Skip to main content

Showing 1–14 of 14 results for author: Gaspari, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.13523  [pdf, other

    cs.LG cs.AI cs.CR

    Have You Poisoned My Data? Defending Neural Networks against Data Poisoning

    Authors: Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini

    Abstract: The unprecedented availability of training data fueled the rapid development of powerful neural networks in recent years. However, the need for such large amounts of data leads to potential threats such as poisoning attacks: adversarial manipulations of the training data aimed at compromising the learned model to achieve a given adversarial goal. This paper investigates defenses against clean-la… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Paper accepted for publication at European Symposium on Research in Computer Security (ESORICS) 2024

  2. arXiv:2403.03593  [pdf, other

    cs.CR cs.AI

    Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

    Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz

    Abstract: Training high-quality deep learning models is a challenging task due to computational and technical requirements. A growing number of individuals, institutions, and companies increasingly rely on pre-trained, third-party models made available in public repositories. These models are often used directly or integrated in product pipelines with no particular precautions, since they are effectively ju… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 16 pages, 9 figures

  3. arXiv:2303.00431  [pdf, other

    cs.CV cs.CY cs.LG

    OliVaR: Improving Olive Variety Recognition using Deep Neural Networks

    Authors: Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez

    Abstract: The easy and accurate identification of varieties is fundamental in agriculture, especially in the olive sector, where more than 1200 olive varieties are currently known worldwide. Varietal misidentification leads to many potential problems for all the actors in the sector: farmers and nursery workers may establish the wrong variety, leading to its maladaptation in the field; olive oil and table o… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Comments: 10 pages, 9 figures

  4. DOLOS: A Novel Architecture for Moving Target Defense

    Authors: Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini

    Abstract: Moving Target Defense and Cyber Deception emerged in recent years as two key proactive cyber defense approaches, contrasting with the static nature of the traditional reactive cyber defense. The key insight behind these approaches is to impose an asymmetric disadvantage for the attacker by using deception and randomization techniques to create a dynamic attack surface. Moving Target Defense typica… ▽ More

    Submitted 27 September, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 16 pages

    Journal ref: IEEE Transactions on Information Forensics and Security, 2023

  5. arXiv:2301.11050  [pdf, other

    cs.CR cs.CY cs.LG

    Minerva: A File-Based Ransomware Detector

    Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Ransomware attacks have caused billions of dollars in damages in recent years, and are expected to cause billions more in the future. Consequently, significant effort has been devoted to ransomware detection and mitigation. Behavioral-based ransomware detection approaches have garnered considerable attention recently. These behavioral detectors typically rely on process-based behavioral profiles t… ▽ More

    Submitted 16 April, 2024; v1 submitted 26 January, 2023; originally announced January 2023.

    Comments: 14 pages

  6. arXiv:2106.00541  [pdf, other

    cs.CR cs.LG cs.NI

    MalPhase: Fine-Grained Malware Detection Using Network Flow Data

    Authors: Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic

    Abstract: Economic incentives encourage malware authors to constantly develop new, increasingly complex malware to steal sensitive data or blackmail individuals and companies into paying large ransoms. In 2017, the worldwide economic impact of cyberattacks is estimated to be between 445 and 600 billion USD, or 0.8% of global GDP. Traditionally, one of the approaches used to defend against malware is network… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Paper accepted for publication at ACM AsiaCCS 2021

  7. arXiv:2105.06165  [pdf, other

    cs.CR cs.LG

    PassFlow: Guessing Passwords with Generative Flows

    Authors: Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini

    Abstract: Recent advances in generative machine learning models rekindled research interest in the area of password guessing. Data-driven password guessing approaches based on GANs, language models and deep latent variable models have shown impressive generalization performance and offer compelling properties for the task of password guessing. In this paper, we propose PassFlow, a flow-based generative mode… ▽ More

    Submitted 14 December, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: 12 pages, 6 figures, 6 tables

  8. arXiv:2103.17059  [pdf, other

    cs.CR cs.LG

    Reliable Detection of Compressed and Encrypted Data

    Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted data fragments. Typically, current approaches employ statistics derived from byte-level distribution, such as entropy estimation, to identify encrypted fragments. However, modern content types use compression techniques which alter data distribution pushing it cl… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: 12 pages, 8 figures. arXiv admin note: substantial text overlap with arXiv:2010.07754

  9. arXiv:2010.07754  [pdf, other

    cs.CR cs.LG

    EnCoD: Distinguishing Compressed and Encrypted File Fragments

    Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Reliable identification of encrypted file fragments is a requirement for several security applications, including ransomware detection, digital forensics, and traffic analysis. A popular approach consists of estimating high entropy as a proxy for randomness. However, many modern content types (e.g. office documents, media files, etc.) are highly compressed for storage and transmission efficiency.… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: 19 pages, 6 images, 2 tables. Accepted for publication at the 14th International Conference on Network and System Security (NSS2020)

  10. arXiv:2005.00283  [pdf, other

    cs.CL

    Facilitating Access to Multilingual COVID-19 Information via Neural Machine Translation

    Authors: Andy Way, Rejwanul Haque, Guodong Xie, Federico Gaspari, Maja Popovic, Alberto Poncelas

    Abstract: Every day, more people are becoming infected and dying from exposure to COVID-19. Some countries in Europe like Spain, France, the UK and Italy have suffered particularly badly from the virus. Others such as Germany appear to have coped extremely well. Both health professionals and the general public are keen to receive up-to-date information on the effects of the virus, as well as treatments that… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

  11. arXiv:1911.02423  [pdf, other

    cs.CR cs.LG

    The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

    Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Recent progress in machine learning has generated promising results in behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. Behavioral features hold great promise as they are intrinsically related to the functioning of each malware, and are therefore considered difficult to evade. Indeed, while a significant amount of resu… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

    Comments: 15 pages, 6 figures, 4 tables

  12. arXiv:1803.10664  [pdf

    cs.CR

    Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0

    Authors: Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca, Fabio De Gaspari

    Abstract: This report - a major revision of its previous release - describes a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152 "Intelligent Autonomous Agents for Cyber Defense… ▽ More

    Submitted 22 March, 2023; v1 submitted 28 March, 2018; originally announced March 2018.

    Comments: This is a major revision and extension of the earlier release of AICA Reference Architecture

    Report number: ARL-SR-0421

  13. arXiv:1608.04766  [pdf, other

    cs.CR cs.NI

    Know Your Enemy: Stealth Configuration-Information Gathering in SDN

    Authors: Mauro Conti, Fabio De Gaspari, Luigi V. Mancini

    Abstract: Software Defined Networking (SDN) is a network architecture that aims at providing high flexibility through the separation of the network logic from the forwarding functions. The industry has already widely adopted SDN and researchers thoroughly analyzed its vulnerabilities, proposing solutions to improve its security. However, we believe important security aspects of SDN are still left uninvestig… ▽ More

    Submitted 16 August, 2016; originally announced August 2016.

  14. arXiv:1502.02234  [pdf, other

    cs.NI

    LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks

    Authors: Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran

    Abstract: Software Defined Networking (SDN) is a new networking architecture which aims to provide better decoupling between network control (control plane) and data forwarding functionalities (data plane). This separation introduces several benefits, such as a directly programmable and (virtually) centralized network control. However, researchers showed that the required communication channel between the c… ▽ More

    Submitted 8 February, 2015; originally announced February 2015.

    Comments: In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015). To appear