Picture for Fabio Pierazzi

Fabio Pierazzi

How to Train your Antivirus: RL-based Hardening through the Problem-Space

Add code
Feb 29, 2024
Viaarxiv icon

Unraveling the Key of Machine Learning Solutions for Android Malware Detection

Add code
Feb 05, 2024
Figure 1 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 2 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 3 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 4 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Viaarxiv icon

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

Add code
Feb 02, 2024
Viaarxiv icon

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

Add code
Dec 20, 2023
Viaarxiv icon

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice

Add code
Dec 29, 2022
Figure 1 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 2 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 3 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 4 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Viaarxiv icon

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers

Add code
Feb 11, 2022
Figure 1 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 2 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 3 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 4 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Viaarxiv icon

Universal Adversarial Perturbations for Malware

Add code
Feb 12, 2021
Figure 1 for Universal Adversarial Perturbations for Malware
Figure 2 for Universal Adversarial Perturbations for Malware
Figure 3 for Universal Adversarial Perturbations for Malware
Figure 4 for Universal Adversarial Perturbations for Malware
Viaarxiv icon

Dos and Don'ts of Machine Learning in Computer Security

Add code
Oct 19, 2020
Figure 1 for Dos and Don'ts of Machine Learning in Computer Security
Figure 2 for Dos and Don'ts of Machine Learning in Computer Security
Figure 3 for Dos and Don'ts of Machine Learning in Computer Security
Figure 4 for Dos and Don'ts of Machine Learning in Computer Security
Viaarxiv icon

Intriguing Properties of Adversarial ML Attacks in the Problem Space

Add code
Nov 05, 2019
Figure 1 for Intriguing Properties of Adversarial ML Attacks in the Problem Space
Figure 2 for Intriguing Properties of Adversarial ML Attacks in the Problem Space
Figure 3 for Intriguing Properties of Adversarial ML Attacks in the Problem Space
Figure 4 for Intriguing Properties of Adversarial ML Attacks in the Problem Space
Viaarxiv icon

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

Add code
Jul 20, 2018
Figure 1 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Figure 2 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Figure 3 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Figure 4 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Viaarxiv icon