Skip to main content

Showing 1–12 of 12 results for author: Mariconti, E

.
  1. arXiv:2405.02731  [pdf, other

    cs.LG

    Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles

    Authors: J. R. V. Solaas, N. Tuptuk, E. Mariconti

    Abstract: This systematic review focuses on anomaly detection for connected and autonomous vehicles. The initial database search identified 2160 articles, of which 203 were included in this review after rigorous screening and assessment. This study revealed that the most commonly used Artificial Intelligence (AI) algorithms employed in anomaly detection are neural networks like LSTM, CNN, and autoencoders,… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 17 pages, 2 tables, 5 figures

  2. arXiv:2304.02952  [pdf

    cs.HC

    Gotta Assess `Em All: A Risk Analysis of Criminal Offenses Facilitated through PokemonGO

    Authors: Ashly Fuller, Martin Lo, Angelica Holmes, Lu Lemanski, Marie Vasek, Enrico Mariconti

    Abstract: Location-based games have come to the forefront of popularity in casual and mobile gaming over the past six years. However, there is no hard data on crimes that these games enable, ranging from assault to cyberstalking to grooming. Given these potential harms, we conduct a risk assessment and quasi-experiment on the game features of location-based games. Using PokemonGO as a case study, we identif… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: 27 pages, Version under submission

  3. Waiting for Q: An Exploration of QAnon Users' Online Migration to Poal in the Wake of Voat's Demise

    Authors: Antonis Papasavva, Enrico Mariconti

    Abstract: Online communities are groups of people who interact primarily via the Internet, often sharing common interests. Some of these groups, particularly supporters of Q who created the far-right conspiracy theory known as QAnon, are highly toxic and controversial. These communities are often banned from various mainstream online social networks due to their controversy. This study examines the deplatfo… ▽ More

    Submitted 25 May, 2024; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: This paper has been accepted to the 16th ACM Web Science Conference (WebSci 2024). Please cite accordingly

  4. arXiv:2209.03050  [pdf, other

    cs.CR cs.AI

    Cerberus: Exploring Federated Prediction of Security Events

    Authors: Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro

    Abstract: Modern defenses against cyberattacks increasingly rely on proactive approaches, e.g., to predict the adversary's next actions based on past events. Building accurate prediction models requires knowledge from many organizations; alas, this entails disclosing sensitive information, such as network structures, security postures, and policies, which might often be undesirable or outright impossible. I… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 29th ACM Conference on Computer and Communications Security (ACM CCS 2022)

  5. Shedding Light on the Targeted Victim Profiles of Malicious Downloaders

    Authors: François Labrèche, Enrico Mariconti, Gianluca Stringhini

    Abstract: Malware affects millions of users worldwide, impacting the daily lives of many people as well as businesses. Malware infections are increasing in complexity and unfold over a number of stages. A malicious downloader often acts as the starting point as it fingerprints the victim's machine and downloads one or more additional malware payloads. Although previous research was conducted on these malici… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

    Comments: Published in the proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22)

  6. arXiv:2202.13922  [pdf, ps, other

    cs.CR cs.LG

    MaMaDroid2.0 -- The Holes of Control Flow Graphs

    Authors: Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir

    Abstract: Android malware is a continuously expanding threat to billions of mobile users around the globe. Detection systems are updated constantly to address these threats. However, a backlash takes the form of evasion attacks, in which an adversary changes malicious samples such that those samples will be misclassified as benign. This paper fully inspects a well-known Android malware detection system, MaM… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  7. Tiresias: Predicting Security Events Through Deep Learning

    Authors: Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini

    Abstract: With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (e.g., whether an attack w… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Journal ref: ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018

  8. arXiv:1805.08168  [pdf, other

    cs.CY cs.CR cs.SI

    "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks

    Authors: Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, Gianluca Stringhini

    Abstract: Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts by ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance of this phenomenon, however, online services often lack effective countermeasures to mitigate it. Unlike well-… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Journal ref: 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)

  9. arXiv:1803.03448  [pdf, other

    cs.CR

    A Family of Droids -- Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis

    Authors: Lucky Onwuzurike, Mario Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro

    Abstract: Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted them, designing and distributing malicious apps that steal information or cause harm to the device's owner. Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed. While the pros and cons of these analysis techniques are… ▽ More

    Submitted 13 July, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: A preliminary version of this paper appears in the Proceedings of 16th Annual Conference on Privacy, Security and Trust (PST 2018). This is the full version

  10. arXiv:1711.07477  [pdf, other

    cs.CR cs.AI

    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

    Authors: Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

    Abstract: As Android has become increasingly popular, so has malware targeting it, thus pushing the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue,… ▽ More

    Submitted 2 March, 2019; v1 submitted 20 November, 2017; originally announced November 2017.

    Comments: A preliminary version of this paper appears in the Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017) [arXiv:1612.04433]. This is the extended version, to appear in the ACM Transactions on Privacy and Security (ACM TOPS)

  11. arXiv:1702.04256  [pdf, other

    cs.SI

    What's in a Name? Understanding Profile Name Reuse on Twitter

    Authors: Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini

    Abstract: Users on Twitter are commonly identified by their profile names. These names are used when directly addressing users on Twitter, are part of their profile page URLs, and can become a trademark for popular accounts, with people referring to celebrities by their real name and their profile name, interchangeably. Twitter, however, has chosen to not permanently link profile names to their correspondin… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

    Comments: International World Wide Web Conference 2017

  12. arXiv:1612.04433  [pdf, other

    cs.CR

    MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models

    Authors: Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

    Abstract: The rise in popularity of the Android platform has resulted in an explosion of malware threats targeting it. As both Android malware and the operating system itself constantly evolve, it is very challenging to design robust malware mitigation techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MaMaDroid, an Androi… ▽ More

    Submitted 20 November, 2017; v1 submitted 13 December, 2016; originally announced December 2016.

    Comments: This paper appears in the Proceedings of 24th Network and Distributed System Security Symposium (NDSS 2017). Some experiments have been slightly updated in this version