Skip to main content

Showing 1–10 of 10 results for author: Marchetti, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15103  [pdf, other

    cs.CR

    Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study

    Authors: Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti

    Abstract: Consumer IP cameras are now the most widely adopted solution for remote monitoring in various contexts, such as private homes or small offices. While the security of these devices has been scrutinized, most approaches are limited to relatively shallow network-based analyses. In this paper, we discuss a methodology for the security analysis and identification of remotely exploitable vulnerabilities… ▽ More

    Submitted 24 June, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

    Comments: 8 pages, 3 figures, accepted for publication at the 19th International Workshop on Security (IWSEC 2024)

  2. arXiv:2405.05023  [pdf, other

    cs.CR

    HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture

    Authors: Dario Stabili, Filip Valgimigli, Edoardo Torrini, Mirco Marchetti

    Abstract: In this paper, we introduce the design of HackCar, a testing platform for replicating attacks and defenses on a generic automotive system without requiring access to a complete vehicle. This platform empowers security researchers to illustrate the consequences of attacks targeting an automotive system on a realistic platform, facilitating the development and testing of security countermeasures aga… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 7 pages, 2 figures, accepted for publication at the 35th IEEE Intelligent Vehicles Symposium (IEEE IV 2024)

  3. arXiv:2403.11830  [pdf, other

    cs.CR cs.AI

    Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks

    Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti

    Abstract: Machine Learning (ML) algorithms have become increasingly popular for supporting Network Intrusion Detection Systems (NIDS). Nevertheless, extensive research has shown their vulnerability to adversarial attacks, which involve subtle perturbations to the inputs of the models aimed at compromising their performance. Recent proposals have effectively leveraged Graph Neural Networks (GNN) to produce p… ▽ More

    Submitted 23 April, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: preprint submitted to IEEE TIFS, under review

  4. arXiv:2307.04561  [pdf, other

    cs.CR cs.PF

    Performance comparison of timing-based anomaly detectors for Controller Area Network: a reproducible study

    Authors: Francesco Pollicino, Dario Stabili, Mirco Marchetti

    Abstract: This work presents an experimental evaluation of the detection performance of eight different algorithms for anomaly detection on the Controller Area Network (CAN) bus of modern vehicles based on the analysis of the timing or frequency of CAN messages. This work solves the current limitations of related scientific literature, that is based on private dataset, lacks of open implementations, and det… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  5. arXiv:2204.11357  [pdf, ps, other

    cs.LG cs.CR cs.NI

    Improving Deep Learning Model Robustness Against Adversarial Attack by Increasing the Network Capacity

    Authors: Marco Marchetti, Edmond S. L. Ho

    Abstract: Nowadays, we are more and more reliant on Deep Learning (DL) models and thus it is essential to safeguard the security of these systems. This paper explores the security issues in Deep Learning and analyses, through the use of experiments, the way forward to build more resilient models. Experiments are conducted to identify the strengths and weaknesses of a new approach to improve the robustness o… ▽ More

    Submitted 24 April, 2022; originally announced April 2022.

    ACM Class: I.2.10

  6. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

    Authors: Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni

    Abstract: The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types of risks. Multiple researches have shown that machine learning methods are vulnerable to adversarial attacks that create tiny perturbations aimed at decreasing the effectiveness of detecting threats. We observe that existing literature assumes threat mod… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  7. Hardening Random Forest Cyber Detectors Against Adversarial Attacks

    Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti

    Abstract: Machine learning algorithms are effective in several applications, but they are not as much successful when applied to intrusion detection in cyber security. Due to the high sensitivity to their training data, cyber detectors based on machine learning are vulnerable to targeted adversarial attacks that involve the perturbation of initial samples. Existing defenses assume unrealistic scenarios; the… ▽ More

    Submitted 8 December, 2019; originally announced December 2019.

  8. arXiv:1902.03368  [pdf, other

    cs.CV

    Skin Lesion Analysis Toward Melanoma Detection 2018: A Challenge Hosted by the International Skin Imaging Collaboration (ISIC)

    Authors: Noel Codella, Veronica Rotemberg, Philipp Tschandl, M. Emre Celebi, Stephen Dusza, David Gutman, Brian Helba, Aadi Kalloo, Konstantinos Liopyris, Michael Marchetti, Harald Kittler, Allan Halpern

    Abstract: This work summarizes the results of the largest skin image analysis challenge in the world, hosted by the International Skin Imaging Collaboration (ISIC), a global partnership that has organized the world's largest public repository of dermoscopic images of skin. The challenge was hosted in 2018 at the Medical Image Computing and Computer Assisted Intervention (MICCAI) conference in Granada, Spain… ▽ More

    Submitted 29 March, 2019; v1 submitted 8 February, 2019; originally announced February 2019.

    Comments: https://challenge2018.isic-archive.com/

  9. arXiv:1710.05006  [pdf, other

    cs.CV

    Skin Lesion Analysis Toward Melanoma Detection: A Challenge at the 2017 International Symposium on Biomedical Imaging (ISBI), Hosted by the International Skin Imaging Collaboration (ISIC)

    Authors: Noel C. F. Codella, David Gutman, M. Emre Celebi, Brian Helba, Michael A. Marchetti, Stephen W. Dusza, Aadi Kalloo, Konstantinos Liopyris, Nabin Mishra, Harald Kittler, Allan Halpern

    Abstract: This article describes the design, implementation, and results of the latest installment of the dermoscopic image analysis benchmark challenge. The goal is to support research and development of algorithms for automated diagnosis of melanoma, the most lethal skin cancer. The challenge was divided into 3 tasks: lesion segmentation, feature detection, and disease classification. Participation involv… ▽ More

    Submitted 8 January, 2018; v1 submitted 13 October, 2017; originally announced October 2017.

  10. arXiv:1605.01397  [pdf, other

    cs.CV

    Skin Lesion Analysis toward Melanoma Detection: A Challenge at the International Symposium on Biomedical Imaging (ISBI) 2016, hosted by the International Skin Imaging Collaboration (ISIC)

    Authors: David Gutman, Noel C. F. Codella, Emre Celebi, Brian Helba, Michael Marchetti, Nabin Mishra, Allan Halpern

    Abstract: In this article, we describe the design and implementation of a publicly accessible dermatology image analysis benchmark challenge. The goal of the challenge is to sup- port research and development of algorithms for automated diagnosis of melanoma, a lethal form of skin cancer, from dermoscopic images. The challenge was divided into sub-challenges for each task involved in image analysis, includi… ▽ More

    Submitted 4 May, 2016; originally announced May 2016.