Skip to main content

Showing 1–6 of 6 results for author: Chilese, M

.
  1. arXiv:2404.06856  [pdf, other

    cs.SE cs.AR cs.CR cs.LG

    Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

    Authors: Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi

    Abstract: Modern computing systems heavily rely on hardware as the root of trust. However, their increasing complexity has given rise to security-critical vulnerabilities that cross-layer at-tacks can exploit. Traditional hardware vulnerability detection methods, such as random regression and formal verification, have limitations. Random regression, while scalable, is slow in exploring hardware, and formal… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  2. arXiv:2403.07465  [pdf, other

    cs.CR cs.LG

    One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

    Authors: Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi

    Abstract: Control-Flow Attestation (CFA) is a security service that allows an entity (verifier) to verify the integrity of code execution on a remote computer system (prover). Existing CFA schemes suffer from impractical assumptions, such as requiring access to the prover's internal state (e.g., memory or code), the complete Control-Flow Graph (CFG) of the prover's software, large sets of measurements, or t… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  3. arXiv:2307.14879  [pdf, other

    cs.CR

    Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users

    Authors: David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi

    Abstract: Satellite Internet plays an increasingly important role in geopolitical conflicts. This notion was affirmed in the Ukrainian conflict escalating at the beginning of 2022, with the large-scale deployment of the Starlink satellite Internet service which consequently demonstrated the strategic importance of a free flow of information. Aside from military use, many citizens publish sensitive informati… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

  4. arXiv:2302.07589  [pdf, other

    cs.CR cs.LG

    ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

    Authors: Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi

    Abstract: IoT application domains, device diversity and connectivity are rapidly growing. IoT devices control various functions in smart homes and buildings, smart cities, and smart factories, making these devices an attractive target for attackers. On the other hand, the large variability of different application scenarios and inherent heterogeneity of devices make it very challenging to reliably detect ab… ▽ More

    Submitted 16 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: To appear in the 32nd USENIX Security Symposium, August 2022, Anaheim CA, USA

  5. arXiv:2302.02740  [pdf, other

    cs.CR

    AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

    Authors: Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Mobile applications are widely used for online services sharing a large amount of personal data online. One-time authentication techniques such as passwords and physiological biometrics (e.g., fingerprint, face, and iris) have their own advantages but also disadvantages since they can be stolen or emulated, and do not prevent access to the underlying device, once it is unlocked. To address these c… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: 16 pages, 7 figures

  6. arXiv:2301.06815  [pdf, other

    cs.SI cs.CY cs.IR cs.LG

    Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

    Authors: Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi

    Abstract: With 1.3 billion users, Instagram (IG) has also become a business tool. IG influencer marketing, expected to generate $33.25 billion in 2022, encourages companies and influencers to create trending content. Various methods have been proposed for predicting a post's popularity, i.e., how much engagement (e.g., Likes) it will generate. However, these methods are limited: first, they focus on forecas… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.