Skip to main content

Showing 1–24 of 24 results for author: Oligeri, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.19633  [pdf, ps, other

    cs.CR

    Weak-Jamming Detection in IEEE 802.11 Networks: Techniques, Scenarios and Mobility

    Authors: Martijn Hanegraaf, Savio Sciancalepore, Gabriele Oligeri

    Abstract: State-of-the-art solutions detect jamming attacks ex-post, i.e., only when jamming has already disrupted the wireless communication link. In many scenarios, e.g., mobile networks or static deployments distributed over a large geographical area, it is often desired to detect jamming at the early stage, when it affects the communication link enough to be detected but not sufficiently to disrupt it (… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

    Comments: Under review

  2. arXiv:2502.20589  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis

    Authors: Saeif Alhazbi, Ahmed Mohamed Hussain, Gabriele Oligeri, Panos Papadimitratos

    Abstract: As Large Language Models (LLMs) become increasingly integrated into many technological ecosystems across various domains and industries, identifying which model is deployed or being interacted with is critical for the security and trustworthiness of the systems. Current verification methods typically rely on analyzing the generated output to determine the source model. However, these techniques ar… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  3. arXiv:2501.03977  [pdf, other

    cs.CR

    Cyber Spectrum Intelligence: Security Applications, Challenges and Road Ahead

    Authors: Savio Sciancalepore, Gabriele Oligeri

    Abstract: Cyber Spectrum Intelligence (SpecInt) is emerging as a concept that extends beyond basic {\em spectrum sensing} and {\em signal intelligence} to encompass a broader set of capabilities and technologies aimed at monitoring the use of the radio spectrum and extracting information. SpecInt merges traditional spectrum sensing techniques with Artificial Intelligence (AI) and parallel processing to enha… ▽ More

    Submitted 7 January, 2025; originally announced January 2025.

  4. arXiv:2412.16008  [pdf, other

    cs.CR

    Detection of Aerial Spoofing Attacks to LEO Satellite Systems via Deep Learning

    Authors: Jos Wigchert, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Detecting spoofing attacks to Low-Earth-Orbit (LEO) satellite systems is a cornerstone to assessing the authenticity of the received information and guaranteeing robust service delivery in several application domains. The solutions available today for spoofing detection either rely on additional communication systems, receivers, and antennas, or require mobile deployments. Detection systems workin… ▽ More

    Submitted 22 May, 2025; v1 submitted 20 December, 2024; originally announced December 2024.

    Comments: Accepted for Publication by Elsevier Computer Networks

  5. arXiv:2411.06417  [pdf, other

    cs.CR

    HidePrint: Hiding the Radio Fingerprint via Random Noise

    Authors: Gabriele Oligeri, Savio Sciancalepore

    Abstract: Radio Frequency Fingerprinting (RFF) techniques allow a receiver to authenticate a transmitter by analyzing the physical layer of the radio spectrum. Although the vast majority of scientific contributions focus on improving the performance of RFF considering different parameters and scenarios, in this work, we consider RFF as an attack vector to identify and track a target device. We propose, im… ▽ More

    Submitted 10 November, 2024; originally announced November 2024.

  6. arXiv:2408.09179  [pdf, other

    cs.CR

    On the Reliability of Radio Frequency Fingerprinting

    Authors: Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software Defined Radios (SDR). Previous works have highlighted the so-called ``Day-After-T… ▽ More

    Submitted 17 August, 2024; originally announced August 2024.

  7. arXiv:2407.08311  [pdf, other

    cs.CR

    Preventing Radio Fingerprinting through Low-Power Jamming

    Authors: Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri

    Abstract: Radio Frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools. Authentication is achieved by isolating specific features of the transmitted signal that are unique to the transmitter's hardware. Much research has focused on improving the effectiveness and efficiency of radio frequency fingerprinting to maximize its per… ▽ More

    Submitted 2 April, 2025; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: 13 pages, 15 figures. Accepted to ACM AsiaCCS 2025

  8. arXiv:2310.16406  [pdf, other

    cs.CR cs.AI eess.SP

    Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities

    Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos

    Abstract: Radio Frequency Fingerprinting (RFF) techniques promise to authenticate wireless devices at the physical layer based on inherent hardware imperfections introduced during manufacturing. Such RF transmitter imperfections are reflected into over-the-air signals, allowing receivers to accurately identify the RF transmitting source. Recent advances in Machine Learning, particularly in Deep Learning (DL… ▽ More

    Submitted 15 April, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: Authors version; Accepted for the 20th International Wireless Communications and Mobile Computing (IWCMC) Security Symposium, 2024

  9. Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram

    Authors: Maurantonio Caprolu, Savio Sciancalepore, Aleksandar Grigorov, Velyan Kolev, Gabriele Oligeri

    Abstract: People Nearby is a service offered by Telegram that allows a user to discover other Telegram users, based only on geographical proximity. Nearby users are reported with a rough estimate of their distance from the position of the reference user, allowing Telegram to claim location privacy In this paper, we systematically analyze the location privacy provided by Telegram to users of the People Nearb… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Journal ref: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024)

  10. arXiv:2308.14016  [pdf, other

    cs.CR

    MITRE ATT&CK: State of the Art and Way Forward

    Authors: Bader Al-Sada, Alireza Sadighian, Gabriele Oligeri

    Abstract: MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques and procedures based on real-world observations. It has been used as a foundation for threat modelling in different sectors, such as government, academia and industry. To the best of our knowledge, no previous work has been devoted to the comprehensive collection, study and investigation of the current state of the art leve… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

  11. arXiv:2308.10268  [pdf, other

    cs.CR eess.SP

    False Data Injection Attacks in Smart Grids: State of the Art and Way Forward

    Authors: Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri

    Abstract: In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad D… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

  12. arXiv:2306.10912  [pdf, other

    cs.CR

    Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning

    Authors: Savio Sciancalepore, Fabrice Kusters, Nada Khaled Abdelhadi, Gabriele Oligeri

    Abstract: The current state of the art on jamming detection relies on link-layer metrics. A few examples are the bit-error-rate (BER), the packet delivery ratio, the throughput, and the increase in the signal-to-noise ratio (SNR). As a result, these techniques can only detect jamming \emph{ex-post}, i.e., once the attack has already taken down the communication link. These solutions are unfit for mobile dev… ▽ More

    Submitted 12 December, 2023; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: 16 pages, 16 figures, 3 tables; Submitted and under review

  13. arXiv:2305.05285  [pdf, other

    cs.CR cs.NI

    The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time

    Authors: Saeif Alhazbi, Savio Sciancalepore, Gabriele Oligeri

    Abstract: The performance of Radio Frequency (RF) Fingerprinting (RFF) techniques is negatively impacted when the training data is not temporally close to the testing data. This can limit the practical implementation of physical-layer authentication solutions. To circumvent this problem, current solutions involve collecting training and testing datasets at close time intervals -- this being detrimental to t… ▽ More

    Submitted 17 October, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

  14. arXiv:2010.09642  [pdf, other

    cs.CR cs.CY

    KaFHCa: Key-establishment via Frequency Hopping Collisions

    Authors: Muhammad Usman, Simone Raponi, Marwa Qaraqe, Gabriele Oligeri

    Abstract: The massive deployment of IoT devices being utilized by home automation, industrial and military scenarios demands for high security and privacy standards to be achieved through innovative solutions. This paper proposes KaFHCa, a crypto-less protocol that generates shared secret keys by combining random frequency hopping collisions and source indistinguishability independently of the radio channel… ▽ More

    Submitted 20 October, 2020; v1 submitted 19 October, 2020; originally announced October 2020.

  15. arXiv:2010.05470  [pdf, other

    cs.CR cs.AI cs.CY

    PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning

    Authors: Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro

    Abstract: Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. However, previous research efforts mainly focused on terrestrial wireless devices while, to the best of our knowledge, none of the previou… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

  16. The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

    Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt

    Abstract: We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum. We perform an extensive measurement campaign of data collection, and we build up a model describing the traffic patterns characterizing three popular IoT smart home devices, i.e., Google Nest Mini, Amazon Echo, and Amazon Echo Do… ▽ More

    Submitted 25 July, 2021; v1 submitted 16 September, 2020; originally announced September 2020.

    Comments: 15 pages, 7 figures. Accepted for the 9th International Symposium On Security And Privacy On Internet of Things (SPIoT), 2020

  17. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals

    Authors: Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro

    Abstract: In this paper, we study the privately-own IRIDIUM satellite constellation, to provide a location service that is independent of the GNSS. In particular, we apply our findings to propose a new GNSS spoofing detection solution, exploiting unencrypted IRIDIUM Ring Alert (IRA) messages that are broadcast by IRIDIUM satellites. We firstly reverse-engineer many parameters of the IRIDIUM satellite conste… ▽ More

    Submitted 18 June, 2020; originally announced June 2020.

    Comments: Accepted for the 13th Conference on Security and Privacy in Wireless and Mobile Networks (WISEC), 2020

  18. arXiv:2004.07948  [pdf, other

    eess.AS cs.LG cs.SD

    Sound of Guns: Digital Forensics of Gun Audio Samples meets Artificial Intelligence

    Authors: Simone Raponi, Isra Ali, Gabriele Oligeri

    Abstract: Classifying a weapon based on its muzzle blast is a challenging task that has significant applications in various security and military fields. Most of the existing works rely on ad-hoc deployment of spatially diverse microphone sensors to capture multiple replicas of the same gunshot, which enables accurate detection and identification of the acoustic source. However, carefully controlled setups… ▽ More

    Submitted 1 March, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

  19. arXiv:2002.05905  [pdf, other

    cs.CR cs.LG

    MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions

    Authors: Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro

    Abstract: Universal Serial Bus (USB) Flash Drives are nowadays one of the most convenient and diffused means to transfer files, especially when no Internet connection is available. However, USB flash drives are also one of the most common attack vectors used to gain unauthorized access to host devices. For instance, it is possible to replace a USB drive so that when the USB key is connected, it would instal… ▽ More

    Submitted 12 September, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

    Comments: Accepted for publication in ACM Transactions on Embedded Computing Systems (TECS) in September 2020

  20. arXiv:2002.05051  [pdf, other

    cs.CR cs.CY

    Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures

    Authors: Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro

    Abstract: Assisted-navigation applications have a relevant impact on our daily life. However, technological progress in virtualization technologies and Software-Defined Radios recently enabled new attack vectors, namely, road traffic poisoning. These attacks open up several dreadful scenarios, which are addressed in this contribution by identifying the associated challenges and proposing innovative counterm… ▽ More

    Submitted 5 May, 2021; v1 submitted 12 February, 2020; originally announced February 2020.

  21. Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection

    Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro

    Abstract: A new cybersecurity attack,where an adversary illicitly runs crypto-mining software over the devices of unaware users, is emerging in both the literature and in the wild . This attack, known as cryptojacking, has proved to be very effective given the simplicity of running a crypto-client into a target device. Several countermeasures have recently been proposed, with different features and performa… ▽ More

    Submitted 28 January, 2020; v1 submitted 21 October, 2019; originally announced October 2019.

    Journal ref: Computer Communications Volume 171, 1 April 2021, Pages 126-139

  22. arXiv:1910.03895  [pdf, other

    cs.CR

    BrokenStrokes: On the (in)Security of Wireless Keyboards

    Authors: Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro

    Abstract: Wireless devices resorting to event-triggered communications have been proved to suffer critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) emissions. In this paper, we move the attack frontier forward by proposing BrokenStrokes: an inexpensive, easy to implement, efficient, and effective attack able to detect the typing of a pre-defined keyword by only eaves… ▽ More

    Submitted 21 May, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

  23. PiNcH: an Effective, Efficient, and Robust Solution to Drone Detection via Network Traffic Analysis

    Authors: Savio Sciancalepore, Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro

    Abstract: We propose PiNcH, a methodology to detect the presence of a drone, its current status, and its movements by leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC). PiNcH is built applying standard classification algorithms to the eavesdropped traffic, analyzing features such as packets inter-arrival time and size. PiNcH is fully passive and it requires… ▽ More

    Submitted 7 December, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

    Journal ref: Computer Networks (COMNET), Elsevier, 2020

  24. arXiv:1307.5714  [pdf, ps, other

    cs.CR

    Silence is Golden: exploiting jamming and radio silence to communicate

    Authors: Roberto Di Pietro, Gabriele Oligeri

    Abstract: Jamming techniques require just moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this paper we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this pow… ▽ More

    Submitted 22 July, 2013; originally announced July 2013.