Skip to main content

Showing 1–18 of 18 results for author: Giacinto, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02011  [pdf, other

    cs.CR

    A Risk Estimation Study of Native Code Vulnerabilities in Android Applications

    Authors: Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto

    Abstract: Android is the most used Operating System worldwide for mobile devices, with hundreds of thousands of apps downloaded daily. Although these apps are primarily written in Java and Kotlin, advanced functionalities such as graphics or cryptography are provided through native C/C++ libraries. These libraries can be affected by common vulnerabilities in C/C++ code (e.g., memory errors such as buffer ov… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2405.01118  [pdf, other

    cs.CR

    A Survey of the Overlooked Dangers of Template Engines

    Authors: Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto

    Abstract: Template engines play a pivotal role in modern web application development, facilitating the dynamic rendering of content, products, and user interfaces. Nowadays, template engines are essential in any website that deals with dynamic data, from e-commerce platforms to social media. However, their widespread use also makes them attractive targets for attackers seeking to exploit vulnerabilities and… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 29 pages, 2 figures

  3. arXiv:2312.17356  [pdf, other

    cs.CR

    Can you See me? On the Visibility of NOPs against Android Malware Detectors

    Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger

    Abstract: Android malware still represents the most significant threat to mobile systems. While Machine Learning systems are increasingly used to identify these threats, past studies have revealed that attackers can bypass these detection mechanisms by making subtle changes to Android applications, such as adding specific API calls. These modifications are often referred to as No OPerations (NOP), which ide… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

  4. arXiv:2205.05573  [pdf, other

    cs.CR

    A Longitudinal Study of Cryptographic API: a Decade of Android Malware

    Authors: Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto

    Abstract: Cryptography has been extensively used in Android applications to guarantee secure communications, conceal critical data from reverse engineering, or ensure mobile users' privacy. Various system-based and third-party libraries for Android provide cryptographic functionalities, and previous works mainly explored the misuse of cryptographic API in benign applications. However, the role of cryptograp… ▽ More

    Submitted 6 July, 2022; v1 submitted 11 May, 2022; originally announced May 2022.

    Comments: Fix processing time data

  5. arXiv:2005.01452  [pdf, other

    cs.LG cs.CR stat.ML

    Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

    Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli

    Abstract: While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, they can be evaded by sparse evasion attacks crafted by injecting a small set of fake components, e.g., permissions and system calls, without compromising intrusive functionality. Previous work has shown that, to improve robustness against such attacks, learning algorithms should avoid overemphasizin… ▽ More

    Submitted 27 May, 2021; v1 submitted 4 May, 2020; originally announced May 2020.

  6. arXiv:1910.01037  [pdf, other

    cs.CR

    Automotive Cybersecurity: Foundations for Next-Generation Vehicles

    Authors: Michele Scalas, Giorgio Giacinto

    Abstract: The automotive industry is experiencing a serious transformation due to a digitalisation process and the transition to the new paradigm of Mobility-as-a-Service. The next-generation vehicles are going to be very complex cyber-physical systems, whose design must be reinvented to fulfil the increasing demand of smart services, both for safety and entertainment purposes, causing the manufacturers' mo… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Accepted to ICTCS 2019 conference

  7. arXiv:1904.10270  [pdf, other

    cs.CR

    PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

    Authors: Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto

    Abstract: PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents. Similarly to other scripting languages used by malware, PowerShell attacks are challenging to analyze due to the extensive use of multiple obfuscation layers, which make the rea… ▽ More

    Submitted 24 April, 2019; v1 submitted 23 April, 2019; originally announced April 2019.

  8. arXiv:1811.09985  [pdf, other

    cs.LG cs.CR stat.ML

    Poisoning Behavioral Malware Clustering

    Authors: Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli

    Abstract: Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems. However, the suitability of clustering algorithms for security-sensitive settings has been recently questioned by showing that they can be significantly compromised if an attacker can exercise some control… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Journal ref: 2014 ACM CCS Workshop on Artificial Intelligent and Security, AISec '14, pages 27-36, New York, NY, USA, 2014. ACM

  9. Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

    Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto

    Abstract: Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents. These infection vectors hide embedded malicious code to the victim users, facilitating the use of social engineering techniques to infect their machines. Research showed that machine-learning algorithms provide effective detection mechanisms against such t… ▽ More

    Submitted 14 April, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Journal ref: ACM Computing Surveys, Vol. 52, No. 4, Article 78, 2019

  10. On the Effectiveness of System API-Related Information for Android Ransomware Detection

    Authors: Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto

    Abstract: Ransomware constitutes a significant threat to the Android operating system. It can either lock or encrypt the target devices, and victims are forced to pay ransoms to restore their data. Hence, the prompt detection of such attacks has a priority in comparison to other malicious threats. Previous works on Android malware detection mainly focused on Machine Learning-oriented approaches that were ta… ▽ More

    Submitted 26 June, 2019; v1 submitted 24 May, 2018; originally announced May 2018.

    Journal ref: Computers & Security 86C (2019) pp. 168-182

  11. arXiv:1803.04173  [pdf, other

    cs.CR

    Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

    Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli

    Abstract: Machine-learning methods have already been exploited as useful tools for detecting malicious executable files. They leverage data retrieved from malware samples, such as header fields, instruction sequences, or even raw bytes, to learn models that discriminate between benign and malicious software. However, it has also been shown that machine learning and deep neural networks can be fooled by evas… ▽ More

    Submitted 12 March, 2018; originally announced March 2018.

  12. arXiv:1803.03544  [pdf, other

    cs.LG cs.CR stat.ML

    Explaining Black-box Android Malware Detection

    Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli

    Abstract: Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions. However, recent findings have highlighted the fragility of such in-vitro evaluations with benchmark datasets, showing that very few c… ▽ More

    Submitted 29 October, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: Published on the Proceedings of 26th European Signal Processing Conference (EUSIPCO '18)

  13. arXiv:1802.01185  [pdf, other

    cs.CR

    IntelliAV: Building an Effective On-Device Android Malware Detector

    Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto

    Abstract: The importance of employing machine learning for malware detection has become explicit to the security community. Several anti-malware vendors have claimed and advertised the application of machine learning in their products in which the inference phase is performed on servers and high-performance machines, but the feasibility of such approaches on mobile devices with limited computational resourc… ▽ More

    Submitted 4 February, 2018; originally announced February 2018.

  14. Adversarial Detection of Flash Malware: Limitations and Open Issues

    Authors: Davide Maiorca, Ambra Demontis, Battista Biggio, Fabio Roli, Giorgio Giacinto

    Abstract: During the past four years, Flash malware has become one of the most insidious threats to detect, with almost 600 critical vulnerabilities targeting Adobe Flash disclosed in the wild. Research has shown that machine learning can be successfully used to detect Flash malware by leveraging static analysis to extract information from the structure of the file or its bytecode. However, the robustness o… ▽ More

    Submitted 14 July, 2020; v1 submitted 27 October, 2017; originally announced October 2017.

    Journal ref: Computers and Security, Volume 96, September 2020, 101901

  15. Evasion Attacks against Machine Learning at Test Time

    Authors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli

    Abstract: In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present a simple but effective gradient-based approach that can be exploited to systema… ▽ More

    Submitted 21 August, 2017; originally announced August 2017.

    Comments: In this paper, in 2013, we were the first to introduce the notion of evasion attacks (adversarial examples) created with high confidence (instead of minimum-distance misclassifications), and the notion of surrogate learners (substitute models). These two concepts are now widely re-used in develo** attacks against deep networks (even if not always referring to the ideas reported in this work). arXiv admin note: text overlap with arXiv:1401.7727

    Journal ref: ECML PKDD, Part III, vol. 8190, LNCS, pp. 387--402. Springer, 2013

  16. arXiv:1704.08996  [pdf, other

    cs.CR

    Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

    Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli

    Abstract: To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for malware detection. However, its security against well-crafted attacks has not only been recently questioned, but it has been shown that machine learning exhibits inherent vulnerabilities that can be exploited to evade detection at test time. In ot… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

    Comments: Accepted for publication on IEEE Transactions on Dependable and Secure Computing

  17. arXiv:1511.04317  [pdf, other

    cs.CR cs.AI

    Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification

    Authors: Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto

    Abstract: Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, which causes an enormous growth in the number of variants of malware samples. Categorization of malware samples on the basis of their behaviors is essential for the computer security community, because they receive huge number of malware everyday, and the signature extraction process is usually based on… ▽ More

    Submitted 10 March, 2016; v1 submitted 13 November, 2015; originally announced November 2015.

  18. arXiv:1401.7727  [pdf, other

    cs.LG cs.CR

    Security Evaluation of Support Vector Machines in Adversarial Environments

    Authors: Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli

    Abstract: Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain info… ▽ More

    Submitted 29 January, 2014; originally announced January 2014.

    Comments: 47 pages, 9 figures; chapter accepted into book 'Support Vector Machine Applications'