(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–14 of 14 results for author: Merlo, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.15645  [pdf

    cs.CR cs.LG cs.SE

    Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection

    Authors: Borja Molina-Coronado, Antonio Ruggia, Usue Mori, Alessio Merlo, Alexander Mendiburu, Jose Miguel-Alonso

    Abstract: Malware authors have seen obfuscation as the mean to bypass malware detectors based on static analysis features. For Android, several studies have confirmed that many anti-malware products are easily evaded with simple program transformations. As opposed to these works, ML detection proposals for Android leveraging static analysis features have also been proposed as obfuscation-resilient. Therefor… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  2. Automatic Security Assessment of GitHub Actions Workflows

    Authors: Giacomo Benedetti, Luca Verderame, Alessio Merlo

    Abstract: The demand for quick and reliable DevOps operations pushed distributors of repository platforms to implement workflows. Workflows allow automating code management operations directly on the repository hosting the software. However, this feature also introduces security issues that directly affect the repository, its content, and all the software supply chains in which the hosted code is involved i… ▽ More

    Submitted 10 November, 2022; v1 submitted 7 August, 2022; originally announced August 2022.

    Journal ref: Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses

  3. Attacking (and defending) the Maritime Radar System

    Authors: G. Longo, E. Russo, A. Armando, A. Merlo

    Abstract: Operation of radar equipment is one of the key facilities used by navigators to gather situational awareness about their surroundings. With an ever increasing need for always-running logistics and tighter shipping schedules, operators are relying more and more on computerized instruments and their indications. As a result, modern ships have become a complex cyber-physical system in which sensors a… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  4. LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework

    Authors: Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo

    Abstract: The rising of the Cyber-Physical System (CPS) and the Industry 4.0 paradigms demands the design and the implementation of Digital Twin Frameworks (DTFs) that may support the quick build of reliable Digital Twins (DTs) for experimental and testing purposes. Most of the current DTF proposals allow generating DTs at a good pace but affect generality, scalability, portability, and completeness. As a c… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

  5. PARIOT: Anti-Repackaging for IoT Firmware Integrity

    Authors: Luca Verderame, Antonio Ruggia, Alessio Merlo

    Abstract: IoT repackaging refers to an attack devoted to tampering with a legitimate firmware package by modifying its content (e.g., injecting some malicious code) and re-distributing it in the wild. In such a scenario, the firmware delivery and update processes play a central role in ensuring firmware integrity. Unfortunately, several existing solutions lack proper integrity verification, exposing firmwar… ▽ More

    Submitted 10 July, 2023; v1 submitted 9 September, 2021; originally announced September 2021.

    Comments: Revised version of the paper

  6. Understanding Fuchsia Security

    Authors: Francesco Pagano, Luca Verderame, Alessio Merlo

    Abstract: Fuchsia is a new open-source operating system created at Google that is currently under active development. The core architectural principles guiding the design and development of the OS include high system modularity and a specific focus on security and privacy. This paper analyzes the architecture and the software model of Fuchsia, giving a specific focus on the core security mechanisms of this… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

    Journal ref: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, September 2021

  7. You can't always get what you want: towards user-controlled privacy on Android

    Authors: Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo

    Abstract: Mobile applications (hereafter, apps) collect a plethora of information regarding the user behavior and his device through third-party analytics libraries. However, the collection and usage of such data raised several privacy concerns, mainly because the end-user - i.e., the actual owner of the data - is out of the loop in this collection process. Also, the existing privacy-enhanced solutions that… ▽ More

    Submitted 29 January, 2022; v1 submitted 4 June, 2021; originally announced June 2021.

  8. Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma

    Authors: Meriem Guerar, Luca Verderame, Mauro Migliardi, Francesco Palmieri, Alessio Merlo

    Abstract: A recent study has found that malicious bots generated nearly a quarter of overall website traffic in 2019 [100]. These malicious bots perform activities such as price and content scraping, account creation and takeover, credit card fraud, denial of service, etc. Thus, they represent a serious threat to all businesses in general, but are especially troublesome for e-commerce, travel and financial… ▽ More

    Submitted 22 January, 2022; v1 submitted 2 March, 2021; originally announced March 2021.

  9. arXiv:2102.13023  [pdf, other

    cs.CR

    Deep Adversarial Learning on Google Home devices

    Authors: Andrea Ranieri, Davide Caputo, Luca Verderame, Alessio Merlo, Luca Caviglione

    Abstract: Smart speakers and voice-based virtual assistants are core components for the success of the IoT paradigm. Unfortunately, they are vulnerable to various privacy threats exploiting machine learning to analyze the generated encrypted traffic. To cope with that, deep adversarial learning approaches can be used to build black-box countermeasures altering the network traffic (e.g., via packet padding)… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

  10. Deep Reinforcement Learning for Black-Box Testing of Android Apps

    Authors: Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella

    Abstract: The state space of Android apps is huge and its thorough exploration during testing remains a major challenge. In fact, the best exploration strategy is highly dependent on the features of the app under test. Reinforcement Learning (RL) is a machine learning technique that learns the optimal strategy to solve a task by trial and error, guided by positive or negative reward, rather than by explicit… ▽ More

    Submitted 15 January, 2021; v1 submitted 7 January, 2021; originally announced January 2021.

    Journal ref: ACM Transactions on Software Engineering and Methodology, 2022

  11. ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection

    Authors: Alessio Merlo, Antonio Ruggia, Luigi Sciolla, Luca Verderame

    Abstract: App repackaging refers to the practice of customizing an existing mobile app and redistributing it in the wild to fool the final user into installing the repackaged app instead of the original one. In this way, an attacker can embed malicious payload into a legitimate app for different aims, such as access to premium features, redirect revenue, or access to user's private data. In the Android ecos… ▽ More

    Submitted 18 December, 2020; v1 submitted 16 December, 2020; originally announced December 2020.

    ACM Class: D.4.6

    Journal ref: Pervasive & Mobile Computing, Vol 76, September 2021

  12. You Shall not Repackage! Demystifying Anti-Repackaging on Android

    Authors: Alessio Merlo, Antonio Ruggia, Luigi Sciolla, Luca Verderame

    Abstract: App repackaging refers to the practice of customizing an existing mobile app and redistributing it in the wild. In this way, the attacker aims to force some mobile users to install the repackaged(likely malicious) app instead of the original one. This phenomenon strongly affects Android, where apps are available on public stores, and the only requirement for an app to execute properly is to be dig… ▽ More

    Submitted 8 January, 2021; v1 submitted 10 September, 2020; originally announced September 2020.

    ACM Class: D.4.6

    Journal ref: Computers & Security, 2021

  13. On the (Un)Reliability of Privacy Policies in Android Apps

    Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo

    Abstract: Access to privacy-sensitive information on Android is a growing concern in the mobile community. Albeit Google Play recently introduced some privacy guidelines, it is still an open problem to soundly verify whether apps actually comply with such rules. To this aim, in this paper, we discuss a novel methodology based on a fruitful combination of static analysis, dynamic analysis, and machine learni… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Journal ref: Proc.of the IEEE International Joint Conference on Neural Networks (IJCNN 2020)

  14. arXiv:1209.0687  [pdf, other

    cs.CR cs.OS

    Security Issues in the Android Cross-Layer Architecture

    Authors: Alessandro Armando, Alessio Merlo, Luca Verderame

    Abstract: The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. We argue that such vulnerabilities are largely related to the interplay among layers composing the Android stack. Thus, we also argue that such interplay has been underestimated from a security point-of-view and a systematic analysis of the Android i… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: 7 pages, double column, 4 figures

    ACM Class: D.4.2; C.1.3