1,834 results on '"Conti, Mauro"'
Search Results
102. OSTIS: A novel Organization-Specific Threat Intelligence System
- Author
-
Arikkat, Dincy R., P., Vinod, K.A., Rafidha Rehiman, Nicolazzo, Serena, Nocera, Antonino, Timpau, Georgiana, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
103. VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments
- Author
-
Verma, Amandeep, Saha, Rahul, Kumar, Gulshan, Conti, Mauro, and Rodrigues, Joel J.P.C.
- Published
- 2024
- Full Text
- View/download PDF
104. Captcha Attack: Turning Captchas Against Humanity
- Author
-
Conti, Mauro, Pajola, Luca, and Tricomi, Pier Paolo
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Nowadays, people generate and share massive content on online platforms (e.g., social networks, blogs). In 2021, the 1.9 billion daily active Facebook users posted around 150 thousand photos every minute. Content moderators constantly monitor these online platforms to prevent the spreading of inappropriate content (e.g., hate speech, nudity images). Based on deep learning (DL) advances, Automatic Content Moderators (ACM) help human moderators handle high data volume. Despite their advantages, attackers can exploit weaknesses of DL components (e.g., preprocessing, model) to affect their performance. Therefore, an attacker can leverage such techniques to spread inappropriate content by evading ACM. In this work, we propose CAPtcha Attack (CAPA), an adversarial technique that allows users to spread inappropriate text online by evading ACM controls. CAPA, by generating custom textual CAPTCHAs, exploits ACM's careless design implementations and internal procedures vulnerabilities. We test our attack on real-world ACM, and the results confirm the ferocity of our simple yet effective attack, reaching up to a 100% evasion success in most cases. At the same time, we demonstrate the difficulties in designing CAPA mitigations, opening new challenges in CAPTCHAs research area., Comment: Currently under submission
- Published
- 2022
105. LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network
- Author
-
K.M., Sameera, P., Vinod, K.A., Rafidha Rehiman, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
106. Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
- Author
-
Cardaioli, Matteo, Cecconello, Stefano, Conti, Mauro, Milani, Simone, Picek, Stjepan, and Saraci, Eugen
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Automated Teller Machines (ATMs) represent the most used system for withdrawing cash. The European Central Bank reported more than 11 billion cash withdrawals and loading/unloading transactions on the European ATMs in 2019. Although ATMs have undergone various technological evolutions, Personal Identification Numbers (PINs) are still the most common authentication method for these devices. Unfortunately, the PIN mechanism is vulnerable to shoulder-surfing attacks performed via hidden cameras installed near the ATM to catch the PIN pad. To overcome this problem, people get used to covering the typing hand with the other hand. While such users probably believe this behavior is safe enough to protect against mentioned attacks, there is no clear assessment of this countermeasure in the scientific literature. This paper proposes a novel attack to reconstruct PINs entered by victims covering the typing hand with the other hand. We consider the setting where the attacker can access an ATM PIN pad of the same brand/model as the target one. Afterward, the attacker uses that model to infer the digits pressed by the victim while entering the PIN. Our attack owes its success to a carefully selected deep learning architecture that can infer the PIN from the typing hand position and movements. We run a detailed experimental analysis including 58 users. With our approach, we can guess 30% of the 5-digit PINs within three attempts -- the ones usually allowed by ATM before blocking the card. We also conducted a survey with 78 users that managed to reach an accuracy of only 7.92% on average for the same setting. Finally, we evaluate a shielding countermeasure that proved to be rather inefficient unless the whole keypad is shielded.
- Published
- 2021
107. Demystifying the Transferability of Adversarial Attacks in Computer Networks
- Author
-
Nowroozi, Ehsan, Mekdad, Yassine, Berenjestanaki, Mohammad Hajian, Conti, Mauro, and Fergougui, Abdeslam EL
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Computer Science - Networking and Internet Architecture - Abstract
Convolutional Neural Networks (CNNs) models are one of the most frequently used deep learning networks, and extensively used in both academia and industry. Recent studies demonstrated that adversarial attacks against such models can maintain their effectiveness even when used on models other than the one targeted by the attacker. This major property is known as transferability, and makes CNNs ill-suited for security applications. In this paper, we provide the first comprehensive study which assesses the robustness of CNN-based models for computer networks against adversarial transferability. Furthermore, we investigate whether the transferability property issue holds in computer networks applications. In our experiments, we first consider five different attacks: the Iterative Fast Gradient Method (I-FGSM), the Jacobian-based Saliency Map (JSMA), the Limited-memory Broyden Fletcher Goldfarb Shanno BFGS (L- BFGS), the Projected Gradient Descent (PGD), and the DeepFool attack. Then, we perform these attacks against three well- known datasets: the Network-based Detection of IoT (N-BaIoT) dataset, the Domain Generating Algorithms (DGA) dataset, and the RIPE Atlas dataset. Our experimental results show clearly that the transferability happens in specific use cases for the I- FGSM, the JSMA, and the LBFGS attack. In such scenarios, the attack success rate on the target network range from 63.00% to 100%. Finally, we suggest two shielding strategies to hinder the attack transferability, by considering the Most Powerful Attacks (MPAs), and the mismatch LSTM architecture., Comment: 14 pages
- Published
- 2021
108. A Survey on Security and Privacy Issues of UAVs
- Author
-
Mekdad, Yassine, Aris, Ahmet, Babun, Leonardo, Fergougui, Abdeslam EL, Conti, Mauro, Lazzeretti, Riccardo, and Uluagac, A. Selcuk
- Subjects
Computer Science - Cryptography and Security - Abstract
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilian applications such as hostage rescue and parcel delivery will integrate smart cities in the future. Nowadays, the affordability of commercial drones expands its usage at a large scale. However, the development of drone technology is associated with vulnerabilities and threats due to the lack of efficient security implementations. Moreover, the complexity of UAVs in software and hardware triggers potential security and privacy issues. Thus, posing significant challenges for the industry, academia, and governments. In this paper, we extensively survey the security and privacy issues of UAVs by providing a systematic classification at four levels: Hardware-level, Software-level, Communication-level, and Sensor-level. In particular, for each level, we thoroughly investigate (1) common vulnerabilities affecting UAVs for potential attacks from malicious actors, (2) existing threats that are jeopardizing the civilian application of UAVs, (3) active and passive attacks performed by the adversaries to compromise the security and privacy of UAVs, (4) possible countermeasures and mitigation techniques to protect UAVs from such malicious activities. In addition, we summarize the takeaways that highlight lessons learned about UAVs' security and privacy issues. Finally, we conclude our survey by presenting the critical pitfalls and suggesting promising future research directions for security and privacy of UAVs.
- Published
- 2021
109. The Spread of Propaganda by Coordinated Communities on Social Media
- Author
-
Hristakieva, Kristina, Cresci, Stefano, Martino, Giovanni Da San, Conti, Mauro, and Nakov, Preslav
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language - Abstract
Large-scale manipulations on social media have two important characteristics: (i) use of propaganda to influence others, and (ii) adoption of coordinated behavior to spread it and to amplify its impact. Despite the connection between them, these two characteristics have so far been considered in isolation. Here we aim to bridge this gap. In particular, we analyze the spread of propaganda and its interplay with coordinated behavior on a large Twitter dataset about the 2019 UK general election. We first propose and evaluate several metrics for measuring the use of propaganda on Twitter. Then, we investigate the use of propaganda by different coordinated communities that participated in the online debate. The combination of the use of propaganda and coordinated behavior allows us to uncover the authenticity and harmfulness of the different communities. Finally, we compare our measures of propaganda and coordination with automation (i.e., bot) scores and Twitter suspensions, revealing interesting trends. From a theoretical viewpoint, we introduce a methodology for analyzing several important dimensions of online behavior that are seldom conjointly considered. From a practical viewpoint, we provide new insights into authentic and inauthentic online activities during the 2019 UK general election., Comment: The 14th ACM Web Science Conference 2022 (WebSci '22)
- Published
- 2021
- Full Text
- View/download PDF
110. Research trends, challenges, and emerging topics of digital forensics: A review of reviews
- Author
-
Casino, Fran, Dasaklis, Tom, Spathoulas, Georgios, Anagnostopoulos, Marios, Ghosal, Amrita, Borocz, Istvan, Solanas, Agusti, Conti, Mauro, and Patsakis, Constantinos
- Subjects
Computer Science - Cryptography and Security - Abstract
Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date, researchers have presented many surveys and reviews on the field. However, such articles focused on the advances of each particular domain of digital forensics individually. Therefore, while each of these surveys facilitates researchers and practitioners to keep up with the latest advances in a particular domain of digital forensics, the global perspective is missing. Aiming to fill this gap, we performed a qualitative review of reviews in the field of digital forensics, determined the main topics on digital forensics topics and identified their main challenges. Our analysis provides enough evidence to prove that the digital forensics community could benefit from closer collaborations and cross-topic research, since it is apparent that researchers and practitioners are trying to find solutions to the same problems in parallel, sometimes without noticing it.
- Published
- 2021
111. Privacy-preserving in Blockchain-based Federated Learning systems
- Author
-
K.M., Sameera, Nicolazzo, Serena, Arazzi, Marco, Nocera, Antonino, K.A., Rafidha Rehiman, P., Vinod, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
112. PETRAK: A solution against DDoS attacks in vehicular networks
- Author
-
Verma, Amandeep, Saha, Rahul, Kumar, Gulshan, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
113. SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
- Author
-
Shirsath, Vaishali A., Chandane, Madhav M., Lal, Chhagan, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
114. EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction
- Author
-
De Salve, Andrea, Brighente, Alessandro, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
115. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers
- Author
-
Koffas, Stefanos, Xu, Jing, Conti, Mauro, and Picek, Stjepan
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers. By doing so, we make the backdoor attack challenging to detect for legitimate users, and thus, potentially more dangerous. We conduct experiments on two versions of a speech dataset and three neural networks and explore the performance of our attack concerning the duration, position, and type of the trigger. Our results indicate that less than 1% of poisoned data is sufficient to deploy a backdoor attack and reach a 100% attack success rate. We observed that short, non-continuous triggers result in highly successful attacks. However, since our trigger is inaudible, it can be as long as possible without raising any suspicions making the attack more effective. Finally, we conducted our attack in actual hardware and saw that an adversary could manipulate inference in an Android application by playing the inaudible trigger over the air.
- Published
- 2021
- Full Text
- View/download PDF
116. EVScout2.0: Electric Vehicle Profiling Through Charging Profile
- Author
-
Brighente, Alessandro, Conti, Mauro, Donadel, Denis, and Turrin, Federico
- Subjects
Computer Science - Cryptography and Security - Abstract
EVs (Electric Vehicles) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Privacy of users represents one of the possible threats impairing EVs adoption. In particular, recent works showed the feasibility of identifying EVs based on the current exchanged during the charging phase. In fact, while the resource negotiation phase runs over secure communication protocols, the signal exchanged during the actual charging contains features peculiar to each EV. A suitable feature extractor can hence associate such features to each EV, in what is commonly known as profiling. In this paper, we propose EVScout2.0, an extended and improved version of our previously proposed framework to profile EVs based on their charging behavior. By exploiting the current and pilot signals exchanged during the charging phase, our scheme is able to extract features peculiar for each EV, allowing hence for their profiling. We implemented and tested EVScout2.0 over a set of real-world measurements considering over 7500 charging sessions from a total of 137 EVs. In particular, numerical results show the superiority of EVScout2.0 with respect to the previous version. EVScout2.0 can profile EVs, attaining a maximum of 0.88 recall and 0.88 precision. To the best of the authors' knowledge, these results set a new benchmark for upcoming privacy research for large datasets of EVs.
- Published
- 2021
117. Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System
- Author
-
Conti, Mauro, Milani, Simone, Nowroozi, Ehsan, and Orazi, Gabriele
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Computer Science - Multimedia - Abstract
The last-generation video conferencing software allows users to utilize a virtual background to conceal their personal environment due to privacy concerns, especially in official meetings with other employers. On the other hand, users maybe want to fool people in the meeting by considering the virtual background to conceal where they are. In this case, developing tools to understand the virtual background utilize for fooling people in meeting plays an important role. Besides, such detectors must prove robust against different kinds of attacks since a malicious user can fool the detector by applying a set of adversarial editing steps on the video to conceal any revealing footprint. In this paper, we study the feasibility of an efficient tool to detect whether a videoconferencing user background is real. In particular, we provide the first tool which computes pixel co-occurrences matrices and uses them to search for inconsistencies among spectral and spatial bands. Our experiments confirm that cross co-occurrences matrices improve the robustness of the detector against different kinds of attacks. This work's performance is especially noteworthy with regard to color SPAM features. Moreover, the performance especially is significant with regard to robustness versus post-processing, like geometric transformations, filtering, contrast enhancement, and JPEG compression with different quality factors., Comment: 6 pages
- Published
- 2021
118. News consumption and social media regulations policy
- Author
-
Etta, Gabriele, Cinelli, Matteo, Galeazzi, Alessandro, Valensise, Carlo Michele, Conti, Mauro, and Quattrociocchi, Walter
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Computers and Society - Abstract
Users online tend to consume information adhering to their system of beliefs and to ignore dissenting information. During the COVID-19 pandemic, users get exposed to a massive amount of information about a new topic having a high level of uncertainty. In this paper, we analyze two social media that enforced opposite moderation methods, Twitter and Gab, to assess the interplay between news consumption and content regulation concerning COVID-19. We compare the two platforms on about three million pieces of content analyzing user interaction with respect to news articles. We first describe users' consumption patterns on the two platforms focusing on the political leaning of news outlets. Finally, we characterize the echo chamber effect by modeling the dynamics of users' interaction networks. Our results show that the presence of moderation pursued by Twitter produces a significant reduction of questionable content, with a consequent affiliation towards reliable sources in terms of engagement and comments. Conversely, the lack of clear regulation on Gab results in the tendency of the user to engage with both types of content, showing a slight preference for the questionable ones which may account for a dissing/endorsement behavior. Twitter users show segregation towards reliable content with a uniform narrative. Gab, instead, offers a more heterogeneous structure where users, independently of their leaning, follow people who are slightly polarized towards questionable news.
- Published
- 2021
119. Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
- Author
-
Rana, Saurabh, Mishra, Dheerendra, Lal, Chhagan, and Conti, Mauro
- Published
- 2023
- Full Text
- View/download PDF
120. GREPHRO: Nature-inspired optimization duo for Internet-of-Things
- Author
-
Kumar, Gulshan, Saha, Rahul, Conti, Mauro, Devgun, Tannishtha, and Thomas, Reji
- Published
- 2024
- Full Text
- View/download PDF
121. Anonymous Federated Learning via Named-Data Networking
- Author
-
Agiollo, Andrea, Bardhi, Enkeleda, Conti, Mauro, Dal Fabbro, Nicolò, and Lazzeretti, Riccardo
- Published
- 2024
- Full Text
- View/download PDF
122. SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches
- Author
-
Shirsath, Vaishali A., Chandane, Madhav M., Lal, Chhagan, and Conti, Mauro
- Published
- 2024
- Full Text
- View/download PDF
123. Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack
- Author
-
Pajola, Luca and Conti, Mauro
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
The increased demand for machine learning applications made companies offer Machine-Learning-as-a-Service (MLaaS). In MLaaS (a market estimated 8000M USD by 2025), users pay for well-performing ML models without dealing with the complicated training procedure. Among MLaaS, text-based applications are the most popular ones (e.g., language translators). Given this popularity, MLaaS must provide resiliency to adversarial manipulations. For example, a wrong translation might lead to a misunderstanding between two parties. In the text domain, state-of-the-art attacks mainly focus on strategies that leverage ML models' weaknesses. Unfortunately, not much attention has been given to the other pipeline' stages, such as the indexing stage (i.e., when a sentence is converted from a textual to a numerical representation) that, if manipulated, can significantly affect the final performance of the application. In this paper, we propose a novel text evasion technique called "\textit{Zero-Width} attack" (ZeW) that leverages the injection of human non-readable characters, affecting indexing stage mechanisms. We demonstrate that our simple yet effective attack deceives MLaaS of "giants" such as Amazon, Google, IBM, and Microsoft. Our case study, based on the manipulation of hateful tweets, shows that out of 12 analyzed services, only one is resistant to our injection strategy. We finally introduce and test a simple \textit{input validation} defense that can prevent our proposed attack., Comment: Accepted to appear in the Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EUROS&P)
- Published
- 2021
124. UAVs Path Deviation Attacks: Survey and Research Challenges
- Author
-
Sorbelli, Francesco Betti, Conti, Mauro, Pinotti, Cristina M., and Rigoni, Giulio
- Subjects
Computer Science - Cryptography and Security - Abstract
Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian applications. Such flying vehicles can accomplish tasks under the pilot's eyesight within the range of a remote controller, or autonomously according to a certain pre-loaded path configuration. Different path deviation attacks can be performed by malicious users against UAVs. We classify such attacks and the relative defenses based on the UAV's flight mode, i.e., (i) First Person View (FPV), (ii) civilian Global Navigation Satellite System based (GNSS), and (iii) GNSS "plus" auxiliary technologies (GNSS+), and on the multiplicity, i.e., (i) Single UAV, and (ii) Multiple UAVs. We found that very little has been done to secure the FPV flight mode against path deviation. In GNSS mode, spoofing is the most worrisome attack. The best defense against spoofing seems to be redundancy, such as adding vision chips to single UAV or using multiple arranged UAVs. No specific attacks and defenses have been found in literature for GNSS+ or for UAVs moving in group without a pre-ordered arrangement. These aspects require further investigation., Comment: Published in: 2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)
- Published
- 2021
- Full Text
- View/download PDF
125. A Survey on Industrial Control System Testbeds and Datasets for Security Research
- Author
-
Conti, Mauro, Donadel, Denis, and Turrin, Federico
- Subjects
Computer Science - Cryptography and Security - Abstract
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore, since ICSs are often employed in critical infrastructures (e.g., nuclear plants) and manufacturing companies (e.g., chemical industries), attacks can lead to devastating physical damages. In dealing with this security requirement, the research community focuses on developing new security mechanisms such as Intrusion Detection Systems (IDSs), facilitated by leveraging modern machine learning techniques. However, these algorithms require a testing platform and a considerable amount of data to be trained and tested accurately. To satisfy this prerequisite, Academia, Industry, and Government are increasingly proposing testbed (i.e., scaled-down versions of ICSs or simulations) to test the performances of the IDSs. Furthermore, to enable researchers to cross-validate security systems (e.g., security-by-design concepts or anomaly detectors), several datasets have been collected from testbeds and shared with the community. In this paper, we provide a deep and comprehensive overview of ICSs, presenting the architecture design, the employed devices, and the security protocols implemented. We then collect, compare, and describe testbeds and datasets in the literature, highlighting key challenges and design guidelines to keep in mind in the design phases. Furthermore, we enrich our work by reporting the best performing IDS algorithms tested on every dataset to create a baseline in state of the art for this field. Finally, driven by knowledge accumulated during this survey's development, we report advice and good practices on the development, the choice, and the utilization of testbeds, datasets, and IDSs.
- Published
- 2021
- Full Text
- View/download PDF
126. MiniV2G: An Electric Vehicle Charging Emulator
- Author
-
Attanasio, Luca, Conti, Mauro, Donadel, Denis, and Turrin, Federico
- Subjects
Computer Science - Cryptography and Security - Abstract
The impact of global warming and the imperative to limit climate change have stimulated the need to develop new solutions based on renewable energy sources. One of the emerging trends in this endeavor are the Electric Vehicles (EVs), which use electricity instead of traditional fossil fuels as a power source, relying on the Vehicle-to-Grid (V2G) paradigm. The novelty of such a paradigm requires careful analysis to avoid malicious attempts. An attacker can exploit several surfaces, such as the remote connection between the Distribution Grid and Charging Supply or the authentication system between the charging Supply Equipment and the Electric Vehicles. However, V2G architecture's high cost and complexity in implementation can restrain this field's research capability. In this paper, we approach this limitation by proposing MiniV2G, an open-source emulator to simulate Electric Vehicle Charging (EVC) built on top of Mininet and RiseV2G. MiniV2G is particularly suitable for security researchers to study and test real V2G charging scenarios. MiniV2G can reproduce with high fidelity a V2G architecture to easily simulate an EV charging process. Finally, we present a MiniV2G application and show how MiniV2G can be used to study V2G communication and develop attacks and countermeasures that can be applied to real systems. Since we believe our tool can be of great help for research in this field, we also made it freely available.
- Published
- 2021
- Full Text
- View/download PDF
127. Leveraging Social Networks for Mergers and Acquisitions Forecasting
- Author
-
Visintin, Alessandro, Conti, Mauro, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Zhang, Feng, editor, Wang, Hua, editor, Barhamgi, Mahmoud, editor, Chen, Lu, editor, and Zhou, Rui, editor
- Published
- 2023
- Full Text
- View/download PDF
128. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps
- Author
-
Carboni, Federico, Conti, Mauro, Donadel, Denis, Sciacco, Mariano, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Zhou, Jianying, editor, Batina, Lejla, editor, Li, Zengpeng, editor, Lin, Jingqiang, editor, Losiouk, Eleonora, editor, Majumdar, Suryadipta, editor, Mashima, Daisuke, editor, Meng, Weizhi, editor, Picek, Stjepan, editor, Rahman, Mohammad Ashiqur, editor, Shao, Jun, editor, Shimaoka, Masaki, editor, Soremekun, Ezekiel, editor, Su, Chunhua, editor, Teh, Je Sen, editor, Udovenko, Aleksei, editor, Wang, Cong, editor, Zhang, Leo, editor, and Zhauniarovich, Yury, editor
- Published
- 2023
- Full Text
- View/download PDF
129. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions
- Author
-
de Vos, Adriaan, Brighente, Alessandro, Conti, Mauro, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Katsikas, Sokratis, editor, Cuppens, Frédéric, editor, Kalloniatis, Christos, editor, Mylopoulos, John, editor, Pallas, Frank, editor, Pohle, Jörg, editor, Sasse, M. Angela, editor, Abie, Habtamu, editor, Ranise, Silvio, editor, Verderame, Luca, editor, Cambiaso, Enrico, editor, Maestre Vidal, Jorge, editor, Sotelo Monge, Marco Antonio, editor, Albanese, Massimiliano, editor, Katt, Basel, editor, Pirbhulal, Sandeep, editor, and Shukla, Ankur, editor
- Published
- 2023
- Full Text
- View/download PDF
130. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
- Author
-
Mohammadi, Reza, Lal, Chhagan, and Conti, Mauro
- Published
- 2023
- Full Text
- View/download PDF
131. Contact Tracing Made Un-relay-able
- Author
-
Casagrande, Marco, Conti, Mauro, and Losiouk, Eleonora
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computers and Society - Abstract
Automated contact tracing is a key solution to control the spread of airborne transmittable diseases: it traces contacts among individuals in order to alert people about their potential risk of being infected. The current SARS-CoV-2 pandemic put a heavy strain on the healthcare system of many countries. Governments chose different approaches to face the spread of the virus and the contact tracing apps were considered the most effective ones. In particular, by leveraging on the Bluetooth Low-Energy technology, mobile apps allow to achieve a privacy-preserving contact tracing of citizens. While researchers proposed several contact tracing approaches, each government developed its own national contact tracing app. In this paper, we demonstrate that many popular contact tracing apps (e.g., the ones promoted by the Italian, French, Swiss government) are vulnerable to relay attacks. Through such attacks people might get misleadingly diagnosed as positive to SARS-CoV-2, thus being enforced to quarantine and eventually leading to a breakdown of the healthcare system. To tackle this vulnerability, we propose a novel and lightweight solution that prevents relay attacks, while providing the same privacy-preserving features as the current approaches. To evaluate the feasibility of both the relay attack and our novel defence mechanism, we developed a proof of concept against the Italian contact tracing app (i.e., Immuni). The design of our defence allows it to be integrated into any contact tracing app.
- Published
- 2020
132. Mascara: A Novel Attack Leveraging Android Virtualization
- Author
-
Alecci, Marco, Cestaro, Riccardo, Conti, Mauro, Kanishka, Ketan, and Losiouk, Eleonora
- Subjects
Computer Science - Cryptography and Security - Abstract
Android virtualization enables an app to create a virtual environment, in which other apps can run. Originally designed to overcome the limitations of mobile apps dimensions, malicious developers soon started exploiting this technique to design novel attacks. As a consequence, researchers proposed new defence mechanisms that enable apps to detect whether they are running in a virtual environment. In this paper, we propose Mascara, the first attack that exploits the virtualization technique in a new way, achieving the full feasibility against any Android app and proving the ineffectiveness of existing countermeasures. Mascara is executed by a malicious app, that looks like the add-on of the victim app. As for any other add-on, our malicious one can be installed as a standard Android app, but, after the installation, it launches Mascara against the victim app. The malicious add-on is generated by Mascarer, the framework we designed and developed to automate the whole process. Concerning Mascara, we evaluated its effectiveness against three popular apps (i.e., Telegram, Amazon Music and Alamo) and its capability to bypass existing mechanisms for virtual environments detection. We analyzed the efficiency of our attack by measuring the overhead introduced at runtime by the virtualization technique and the compilation time required by Mascarer to generate 100 malicious add-ons (i.e., less than 10 sec). Finally, we designed a robust approach that detects virtual environments by inspecting the fields values of ArtMethod data structures in the Android Runtime (ART) environment.
- Published
- 2020
133. A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems
- Author
-
Tavella, Federico, Giaretta, Alberto, Conti, Mauro, and Balasubramaniam, Sasitharan
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Emerging Technologies ,Computer Science - Machine Learning - Abstract
Data storage is one of the main computing issues of this century. Not only storage devices are converging to strict physical limits, but also the amount of data generated by users is growing at an unbelievable rate. To face these challenges, data centres grew constantly over the past decades. However, this growth comes with a price, particularly from the environmental point of view. Among various promising media, DNA is one of the most fascinating candidate. In our previous work, we have proposed an automated archival architecture which uses bioengineered bacteria to store and retrieve data, previously encoded into DNA. This storage technique is one example of how biological media can deliver power-efficient storing solutions. The similarities between these biological media and classical ones can also be a drawback, as malicious parties might replicate traditional attacks on the former archival system, using biological instruments and techniques. In this paper, first we analyse the main characteristics of our storage system and the different types of attacks that could be executed on it. Then, aiming at identifying on-going attacks, we propose and evaluate detection techniques, which rely on traditional metrics and machine learning algorithms. We identify and adapt two suitable metrics for this purpose, namely generalized entropy and information distance. Moreover, our trained models achieve an AUROC over 0.99 and AUPRC over 0.91., Comment: 12 pages, 21 figures
- Published
- 2020
134. TEL: Low-Latency Failover Traffic Engineering in Data Plane
- Author
-
Mostafaei, Habib, Shojafar, Mohammad, and Conti, Mauro
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Modern network applications demand low-latency traffic engineering in the presence of network failure while preserving the quality of service constraints like delay and capacity. Fast Re-Route (FRR) mechanisms are widely used for traffic re-routing purposes in failure scenarios. Control plane FRR typically computes the backup forwarding rules to detour the traffic in the data plane when the failure occurs. This mechanism could be computed in the data plane with the emergence of programmable data planes. In this paper, we propose a system (called TEL) that contains two FRR mechanisms, namely, TEL-C and TEL-D. The first one computes backup forwarding rules in the control plane, satisfying max-min fair allocation. The second mechanism provides FRR in the data plane. Both algorithms require minimal memory on programmable data planes and are well-suited with modern line rate match-action forwarding architectures (e.g., PISA). We implement both mechanisms on P4 programmable software switches (e.g., BMv2 and Tofino) and measure their performance on various topologies. The obtained results from a datacenter topology show that our FRR mechanism can improve the flow completion time up to 4.6x$-$7.3x (i.e., small flows) and 3.1x$-$12x (i.e., large flows) compared to recirculation-based mechanisms, such as F10, respectively.
- Published
- 2020
135. Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis
- Author
-
Barbieri, Giovanni, Conti, Mauro, Tippenhauer, Nils Ole, and Turrin, Federico
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Networking and Internet Architecture - Abstract
Modern Industrial Control Systems (ICSs) allow remote communication through the Internet using industrial protocols that were not designed to work with external networks. To understand security issues related to this practice, prior work usually relies on active scans by researchers or services such as Shodan. While such scans can identify publicly open ports, they cannot identify legitimate use of insecure industrial traffic. In particular, source-based filtering in Network Address Translation or Firewalls prevent detection by active scanning, but do not ensure that insecure communication is not manipulated in transit. In this work, we compare Shodan-only analysis with large-scale traffic analysis at a local Internet Exchange Point (IXP), based on sFlow sampling. This setup allows us to identify ICS endpoints actually exchanging industrial traffic over the Internet. Besides, we are able to detect scanning activities and what other type of traffic is exchanged by the systems (i.e., IT traffic). We find that Shodan only listed less than 2% of hosts that we identified as exchanging industrial traffic, and only 7% of hosts identified by Shodan actually exchange industrial traffic. Therefore, Shodan do not allow to understand the actual use of insecure industrial protocols on the Internet and the current security practices in ICS communications. We show that 75.6% of ICS hosts still rely on unencrypted communications without integrity protection, leaving those critical systems vulnerable to malicious attacks.
- Published
- 2020
136. Online Advertising Security: Issues, Taxonomy, and Future Directions
- Author
-
Pooranian, Zahra, Conti, Mauro, Haddadi, Hamed, and Tafazolli, Rahim
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Social and Information Networks - Abstract
Online advertising has become the backbone of the Internet economy by revolutionizing business marketing. It provides a simple and efficient way for advertisers to display their advertisements to specific individual users, and over the last couple of years has contributed to an explosion in the income stream for several web-based businesses. For example, Google's income from advertising grew 51.6% between 2016 and 2018, to $136.8 billion. This exponential growth in advertising revenue has motivated fraudsters to exploit the weaknesses of the online advertising model to make money, and researchers to discover new security vulnerabilities in the model, to propose countermeasures and to forecast future trends in research. Motivated by these considerations, this paper presents a comprehensive review of the security threats to online advertising systems. We begin by introducing the motivation for online advertising system, explain how it differs from traditional advertising networks, introduce terminology, and define the current online advertising architecture. We then devise a comprehensive taxonomy of attacks on online advertising to raise awareness among researchers about the vulnerabilities of online advertising ecosystem. We discuss the limitations and effectiveness of the countermeasures that have been developed to secure entities in the advertising ecosystem against these attacks. To complete our work, we identify some open issues and outline some possible directions for future research towards improving security methods for online advertising systems., Comment: 31 pages, 13 figures, 4 tables, IEEE Communications Surveys & Tutorials
- Published
- 2020
137. Information Consumption and Social Response in a Segregated Environment: the Case of Gab
- Author
-
Etta, Gabriele, Galeazzi, Alessandro, Cinelli, Matteo, Conti, Mauro, and Quattrociocchi, Walter
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Computers and Society - Abstract
Most of the information operations involve users who may foster polarization and distrust toward science and mainstream journalism, without these users being conscious of their role. Gab is well known to be an extremist-friendly platform that performs little control on the posted content. Thus it represents an ideal benchmark for studying phenomena potentially related to polarization such as misinformation spreading. The combination of these factors may lead to hate as well as to episodes of harm in the real world. In this work we provide a characterization of the interaction patterns within Gab around the COVID-19 topic. To assess the spreading of different content type, we analyze consumption patterns based on both interaction type and source reliability. Overall we find that there are no strong statistical differences in the social response to questionable and reliable content, both following a power law distribution. However, questionable and reliable sources display structural and topical differences in the use of hashtags. The commenting behaviour of users in terms of both lifetime and sentiment reveals that questionable and reliable posts are perceived in the same manner. We can conclude that despite evident differences between questionable and reliable posts Gab users do not perform such a differentiation thus treating them as a whole. Our results provide insights toward the understanding of coordinated inauthentic behavior and on the early-warning of information operation., Comment: The paper is now replaced with an updated version: arXiv:2106.03924
- Published
- 2020
138. (Mis)Information Operations: An Integrated Perspective
- Author
-
Cinelli, Matteo, Conti, Mauro, Finos, Livio, Grisolia, Francesco, Novak, Petra Kralj, Peruzzi, Antonio, Tesconi, Maurizio, Zollo, Fabiana, and Quattrociocchi, Walter
- Subjects
Computer Science - Computers and Society ,Computer Science - Social and Information Networks - Abstract
The massive diffusion of social media fosters disintermediation and changes the way users are informed, the way they process reality, and the way they engage in public debate. The cognitive layer of users and the related social dynamics define the nature and the dimension of informational threats. Users show the tendency to interact with information adhering to their preferred narrative and to ignore dissenting information. Confirmation bias seems to account for users decisions about consuming and spreading content; and, at the same time, aggregation of favored information within those communities reinforces group polarization. In this work, the authors address the problem of (mis)information operations with a holistic and integrated approach. Cognitive weakness induced by this new information environment are considered. Moreover, (mis)information operations, with particular reference to the Italian context, are considered; and the fact that the phenomenon is more complex than expected is highlighted. The paper concludes by providing an integrated research roadmap accounting for the possible future technological developments., Comment: The paper first appeared in Volume 18, Issue 3 of the Journal of Information Warfare
- Published
- 2019
139. Covert Channel-Based Transmitter Authentication in Controller Area Networks
- Author
-
Ying, Xuhang, Bernieri, Giuseppe, Conti, Mauro, Bushnell, Linda, and Poovendran, Radha
- Subjects
Computer Science - Cryptography and Security - Abstract
In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial vehicle functioning. In this scenario, malicious actors can exploit CAN vulnerabilities, such as the lack of built-in authentication and encryption schemes, to launch CAN bus attacks with life-threatening consequences (e.g., disabling brakes). In this paper, we present TACAN (Transmitter Authentication in CAN), which provides secure authentication of ECUs on the legacy CAN bus by exploiting the covert channels, without introducing CAN protocol modifications or traffic overheads. TACAN turns upside-down the originally malicious concept of covert channels and exploits it to build an effective defensive technique that facilitates transmitter authentication via a centralized, trusted Monitor Node. TACAN consists of three different covert channels for ECU authentication: 1) the Inter-Arrival Time (IAT)-based; 2) the Least Significant Bit (LSB)-based; and 3) a hybrid covert channel, exploiting the combination of the first two. In order to validate TACAN, we implement the covert channels on the University of Washington (UW) EcoCAR (Chevrolet Camaro 2016) testbed. We further evaluate the bit error, throughput, and detection performance of TACAN through extensive experiments using the EcoCAR testbed and a publicly available dataset collected from Toyota Camry 2010. We demonstrate the feasibility of TACAN and the effectiveness of detecting CAN bus attacks, highlighting no traffic overheads and attesting the regular functionality of ECUs., Comment: Submitted to TDSC (Transactions on Dependable and Secure Computing). arXiv admin note: text overlap with arXiv:1903.05231
- Published
- 2019
140. Honey-list based authentication protocol for industrial IoT swarms
- Author
-
El-Zawawy, Mohamed A., Kaliyar, Pallavi, Conti, Mauro, and Katsikas, Sokratis
- Published
- 2023
- Full Text
- View/download PDF
141. COUNT: Blockchain framework for resource accountability in e-healthcare
- Author
-
Kumar, Gulshan, Saha, Rahul, Conti, Mauro, Devgun, Tannishtha, Goyat, Rekha, and Rodrigues, Joel J.P.C.
- Published
- 2023
- Full Text
- View/download PDF
142. An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
- Author
-
Khan, Tayyab, Singh, Karan, Shariq, Mohd, Ahmad, Khaleel, Savita, K.S., Ahmadian, Ali, Salahshour, Soheil, and Conti, Mauro
- Published
- 2023
- Full Text
- View/download PDF
143. PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
- Author
-
Jayalaxmi, P.L.S., Saha, Rahul, Kumar, Gulshan, Alazab, Mamoun, Conti, Mauro, and Cheng, Xiaochun
- Published
- 2023
- Full Text
- View/download PDF
144. Improving Password Guessing via Representation Learning
- Author
-
Pasquini, Dario, Gangwal, Ankit, Ateniese, Giuseppe, Bernaschi, Massimo, and Conti, Mauro
- Subjects
Computer Science - Cryptography and Security - Abstract
Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages of learning and harnessing such representations. In this paper, we introduce a deep generative model representation learning approach for password guessing. We show that an abstract password representation naturally offers compelling and versatile properties that can be used to open new directions in the extensively studied, and yet presently active, password guessing field. These properties can establish novel password generation techniques that are neither feasible nor practical with the existing probabilistic and non-probabilistic approaches. Based on these properties, we introduce:(1) A general framework for conditional password guessing that can generate passwords with arbitrary biases; and (2) an Expectation Maximization-inspired framework that can dynamically adapt the estimated password distribution to match the distribution of the attacked password set., Comment: This paper appears in the proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland) S&P 2021
- Published
- 2019
145. SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices
- Author
-
Visintin, Alessandro, Toffalini, Flavio, Conti, Mauro, and Zhou, Jianying
- Subjects
Computer Science - Cryptography and Security - Abstract
The Internet of Things (IoT) is an emerging paradigm that allows to set large networks of small and independent devices. To ensure their integrity, practitioners employ so-called Remote Attestation (RA) schemes. Classic RA schemes require a central and powerful entity, called Verifier, that has mainly two duties: (i) it manages the entire process of attestation, and (ii) it contains all the proofs for validating the devices' integrity. However, having a central Verifier makes the network dependent upon an external entity and introduces a single point of failure for security. In this work, we propose SAFE^d: the first RA schema that allows a pair of IoT devices to validate their integrity without relying on an external Verifier. Our approach overcomes previous limitations by spreading the proofs among multiple IoT devices and using novel cryptographic mechanisms to ensure secure communications. Moreover, the entire IoT network can collaboratively isolate tampered devices and recover missing proofs in case of anomalies. We evaluate our schema through an implementation for Raspberry Pi platform and a network simulation. The results show that SAFE^d can detect infected devices and recover up to 99.9% of proofs in case of faults or attacks. Moreover, we managed to protect up to 10K devices with a logarithmic overhead on the network and on the devices' memory., Comment: 12 pages, 7 figures
- Published
- 2019
146. Detecting Covert Cryptomining using HPC
- Author
-
Gangwal, Ankit, Piazzetta, Samuele Giuliano, Lain, Gianluca, and Conti, Mauro
- Subjects
Computer Science - Cryptography and Security - Abstract
Cybercriminals have been exploiting cryptocurrencies to commit various unique financial frauds. Covert cryptomining - which is defined as an unauthorized harnessing of victims' computational resources to mine cryptocurrencies - is one of the prevalent ways nowadays used by cybercriminals to earn financial benefits. Such exploitation of resources causes financial losses to the victims. In this paper, we present our novel and efficient approach to detect covert cryptomining. Our solution is a generic solution that, unlike currently available solutions to detect covert cryptomining, is not tailored to a specific cryptocurrency or a particular form of cryptomining. In particular, we focus on the core mining algorithms and utilize Hardware Performance Counters (HPC) to create clean signatures that grasp the execution pattern of these algorithms on a processor. We built a complete implementation of our solution employing advanced machine learning techniques. We evaluated our methodology on two different processors through an exhaustive set of experiments. In our experiments, we considered all the cryptocurrencies mined by the top-10 mining pools, which collectively represent the largest share (84% during Q3 2018) of the cryptomining market. Our results show that our classifier can achieve a near-perfect classification with samples of length as low as five seconds. Due to its robust and practical design, our solution can even adapt to zero-day cryptocurrencies. Finally, we believe our solution is scalable and can be deployed to tackle the uprising problem of covert cryptomining., Comment: 20 pages
- Published
- 2019
147. On Defending Against Label Flipping Attacks on Malware Detection Systems
- Author
-
Taheri, Rahim, Javidan, Reza, Shojafar, Mohammad, Pooranian, Zahra, Miri, Ali, and Conti, Mauro
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Statistics - Machine Learning - Abstract
Label manipulation attacks are a subclass of data poisoning attacks in adversarial machine learning used against different applications, such as malware detection. These types of attacks represent a serious threat to detection systems in environments having high noise rate or uncertainty, such as complex networks and Internet of Thing (IoT). Recent work in the literature has suggested using the $K$-Nearest Neighboring (KNN) algorithm to defend against such attacks. However, such an approach can suffer from low to wrong detection accuracy. In this paper, we design an architecture to tackle the Android malware detection problem in IoT systems. We develop an attack mechanism based on Silhouette clustering method, modified for mobile Android platforms. We proposed two Convolutional Neural Network (CNN)-type deep learning algorithms against this \emph{Silhouette Clustering-based Label Flipping Attack (SCLFA)}. We show the effectiveness of these two defense algorithms - \emph{Label-based Semi-supervised Defense (LSD)} and \emph{clustering-based Semi-supervised Defense (CSD)} - in correcting labels being attacked. We evaluate the performance of the proposed algorithms by varying the various machine learning parameters on three Android datasets: Drebin, Contagio, and Genome and three types of features: API, intent, and permission. Our evaluation shows that using random forest feature selection and varying ratios of features can result in an improvement of up to 19\% accuracy when compared with the state-of-the-art method in the literature., Comment: 21 pages, 6 figures, 4 tables, NCAA Springer Journal
- Published
- 2019
148. Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
- Author
-
Taheri, Rahim, Ghahramani, Meysam, Javidan, Reza, Shojafar, Mohammad, Pooranian, Zahra, and Conti, Mauro
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning ,Computer Science - Neural and Evolutionary Computing ,Statistics - Machine Learning - Abstract
In this paper, we develop four malware detection methods using Hamming distance to find similarity between samples which are first nearest neighbors (FNN), all nearest neighbors (ANN), weighted all nearest neighbors (WANN), and k-medoid based nearest neighbors (KMNN). In our proposed methods, we can trigger the alarm if we detect an Android app is malicious. Hence, our solutions help us to avoid the spread of detected malware on a broader scale. We provide a detailed description of the proposed detection methods and related algorithms. We include an extensive analysis to asses the suitability of our proposed similarity-based detection methods. In this way, we perform our experiments on three datasets, including benign and malware Android apps like Drebin, Contagio, and Genome. Thus, to corroborate the actual effectiveness of our classifier, we carry out performance comparisons with some state-of-the-art classification and malware detection algorithms, namely Mixed and Separated solutions, the program dissimilarity measure based on entropy (PDME) and the FalDroid algorithms. We test our experiments in a different type of features: API, intent, and permission features on these three datasets. The results confirm that accuracy rates of proposed algorithms are more than 90% and in some cases (i.e., considering API features) are more than 99%, and are comparable with existing state-of-the-art solutions., Comment: 20 pages, 8 figures, 11 tables, FGCS Elsevier journal
- Published
- 2019
149. TANGO: A temporal spatial dynamic graph model for event prediction
- Author
-
Wang, Zhihao, Ding, Ding, Ren, Min, and Conti, Mauro
- Published
- 2023
- Full Text
- View/download PDF
150. Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage
- Author
-
Cardaioli, Matteo, Conti, Mauro, Balagani, Kiran, and Gasti, Paolo
- Subjects
Computer Science - Cryptography and Security - Abstract
Personal Identification Numbers (PIN) are widely used as authentication method for systems such as Automated Teller Machines (ATMs) and Point of Sale (PoS). Input devices (PIN pads) usually give the user a feedback sound when a key is pressed. In this paper, we propose an attack based on the extraction of inter-keystroke timing from the feedback sound when users type their PINs. Our attack is able to reach an accuracy of 98% with a mean error of 0.13 +/-6.66 milliseconds. We demonstrate that inter-keystroke timing significantly improves the guessing probability of certain subsets of PINs. We believe this represents a security problem that has to be taken into account for secure PIN generation. Furthermore, we identified several attack scenarios where the adversary can exploit inter-keystroke timing and additional information about the user or the PIN, such as typing behavior. Our results show that combining the inter-keystroke timing with other information drastically reduces attempts to guess a PIN, outperforming random guessing. With our attack, we are able to guess 72% of the 4-digit PINs within 3 attempts. We believe this poses a serious security problem for systems that use PIN-based authentication.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.