Physical Unclonable Functions (PUFs) provide means to gen-erate chip individual keys, especially for low-cost applications such as theInternet of Things (IoT). They are intrinsically robust against reverseengineering, and more cost-effective than non-volatile memory (NVM).For several PUF primitives, countermeasures have been proposed to mit-igate side-channel weaknesses. However, most mitigation techniques re-quire...More>>
SAFAIR AI Contest
from 1st March to 15th May
Publications & Demonstrators
All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA
Publications
Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware DetectionNeural Networks
Damaševičius, Robertas; Venčkauskas, Algimantas; Toldinas, Jevgenijus; Grigaliūnas, Šarūnas
The security of information is among the greatest challenges facing organizations and institutions. Cybercrime has risen in frequency and magnitude in recent years, with new ways to steal, change and destroy information or disable information systems appearing every day. Among the types of penetration into the information systems where confidential...More>>
Information Sharing in Cyber Defence Exercises
Eduardas Kutka, Aušrius Juozapavičius, Linas Bukauskas, Agnė Brilingaitė
Availability and easy access to sophisticated cyber penetration testing tools enable exploitation of vulnerabilities in different systems globally. Repetitive nature and recognisable signatures of attacks raise demand for effective information sharing. Timely warnings about cyber incidents in other systems make it possible to identify related attacks locally. International cyber community...More>>
Machine Learning for Driver Detection through CAN bus
Fabio Martinelli, Francesco Mercaldo, Antonella Santone
In last years vehicular network safety and security are attracting interest from both industries and researchers. In this paper, starting from a set of features gathered from the in-vehicle CAN bus, we show how machine learning algorithms can be useful to discriminate between the car owner and impostors. Furthermore, we...More>>
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Android currently represents the most widespread operating system focused on mobile devices. It is not surprising that the majority of malware is created to perpetrate attacks targeting mobile devices equipped with this operating systems. In the mobile malware landscape, there exists a plethora of malware families exhibiting different malicious behaviors....More>>
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources
Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, Antonella Santone
The role of remote resources, such as the ones provided by Cloud infrastructures, is of paramount importance for the implementation of cost effective, yet reliable software systems to provide services to third parties. Cost effectiveness is a direct consequence of a correct estimation of resource usage, to be able to...More>>
Visualizing the outcome of dynamic analysis of Android malware with VizMal
Andrea De Lorenzo, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Antonella Santone
Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of the effort is on the identification as malware or non-malware of an entire sample. There are no...More>>
VisualDroid: automatic triage and detection of Android repackaged applications
Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Considering the pervasiveness of mobile devices, malicious writers are constantly focusing their attention in developing malicious payload aimed to gather sensible information from mobile devices without user content. As a matter of fact, it is really easy for malware writers to embed malicious payloads into legitimate applications, by applying the...More>>
Towards Visual Debugging for Multi-Target Time Series Classification
Udo Schlegel, Eren Cakmak, Hiba Arnout, Mennatallah El-Assady, Daniela Oelke, Daniel A Keim
Multi-target classification of multivariate time series data poses a challenge in many real-world applications (e.g., predictive main- tenance). Machine learning methods, such as random forests and neural networks, support training these classifiers. However, the debugging and analysis of possible misclassifications remain chal- lenging due to the often complex relations between...More>>