Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Vigna, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14036  [pdf, other

    cs.CR

    Remote Keylogging Attacks in Multi-user VR Applications

    Authors: Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna

    Abstract: As Virtual Reality (VR) applications grow in popularity, they have bridged distances and brought users closer together. However, with this growth, there have been increasing concerns about security and privacy, especially related to the motion data used to create immersive experiences. In this study, we highlight a significant security threat in multi-user VR applications, which are applications t… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Comments: Accepted for Usenix 2024

  2. arXiv:2310.06844  [pdf, other

    q-fin.TR cs.CE

    Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market

    Authors: Priyanka Bose, Dipanjan Das, Fabio Gritti, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna

    Abstract: As cryptocurrency evolved, new financial instruments, such as lending and borrowing protocols, currency exchanges, fungible and non-fungible tokens (NFT), staking and mining protocols have emerged. A financial ecosystem built on top of a blockchain is supposed to be fair and transparent for each participating actor. Yet, there are sophisticated actors who turn their domain knowledge and market ine… ▽ More

    Submitted 5 September, 2023; originally announced October 2023.

  3. arXiv:2306.01953  [pdf, other

    cs.CR cs.AI cs.CV

    Invisible Image Watermarks Are Provably Removable Using Generative AI

    Authors: Xuandong Zhao, Kexun Zhang, Zihao Su, Saastha Vasan, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna, Yu-Xiang Wang, Lei Li

    Abstract: Invisible watermarks safeguard images' copyright by embedding hidden messages only detectable by owners. They also prevent people from misusing images, especially those generated by AI models. We propose a family of regeneration attacks to remove these invisible watermarks. The proposed attack method first adds random noise to an image to destroy the watermark and then reconstructs the image. This… ▽ More

    Submitted 6 August, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

  4. arXiv:2304.02103  [pdf, other

    cs.CR

    Token-Level Fuzzing

    Authors: Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna

    Abstract: Fuzzing has become a commonly used approach to identifying bugs in complex, real-world programs. However, interpreters are notoriously difficult to fuzz effectively, as they expect highly structured inputs, which are rarely produced by most fuzzing mutations. For this class of programs, grammar-based fuzzing has been shown to be effective. Tools based on this approach can find bugs in the code tha… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Journal ref: USENIX Security Symposium, 2021, pages 2795-2809

  5. arXiv:2302.09116  [pdf, other

    cs.SE

    Columbus: Android App Testing Through Systematic Callback Exploration

    Authors: Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna

    Abstract: With the continuous rise in the popularity of Android mobile devices, automated testing of apps has become more important than ever. Android apps are event-driven programs. Unfortunately, generating all possible types of events by interacting with the app's interface is challenging for an automated testing approach. Callback-driven testing eliminates the need for event generation by directly invok… ▽ More

    Submitted 17 February, 2023; originally announced February 2023.

    Journal ref: International Conference on Software Engineering (ICSE), 2023

  6. arXiv:2301.09806  [pdf, other

    cs.CR cs.CY

    Unveiling the Risks of NFT Promotion Scams

    Authors: Sayak Saha Roy, Dipanjan Das, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, Shirin Nilizadeh

    Abstract: The rapid growth in popularity and hype surrounding digital assets such as art, video, and music in the form of non-fungible tokens (NFTs) has made them a lucrative investment opportunity, with NFT-based sales surpassing $25B in 2021 alone. However, the volatility and general lack of technical understanding of the NFT ecosystem have led to the spread of various scams. The success of an NFT heavily… ▽ More

    Submitted 11 September, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

  7. arXiv:2301.02344  [pdf, other

    cs.CR cs.LG

    TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

    Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim

    Abstract: With tools like GitHub Copilot, automatic code suggestion is no longer a dream in software engineering. These tools, based on large language models, are typically trained on massive corpora of code mined from unvetted public sources. As a result, these models are susceptible to data poisoning attacks where an adversary manipulates the model's training by injecting malicious data. Poisoning attacks… ▽ More

    Submitted 24 January, 2024; v1 submitted 5 January, 2023; originally announced January 2023.

  8. arXiv:2111.08893  [pdf, other

    cs.CR

    Understanding Security Issues in the NFT Ecosystem

    Authors: Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna

    Abstract: Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth in trading volumes over the last year. Unfortunately, these marketplaces have not yet received much security scrutiny. Instead, most academic rese… ▽ More

    Submitted 27 April, 2022; v1 submitted 16 November, 2021; originally announced November 2021.

    Journal ref: ACM Conference on Computer and Communications Security (CCS), 2022

  9. Toward a Secure Crowdsourced Location Tracking System

    Authors: Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna

    Abstract: Low-energy Bluetooth devices have become ubiquitous and widely used for different applications. Among these, Bluetooth trackers are becoming popular as they allow users to track the location of their physical objects. To do so, Bluetooth trackers are often built-in within other commercial products connected to a larger crowdsourced tracking system. Such a system, however, can pose a threat to the… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: 10 pages - ACM WiSec 2021 - Preprint

    ACM Class: C.2.1; C.2.3; C.5.m

  10. arXiv:2104.08638  [pdf, other

    cs.CR cs.PL

    SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds

    Authors: Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna

    Abstract: This paper presents SAILFISH, a scalable system for automatically finding state-inconsistency bugs in smart contracts. To make the analysis tractable, we introduce a hybrid approach that includes (i) a light-weight exploration phase that dramatically reduces the number of instructions to analyze, and (ii) a precise refinement phase based on symbolic evaluation guided by our novel value-summary ana… ▽ More

    Submitted 12 December, 2021; v1 submitted 17 April, 2021; originally announced April 2021.

    Journal ref: IEEE Symposium on Security & Privacy, May 2022

  11. arXiv:2010.10682  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    VenoMave: Targeted Poisoning Against Speech Recognition

    Authors: Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

    Abstract: Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturbations. Compared to standard machine learning architectures, these attacks are significantly more challenging, especially since the inputs to a speech recognition system are time series that contain both acoustic and linguistic properties of speech. Extracting all recognition-relevant information req… ▽ More

    Submitted 20 April, 2023; v1 submitted 20 October, 2020; originally announced October 2020.

  12. arXiv:2005.00191  [pdf, other

    cs.LG cs.CR stat.ML

    Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

    Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna

    Abstract: A recent source of concern for the security of neural networks is the emergence of clean-label dataset poisoning attacks, wherein correctly labeled poison samples are injected into the training dataset. While these poison samples look legitimate to the human observer, they contain malicious characteristics that trigger a targeted misclassification during inference. We propose a scalable and transf… ▽ More

    Submitted 13 March, 2021; v1 submitted 30 April, 2020; originally announced May 2020.

  13. arXiv:1910.11376  [pdf, other

    cs.CR

    Neurlux: Dynamic Malware Analysis Without Feature Engineering

    Authors: Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna

    Abstract: Malware detection plays a vital role in computer security. Modern machine learning approaches have been centered around domain knowledge for extracting malicious features. However, many potential features can be used, and it is time consuming and difficult to manually identify the best features, especially given the diverse nature of malware. In this paper, we propose Neurlux, a neural network f… ▽ More

    Submitted 24 October, 2019; originally announced October 2019.

  14. BootKeeper: Validating Software Integrity Properties on Boot Firmware Images

    Authors: Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi

    Abstract: Boot firmware, like UEFI-compliant firmware, has been the target of numerous attacks, giving the attacker control over the entire system while being undetected. The measured boot mechanism of a computer platform ensures its integrity by using cryptographic measurements to detect such attacks. This is typically performed by relying on a Trusted Platform Module (TPM). Recent work, however, shows tha… ▽ More

    Submitted 29 March, 2019; originally announced March 2019.

    Journal ref: Conference on Data and Application Security and Privacy (CODASPY), Mar 2019, Dallas, United States. ACM Press, pp.11, Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. http://www.codaspy.org/

  15. arXiv:1805.10364  [pdf, other

    cs.CR cs.AI cs.CL cs.IR cs.LG

    Detecting Deceptive Reviews using Generative Adversarial Networks

    Authors: Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna

    Abstract: In the past few years, consumer review sites have become the main target of deceptive opinion spam, where fictitious opinions or reviews are deliberately written to sound authentic. Most of the existing work to detect the deceptive reviews focus on building supervised classifiers based on syntactic and lexical patterns of an opinion. With the successful use of Neural Networks on various classifica… ▽ More

    Submitted 25 May, 2018; originally announced May 2018.

    Comments: accepted at 1st Deep Learning and Security Workshop co-located with the 39th IEEE Symposium on Security and Privacy

  16. arXiv:1804.04649  [pdf, other

    cs.SI cs.CY

    Peer to Peer Hate: Hate Speech Instigators and Their Targets

    Authors: Mai ElSherief, Shirin Nilizadeh, Dana Nguyen, Giovanni Vigna, Elizabeth Belding

    Abstract: While social media has become an empowering agent to individual voices and freedom of expression, it also facilitates anti-social behaviors including online harassment, cyberbullying, and hate speech. In this paper, we present the first comparative study of hate speech instigators and target users on Twitter. Through a multi-step classification process, we curate a comprehensive hate speech datase… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

    Journal ref: ICWSM 2018

  17. arXiv:1708.09058  [pdf, other

    cs.CR cs.SI

    POISED: Spotting Twitter Spam Off the Beaten Paths

    Authors: Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, Jose Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna

    Abstract: Cybercriminals have found in online social networks a propitious medium to spread spam and malicious content. Existing techniques for detecting spam include predicting the trustworthiness of accounts and analyzing the content of these messages. However, advanced attackers can still successfully evade these defenses. Online social networks bring people who have personal connections or share commo… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  18. arXiv:1708.02749  [pdf, other

    cs.CR cs.HC

    Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

    Authors: Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna

    Abstract: As the size and complexity of software systems increase, the number and sophistication of software security flaws increase as well. The analysis of these flaws began as a manual approach, but it soon became apparent that tools were necessary to assist human experts in this task, resulting in a number of techniques and approaches that automated aspects of the vulnerability analysis process. Recen… ▽ More

    Submitted 9 August, 2017; originally announced August 2017.

  19. arXiv:1509.03531  [pdf, ps, other

    cs.CR cs.SI

    Towards Detecting Compromised Accounts on Social Networks

    Authors: Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna

    Abstract: Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our pre… ▽ More

    Submitted 11 September, 2015; originally announced September 2015.

    Journal ref: TDSC-2014-10-0271.R1