Skip to main content

Showing 1–6 of 6 results for author: Lagorio, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.11289  [pdf, other

    cs.CR

    Longitudinal Study of the Prevalence of Malware Evasive Techniques

    Authors: Lorenzo Maffia, Dario Nisi, Platon Kotzias, Giovanni Lagorio, Simone Aonzo, Davide Balzarotti

    Abstract: By their very nature, malware samples employ a variety of techniques to conceal their malicious behavior and hide it from analysis tools. To mitigate the problem, a large number of different evasion techniques have been documented over the years, and PoC implementations have been collected in public frameworks, like the popular Al-Khaser. As malware authors tend to reuse existing approaches, it is… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  2. arXiv:2008.07125  [pdf, other

    cs.CR cs.LG

    Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

    Authors: Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli

    Abstract: Recent work has shown that adversarial Windows malware samples - referred to as adversarial EXEmples in this paper - can bypass machine learning-based detection relying on static code analysis by perturbing relatively few input bytes. To preserve malicious functionality, previous attacks either add bytes to existing non-functional areas of the file, potentially limiting their effectiveness, or req… ▽ More

    Submitted 22 March, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Journal ref: ACM Transactions on Privacy and Security, 2021

  3. Functionality-preserving Black-box Optimization of Adversarial Windows Malware

    Authors: Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando

    Abstract: Windows malware detectors based on machine learning are vulnerable to adversarial examples, even if the attacker is only given black-box query access to the model. The main drawback of these attacks is that: (i) they are query-inefficient, as they rely on iteratively applying random transformations to the input malware; and (ii) they may also require executing the adversarial malware in a sandbox… ▽ More

    Submitted 18 February, 2021; v1 submitted 30 March, 2020; originally announced March 2020.

  4. WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

    Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio

    Abstract: Web Application Firewalls are widely used in production environments to mitigate security threats like SQL injections. Many industrial products rely on signature-based techniques, but machine learning approaches are becoming more and more popular. The main goal of an adversary is to craft semantically malicious payloads to bypass the syntactic analysis performed by a WAF. In this paper, we present… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the 35th Annual ACM Symposium on Applied Computing 2020

  5. arXiv:1901.03583  [pdf, other

    cs.CR

    Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries

    Authors: Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando

    Abstract: Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted perturbations to input malware that enable misleading classification. Although this has questioned their suitability for this task, it is not yet clear why such algorithms are easily fooled also in this particular application domain. In this work, we take… ▽ More

    Submitted 24 January, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

  6. Coinductive subty** for abstract compilation of object-oriented languages into Horn formulas

    Authors: Davide Ancona, Giovanni Lagorio

    Abstract: In recent work we have shown how it is possible to define very precise type systems for object-oriented languages by abstractly compiling a program into a Horn formula f. Then type inference amounts to resolving a certain goal w.r.t. the coinductive (that is, the greatest) Herbrand model of f. Type systems defined in this way are idealized, since in the most interesting instantiations both the… ▽ More

    Submitted 7 June, 2010; originally announced June 2010.

    ACM Class: D.3.1; F.3.2

    Journal ref: EPTCS 25, 2010, pp. 214-230