Skip to main content

Showing 1–8 of 8 results for author: Perdisci, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.05569  [pdf, other

    cs.CR cs.LG

    SENet: Visual Detection of Online Social Engineering Attack Campaigns

    Authors: Irfan Ozen, Karthika Subramani, Phani Vadrevu, Roberto Perdisci

    Abstract: Social engineering (SE) aims at deceiving users into performing actions that may compromise their security and privacy. These threats exploit weaknesses in human's decision making processes by using tactics such as pretext, baiting, impersonation, etc. On the web, SE attacks include attack classes such as scareware, tech support scams, survey scams, sweepstakes, etc., which can result in sensitive… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  2. arXiv:2310.17851  [pdf, other

    cs.CR cs.NI

    Measuring CDNs susceptible to Domain Fronting

    Authors: Karthika Subramani, Roberto Perdisci, Pierros Skafidas

    Abstract: Domain fronting is a network communication technique that involves leveraging (or abusing) content delivery networks (CDNs) to disguise the final destination of network packets by presenting them as if they were intended for a different domain than their actual endpoint. This technique can be used for both benign and malicious purposes, such as circumventing censorship or hiding malware-related co… ▽ More

    Submitted 13 November, 2023; v1 submitted 26 October, 2023; originally announced October 2023.

  3. arXiv:2111.07153  [pdf, other

    cs.CR

    Categorizing Service Worker Attacks and Mitigations

    Authors: Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci

    Abstract: Service Workers (SWs) are a powerful feature at the core of Progressive Web Apps, namely web applications that can continue to function when the user's device is offline and that have access to device sensors and capabilities previously accessible only by native applications. During the past few years, researchers have found a number of ways in which SWs may be abused to achieve different maliciou… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

  4. arXiv:2008.03554  [pdf, other

    cs.CR

    Fighting Voice Spam with a Virtual Assistant Prototype

    Authors: Sharbani Pandit, Jienan Liu, Roberto Perdisci, Mustaque Ahamad

    Abstract: Mass robocalls affect millions of people on a daily basis. Unfortunately, most current defenses against robocalls rely on phone blocklists and are ineffective against caller ID spoofing. To enable the detection of spoofed robocalls, we propose a {\em virtual assistant} application that could be integrated on smartphones to automatically vet incoming calls. Similar to a human assistant, the virtual… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

  5. arXiv:2006.12555  [pdf, other

    cs.NI cs.CR

    IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points

    Authors: Karthika Subramani, Roberto Perdisci, Maria Konte

    Abstract: Distributed reflective denial of service (DRDoS) attacks are a popular choice among adversaries. In fact, one of the largest DDoS attacks ever recorded, reaching a peak of 1.3Tbps against GitHub, was a memcached-based DRDoS attack. More recently, a record-breaking 2.3Tbps attack against Amazon AWS was due to a CLDAP-based DRDoS attack. Although reflective attacks have been known for years, DRDoS a… ▽ More

    Submitted 10 July, 2020; v1 submitted 22 June, 2020; originally announced June 2020.

  6. Building a Collaborative Phone Blacklisting System with Local Differential Privacy

    Authors: Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad

    Abstract: Spam phone calls have been rapidly growing from nuisance to an increasingly effective scam delivery tool. To counter this increasingly successful attack vector, a number of commercial smartphone apps that promise to block spam phone calls have appeared on app stores, and are now used by hundreds of thousands or even millions of users. However, following a business model similar to some online soci… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: 15 pages, 10 figures, 7 algorithms

  7. Measuring Abuse in Web Push Advertising

    Authors: Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci

    Abstract: The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and ad networks are constantly trying to pursue new strategies to keep up their revenues. To this end, ad networks have started to leverage the Web Push technology enabled by modern web browsers. As web… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

    Journal ref: IMC '20: ACM Internet Measurement Conference October, 2020

  8. Practical Attacks Against Graph-based Clustering

    Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou

    Abstract: Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks. We design and evaluate two novel graph attacks against a state-of-the-art network-level, graph-based detection system. Our work highlights areas in adversarial machine learning that have not yet been addressed, specificall… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: ACM CCS 2017