RAID 2023 is going to be held in-person, only. Instructions for traveling to Hong Kong and reaching the venue can be found here. If you need an invitation letter for traveling to Hong Kong, please, contact the Local Arrangement at localarrangement@raid2023.org .
For the presenter of RAID2023, you have two choices to display your presentation slides:
Option 1. Send us a copy of your presentation slides. You can share it by uploading it to our Google Drive or using a USB drive of your own (or one we can provide). We will display your presentation slides on the screen in the Senate Room and provide you with a presentation remote to control the slides. You are recommended to use .pptx file for the slides.
Google Drive Link: https://drive.google.com/drive/folders/1Pl6fLwbfHKoy3xz1_jqArJCleHv7dwTl
Option 2. Use your own device with connecting Zoom to share screen. If you would like to use your own computer to present, you are required to have Zoom. Then, join our meeting room with share your computer screen. You may refer to the Zoom meeting room information below.
Zoom Meeting Room Information:
8:30 - 9:00 | Registration | |
9:00 - 9:30 | Opening | |
9:30 - 10:30 | Keynote I | |
Revisiting Security in the Age of Software-Defined Everything Abstract: Software is not only eating the world, but also defining the new world. With the increasing examples such as software-defined compute/storage (aka, cloud), software-defined networking, software-defined radio/5G, and software-defined vehicle, we are now living in a world of software-defined everything (SDx). Infosys estimated that the global SDx market will reach USD 160 billion by 2024 and grow at a compound annual growth rate of 25%. The security of SDx is becoming more interesting and important. On one hand, SDx presents new attack surfaces and security challenges. On the other hand, SDx also provides new opportunities to rethink the design of security. In this talk, we will revisit the security at both sides anddemonstrate with our recentresearch results. In particular, we show that we can well leverage software-defined principles to enhance zero-trust security and design new programmable security frameworks, thus also making this software-defined world more secure. Bio: Prof. Guofei Gu is a professor and holder of the Eppright Professorship in Engineering in the Department of Computer Science & Engineering at Texas A&M University (TAMU). Before coming to Texas A&M, he received his Ph.D. degree in Computer Science from the College of Computing, Georgia Institute of Technology. His research interests are in network and systems security. Prof. Gu is a recipient of 2010 NSF CAREER Award, 2013 AFOSR Young Investigator Award, 2010 IEEE S&P Best Student Paper Award, 2015 ICDCS Best Paper Award, 2022 ASIACCS Best Paper Award, Texas A&M Dean of Engineering Excellence Award, and Presidential Impact Fellow, among several others. He is an active member of the security research community and has pioneered several new research directions such as botnet detection/defense and SDN security. Prof. Gu has frequently served on the program committees of top-tier security conferences such as IEEE S&P, ACM CCS, USENIX Security, and NDSS. He is an IEEE Fellow and an ACM Distinguished Member. He is currently directing the SUCCESS Lab at TAMU. |
||
10:30 - 11:00 | Break | |
11:00 - 12:30 | Cloud and Network Security (Chair:Sherman Chow) + | |
Container Orchestration Honeypot: Observing Attacks in the Wild
|
||
12:30 - 14:00 | Lunch | |
14:00 - 15:30 | Malware and Fuzzing (Chair:Fengwei Zhang) + | |
A Method for Summarizing and Classifying Evasive Malware
|
||
15:30 - 16:00 | Break | |
16:00 - 17:30 | Software Security (I) (Chair:Nils Ole Tippenhauer) + | |
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking
|
||
18:00 | Gathering time for Welcome Receiption | |
19:00 | Welcome Reception |
9:30 - 10:30 | Keynote II | |
Unpacking the Threats of All-in-One Mobile Super Apps Abstract: Mobile apps have evolved. Today, apps like WeChat have transformed from offering just one single service to a unified hub, integrating services ranging from instant messaging and ride-hailing to online shopping. This evolution birthed the term "super apps". To add even more features, these apps let other developers build small miniapps inside them using specific APIs. But as they grow, new security and privacy challenges emerge, particularly given the sheer volume of user data they handle. In this talk, Dr. Lin will walk through these challenges. More specifically, he will highlight the benefits and conveniences of super apps, but more importantly, the potential pitfalls. Some of these problems come from weak spots in how apps connect with each other, not setting clear boundaries for what each mini-app can do, or not vetting these mini-apps properly. Because of these issues, users might face threats like data theft, privacy leaks, or even malicious miniapps. Finally, Dr. Lin will also shed light on how to deal with and prevent these threats when concluding the talk. Bio: Prof. Zhiqiang Lin is a Distinguished Professor of Engineering, and the Director of Institute for Cybersecurity and Digital Trust at The Ohio State University. His research interests center around systems and software security, with a key focus on developing automated program analysis techniques for vulnerability discovery and malware analysis; hardening the systems and software from binary code rewriting, virtualization, and trusted execution environment; and the applications of these techniques in emerging platforms such as super apps. He has published over 140 papers, many of which appeared in the top venues in cybersecurity. He is an ACM Distinguished Member, a recipient of Harrison Faculty Award for Excellence in Engineering Education, NSF CAREER award, AFOSR Young Investigator award, and Outstanding Faculty Teaching Award. He received his Ph.D. in Computer Science from Purdue University. |
||
10:30 - 11:00 | Break | |
11:00 - 12:30 | IoT / Firmware / Binaries (Chair:Ioannis Agadakos) + | |
Black-box Attacks Against Neural Binary Function Detection
|
||
12:30 - 14:00 | Lunch | |
14:00 - 15:30 | ML (I): Inference and Toxicity (Chair:David Lie) + | |
Efficient Membership Inference Attacks against Federated Learning via Bias Differences
|
||
15:30 - 16:00 | Break | |
16:00 - 17:30 | IDS and Applied Crypto (Chair:Jianying Zhou) + | |
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection
|
||
18:00 | Gathering time for Dinner Banquet | |
19:00 | Dinner Banquet |
9:00 - 10:30 | Software Security (II) (Chair:Wenbo Shen) + | |
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking
|
||
10:30 - 11:00 | Break | |
11:00 - 12:30 | ML (II): Adversarial, Robust & Explainable AI (Chair:Haining Wang) + | |
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification
|
||
12:30 - 14:00 | Lunch | |
14:00 - 15:30 | Deep into sytems & formats (Chair:Youqian Zhang) + | |
CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors
|
||
15:30 - 16:00 | Break | |
16:00 - 17:30 | Web Sec & Authentication (Chair:Sze Yiu Chau) + | |
Boosting Big Brother: Attacking Search Engines with Encodings
|
||
17:30 | Closure |