Skip to main content

Showing 1–5 of 5 results for author: Bilge, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.14657  [pdf, other

    cs.CR cs.LG

    Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance

    Authors: Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge

    Abstract: Many studies have proposed machine-learning (ML) models for malware detection and classification, reporting an almost-perfect performance. However, they assemble ground-truth in different ways, use diverse static- and dynamic-analysis techniques for feature extraction, and even differ on what they consider a malware family. As a consequence, our community still lacks an understanding of malware cl… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

  2. arXiv:2304.00927  [pdf, other

    cs.CY

    Quantifying Carbon Emissions due to Online Third-Party Tracking

    Authors: Michalis Pachilakis, Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge

    Abstract: In the past decade, global warming made several headlines and turned the attention of the whole world to it. Carbon footprint is the main factor that drives greenhouse emissions up and results in the temperature increase of the planet with dire consequences. While the attention of the public is turned to reducing carbon emissions by transportation, food consumption and household activities, we ign… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  3. arXiv:2301.07346  [pdf, other

    cs.CR cs.CY

    One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles

    Authors: Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero

    Abstract: Previous work has investigated the particularities of security practices within specific user communities defined based on country of origin, age, prior tech abuse, and economic status. Their results highlight that current security solutions that adopt a one-size-fits-all-users approach ignore the differences and needs of particular user communities. However, those works focus on a single communit… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

  4. Unsupervised Detection and Clustering of Malicious TLS Flows

    Authors: Gibran Gomez, Platon Kotzias, Matteo Dell'Amico, Leyla Bilge, Juan Caballero

    Abstract: Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious TLS flows is an important, but challenging, problem. Prior works have proposed supervised machine learning detectors using TLS features. However, by trying to represent all malicious traffic, supervised binary detectors produce models that are… ▽ More

    Submitted 23 December, 2022; v1 submitted 8 September, 2021; originally announced September 2021.

  5. arXiv:2010.10088  [pdf, other

    cs.CR

    How Did That Get In My Phone? Unwanted App Distribution on Android Devices

    Authors: Platon Kotzias, Juan Caballero, Leyla Bilge

    Abstract: Android is the most popular operating system with billions of active devices. Unfortunately, its popularity and openness makes it attractive for unwanted apps, i.e., malware and potentially unwanted programs (PUP). In Android, app installations typically happen via the official and alternative markets, but also via other smaller and less understood alternative distribution vectors such as Web down… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: 17 pages, 3 figures, to be published at 42nd IEEE Symposium on Security and Privacy, 23-27 May 2021, San Fransisco, CA, USA