Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Davide Ariu"'
Autor:
Fabio Roli, Konrad Rieck, Giorgio Giacinto, Battista Biggio, Davide Ariu, Igino Corona, Christian Wressnegger
Publikováno v:
AISec@CCS
Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems. However, the suitability of clustering algorithms for s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a59aed0476b38b56d64ba30c59515ed6
Publikováno v:
Computers & Security. 51:16-31
In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. Recent works have shown, on small-scale experiments, the possibility of evading anti-malware engines by app
Publikováno v:
Conf. Computing Frontiers
Proceedings of the Computing Frontiers Conference on ZZZ-CF17
Proceedings of the Computing Frontiers Conference on ZZZ -CF'17
Proceedings of the Computing Frontiers Conference on ZZZ-CF17
Proceedings of the Computing Frontiers Conference on ZZZ -CF'17
During the past few years, social engineering has rapidly evolved and has become a mainstream technique in cybercrime and terrorism. It is used especially in targeted attacks involving complex human and technological exploits, aimed at deceiving huma
Autor:
Giorgio Giacinto, Igino Corona, Davide Ariu, Paolo Piredda, Fabio Roli, Battista Biggio, Luca Piras
Publikováno v:
AI*IA 2017 Advances in Artificial Intelligence ISBN: 9783319701684
AI*IA
AI*IA
Typosquatting consists of registering Internet domain names that closely resemble legitimate, reputable, and well-known ones (e.g., Farebook instead of Facebook). This cyber-attack aims to distribute malware or to phish the victims users (i.e., steal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7d8097c7f5601d9b72a61ed154d0bc36
https://doi.org/10.1007/978-3-319-70169-1_26
https://doi.org/10.1007/978-3-319-70169-1_26
Publikováno v:
Computer Networks. 57:487-500
A large number of today's botnets leverage the HTTP protocol to communicate with their botmasters or perpetrate malicious activities. In this paper, we present a new scalable system for network-level behavioral clustering of HTTP-based malware that a
Publikováno v:
SPSM@CCS
Google Cloud Messaging (GCM) is a widely-used and reliable mechanism that helps developers to build more efficient Android applications; in particular, it enables sending push notifications to an application only when new information is available for
Autor:
Davide Ariu, Federica Freschi, Fabio Roli, Enrico Frumento, Giorgio Fumera, Giorgio Giacinto, Luca Didaci
Publikováno v:
Advanced Sciences and Technologies for Security Applications ISBN: 9783319389295
We describe the roadmapping method developed in the context of the CyberROAD EU FP7 project, the aim of which was to develop a research roadmap for cybercrime and cyberterrorism. To achieve this aim we build on state-of-the-art methodologies and guid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::86a40a56aba945ee38ad6077a72bc6bf
https://hdl.handle.net/11567/1098514
https://hdl.handle.net/11567/1098514
Publikováno v:
Computers & Security. 30:221-241
Nowadays the security of Web applications is one of the key topics in Computer Security. Among all the solutions that have been proposed so far, the analysis of the HTTP payload at the byte level has proven to be effective as it does not require the
Publikováno v:
MALWARE
Due to its popularity and open-source nature, Android is the mobile platform that has been targeted the most by malware that aim to steal personal information or to control the users’ devices. More specifically, mobile botnets are malware that allo
Autor:
Davide Ariu, Giorgio Giacinto, Luca Didaci, Giorgio Fumera, Fabio Roli, Enrico Frumento, Federica Freschi
Publikováno v:
ARES
In this paper we describe the road mapping methodology we developed in the context of the Cyber ROAD EU FP7 project, whose aim is to develop a research roadmap for cybercrime and cyber terrorism. To this aim we built on state-of-the-art methodologies