ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Nick Nikiforakis <[log in to unmask]>
Reply To:
Nick Nikiforakis <[log in to unmask]>
Fri, 21 Jul 2017 16:45:14 -0400
text/plain (336 lines)
[Apologies for cross-posting]


20th International Symposium on Research in Attacks,
Intrusions and Defenses (RAID 2017)

Atlanta, Georgia, September 18-20, 2017

** **


The 20th International Symposium on Research in Attacks, Intrusions and
Defenses (RAID 2017), previously known as Recent Advances in Intrusion
Detection, aims at bringing together leading researchers and 
practitioners from
academia, government, and industry to discuss novel research contributions
related to computer and information security. RAID 2017 will be held in
Atlanta, Georgia on September 18-20, 2017

RAID is an international event that brings together leading researchers and
practitioners from academia, government, and industry. Attendees are from
prestigious universities, government and high technology companies all over
the world.

Attendees typically include:

  - Researchers working in the field of computer and information security
  - Academics studying the field of cyber security
  - Incident response and security teams with responsibility for 
coordinating computer security
  - Technical staff who determine security product needs and implement 
  - Anyone wanting to learn more about computer security in general

RAID 2017 is an excellent opportunity to discuss cutting-edge research
in intrusion detection and defenses, malware, application security,
anomaly detection, special environments and sandboxing, web security
and social networks, and network security, among other topics.


Registration information is available at:


Information on the conference venue is available at:


Monday, September 18, 2017

  9:30 - 10:30    Registration & Welcome Coffee

10:30 - 11:00    Welcome to RAID 20th anniversary

11:00 - 12:30    Session I: Software Security

     - VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices

       Andrew Henderson (Intelligent Automation, Inc.)
       Heng Yin (University of California, Riverside)
       Guang Jin (Intelligent Automation, Inc.)
       Hao Han (Intelligent Automation, Inc.)
       Hongmei Deng (Intelligent Automation, Inc.)

     - Static Program Analysis as a Fuzzing Aid

       Bhargava Shastry (Technische Universität Berlin)
       Markus Leutner (Technische Universität Berlin)
       Tobias Fiebig (Technische Universität Berlin)
       Kashyap Thimmaraju (Technische Universität Berlin)
       Fabian Yamaguchi (Technische Universität Braunschweig)
       Konrad Rieck (Technische Universität Braunschweig)
       Stefan Schmid (Aalborg University)
       Jean-Pierre Seifert (Technische Universität Berlin)
       Anja Feldmann (Technische Universität Berlin)

     - Breaking Fitness Records without Moving: Reverse Engineering and 
Spoofing Fitbit

       Hossein Fereidooni (University of Padua, Italy)
       Jiska Classen (Technische Universität Darmstadt, Germany)
       Tom Spink (University of Edinburgh, United Kingdom)
       Paul Patras (University of Edinburgh, United Kingdom)
       Markus Miettinen (Technische Universität Darmstadt, Germany)
       Ahmad-Reza Sadeghi (Technische Universität Darmstadt, Germany)
       Matthias Hollick (Technische Universität Darmstadt, Germany)
       Mauro Conti (University of Padua, Italy)

12:30 - 14:00    Lunch break

11:00 - 12:30    Session II: Intrusion Detection

     - Lens on the endpoint: Hunting for malicious software through 
endpoint data analysis

       Ahmet Salih Buyukkayhan (Northeastern University)
       Alina Oprea (Northeastern University)
       Zhou Li (RSA Laboratories)
       William Robertson (Northeastern University)

     - Redemption: Real-time Protection Against Ransomware at End-Hosts

       Amin Kharraz (Northeastern University)
       Engin Kirda (Northeastern University)

     - ILAB: An Interactive Labelling Strategy for Intrusion Detection

       Anael Bonneton (ANSSI – INRIA)
       Francis Bach (INRIA – ENS)
       Pierre Chifflier (ANSSI)

15:30 - 16:00    Coffee Break

16:00 - 17:30    Poster Presentation Session

18:00 - 21:00    Poster Session and Cocktails

Tuesday, September 19, 2017

  9:30 - 10:30    Dr. Deborah Frincke, "Why Science?"

10:30 - 11:00    Coffee Break

11:00 - 12:30    Session III: Android Security

     - Precisely and Scalably Vetting JavaScript Bridge In Android 
Hybrid Apps

       Guangliang Yang (Texas A&M University)
       Abner Mendoza (Texas A&M University)
       Jialong Zhang (Texas A&M University)
       Guofei Gu (Texas A&M University)

     - Filtering for Malice through the Data Ocean: Large-Scale PHA 
Install Detection at the Communication Service Provider Level

       Kai Chen (Institute of Information Engineering, Chinese Academy 
of Sciences; University of Chinese Academy of Sciences)
       Tongxin Li (Peking University)
       Bin Ma (Institute of Information Engineering, Chinese Academy of 
       Peng Wang (Indiana University Bloomington)
       XiaoFeng Wang (Indiana University Bloomington)
       Peiyuan Zong (Institute of Information Engineering, Chinese 
Academy of Sciences)

     - Android Malware Clustering through Malicious Payload Mining

       Yuping Li (University of South Florida)
       Jiyong Jang (IBM Research)
       Xin Hu (Pinterest)
       Xinming Ou (University of South Florida)

12:30 - 14:00    Lunch break

14:00 - 15:30    Session IV: Systems Security

     - Stealth Loader: Trace-free Program Loading for API Obfuscation

       Yuhei Kawakoya (NTT Secure Platform Laboratories)
       Eitaro Shioji (NTT Secure Platform Laboratories)
       Yuto Otsuki (NTT Secure Platform Laboratories)
       Makoto Iwamura (NTT Secure Platform Laboratories)
       Takeshi Yada (NTT Secure Platform Laboratories)

     - LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization

       Orlando Arias (University of Central Florida)
       David Gens (TU Darmstadt)
       Yier Jin (University of Central Florida)
       Christopher Liebchen (TU Darmstadt)
       Ahmad Reza-Sadeghi (TU Darmstadt)
       Dean Sullivan (University of Central Florida)

     - CFI CaRE: Hardware-supported Call and Return Enforcement for 
Commercial Microcontrollers

       Thomas Nyman (Aalto University / Trustonic)
       Jan-Erik Ekberg (Trustonic)
       Lucas Davi (University of Duisburg-Essen)
       N. Asokan (Aalto University)

15:30 - 16:00    Coffee break

16:00 - 17:30    Session V: Cybercrime

     - Mining on Someone Else's Dime? Mitigating Covert Mining 
Operations in Clouds and Enterprises

       Rashid Tahir (University of Illinois Urbana-Champaign)
       Muhmmad Huzaifa (University of Illinois Urbana-Champaign)
       Anupam Das (Carnegie Mellon University)
       Mohammad Ahmad (University of Illinois Urbana-Champaign)
       Carl Gunter (University of Illinois Urbana-Champaign)
       Fareed Zaffar (Lahore University of Management Sciences)
       Matthew Caesar (University of Illinois Urbana-Champaign)
       Nikita Borisov (University of Illinois Urbana-Champaign)

     - BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems

       Samuel Jero (Purdue University)
       Xiangyu Bu (Purdue University)
       Cristina Nita-Rotaru (Northeastern University)
       Hamed Okhravi (MIT Lincoln Laboratory)
       Richard Skowyra (MIT Lincoln Laboratory)
       Sonia Fahmy (Purdue University)
       Sonia Fahmy (Purdue University)

     - Trapped by the UI: The Android case

       Efthimios Alepis (Department of Informatics, University of Piraeus)
       Constantinos Patsakis (Department of Informatics, University of 

18:00 - 21:00    Social Event and Dinner

Wednesday, September 20, 2017

  9:30 - 10:30    Influential Paper Award Talk by Sal Stolfo

10:30 - 11:00    Coffee break

11:00 - 12:30    Session VI: Cloud Security

     - Thwarting Controlled Side Channel Attacks via Enclave Verifiable 
Page Faults

       Yangchun Fu (Google Inc)
       Erick Bauman (UT Dallas)
       Zhiqiang Lin (UT Dallas)

     - Secure In-Cache Execution

       Yue Chen (Florida State University)
       Mustakimur Khandaker (Florida State University)
       Zhi Wang (Florida State University)

     - Combining Secure Guard Extensions and System Management Mode to 
Monitor Cloud Resource Usage

       Kevin Leach (University of Virginia)
       Fengwei Zhang (Wayne State University)
       Westley Weimer (University of Michigan)

12:30 - 14:00    Lunch break

14:00 - 15:30    Session VII: Network Security

     - Linking Amplification DDoS Attacks to Booter Services

       Johannes Krupp (CISPA, Saarland University)
       Mohammad Karami (Google)
       Christian Rossow (CISPA, Saarland University)
       Damon McCoy (New York University)
       Michael Backes (CISPA, Saarland University & MPI-SWS)

     - Practical and Accurate Runtime Application Protection against DoS 

       Mohamed Elsabagh (George Mason University)
       Dan Fleck (George Mason University)
       Angelos Stavrou (George Mason University)
       Michael Kaplan (Vencore Labs)
       Thomas Bowen (Vencore Labs)

     - Exploring the ecosystem of malicious domain registrations in the 
.eu TLD

       Thomas Vissers (imec-DistriNet, KU Leuven)
       Jan Spooren (imec-DistriNet, KU Leuven)
       Pieter Agten (imec-DistriNet, KU Leuven)
       Dirk Jumpertz (EURid vzw)
       Peter Janssen (EURid vzw)
       Marc Van Wesemael (EURid vzw)
       Frank Piessens (imec-DistriNet, KU Leuven)
       Wouter Joosen (imec-DistriNet, KU Leuven)
       Lieven Desmet (imec-DistriNet, KU Leuven)

15:30 - 16:00 Conclusion and Closing Remarks


Additional information is available at:

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see