The privacy implications of cyber security systems: A technological survey

E Toch, C Bettini, E Shmueli, L Radaelli… - ACM Computing …, 2018 - dl.acm.org
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022 - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …

Dodgetron: Towards autonomous cyber deception using dynamic hybrid analysis of malware

MSI Sajid, J Wei, MR Alam, E Aghaei… - … IEEE Conference on …, 2020 - ieeexplore.ieee.org
With the advancement of technology, all our valuable and sensitive information has now
moved into digital formats. Adversary utilizes malware as a medium to steal our information …

[PDF][PDF] A natural language processing approach for financial fraud detection

JF Rodríguez, M Papale, M Carminati… - CEUR WORKSHOP …, 2022 - re.public.polimi.it
Due to the proliferation of online banking, people are more exposed than ever to attacks.
Moreover, frauds are becoming more sophisticated, bypassing the security measures put in …

Advancing Fraud Detection Systems Through Online Learning

T Paladini, M Bernasconi de Luca, M Carminati… - … Conference on Machine …, 2023 - Springer
The rapid increase in digital transactions has led to a consequential surge in financial fraud,
requiring an automatic way of defending effectively from such a threat. The past few years …

API based discrimination of ransomware and benign cryptographic programs

P Black, A Sohail, I Gondal, J Kamruzzaman… - … , ICONIP 2020, Bangkok …, 2020 - Springer
Ransomware is a widespread class of malware that encrypts files in a victim's computer and
extorts victims into paying a fee to regain access to their data. Previous research has …

Rogue key and impersonation attacks on FIDO2: From theory to practice

M Barbosa, A Cirne, L Esquível - … of the 18th International Conference on …, 2023 - dl.acm.org
FIDO2 is becoming a defacto standard for passwordless authentication. Using FIDO2 and
WebAuthn, web applications can enable users to associate cryptographic credentials to their …

FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning

C Doytshman, S Momiyama, I Singh, Y Elovici… - arxiv preprint arxiv …, 2023 - arxiv.org
In recent years, financial fraud detection systems have become very efficient at detecting
fraud, which is a major threat faced by e-commerce platforms. Such systems often include …

A server side solution for detecting webinject: A machine learning approach

M Moniruzzaman, A Bagirov, I Gondal… - Trends and Applications in …, 2018 - Springer
With the advancement of client-side on the fly web content generation techniques, it
becomes easier for attackers to modify the content of a website dynamically and gain access …

SysTaint: Assisting Reversing of Malicious Network Communications

G Viglianisi, M Carminati, M Polino… - Proceedings of the 8th …, 2018 - dl.acm.org
The ever-increasing number of malware samples demands for automated tools that aid the
analysts in the reverse engineering of complex malicious binaries. Frequently, malware …