default search action
Fabio Pierazzi
Person information
- affiliation: King's College London, UK
- affiliation: University of Modena and Reggio Emilia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Pitfalls in Machine Learning for Computer Security. Commun. ACM 67(11): 104-112 (2024) - [c22]Wenxi Wu, Fabio Pierazzi, Yali Du, Martim Brandão:
Characterizing Physical Adversarial Attacks on Robot Motion Planners. ICRA 2024: 14319-14325 - [c21]Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146 - [c20]Shae McFadden, Marcello Maugeri, Chris Hicks, Vasilios Mavroudis, Fabio Pierazzi:
WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL. SP (Workshops) 2024: 68-75 - [i12]Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version). CoRR abs/2402.01359 (2024) - [i11]Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang:
Unraveling the Key of Machine Learning Solutions for Android Malware Detection. CoRR abs/2402.02953 (2024) - [i10]Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024) - [i9]Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David A. Wagner, Tudor Dumitras:
Demystifying Behavior-Based Malware Detection at Endpoints. CoRR abs/2405.06124 (2024) - 2023
- [j12]Lorenzo Cavallaro, Johannes Kinder, Feargus Pendlebury, Fabio Pierazzi:
Are Machine Learning Models for Malware Detection Ready for Prime Time? IEEE Secur. Priv. 21(2): 53-56 (2023) - [j11]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Lessons Learned on Machine Learning for Computer Security. IEEE Secur. Priv. 21(5): 72-77 (2023) - [c19]Theo Chow, Zeliang Kan, Lorenz Linhardt, Lorenzo Cavallaro, Daniel Arp, Fabio Pierazzi:
Drift Forensics of Malware Classifiers. AISec@CCS 2023: 197-207 - [c18]Shae McFadden, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi:
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning. CCS 2023: 3561-3563 - [c17]Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy:
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. SaTML 2023: 339-364 - [c16]Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors. SP (Workshops) 2023: 21-28 - [c15]Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. SP 2023: 719-736 - [i8]Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen:
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses. CoRR abs/2312.13435 (2023) - 2022
- [c14]Fabio Pierazzi, Nedim Srndic:
WoRMA '22: 1st Workshop on Robust Malware Analysis. AsiaCCS 2022: 1271-1272 - [c13]Jide S. Edu, Cliona Mulligan, Fabio Pierazzi, Jason Polakis, Guillermo Suarez-Tangil, Jose M. Such:
Exploring the security and privacy risks of chatbots in messaging services. IMC 2022: 581-588 - [c12]Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift. SP 2022: 805-823 - [c11]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Dos and Don'ts of Machine Learning in Computer Security. USENIX Security Symposium 2022: 3971-3988 - [e1]Fabio Pierazzi, Nedim Srndic:
WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, Nagasaki, Japan, 30 May 2022. ACM 2022, ISBN 978-1-4503-9179-5 [contents] - [i7]Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. CoRR abs/2202.05470 (2022) - [i6]Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy:
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. CoRR abs/2212.14315 (2022) - 2021
- [j10]Chongyang Bai, Qian Han, Ghita Mezzour, Fabio Pierazzi, V. S. Subrahmanian:
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. IEEE Trans. Dependable Secur. Comput. 18(3): 1378-1393 (2021) - [j9]Fabio Pierazzi, Stefano Cristalli, Danilo Bruschi, Michele Colajanni, Mirco Marchetti, Andrea Lanzi:
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks. IEEE Trans. Inf. Forensics Secur. 16: 740-755 (2021) - [c10]Giuseppina Andresini, Feargus Pendlebury, Fabio Pierazzi, Corrado Loglisci, Annalisa Appice, Lorenzo Cavallaro:
INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection. AISec@CCS 2021: 111-122 - [c9]Zeliang Kan, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Investigating Labelless Drift Adaptation for Malware Detection. AISec@CCS 2021: 123-134 - [i5]Raphael Labaca Castro, Luis Muñoz-González, Feargus Pendlebury, Gabi Dreo Rodosek, Fabio Pierazzi, Lorenzo Cavallaro:
Universal Adversarial Perturbations for Malware. CoRR abs/2102.06747 (2021) - 2020
- [j8]Tanmoy Chakraborty, Fabio Pierazzi, V. S. Subrahmanian:
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. IEEE Trans. Dependable Secur. Comput. 17(2): 262-277 (2020) - [j7]Giovanni Apruzzese, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti:
Detection and Threat Prioritization of Pivoting Attacks in Large Networks. IEEE Trans. Emerg. Top. Comput. 8(2): 404-415 (2020) - [j6]Fabio Pierazzi, Ghita Mezzour, Qian Han, Michele Colajanni, V. S. Subrahmanian:
A Data-driven Characterization of Modern Android Spyware. ACM Trans. Manag. Inf. Syst. 11(1): 4:1-4:38 (2020) - [c8]Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, Lorenzo Cavallaro:
Intriguing Properties of Adversarial ML Attacks in the Problem Space. SP 2020: 1332-1349 - [i4]Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR abs/2010.03856 (2020) - [i3]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Dos and Don'ts of Machine Learning in Computer Security. CoRR abs/2010.09470 (2020)
2010 – 2019
- 2019
- [c7]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. USENIX Security Symposium 2019: 729-746 - [i2]Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, Lorenzo Cavallaro:
Intriguing Properties of Adversarial ML Attacks in the Problem Space. CoRR abs/1911.02142 (2019) - 2018
- [c6]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
Enabling Fair ML Evaluations for Security. CCS 2018: 2264-2266 - [i1]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. CoRR abs/1807.07838 (2018) - 2017
- [j5]Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. IEEE Trans. Inf. Forensics Secur. 12(11): 2532-2544 (2017) - [c5]Fabio Pierazzi, Giovanni Apruzzese, Michele Colajanni, Alessandro Guido, Mirco Marchetti:
Scalable architecture for online prioritisation of cyber threats. CyCon 2017: 1-18 - 2016
- [j4]Mirco Marchetti, Fabio Pierazzi, Michele Colajanni, Alessandro Guido:
Analysis of high volumes of network traffic for Advanced Persistent Threat detection. Comput. Networks 109: 127-141 (2016) - [j3]Fabio Pierazzi, Sara Casolari, Michele Colajanni, Mirco Marchetti:
Exploratory security analytics for anomaly detection. Comput. Secur. 56: 28-49 (2016) - [c4]Mirco Marchetti, Fabio Pierazzi, Alessandro Guido, Michele Colajanni:
Countering Advanced Persistent Threats through security intelligence and big data analytics. CyCon 2016: 243-261 - 2015
- [c3]Fabio Pierazzi, Andrea Balboni, Alessandro Guido, Mirco Marchetti:
The Network Perspective of Cloud Security. NCCA 2015: 75-82 - 2014
- [j2]Luca Ferretti, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti:
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases. IEEE Trans. Cloud Comput. 2(2): 143-155 (2014) - [j1]Luca Ferretti, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti:
Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services. IEEE Trans. Cloud Comput. 2(4): 448-458 (2014) - [c2]Marcello Missiroli, Fabio Pierazzi, Michele Colajanni:
Security and privacy of location-based services for in-vehicle device systems. HPCS 2014: 841-848 - [c1]Luca Ferretti, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti, Marcello Missiroli:
Efficient detection of unauthorized data modification in cloud databases. ISCC 2014: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint