Skip to main content

Showing 1–11 of 11 results for author: Marchiori, F

.
  1. arXiv:2405.08466  [pdf, ps, other

    cs.CR

    Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

    Authors: Francesco Marchiori, Alessandro Brighente, Mauro Conti

    Abstract: Autonomous driving is a research direction that has gained enormous traction in the last few years thanks to advancements in Artificial Intelligence (AI). Depending on the level of independence from the human driver, several studies show that Autonomous Vehicles (AVs) can reduce the number of on-road crashes and decrease overall fuel emissions by improving efficiency. However, security research on… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: Accepted at ACSW 2024

  2. arXiv:2404.12991  [pdf, other

    cs.CR

    RedactBuster: Entity Type Recognition from Redacted Documents

    Authors: Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi

    Abstract: The widespread exchange of digital documents in various domains has resulted in abundant private information being shared. This proliferation necessitates redaction techniques to protect sensitive content and user privacy. While numerous redaction methods exist, their effectiveness varies, with some proving more robust than others. As such, the literature proposes several deanonymization technique… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  3. arXiv:2404.12689  [pdf, other

    cs.NI cs.AI cs.ET

    Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

    Authors: Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti

    Abstract: Recent advancements in Artificial Intelligence, and particularly Large Language Models (LLMs), offer promising prospects for aiding system administrators in managing the complexity of modern networks. However, despite this potential, a significant gap exists in the literature regarding the extent to which LLMs can understand computer networks. Without empirical evidence, system administrators migh… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    ACM Class: C.2.1; C.2.5; I.2.1

  4. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

    Authors: Francesco Marchiori, Mauro Conti

    Abstract: The growing integration of vehicles with external networks has led to a surge in attacks targeting their Controller Area Network (CAN) internal bus. As a countermeasure, various Intrusion Detection Systems (IDSs) have been suggested in the literature to prevent and mitigate these threats. With the increasing volume of data facilitated by the integration of Vehicle-to-Vehicle (V2V) and Vehicle-to-I… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: Accepted at WiseML 2024

  5. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

    Authors: Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti

    Abstract: Predicting and classifying faults in electricity networks is crucial for uninterrupted provision and kee** maintenance costs at a minimum. Thanks to the advancements in the field provided by the smart grid, several data-driven approaches have been proposed in the literature to tackle fault prediction tasks. Implementing these systems brought several improvements, such as optimal energy consumpti… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  6. arXiv:2401.10736  [pdf, other

    cs.CR

    A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

    Authors: Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti

    Abstract: The large number of Electronic Control Units (ECUs) mounted on modern cars and their expansive communication capabilities create a substantial attack surface for potential exploitation. Despite the evolution of automotive technology, the continued use of the originally insecure Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure. In response to the absence of s… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  7. arXiv:2310.02655  [pdf, other

    cs.CR cs.CL

    AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

    Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde

    Abstract: Cyber Threat Intelligence (CTI) reporting is pivotal in contemporary risk management strategies. As the volume of CTI reports continues to surge, the demand for automated tools to streamline report generation becomes increasingly apparent. While Natural Language Processing techniques have shown potential in handling text data, they often struggle to address the complexity of diverse data sources a… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 10 pages, 7 figures

  8. arXiv:2309.03607  [pdf, other

    cs.CR cs.LG

    Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication

    Authors: Francesco Marchiori, Mauro Conti

    Abstract: Lithium-ion (Li-ion) batteries are the primary power source in various applications due to their high energy and power density. Their market was estimated to be up to 48 billion U.S. dollars in 2022. However, the widespread adoption of Li-ion batteries has resulted in counterfeit cell production, which can pose safety hazards to users. Counterfeit cells can cause explosions or fires, and their pre… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    Comments: 18 pages, 11 figures

  9. arXiv:2306.15363  [pdf, other

    cs.CR cs.LG

    Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

    Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola

    Abstract: Evasion attacks are a threat to machine learning models, where adversaries attempt to affect classifiers by injecting malicious samples. An alarming side-effect of evasion attacks is their ability to transfer among different models: this property is called transferability. Therefore, an attacker can produce adversarial samples on a custom model (surrogate) to conduct the attack on a victim's organ… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: Accepted at RAID 2023

  10. arXiv:2306.05923  [pdf, other

    cs.CR

    When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems

    Authors: Emad Efatinasab, Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti

    Abstract: Many research papers have recently focused on behavioral-based driver authentication systems in vehicles. Pushed by Artificial Intelligence (AI) advancements, these works propose powerful models to identify drivers through their unique biometric behavior. However, these models have never been scrutinized from a security point of view, rather focusing on the performance of the AI algorithms. Severa… ▽ More

    Submitted 10 June, 2024; v1 submitted 9 June, 2023; originally announced June 2023.

  11. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

    Authors: Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde

    Abstract: The automatic extraction of information from Cyber Threat Intelligence (CTI) reports is crucial in risk management. The increased frequency of the publications of these reports has led researchers to develop new systems for automatically recovering different types of entities and relations from textual data. Most state-of-the-art models leverage Natural Language Processing (NLP) techniques, which… ▽ More

    Submitted 8 September, 2023; v1 submitted 17 March, 2023; originally announced March 2023.

    Comments: 11 pages, 3 figures