Skip to main content

Showing 1–26 of 26 results for author: Demetrio, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13547  [pdf, other

    cs.LG

    ModSec-Learn: Boosting ModSecurity with Machine Learning

    Authors: Christian Scano, Giuseppe Floris, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio

    Abstract: ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set (CRS), identifying well-known attack patterns. Each rule is manually assigned a weight based on the severity of the corresponding attack, and a request is blocked if the sum of the weights of matche… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2308.04964

  2. arXiv:2406.10090  [pdf, other

    cs.LG

    Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

    Authors: Zhang Chen, Luca Demetrio, Srishti Gupta, Xiaoyi Feng, Zhaoqiang Xia, Antonio Emanuele Cinà, Maura Pintor, Luca Oneto, Ambra Demontis, Battista Biggio, Fabio Roli

    Abstract: Thanks to their extensive capacity, over-parameterized neural networks exhibit superior predictive capabilities and generalization. However, having a large parameter space is considered one of the main suspects of the neural networks' vulnerability to adversarial example -- input samples crafted ad-hoc to induce a desired misclassification. Relevant literature has claimed contradictory remarks in… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    MSC Class: 68T10 ACM Class: I.5

  3. arXiv:2405.14519  [pdf, ps, other

    cs.LG

    A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection

    Authors: Marco Rando, Luca Demetrio, Lorenzo Rosasco, Fabio Roli

    Abstract: Machine learning malware detectors are vulnerable to adversarial EXEmples, i.e. carefully-crafted Windows programs tailored to evade detection. Unlike other adversarial problems, attacks in this context must be functionality-preserving, a constraint which is challenging to address. As a consequence heuristic algorithms are typically used, that inject new content, either randomly-picked or harveste… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  4. arXiv:2405.14478  [pdf, other

    cs.CR cs.AI

    SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

    Authors: Andrea Ponte, Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Ivan Tesfai Ogbu, Fabio Roli

    Abstract: As a result of decades of research, Windows malware detection is approached through a plethora of techniques. However, there is an ongoing mismatch between academia -- which pursues an optimal performances in terms of detection rate and low false alarms -- and the requirements of real-world scenarios. In particular, academia focuses on combining static and dynamic analysis within a single or ensem… ▽ More

    Submitted 5 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

  5. arXiv:2405.02646  [pdf, other

    cs.CR

    Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples

    Authors: Matous Kozak, Luca Demetrio, Dmitrijs Trizna, Fabio Roli

    Abstract: Adversarial EXEmples are carefully-perturbed programs tailored to evade machine learning Windows malware detectors, with an on-going effort in develo** robust models able to address detection effectiveness. However, even if robust models can prevent the majority of EXEmples, to maintain predictive power over time, models are fine-tuned to newer threats, leading either to partial updates or time-… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 11 pages, 3 figures, 7 tables

  6. arXiv:2405.00392  [pdf, other

    cs.CR cs.AI

    Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing

    Authors: Daniel Gibert, Luca Demetrio, Giulio Zizzo, Quan Le, Jordi Planes, Battista Biggio

    Abstract: Deep learning-based malware detection systems are vulnerable to adversarial EXEmples - carefully-crafted malicious programs that evade detection with minimal perturbation. As such, the community is dedicating effort to develop mechanisms to defend against adversarial EXEmples. However, current randomized smoothing-based defenses are still vulnerable to attacks that inject blocks of adversarial con… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  7. arXiv:2404.19460  [pdf, other

    cs.LG cs.CR cs.CV

    AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples

    Authors: Antonio Emanuele Cinà, Jérôme Rony, Maura Pintor, Luca Demetrio, Ambra Demontis, Battista Biggio, Ismail Ben Ayed, Fabio Roli

    Abstract: Adversarial examples are typically optimized with gradient-based attacks. While novel attacks are continuously proposed, each is shown to outperform its predecessors using different experimental setups, hyperparameter settings, and number of forward and backward calls to the target models. This provides overly-optimistic and even biased evaluations that may unfairly favor one particular attack ove… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: https://attackbench.github.io

  8. arXiv:2402.18329  [pdf, other

    cs.CR cs.LG

    Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation

    Authors: Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli

    Abstract: The living-off-the-land (LOTL) offensive methodologies rely on the perpetration of malicious actions through chains of commands executed by legitimate applications, identifiable exclusively by analysis of system logs. LOTL techniques are well hidden inside the stream of events generated by common legitimate activities, moreover threat actors often camouflage activity through obfuscation, making th… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  9. arXiv:2402.17390  [pdf, other

    cs.LG cs.CR

    Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

    Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli

    Abstract: Machine-learning models demand for periodic updates to improve their average accuracy, exploiting novel architectures and additional data. However, a newly-updated model may commit mistakes that the previous model did not make. Such misclassifications are referred to as negative flips, and experienced by users as a regression of performance. In this work, we show that this problem also affects rob… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  10. arXiv:2310.10664  [pdf, other

    cs.CR cs.LG

    Nebula: Self-Attention for Dynamic Malware Analysis

    Authors: Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli

    Abstract: Dynamic analysis enables detecting Windows malware by executing programs in a controlled environment, and storing their actions in log reports. Previous work has started training machine learning models on such reports to perform either malware detection or malware classification. However, most of the approaches (i) have only considered convolutional and long-short term memory networks, (ii) they… ▽ More

    Submitted 19 September, 2023; originally announced October 2023.

    Comments: 18 pages, 7 figures, 12 tables, preprint, in review

  11. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors

    Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio

    Abstract: Machine-learning phishing webpage detectors (ML-PWD) have been shown to suffer from adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks recently proposed have demonstrated limited effectiveness due to their lack of optimizing the usage of the adopted manipulations, and they focus solely on specific elements of the HTML code. In this work, we overcome these li… ▽ More

    Submitted 13 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

    Comments: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security (AISec '23), November 30, 2023, Copenhagen, Denmark

  12. arXiv:2309.07106  [pdf, other

    cs.CV cs.CR

    Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

    Authors: Yang Zheng, Luca Demetrio, Antonio Emanuele Cinà, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Battista Biggio, Fabio Roli

    Abstract: RGB-D object recognition systems improve their predictive performances by fusing color and depth information, outperforming neural network architectures that rely solely on colors. While RGB-D systems are expected to be more robust to adversarial examples than RGB-only systems, they have also been proven to be highly vulnerable. Their robustness is similar even when the adversarial examples are ge… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: Accepted for publication in the Information Sciences journal

  13. arXiv:2308.04964  [pdf, other

    cs.LG cs.CR

    Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

    Authors: Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio

    Abstract: ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set, identifying well-known attack patterns. Each rule in the CRS is manually assigned a weight, based on the severity of the corresponding attack, and a request is detected as malicious if the sum of t… ▽ More

    Submitted 17 August, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

  14. arXiv:2212.06123  [pdf, other

    cs.LG cs.RO

    A Survey on Reinforcement Learning Security with Application to Autonomous Driving

    Authors: Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli

    Abstract: Reinforcement learning allows machines to learn from their own experience. Nowadays, it is used in safety-critical applications, such as autonomous driving, despite being vulnerable to attacks carefully crafted to either prevent that the reinforcement learning algorithm learns an effective and reliable policy, or to induce the trained agent to make a wrong decision. The literature about the securi… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  15. arXiv:2208.05285  [pdf, other

    cs.CR cs.LG

    Explaining Machine Learning DGA Detectors from DNS Traffic Data

    Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio

    Abstract: One of the most common causes of lack of continuity of online systems stems from a widely popular Cyber Attack known as Distributed Denial of Service (DDoS), in which a network of infected devices (botnet) gets exploited to flood the computational capacity of services through the commands of an attacker. This attack is made by leveraging the Domain Name System (DNS) technology through Domain Gener… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

  16. arXiv:2208.04838  [pdf, ps, other

    cs.CR

    Robust Machine Learning for Malware Detection over Time

    Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio

    Abstract: The presence and persistence of Android malware is an on-going threat that plagues this information era, and machine learning technologies are now extensively used to deploy more effective detectors that can block the majority of these malicious programs. However, these algorithms have not been developed to pursue the natural evolution of malware, and their performances significantly degrade over… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

  17. Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

    Authors: Luca Demetrio, Battista Biggio, Fabio Roli

    Abstract: While machine learning is vulnerable to adversarial examples, it still lacks systematic procedures and tools for evaluating its security in different application contexts. In this article, we discuss how to develop automated and scalable security evaluations of machine learning using practical attacks, reporting a use case on Windows malware detection.

    Submitted 12 July, 2022; originally announced July 2022.

    Journal ref: IEEE Security & Privacy, 2022

  18. arXiv:2205.13618  [pdf, other

    cs.CV cs.CR cs.LG

    Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors

    Authors: Avishag Shapira, Alon Zolfi, Luca Demetrio, Battista Biggio, Asaf Shabtai

    Abstract: Adversarial attacks against deep learning-based object detectors have been studied extensively in the past few years. Most of the attacks proposed have targeted the model's integrity (i.e., caused the model to make incorrect predictions), while adversarial attacks targeting the model's availability, a critical aspect in safety-critical domains such as autonomous driving, have not yet been explored… ▽ More

    Submitted 17 November, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

  19. arXiv:2203.04412  [pdf, other

    cs.CR cs.CV cs.LG

    ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

    Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli

    Abstract: Adversarial patches are optimized contiguous pixel blocks in an input image that cause a machine-learning model to misclassify it. However, their optimization is computationally demanding, and requires careful hyperparameter tuning, potentially leading to suboptimal robustness evaluations. To overcome these issues, we propose ImageNet-Patch, a dataset to benchmark machine-learning models against a… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

  20. arXiv:2106.09947  [pdf, other

    cs.LG cs.CR cs.CV

    Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

    Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli

    Abstract: Evaluating robustness of machine-learning models to adversarial examples is a challenging problem. Many defenses have been shown to provide a false sense of robustness by causing gradient-based attacks to fail, and they have been broken under more rigorous evaluations. Although guidelines and best practices have been suggested to improve current adversarial robustness evaluations, the lack of auto… ▽ More

    Submitted 11 October, 2022; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: Accepted at NeurIPS 2022

  21. arXiv:2104.12848  [pdf, ps, other

    cs.CR

    secml-malware: Pentesting Windows Malware Classifiers with Adversarial EXEmples in Python

    Authors: Luca Demetrio, Battista Biggio

    Abstract: Machine learning has been increasingly used as a first line of defense for Windows malware detection. Recent work has however shown that learning-based malware detectors can be evaded by carefully-perturbed input malware samples, referred to as adversarial EXEmples, thus demanding for tools that can ease and automate the adversarial robustness evaluation of such detectors. To this end, we present… ▽ More

    Submitted 29 July, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

  22. arXiv:2008.07125  [pdf, other

    cs.CR cs.LG

    Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

    Authors: Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli

    Abstract: Recent work has shown that adversarial Windows malware samples - referred to as adversarial EXEmples in this paper - can bypass machine learning-based detection relying on static code analysis by perturbing relatively few input bytes. To preserve malicious functionality, previous attacks either add bytes to existing non-functional areas of the file, potentially limiting their effectiveness, or req… ▽ More

    Submitted 22 March, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Journal ref: ACM Transactions on Privacy and Security, 2021

  23. Functionality-preserving Black-box Optimization of Adversarial Windows Malware

    Authors: Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando

    Abstract: Windows malware detectors based on machine learning are vulnerable to adversarial examples, even if the attacker is only given black-box query access to the model. The main drawback of these attacks is that: (i) they are query-inefficient, as they rely on iteratively applying random transformations to the input malware; and (ii) they may also require executing the adversarial malware in a sandbox… ▽ More

    Submitted 18 February, 2021; v1 submitted 30 March, 2020; originally announced March 2020.

  24. WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

    Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio

    Abstract: Web Application Firewalls are widely used in production environments to mitigate security threats like SQL injections. Many industrial products rely on signature-based techniques, but machine learning approaches are becoming more and more popular. The main goal of an adversary is to craft semantically malicious payloads to bypass the syntactic analysis performed by a WAF. In this paper, we present… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the 35th Annual ACM Symposium on Applied Computing 2020

  25. arXiv:1912.10013  [pdf, other

    cs.LG cs.CR cs.CV cs.GT stat.ML

    secml: A Python Library for Secure and Explainable Machine Learning

    Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio

    Abstract: We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the secu… ▽ More

    Submitted 13 May, 2022; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted for publication to SoftwareX. Published version can be found at: https://doi.org/10.1016/j.softx.2022.101095

    Journal ref: SoftwareX 18 (2022)

  26. arXiv:1901.03583  [pdf, other

    cs.CR

    Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries

    Authors: Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando

    Abstract: Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted perturbations to input malware that enable misleading classification. Although this has questioned their suitability for this task, it is not yet clear why such algorithms are easily fooled also in this particular application domain. In this work, we take… ▽ More

    Submitted 24 January, 2019; v1 submitted 11 January, 2019; originally announced January 2019.