no code implementations • 4 May 2020 • Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli
While machine-learning algorithms have demonstrated a strong ability in detecting Android malware, they can be evaded by sparse evasion attacks crafted by injecting a small set of fake components, e. g., permissions and system calls, without compromising intrusive functionality.
1 code implementation • 23 Apr 2019 • Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto
We used PowerDrive to successfully analyze thousands of PowerShell attacks extracted from various malware vectors and executables.
Cryptography and Security
no code implementations • 24 May 2018 • Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto
The attained results showed that systems based on System API could detect ransomware and generic malware with very good accuracy, comparable to systems that employed more complex information.
1 code implementation • 12 Mar 2018 • Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli
Machine-learning methods have already been exploited as useful tools for detecting malicious executable files.
Cryptography and Security
no code implementations • 9 Mar 2018 • Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli
In this work, we generalize this approach to any black-box machine- learning model, by leveraging a gradient-based approach to identify the most influential local features.
1 code implementation • 21 Aug 2017 • Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli
In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data.
no code implementations • 28 Apr 2017 • Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli
To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for malware detection.
Cryptography and Security
no code implementations • 15 Nov 2016 • Igino Corona, Battista Biggio, Davide Maiorca
We present AdversariaLib, an open-source python library for the security evaluation of machine learning (ML) against carefully-targeted attacks.
no code implementations • 30 Jan 2014 • Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli
Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering.