Skip to main content

Showing 1–7 of 7 results for author: Campobasso, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.05898  [pdf, other

    cs.CR cs.CY cs.SI

    You Can Tell a Cybercriminal by the Company they Keep: A Framework to Infer the Relevance of Underground Communities to the Threat Landscape

    Authors: Michele Campobasso, Radu Rădulescu, Sylvan Brons, Luca Allodi

    Abstract: The criminal underground is populated with forum marketplaces where, allegedly, cybercriminals share and trade knowledge, skills, and cybercrime products. However, it is still unclear whether all marketplaces matter the same in the overall threat landscape. To effectively support trade and avoid degenerating into scams-for-scammers places, underground markets must address fundamental economic prob… ▽ More

    Submitted 13 June, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: The 22nd Workshop on the Economics of Information Security (WEIS'23), July 05--08, 2023, Geneva, Switzerland

  2. arXiv:2303.03249  [pdf, other

    cs.CR cs.CY

    Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale

    Authors: Michele Campobasso, Luca Allodi

    Abstract: In this paper we exploit market features proper of a leading Russian cybercrime market for user impersonation at scale to evaluate attacker preferences when purchasing stolen user profiles, and the overall economic activity of the market. We run our data collection over a period of $161$ days and collect data on a sample of $1'193$ sold user profiles out of $11'357$ advertised products in that per… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

    Comments: To be published in the Proceedings of the 32nd USENIX Security Symposium (USENIX Security '23)

  3. arXiv:2212.03641  [pdf, other

    cs.IR cs.CR

    THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums

    Authors: Michele Campobasso, Luca Allodi

    Abstract: Collecting data on underground criminal communities is highly valuable both for security research and security operations. Unfortunately these communities live within a constellation of diverse online forums that are difficult to infiltrate, may adopt crawling monitoring countermeasures, and require the development of ad-hoc scrapers for each different community, making the endeavour increasingly… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: To be published in the Proceedings of the 17th Symposium on Electronic Crime Research (APWG eCrime 2022). Source code of the implemented solution available at https://gitlab.tue.nl/threat-crawl/THREATcrawl/

  4. SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers

    Authors: Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi

    Abstract: In this paper we introduce SAIBERSOC, a tool and methodology enabling security researchers and operators to evaluate the performance of deployed and operational Security Operation Centers (SOCs) (or any other security monitoring infrastructure). The methodology relies on the MITRE ATT&CK Framework to define a procedure to generate and automatically inject synthetic attacks in an operational SOC to… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

    Comments: To be published in Annual Computer Security Applications Conference (ACSAC 2020), December 7-11, 2020, Austin, USA. ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3427228.3427233, ISBN: 978-1-4503-8858-0/20/12 Artifact repository: https://gitlab.tue.nl/saibersoc/acsac2020-artifacts

  5. CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments

    Authors: Michele Campobasso, Pavlo Burda, Luca Allodi

    Abstract: The monitoring of underground criminal activities is often automated to maximize the data collection and to train ML models to automatically adapt data collection tools to different communities. On the other hand, sophisticated adversaries may adopt crawling-detection capabilities that may significantly jeopardize researchers' opportunities to perform the data collection, for example by putting th… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Journal ref: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 2019, pp. 433-442

  6. Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

    Authors: Michele Campobasso, Luca Allodi

    Abstract: In this paper we provide evidence of an emerging criminal infrastructure enabling impersonation attacks at scale. Impersonation-as-a-Service (ImpaaS) allows attackers to systematically collect and enforce user profiles (consisting of user credentials, cookies, device and behavioural fingerprints, and other metadata) to circumvent risk-based authentication system and effectively bypass multi-factor… ▽ More

    Submitted 5 November, 2020; v1 submitted 9 September, 2020; originally announced September 2020.

    Comments: Presented at ACM CCS 2020. Appendix on "Deriving a Threat Model from Observation" available at https://michelecampobasso.github.io/publication/2020-11-10-impaas

    Journal ref: In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20), Pages 1665-1680

  7. arXiv:1304.7654  [pdf, ps, other

    cs.DC

    Optimised hybrid parallelisation of a CFD code on Many Core architectures

    Authors: Adrian Jackson, M. Sergio Campobasso

    Abstract: COSA is a novel CFD system based on the compressible Navier-Stokes model for unsteady aerodynamics and aeroelasticity of fixed structures, rotary wings and turbomachinery blades. It includes a steady, time domain, and harmonic balance flow solver. COSA has primarily been parallelised using MPI, but there is also a hybrid parallelisation that adds OpenMP functionality to the MPI parallelisation t… ▽ More

    Submitted 29 April, 2013; originally announced April 2013.

    Comments: Submitted to the SC13 conference, 10 pages with 8 figures