Skip to main content

Showing 1–4 of 4 results for author: Caselli, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.03931  [pdf, other

    cond-mat.mes-hall cs.LG quant-ph

    Fully autonomous tuning of a spin qubit

    Authors: Jonas Schuff, Miguel J. Carballido, Madeleine Kotzagiannidis, Juan Carlos Calvo, Marco Caselli, Jacob Rawling, David L. Craig, Barnaby van Straaten, Brandon Severin, Federico Fedele, Simon Svab, Pierre Chevalier Kwon, Rafael S. Eggli, Taras Patlatiuk, Nathan Korda, Dominik Zumbühl, Natalia Ares

    Abstract: Spanning over two decades, the study of qubits in semiconductors for quantum computing has yielded significant breakthroughs. However, the development of large-scale semiconductor quantum circuits is still limited by challenges in efficiently tuning and operating these circuits. Identifying optimal operating conditions for these qubits is complex, involving the exploration of vast parameter spaces… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  2. arXiv:2204.09106  [pdf, other

    cs.CR

    Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

    Authors: Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter

    Abstract: Industrial Control Systems (ICSs) rely on insecure protocols and devices to monitor and operate critical infrastructure. Prior work has demonstrated that powerful attackers with detailed system knowledge can manipulate exchanged sensor data to deteriorate performance of the process, even leading to full shutdowns of plants. Identifying those attacks requires iterating over all possible sensor valu… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted at Applied Cryptography and Network Security (ACNS) 2022

  3. arXiv:2110.10540  [pdf, other

    cs.CR

    On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence

    Authors: Vasileios Mavroeidis, Pavel Eis, Martin Zadnik, Marco Caselli, Bret Jordan

    Abstract: Motivated by the introduction of CACAO, the first open standard that harmonizes the way we document courses of action in a machine-readable format for interoperability, and the benefits for cybersecurity operations derived from utilizing, and coupling and sharing course of action playbooks with cyber threat intelligence, we introduce a uniform metadata template that supports managing and integrati… ▽ More

    Submitted 22 November, 2021; v1 submitted 20 October, 2021; originally announced October 2021.

  4. arXiv:2004.14322  [pdf, other

    cs.CR cs.LG

    Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports

    Authors: Valentine Legoy, Marco Caselli, Christin Seifert, Andreas Peter

    Abstract: Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professionals to access increasingly larger amounts of heterogeneous data. Among those, cyber attacks' Tactics, Techniques and Procedures (TTPs) have proven to be particularly valuable to characterize threat actors' behaviors and, thus, improve defensive countermeasures. Unfortunately, this information is of… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.