Fabio Pierazzi

Orcid: 0000-0002-1254-1758

Affiliations:
  • King's College London, UK
  • University of Modena and Reggio Emilia


According to our database1, Fabio Pierazzi authored at least 37 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
How to Train your Antivirus: RL-based Hardening through the Problem-Space.
CoRR, 2024

Unraveling the Key of Machine Learning Solutions for Android Malware Detection.
CoRR, 2024

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024

2023
Are Machine Learning Models for Malware Detection Ready for Prime Time?
IEEE Secur. Priv., 2023

Lessons Learned on Machine Learning for Computer Security.
IEEE Secur. Priv., 2023

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses.
CoRR, 2023

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Drift Forensics of Malware Classifiers.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice.
CoRR, 2022

Dos and Don'ts of Machine Learning in Computer Security.
Proceedings of the 31st USENIX Security Symposium, 2022

Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Exploring the security and privacy risks of chatbots in messaging services.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

WoRMA '22: 1st Workshop on Robust Malware Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans.
IEEE Trans. Dependable Secur. Comput., 2021

Universal Adversarial Perturbations for Malware.
CoRR, 2021

Investigating Labelless Drift Adaptation for Malware Detection.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
A Data-driven Characterization of Modern Android Spyware.
ACM Trans. Manag. Inf. Syst., 2020

Detection and Threat Prioritization of Pivoting Attacks in Large Networks.
IEEE Trans. Emerg. Top. Comput., 2020

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families.
IEEE Trans. Dependable Secur. Comput., 2020

Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation.
CoRR, 2020

Intriguing Properties of Adversarial ML Attacks in the Problem Space.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Enabling Fair ML Evaluations for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Probabilistic Logic of Cyber Deception.
IEEE Trans. Inf. Forensics Secur., 2017

Scalable architecture for online prioritisation of cyber threats.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

2016
Exploratory security analytics for anomaly detection.
Comput. Secur., 2016

Analysis of high volumes of network traffic for Advanced Persistent Threat detection.
Comput. Networks, 2016

Countering Advanced Persistent Threats through security intelligence and big data analytics.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
The Network Perspective of Cloud Security.
Proceedings of the Fourth IEEE Symposium on Network Cloud Computing and Applications, 2015

2014
Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services.
IEEE Trans. Cloud Comput., 2014

Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases.
IEEE Trans. Cloud Comput., 2014

Efficient detection of unauthorized data modification in cloud databases.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Security and privacy of location-based services for in-vehicle device systems.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014


  Loading...