Search Results for author: Igino Corona

Found 5 papers, 1 papers with code

Poisoning Behavioral Malware Clustering

no code implementations25 Nov 2018 Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli

Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems.

Clustering Computer Security +1

Evasion Attacks against Machine Learning at Test Time

1 code implementation21 Aug 2017 Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli

In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data.

BIG-bench Machine Learning Malware Detection +1

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

no code implementations28 Apr 2017 Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli

To cope with the increasing variability and sophistication of modern attacks, machine learning has been widely adopted as a statistically-sound tool for malware detection.

Cryptography and Security

AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack

no code implementations15 Nov 2016 Igino Corona, Battista Biggio, Davide Maiorca

We present AdversariaLib, an open-source python library for the security evaluation of machine learning (ML) against carefully-targeted attacks.

BIG-bench Machine Learning General Classification

Security Evaluation of Support Vector Machines in Adversarial Environments

no code implementations30 Jan 2014 Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli

Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering.

Intrusion Detection Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.