Skip to main content

Showing 1–4 of 4 results for author: Nappa, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.02979  [pdf, other

    cs.CR

    POW-HOW: An enduring timing side-channel to evade online malware sandboxes

    Authors: Antonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi

    Abstract: Online malware scanners are one of the best weapons in the arsenal of cybersecurity companies and researchers. A fundamental part of such systems is the sandbox that provides an instrumented and isolated environment (virtualized or emulated) for any user to upload and run unknown artifacts and identify potentially malicious behaviors. The provided API and the wealth of information inthe reports pr… ▽ More

    Submitted 5 October, 2021; v1 submitted 7 September, 2021; originally announced September 2021.

    Journal ref: In proceedings of 26th European Symposium on Research in Computer Security (ESORICS'21), 2021

  2. arXiv:2105.05103  [pdf, other

    cs.CR quant-ph

    Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations

    Authors: Antonio Nappa, Christopher Hobbs, Andrea Lanzi

    Abstract: What do Apple, the FBI and a Belgian politician have in common? In 2003, in Belgium there was an election using electronic voting machines. Mysteriously one candidate summed an excess of 4096 votes. An accurate analysis led to the official explanation that a spontaneous creation of a bit in position 13 of the memory of the computer attributed 4096 extra votes to one candidate. One of the most cred… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: 6 Pages - Preliminary Work

  3. ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices

    Authors: Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Matteo Varvello, Antonio Nappa, Jiexin Zhang, Benjamin Livshits

    Abstract: Recent studies show that 20.4% of the internet traffic originates from automated agents. To identify and block such ill-intentioned traffic, mechanisms that verify the humanness of the user are widely deployed, with CAPTCHAs being the most popular. Traditional CAPTCHAs require extra user effort (e.g., solving mathematical puzzles), which can severely downgrade the end-user's experience, especially… ▽ More

    Submitted 7 September, 2021; v1 submitted 18 November, 2019; originally announced November 2019.

    Journal ref: Proceedings on Privacy Enhancing Technologies 2021

  4. arXiv:1910.00159  [pdf, other

    cs.NI cs.CR

    VPN0: A Privacy-Preserving Decentralized Virtual Private Network

    Authors: Matteo Varvello, Iñigo Querejeta Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana, Ben Livshits

    Abstract: Distributed Virtual Private Networks (dVPNs) are new VPN solutions aiming to solve the trust-privacy concern of a VPN's central authority by leveraging a distributed architecture. In this paper, we first review the existing dVPN ecosystem and debate on its privacy requirements. Then, we present VPN0, a dVPN with strong privacy guarantees and minimal performance impact on its users. VPN0 guarantees… ▽ More

    Submitted 30 September, 2019; originally announced October 2019.