Skip to main content

Showing 1–14 of 14 results for author: Pajola, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.14138  [pdf, other

    cs.CR

    Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

    Authors: Alberto Castagnaro, Mauro Conti, Luca Pajola

    Abstract: Web Vulnerability Assessment and Penetration Testing (Web VAPT) is a comprehensive cybersecurity process that uncovers a range of vulnerabilities which, if exploited, could compromise the integrity of web applications. In a VAPT, it is common to perform a \textit{Directory brute-forcing Attack}, aiming at the identification of accessible directories of a target website. Current commercial solution… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: Under submission

  2. arXiv:2404.12689  [pdf, other

    cs.NI cs.AI cs.ET

    Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

    Authors: Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti

    Abstract: Recent advancements in Artificial Intelligence, and particularly Large Language Models (LLMs), offer promising prospects for aiding system administrators in managing the complexity of modern networks. However, despite this potential, a significant gap exists in the literature regarding the extent to which LLMs can understand computer networks. Without empirical evidence, system administrators migh… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    ACM Class: C.2.1; C.2.5; I.2.1

  3. arXiv:2401.14296  [pdf, other

    cs.CR cs.LG cs.SI

    "All of Me": Mining Users' Attributes from their Public Spotify Playlists

    Authors: Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti

    Abstract: In the age of digital music streaming, playlists on platforms like Spotify have become an integral part of individuals' musical experiences. People create and publicly share their own playlists to express their musical tastes, promote the discovery of their favorite artists, and foster social connections. These publicly accessible playlists transcend the boundaries of mere musical preferences: the… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  4. arXiv:2310.08259  [pdf, other

    cs.CR cs.CV cs.LG

    Invisible Threats: Backdoor Attack in OCR Systems

    Authors: Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek

    Abstract: Optical Character Recognition (OCR) is a widely used tool to extract text from scanned documents. Today, the state-of-the-art is achieved by exploiting deep neural networks. However, the cost of this performance is paid at the price of system vulnerability. For instance, in backdoor attacks, attackers compromise the training phase by inserting a backdoor in the victim's model that will be activate… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  5. arXiv:2306.15363  [pdf, other

    cs.CR cs.LG

    Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

    Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola

    Abstract: Evasion attacks are a threat to machine learning models, where adversaries attempt to affect classifiers by injecting malicious samples. An alarming side-effect of evasion attacks is their ability to transfer among different models: this property is called transferability. Therefore, an attacker can produce adversarial samples on a custom model (surrogate) to conduct the attack on a victim's organ… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: Accepted at RAID 2023

  6. Boosting Big Brother: Attacking Search Engines with Encodings

    Authors: Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti

    Abstract: Search engines are vulnerable to attacks against indexing and searching via text encoding manipulation. By imperceptibly perturbing text using uncommon encoded representations, adversaries can control results across search engines for specific search queries. We demonstrate that this attack is successful against two major commercial search engines - Google and Bing - and one open source search eng… ▽ More

    Submitted 27 July, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: To appear in the 26th Symposium on Research in Attacks, Intrusions and Defenses (RAID). Revisions: Adds table summarizing attacks

  7. arXiv:2303.17946  [pdf, other

    cs.SI cs.AI cs.CR

    Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

    Authors: Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi

    Abstract: Social Honeypots are tools deployed in Online Social Networks (OSN) to attract malevolent activities performed by spammers and bots. To this end, their content is designed to be of maximum interest to malicious users. However, by choosing an appropriate content topic, this attractive mechanism could be extended to any OSN users, rather than only luring malicious actors. As a result, honeypots can… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: Accepted at ACNS2023

  8. arXiv:2211.03117  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Going In Style: Audio Backdoors Through Stylistic Transformations

    Authors: Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti

    Abstract: This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects. We first formalize stylistic triggers - currently missing in the literature. Second, we explore how to develop stylistic triggers in the audio domain by proposing **gleBack. Our experiments confirm the effectiveness of the attack, achieving a 96% att… ▽ More

    Submitted 2 May, 2023; v1 submitted 6 November, 2022; originally announced November 2022.

    Comments: Accepted to ICASSP '23 and the first two authors contributed equally

  9. arXiv:2209.10849  [pdf, other

    cs.HC cs.CR

    You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

    Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini

    Abstract: Virtual and Augmented Reality (VR, AR) are increasingly gaining traction thanks to their technical advancement and the need for remote connections, recently accentuated by the pandemic. Remote surgery, telerobotics, and virtual offices are only some examples of their successes. As users interact with VR/AR, they generate extensive behavioral data usually leveraged for measuring human behavior. How… ▽ More

    Submitted 22 September, 2022; originally announced September 2022.

  10. arXiv:2208.10605  [pdf, other

    cs.CR cs.CY cs.LG

    SoK: Explainable Machine Learning for Computer Security Applications

    Authors: Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer

    Abstract: Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We identify 3 cybersecurity stakeholders, i.e., model users, designers, and adversaries, who utilize XAI for 4 distinct objec… ▽ More

    Submitted 3 March, 2023; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: 13 pages. Accepted at Euro S&P

  11. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

    Authors: Giovanni Apruzzese, Luca Pajola, Mauro Conti

    Abstract: Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labelled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying on the same outdated data. The situation improved recent… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

  12. arXiv:2201.04014  [pdf, other

    cs.CR cs.CV cs.LG

    Captcha Attack: Turning Captchas Against Humanity

    Authors: Mauro Conti, Luca Pajola, Pier Paolo Tricomi

    Abstract: Nowadays, people generate and share massive content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to prevent the spreading of inappropriate content (e.g., hate speech, nudity images). Based on deep learning (DL) advances, Automatic… ▽ More

    Submitted 4 April, 2022; v1 submitted 11 January, 2022; originally announced January 2022.

    Comments: Currently under submission

  13. arXiv:2104.05996  [pdf, other

    cs.CR cs.LG

    Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

    Authors: Luca Pajola, Mauro Conti

    Abstract: The increased demand for machine learning applications made companies offer Machine-Learning-as-a-Service (MLaaS). In MLaaS (a market estimated 8000M USD by 2025), users pay for well-performing ML models without dealing with the complicated training procedure. Among MLaaS, text-based applications are the most popular ones (e.g., language translators). Given this popularity, MLaaS must provide resi… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

    Comments: Accepted to appear in the Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EUROS&P)

  14. arXiv:1808.09115  [pdf, ps, other

    cs.CL

    All You Need is "Love": Evading Hate-speech Detection

    Authors: Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan

    Abstract: With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech detection models from prior work, and show that they perform well only when tested on the same type of data they were trained on. Based on these results, we argue that for successful hate speech… ▽ More

    Submitted 5 November, 2018; v1 submitted 28 August, 2018; originally announced August 2018.

    Comments: 11 pages, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec) 2018