Skip to main content

Showing 1–5 of 5 results for author: Carminati, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11698  [pdf, other

    cs.AI cs.DC

    A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications

    Authors: Antonio Boiano, Marco Di Gennaro, Luca Barbieri, Michele Carminati, Monica Nicoli, Alessandro Redondi, Stefano Savazzi, Albert Sund Aillet, Diogo Reis Santos, Luigi Serio

    Abstract: Federated Learning (FL) has emerged as a promising approach for privacy-preserving machine learning, particularly in sensitive domains such as healthcare. In this context, the TRUSTroke project aims to leverage FL to assist clinicians in ischemic stroke prediction. This paper provides an overview of the TRUSTroke FL network infrastructure. The proposed architecture adopts a client-server model wit… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  2. CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks

    Authors: Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero

    Abstract: Current research in the automotive domain has proven the limitations of the CAN protocol from a security standpoint. Application-layer attacks, which involve the creation of malicious packets, are deemed feasible from remote but can be easily detected by modern IDS. On the other hand, more recent link-layer attacks are stealthier and possibly more disruptive but require physical access to the bus.… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: To appear in CCS'22

  3. arXiv:2208.06628  [pdf, other

    cs.CR

    CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks

    Authors: Stefano Longari, Alessandro Nichelini, Carlo Alberto Pozzoli, Michele Carminati, Stefano Zanero

    Abstract: Over the years, the increasingly complex and interconnected vehicles raised the need for effective and efficient Intrusion Detection Systems against on-board networks. In light of the stringent domain requirements and the heterogeneity of information transmitted on Controller Area Network, multiple approaches have been proposed, which work at different abstraction levels and granularities. Among t… ▽ More

    Submitted 13 August, 2022; originally announced August 2022.

  4. arXiv:2011.05808  [pdf, other

    cs.CY

    AIRSENSE-TO-ACT: A Concept Paper for COVID-19 Countermeasures based on Artificial Intelligence algorithms and multi-sources Data Processing

    Authors: A. Sebastianelli, F. Mauro, G. Di Cosmo, F. Passarini, M. Carminati, S. L. Ullo

    Abstract: Aim of this paper is the description of a new tool to support institutions in the implementation of targeted countermeasures, based on quantitative and multi-scale elements, for the fight and prevention of emergencies, such as the current COVID-19 pandemic. The tool is a centralized system (web application), single multi-user platform, which relies on Artificial Intelligence (AI) algorithms for th… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: 19 pages, 14 figures, 50 references, sottomesso ad una Special Issue di ISPRS International Journal of Geo-Information (https://www.mdpi.com/journal/ijgi/special_issues/Impacts_COVID-19 ), attualmente under review

  5. Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems

    Authors: Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer

    Abstract: Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based detectors operate on the measured sensor data, leveraging physical process models learned a priori. In this work, we investigate different approaches to e… ▽ More

    Submitted 12 October, 2020; v1 submitted 17 July, 2019; originally announced July 2019.

    Comments: Proceedings of the Annual Computer Security Applications Conference (ACSAC) 2020