Skip to main content

Showing 1–37 of 37 results for author: Mancini, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.20576  [pdf, ps, other

    cs.CR cs.AI

    Vulnerability Disclosure through Adaptive Black-Box Adversarial Attacks on NIDS

    Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi V. Mancini

    Abstract: Adversarial attacks, wherein slight inputs are carefully crafted to mislead intelligent models, have attracted increasing attention. However, a critical gap persists between theoretical advancements and practical application, particularly in structured data like network traffic, where interdependent features complicate effective adversarial manipulations. Moreover, ambiguity in current approaches… ▽ More

    Submitted 25 June, 2025; originally announced June 2025.

  2. arXiv:2505.22781  [pdf, ps, other

    stat.ML cs.LG math.ST

    Finite-Sample Convergence Bounds for Trust Region Policy Optimization in Mean-Field Games

    Authors: Antonio Ocello, Daniil Tiapkin, Lorenzo Mancini, Mathieu Laurière, Eric Moulines

    Abstract: We introduce Mean-Field Trust Region Policy Optimization (MF-TRPO), a novel algorithm designed to compute approximate Nash equilibria for ergodic Mean-Field Games (MFG) in finite state-action spaces. Building on the well-established performance of TRPO in the reinforcement learning (RL) setting, we extend its methodology to the MFG framework, leveraging its stability and robustness in policy optim… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  3. arXiv:2504.16651  [pdf, ps, other

    cs.CR cs.AI cs.LG

    MAYA: Addressing Inconsistencies in Generative Password Guessing through a Unified Benchmark

    Authors: William Corrias, Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini

    Abstract: Recent advances in generative models have led to their application in password guessing, with the aim of replicating the complexity, structure, and patterns of human-created passwords. Despite their potential, inconsistencies and inadequate evaluation methodologies in prior research have hindered meaningful comparisons and a comprehensive, unbiased understanding of their capabilities. This paper i… ▽ More

    Submitted 12 June, 2025; v1 submitted 23 April, 2025; originally announced April 2025.

  4. arXiv:2504.08480  [pdf, other

    cs.CR

    Toward Realistic Adversarial Attacks in IDS: A Novel Feasibility Metric for Transferability

    Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini

    Abstract: Transferability-based adversarial attacks exploit the ability of adversarial examples, crafted to deceive a specific source Intrusion Detection System (IDS) model, to also mislead a target IDS model without requiring access to the training data or any internal model parameters. These attacks exploit common vulnerabilities in machine learning models to bypass security measures and compromise system… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  5. arXiv:2410.22908  [pdf, other

    cs.LG stat.ML

    Federated UCBVI: Communication-Efficient Federated Regret Minimization with Heterogeneous Agents

    Authors: Safwan Labbi, Daniil Tiapkin, Lorenzo Mancini, Paul Mangold, Eric Moulines

    Abstract: In this paper, we present the Federated Upper Confidence Bound Value Iteration algorithm ($\texttt{Fed-UCBVI}$), a novel extension of the $\texttt{UCBVI}$ algorithm (Azar et al., 2017) tailored for the federated learning framework. We prove that the regret of $\texttt{Fed-UCBVI}$ scales as $\tilde{\mathcal{O}}(\sqrt{H^3 |\mathcal{S}| |\mathcal{A}| T / M})$, with a small additional term due to hete… ▽ More

    Submitted 30 October, 2024; originally announced October 2024.

  6. arXiv:2410.20687  [pdf, other

    eess.SP cs.LG

    Joint Channel Selection using FedDRL in V2X

    Authors: Lorenzo Mancini, Safwan Labbi, Karim Abed Meraim, Fouzi Boukhalfa, Alain Durmus, Paul Mangold, Eric Moulines

    Abstract: Vehicle-to-everything (V2X) communication technology is revolutionizing transportation by enabling interactions between vehicles, devices, and infrastructures. This connectivity enhances road safety, transportation efficiency, and driver assistance systems. V2X benefits from Machine Learning, enabling real-time data analysis, better decision-making, and improved traffic predictions, making transpo… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

  7. arXiv:2409.18736  [pdf, other

    cs.CR cs.ET cs.NI

    Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects

    Authors: Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj, Alicia Kbidi, Luigi V. Mancini

    Abstract: Machine learning has brought significant advances in cybersecurity, particularly in the development of Intrusion Detection Systems (IDS). These improvements are mainly attributed to the ability of machine learning algorithms to identify complex relationships between features and effectively generalize to unseen data. Deep neural networks, in particular, contributed to this progress by enabling the… ▽ More

    Submitted 22 October, 2024; v1 submitted 27 September, 2024; originally announced September 2024.

    Comments: 35 pages

  8. arXiv:2403.13523  [pdf, other

    cs.LG cs.AI cs.CR

    Have You Poisoned My Data? Defending Neural Networks against Data Poisoning

    Authors: Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini

    Abstract: The unprecedented availability of training data fueled the rapid development of powerful neural networks in recent years. However, the need for such large amounts of data leads to potential threats such as poisoning attacks: adversarial manipulations of the training data aimed at compromising the learned model to achieve a given adversarial goal. This paper investigates defenses against clean-la… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Paper accepted for publication at European Symposium on Research in Computer Security (ESORICS) 2024

  9. arXiv:2403.03593  [pdf, other

    cs.CR cs.AI

    Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

    Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz

    Abstract: Training high-quality deep learning models is a challenging task due to computational and technical requirements. A growing number of individuals, institutions, and companies increasingly rely on pre-trained, third-party models made available in public repositories. These models are often used directly or integrated in product pipelines with no particular precautions, since they are effectively ju… ▽ More

    Submitted 13 May, 2025; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: 18 pages

  10. arXiv:2303.00431  [pdf, other

    cs.CV cs.CY cs.LG

    OliVaR: Improving Olive Variety Recognition using Deep Neural Networks

    Authors: Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez

    Abstract: The easy and accurate identification of varieties is fundamental in agriculture, especially in the olive sector, where more than 1200 olive varieties are currently known worldwide. Varietal misidentification leads to many potential problems for all the actors in the sector: farmers and nursery workers may establish the wrong variety, leading to its maladaptation in the field; olive oil and table o… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Comments: 10 pages, 9 figures

  11. DOLOS: A Novel Architecture for Moving Target Defense

    Authors: Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini

    Abstract: Moving Target Defense and Cyber Deception emerged in recent years as two key proactive cyber defense approaches, contrasting with the static nature of the traditional reactive cyber defense. The key insight behind these approaches is to impose an asymmetric disadvantage for the attacker by using deception and randomization techniques to create a dynamic attack surface. Moving Target Defense typica… ▽ More

    Submitted 27 September, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 16 pages

    Journal ref: IEEE Transactions on Information Forensics and Security, 2023

  12. arXiv:2301.11050  [pdf, other

    cs.CR cs.CY cs.LG

    Minerva: A File-Based Ransomware Detector

    Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Ransomware attacks have caused billions of dollars in damages in recent years, and are expected to cause billions more in the future. Consequently, significant effort has been devoted to ransomware detection and mitigation. Behavioral-based ransomware detection approaches have garnered considerable attention recently. These behavioral detectors typically rely on process-based behavioral profiles t… ▽ More

    Submitted 29 March, 2025; v1 submitted 26 January, 2023; originally announced January 2023.

    Comments: Accepted for publication at The 20th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2025), Meliá Hanoi

  13. arXiv:2202.06091  [pdf, other

    cs.CR cs.IT cs.LG

    TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding

    Authors: Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Perez-Cruz, Luigi V. Mancini

    Abstract: Watermarking of deep neural networks (DNNs) has gained significant traction in recent years, with numerous (watermarking) strategies being proposed as mechanisms that can help verify the ownership of a DNN in scenarios where these models are obtained without the permission of the owner. However, a growing body of work has demonstrated that existing watermarking mechanisms are highly susceptible to… ▽ More

    Submitted 3 June, 2024; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: 12 pages

  14. arXiv:2201.08786  [pdf, other

    cs.CR cs.LG

    FedComm: Federated Learning as a Medium for Covert Communication

    Authors: Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Perez-Cruz, Luigi V. Mancini

    Abstract: Proposed as a solution to mitigate the privacy implications related to the adoption of deep learning, Federated Learning (FL) enables large numbers of participants to successfully train deep neural networks without having to reveal the actual private training data. To date, a substantial amount of research has investigated the security and privacy properties of FL, resulting in a plethora of innov… ▽ More

    Submitted 17 May, 2023; v1 submitted 21 January, 2022; originally announced January 2022.

    Comments: 13 pages

  15. arXiv:2106.00541  [pdf, other

    cs.CR cs.LG cs.NI

    MalPhase: Fine-Grained Malware Detection Using Network Flow Data

    Authors: Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic

    Abstract: Economic incentives encourage malware authors to constantly develop new, increasingly complex malware to steal sensitive data or blackmail individuals and companies into paying large ransoms. In 2017, the worldwide economic impact of cyberattacks is estimated to be between 445 and 600 billion USD, or 0.8% of global GDP. Traditionally, one of the approaches used to defend against malware is network… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Paper accepted for publication at ACM AsiaCCS 2021

  16. arXiv:2105.06165  [pdf, other

    cs.CR cs.LG

    PassFlow: Guessing Passwords with Generative Flows

    Authors: Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini

    Abstract: Recent advances in generative machine learning models rekindled research interest in the area of password guessing. Data-driven password guessing approaches based on GANs, language models and deep latent variable models have shown impressive generalization performance and offer compelling properties for the task of password guessing. In this paper, we propose PassFlow, a flow-based generative mode… ▽ More

    Submitted 14 December, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: 12 pages, 6 figures, 6 tables

  17. arXiv:2103.17059  [pdf, other

    cs.CR cs.LG

    Reliable Detection of Compressed and Encrypted Data

    Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted data fragments. Typically, current approaches employ statistics derived from byte-level distribution, such as entropy estimation, to identify encrypted fragments. However, modern content types use compression techniques which alter data distribution pushing it cl… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: 12 pages, 8 figures. arXiv admin note: substantial text overlap with arXiv:2010.07754

  18. arXiv:2103.01914  [pdf, other

    cs.LG cs.CR

    Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training

    Authors: Dorjan Hitaj, Giulio Pagnotta, Iacopo Masi, Luigi V. Mancini

    Abstract: In this technical report, we evaluate the adversarial robustness of a very recent method called "Geometry-aware Instance-reweighted Adversarial Training"[7]. GAIRAT reports state-of-the-art results on defenses to adversarial attacks on the CIFAR-10 dataset. In fact, we find that a network trained with this method, while showing an improvement over regular adversarial training (AT), is biasing the… ▽ More

    Submitted 5 March, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: 6 pages, 2 figures, 1 table

  19. Fixed-MAML for Few Shot Classification in Multilingual Speech Emotion Recognition

    Authors: Anugunj Naman, Chetan Sinha, Liliana Mancini

    Abstract: In this paper, we analyze the feasibility of applying few-shot learning to speech emotion recognition task (SER). The current speech emotion recognition models work exceptionally well but fail when then input is multilingual. Moreover, when training such models, the models' performance is suitable only when the training corpus is vast. This availability of a big training corpus is a significant pr… ▽ More

    Submitted 30 May, 2022; v1 submitted 5 January, 2021; originally announced January 2021.

    Comments: Code at https://github.com/AnugunjNaman/Fixed-MAML

    MSC Class: 68T10

  20. arXiv:2010.16204  [pdf, other

    cs.CR cs.LG

    Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks

    Authors: Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini

    Abstract: To this date, CAPTCHAs have served as the first line of defense preventing unauthorized access by (malicious) bots to web-based services, while at the same time maintaining a trouble-free experience for human visitors. However, recent work in the literature has provided evidence of sophisticated bots that make use of advancements in machine learning (ML) to easily bypass existing CAPTCHA-based def… ▽ More

    Submitted 4 November, 2020; v1 submitted 30 October, 2020; originally announced October 2020.

    Comments: 17 pages, 4 figures. Accepted for publication on IEEE Intelligent Systems magazine

  21. arXiv:2010.07754  [pdf, other

    cs.CR cs.LG

    EnCoD: Distinguishing Compressed and Encrypted File Fragments

    Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Reliable identification of encrypted file fragments is a requirement for several security applications, including ransomware detection, digital forensics, and traffic analysis. A popular approach consists of estimating high entropy as a proxy for randomness. However, many modern content types (e.g. office documents, media files, etc.) are highly compressed for storage and transmission efficiency.… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: 19 pages, 6 images, 2 tables. Accepted for publication at the 14th International Conference on Network and System Security (NSS2020)

  22. arXiv:1911.02423  [pdf, other

    cs.CR cs.LG

    The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

    Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini

    Abstract: Recent progress in machine learning has generated promising results in behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. Behavioral features hold great promise as they are intrinsically related to the functioning of each malware, and are therefore considered difficult to evade. Indeed, while a significant amount of resu… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

    Comments: 15 pages, 6 figures, 4 tables

  23. arXiv:1910.03268  [pdf, other

    math.OC cs.NE

    Integrated Optimization of Ascent Trajectory and SRM Design of Multistage Launch Vehicles

    Authors: Lorenzo Federici, Alessandro Zavoli, Guido Colasurdo, Lucandrea Mancini, Agostino Neri

    Abstract: This paper presents a methodology for the concurrent first-stage preliminary design and ascent trajectory optimization, with application to a Vega-derived Light Launch Vehicle. The reuse as first stage of an existing upper-stage (Zefiro 40) requires a propellant grain geometry redesign, in order to account for the mutated operating conditions. An optimization code based on the parallel running of… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Comments: 29th AAS/AIAA Space Flight Mechanics Meeting, Ka'anapali, Maui, HI

  24. arXiv:1809.00615  [pdf, other

    cs.CR cs.LG

    Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques

    Authors: Dorjan Hitaj, Luigi V. Mancini

    Abstract: Deep neural networks have had enormous impact on various domains of computer science, considerably outperforming previous state of the art machine learning techniques. To achieve this performance, neural networks need large quantities of data and huge computational resources, which heavily increases their construction costs. The increased cost of building a good deep neural network model gives ris… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

    Comments: 7 pages, 4 figures, 1 table

  25. arXiv:1807.10588  [pdf, other

    cs.CV cs.LG stat.ML

    A Modality-Adaptive Method for Segmenting Brain Tumors and Organs-at-Risk in Radiation Therapy Planning

    Authors: Mikael Agn, Per Munck af Rosenschöld, Oula Puonti, Michael J. Lundemann, Laura Mancini, Anastasia Papadaki, Steffi Thust, John Ashburner, Ian Law, Koen Van Leemput

    Abstract: In this paper we present a method for simultaneously segmenting brain tumors and an extensive set of organs-at-risk for radiation therapy planning of glioblastomas. The method combines a contrast-adaptive generative model for whole-brain segmentation with a new spatial regularization model of tumor shape using convolutional restricted Boltzmann machines. We demonstrate experimentally that the meth… ▽ More

    Submitted 15 August, 2018; v1 submitted 18 July, 2018; originally announced July 2018.

    Comments: corrected one reference

  26. RADIS: Remote Attestation of Distributed IoT Services

    Authors: Mauro Conti, Edlira Dushku, Luigi V. Mancini

    Abstract: Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) checks the trustworthiness of a potentially untrusted device (i.e., Prover). In the Internet of Things (IoT) systems, the existing remote attestation protocols propose various approaches to detect the modified software and physical tampering attacks. However, in an interoperable IoT system, in which Io… ▽ More

    Submitted 18 November, 2020; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: 21 pages, 10 figures, 2 tables

    Journal ref: Sixth IEEE International Conference on Software Defined Systems (2019) 25-32

  27. arXiv:1806.08657  [pdf

    cs.CR

    Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture

    Authors: Paul Theron, Alexander Kott, Martin Drašar, Krzysztof Rzadca, Benoît LeBlanc, Mauno Pihelgas, Luigi Mancini, Agostino Panico

    Abstract: Within the future Global Information Grid, complex massively interconnected systems, isolated defense vehicles, sensors and effectors, and infrastructures and systems demanding extremely low failure rates, to which human security operators cannot have an easy access and cannot deliver fast enough reactions to cyber-attacks, need an active, autonomous and intelligent cyber defense. Multi Agent Syst… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: This is a pre-print version of the paper that appears in the Proceedings of the International Conference on Military Communications and Information Systems, Warsaw, Poland, 22-23 May 2018. arXiv admin note: substantial text overlap with arXiv:1803.10664

  28. arXiv:1803.10664  [pdf

    cs.CR

    Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0

    Authors: Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca, Fabio De Gaspari

    Abstract: This report - a major revision of its previous release - describes a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152 "Intelligent Autonomous Agents for Cyber Defense… ▽ More

    Submitted 22 March, 2023; v1 submitted 28 March, 2018; originally announced March 2018.

    Comments: This is a major revision and extension of the earlier release of AICA Reference Architecture

    Report number: ARL-SR-0421

  29. arXiv:1611.06737  [pdf, other

    cs.SI

    OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles

    Authors: Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini

    Abstract: Online Social Networks (OSNs), such as Facebook, provide users with tools to share information along with a set of privacy controls preferences to regulate the spread of information. Current privacy controls are efficient to protect content data. However, the complexity of tuning them undermine their efficiency when protecting contextual information (such as the social network structure) that many… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

  30. arXiv:1608.04766  [pdf, other

    cs.CR cs.NI

    Know Your Enemy: Stealth Configuration-Information Gathering in SDN

    Authors: Mauro Conti, Fabio De Gaspari, Luigi V. Mancini

    Abstract: Software Defined Networking (SDN) is a network architecture that aims at providing high flexibility through the separation of the network logic from the forwarding functions. The industry has already widely adopted SDN and researchers thoroughly analyzed its vulnerabilities, proposing solutions to improve its security. However, we believe important security aspects of SDN are still left uninvestig… ▽ More

    Submitted 16 August, 2016; originally announced August 2016.

  31. arXiv:1505.07774  [pdf, other

    cs.CR

    No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position

    Authors: Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino V. Verde, Antonio Villani

    Abstract: News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature. In this paper, we propose a new adversary model for Location Based Services (LBSs). The model takes into account an unauthorized third party, different… ▽ More

    Submitted 4 September, 2015; v1 submitted 28 May, 2015; originally announced May 2015.

    Comments: 14 pages, 9th International Conference on Network and System Security (NSS 2015)

  32. arXiv:1407.7844  [pdf, other

    cs.CR

    Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis

    Authors: Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino V. Verde

    Abstract: While smartphone usage become more and more pervasive, people start also asking to which extent such devices can be maliciously exploited as "tracking devices". The concern is not only related to an adversary taking physical or remote control of the device (e.g., via a malicious app), but also to what a passive adversary (without the above capabilities) can observe from the device communications.… ▽ More

    Submitted 29 July, 2014; originally announced July 2014.

    Comments: 12 pages

  33. arXiv:1402.1940  [pdf, other

    cs.CR

    No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone

    Authors: Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi

    Abstract: It is generally recognized that the traffic generated by an individual connected to a network acts as his biometric signature. Several tools exploit this fact to fingerprint and monitor users. Often, though, these tools assume to access the entire traffic, including IP addresses and payloads. This is not feasible on the grounds that both performance and privacy would be negatively affected. In rea… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.

  34. arXiv:1306.4447  [pdf, ps, other

    cs.CR cs.LG stat.ML

    Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers

    Authors: Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali

    Abstract: Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience. Computers learn how to recognize patterns, make unintended decisions, or react to a dynamic environment. Certain trained machines may be more effective than others because they are based on more suitable ML algorithms or because they were trained through superior training… ▽ More

    Submitted 19 June, 2013; originally announced June 2013.

  35. arXiv:1306.2833  [pdf, other

    cs.CR

    Mapping the File Systems Genome: rationales, technique, results and applications

    Authors: Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali

    Abstract: This paper provides evidence of a feature of Hard-Disk Drives (HDDs), that we call File System Genome. Such a feature is originated by the areas where (on the HDD) the file blocks are placed by the operating system during the installation procedure. It appears from our study that the File System Genome is a distinctive and unique feature of each indi- vidual HDD. In particular, our extensive set o… ▽ More

    Submitted 12 June, 2013; originally announced June 2013.

    Comments: 16 pages, 5 image

  36. arXiv:1109.2066  [pdf, other

    cs.CR

    Formal Analysis of UMTS Privacy

    Authors: Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan

    Abstract: The ubiquitous presence of mobile communication devices and the continuous development of mo- bile data applications, which results in high level of mobile devices' activity and exchanged data, often transparent to the user, makes privacy preservation an important feature of mobile telephony systems. We present a formal analysis of the UMTS Authentication and Key Agreement protocol, using the appl… ▽ More

    Submitted 9 September, 2011; originally announced September 2011.

  37. arXiv:0912.2199  [pdf, ps, other

    cs.CR cs.NI

    The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack

    Authors: Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei

    Abstract: Mobile Ad Hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions are either centralized or focused on theoretical mobility models alone. In the former case… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.