downloaded from this link

Co-located Events

International workshop on Information & Operational Technology (IT & OT) security systems

IOSec 2018

1st SMESEC Workshop


Committees

Sponsorship

Sponsorship Opportunities

The 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID) seeks sponsorships for its upcoming event to be held in Heraklion, Crete, Greece on 10-12 September 2018. Well-attended and favorably reviewed, past symposiums have attracted more than 200 participants from around the world. Please contact the Sponsor Chair for sponsorship inquiries.

Sponsorship Levels

Gold Sponsorships – Suggested donation USD 25,000.00

Gold sponsors receive exceptional visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.

Sponsorship benefits include:

  • Logo featured prominently on the Symposium web site

  • Advance access to attendees who opt-in for contact with supporters

  • One table at poster event or similar marked with supporter’s name, logo, and promotional materials

  • Tabletop exhibit space at the Symposium if desired

  • All badges for attendees from the organization marked “Gold Supporter” (up to 10 people)

Silver Sponsorships – Suggested donation USD 10,000.00

Silver sponsors receive excellent visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.

Sponsorship benefits include:

  • Logo featured on the Symposium web site

  • Advance access to attendees who opt-in for contact with supporters

  • One table at poster event or similar marked with supporter’s name, logo, and promotional materials

  • All badges for attendees from the organization marked “Silver Donor” (up to 4 people)

Bronze Sponsorships – Suggested donation USD 5,000.00

Bronze sponsors receive excellent visibility before, during, and following the symposium. These sponsorships are an excellent opportunity to become involved and recognized within the international security community.

Sponsorship benefit include:

  • Logo featured on the Symposium web site

  • Advance access to attendees who opt-in for contact with supporters

  • All badges for attendees from the organization marked “Bronze Donor” (up to 2 people)

Conference Program

A printable version can be downloaded from this link

Monday

08:00-08:45 Registration

08:45-09:00 Welcome remarks

09:00-10:30 Session 1: Attacks

Proteus: Detecting Android Emulators from Instruction-level Profiles Onur Sahin,Ayse K. Coskun ,Manuel Egele (Boston University)

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews laudio Rizzo, Johannes Kinder, Lorenzo Cavallaro (Royal Holloway, University of London)

Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer Andrei Tatar, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida (Vrije Universiteit Amsterdam)

10:30-11:00 Coffee Break

11:00-12:30 Session 2: Intrusion detection and prevention

Reading Between The Lines: Content-Agnostic Detection of Spear-Phishing Emails Hugo Gascon (TU Braunschweig), Steffen Ulrich(Genua GmbH), Benjamin Stritter (University of Erlangen-Nuremberg ), Konrad Rieck( TU Braunschweig )

Backdoors: Definition, Deniability and Detection Sam L. Thomas (University of Birmingham), Aurélien Francillon (EURECOM)

RWGuard: A Real-time Detection System Against Cryptographic Ransomware Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino (Purdue University)

12:30-13:30 Lunch Break

13:30-15:00 Session 3: DDoS attacks

DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives Jonas Bushart, Christian Rossow( CISPA, Saarland University)

Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures Menghao Zhang, Guanyu Li, Jun Bi, Jiasong Bai (Tsinghua University), Lei Xu, Guofei Gu( Texas A&M University)

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids Johanna Ullrich, Nicholas Stifter,Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl (SBA Research)

15:00-15:30 Coffee Break

15:30-17:00 Session 4: Passwords, Accounts, and Users

Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery, (University of Cambridge)

SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels Binghui Wang, Le Zhang, Neil Zhenqiang Gong (Iowa State University)

GuidedPass: Guiding users to create both more memorable and strong passwords Simon S. Woo (SUNY-Korea), Jelena Mirkovic (USC/ISI)

19:30 Drinks/Reception Welcome Event will take place at Veneto Cafe

Tuesday

09:30-10:30 Invited TalkQuo Vadis?

A Look at the Evolution of the Security of Web Applications Engin Kirda, Northeastern University

10:30-11:00 Coffee Break

11:00-12:30 Session 5: Machine learning for computer security

Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg (NYU)

Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic Mayana Pereira, Bin Yu (Infoblox Inc.), Shaun Coleman, Martine DeCock, Anderson Nascimento (University of Washington, Tacoma)

OTTer: A Scalable High-resolution Encrypted Traffic Identification Engine Eva Papadogiannaki (Niometrics, FORTH-ICS) Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas (Niometrics)

12:30-13:30 Lunch Break

13:30-15:00 Session 6: Hardware-assisted security

Hardware Assisted Randomization of Data Brian Belleville, Joseph Michael Nash, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz ( University of California, Irvine ), Hyungon Moon, Jangseop Shin, Dongil Hwang, Seonhwa Jung, Yunheung Paek (ECE and ISRC, Seoul National University)

MicroStache: A Hardware Enforced Abstraction for Efficient Data Isolation Lucian Mogosanu (University POLITEHNICA of Bucharest), Ashay Rane (University of Texas at Austin), Nathan Dautenhahn (University of Pennsylvania)

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices Chen Cao, Le Guan (The Pennsylvania State University), Ning Zhang (Virginia Polytechnic Institute and State University), Neng Gao, Jingqiang Lin (Institute of Information Engineering, CAS), Bo Luo (The University of Kansas), Peng Liu (The Pennsylvania State University), Ji Xiang (Institute of Information Engineering, CAS), Wenjing Lou (Virginia Polytechnic Institute and State University)

15:00-15:30 Coffee Break

15:30-17:00 Session 7: Software Security

PartiSan: Fast and Flexible Sanitization via Run-time Partitioning HJulian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, Michael Franz (University of California, Irvine)

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries Paul Muntean, Matthias Fischer, Jens Grossklags, Claudia Eckert (Technical University of Munich), Gang Tan (Penn State University), Zhiqiang Lin (The Ohio State University)

Trusted Execution Path For Protecting Java Applications Against Deserialization of Untrusted Data Cristalli Stefano, Vignati Edoardo, Bruschi Danilo, Andrea Lanzi (University of Milan)

19:30 Gala Dinner

At 19.30(sharp), all participants will be taken by bus from the meeting venue to the dinner location at Almyra Seaside food & Cocktails. At the end of the dinner, buses will take participants back to the meeting venue.

Meeting point : outside of the north entrance of Megaron hotel (Efessou Str.)

Wednesday

09:00-10:30 Session 8: Malware

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence Jialong Zhang, Jiyong Jang, Marc Ph. Stoecklin, Jialong Zhang (IBM Research), Guofei Gu (Texas A&M University), Xin Hu (Pinterest, Inc.)

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers Ishai Rosenberg,Asaf Shabtai,Yuval Elovici, Lior Rokach (Software and Information Systems Engineering Department, Ben Gurion University of Israel)

Next Generation P2P Botnets: Monitoring under Adverse Conditions Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser (Technische Universität Darmstadt), Shankar Karuppayah (Universiti Sains Malaysia)

10:30-11:00 Coffee Break

11:00-12:30 Session 9: IoT/CPS security

Malicious IoT Implants: Tampering with Serial Communication over the Internet Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg)

Before Toasters Rise Up: A View Into the Emerging IoT Threat Landscape Pierre-Antoine Vervier, Yun Shen (Symantec Research Labs)

Statistical Similarity of Critical Infrastructure Network Traffic based on Nearest Neighbor Distances Jeong-Han Yun, Woomyo Lee, Sin-Kyu Kim,Jeong-Han Yun (The Affiliated Institute of ETRI), Yoonho Hwang, Hee-Kap Ahn (Dept. of Computer Science and Engineering, POSTECH)

12:30-13:30 Lunch Break

13:30-14:00 Community Service Award Prof. Marc Dacier

14:00-15:00 Session 10: Security measurements

PostScript Undead: Pwning the Web with a 35 year old Language Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk (Ruhr-University Bochum)Identifying Key Leakage of Bitcoin UsersSichael Brengel, Christian Rossow (CISPA, Saarland University)

15:00-15:30 Coffee Break

15:30-17:00 Session 11: Defenses

Furnace: Self-Service Tenant VMI for the Cloud Micah Bushouse, Douglas Reeves (North Carolina State University)

ShadowMonitor: An Effective in-VM Monitoring Framework with Hardware-enforced Isolation Bin Shi (Beihang University)

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels zhi zhang (CSIRO and UNSW, Australia), Yueqiang Cheng(Baidu USA Xlab), Surya Nepal (CSIRO, Australia), Dongxi Liu (CSIRO, Australia), Fethi Rabhi (UNSW, Australia ), Qingni Shen (MoE Key Lab of Network and Software Assurance, Peking University)

17:00 Closing remarks

18:00 Visit to the Archaeological Museum of Heraklion

Venue

GDM Megaron hotel

9, D. Beaufort, 71202, Heraklion - Crete - Greece

Special rates are offered to RAID 2018 participants (subject to availability) trough the Conference registration process, which also provides accomodation requests by:

CCBS GREECE P.C. Cretan Conference and Business Services P.C

6 Pediados Str, 71201, Heraklion GRTel: +30 2810 331010, Fax: +30 2810 330606


How to get to Heraklion, Crete


  • By air: The airport Nikos Kazantzakis (airport Code: HER http://www.heraklion-airport.info/) is the only one in Heraklion. Heraklion has about 5 direct flights per day from Athens (ATH) and 2 direct flights per day from Thessaloniki (SKG). You can go to city center by taxi (15min) or by Bus. There are also a number of car rental companies located in the airport.

  • By sea: Heraklion harbor is located close to the city. There are two major shipping companies on the line: Athens-Heraklion. Minoan lines and ANEK lines provide daily service from and towards Crete. There are taxis available as well as buses near the harbor. If you would like to rent a car, you will find a number of rental agencies in the city center (15-20 minutes’ walk or 2 minutes by taxi).

Register

€ 400 Early registration (before 22/07/18)

€ 500 Late registration (after 22/07/18)

Regular

Registration Closed

€ 200 Early registration (before 22/07/18)

€ 300 Late registration (after 22/07/18)

Student

Registration Closed

Accepted payment methods are with credit/debit card (Visa or Mastercard only) or by bank transfer. A cancellation fee of €50 applies. No cancellation will be allowed after July 30th, 2018. If you cannot attend you may transfer the registration to another person.

Authors, please remember that each paper must have a Regular registration associated with it.

Raid2018 registars can also attend the co-located events.

Contact us

Photo Gallery