74 research outputs found

    WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs

    Get PDF
    Abstract Web Application Firewalls (WAFs) are plug-and-play security gateways that promise to enhance the security of a (potentially vulnerable) system with minimal cost and configuration. In recent years, machine learning-based WAFs are catching up with traditional, signature-based ones. They are competitive because they do not require predefined rules; instead, they infer their rules through a learning process. In this paper, we present WAF-A-MoLE, a WAF breaching tool. It uses guided mutational-based fuzzing to generate adversarial examples. The main applications include WAF ( i ) penetration testing, ( i i ) benchmarking and ( i i i ) hardening

    A Systematic Literature Review on Innovative Technologies Adopted in Logistics Management

    Get PDF
    Many innovative technologies have been successfully adopted in logistics and supply chain management processes to increase efficiency, reduce costs or enhance communication. In recent years, considerable attention from both practitioners and academics has been focused on evaluating the impacts of innovative technologies adoption. However, the current body of literature on technology adoption, implementation and evaluation in logistics is quite fragmented; thus, an updated and structured overview of the scientific literature in this field might be useful. To this end, this work presents a systematic literature review (SLR) that aims to increase the understanding of the trend toward new technologies in logistics and identify the main research trends and gaps. The principal research trends that emerged from the SLR involve the technologies, their evolution over time and their relationships with the research methodologies. The main literature gaps concern integration and communication, technology-adoption processes and differences between inbound and outbound logistics

    A Systematic Review of Innovative Technologies adopted in Logistics Management

    Get PDF
    Logistics and supply chain management have always been at the forefront of industrial innovations, and numerous technologies have been tested and applied with success to increase efficiency of processes, reduce costs, or improve the relationships among different actors, such as buyers, sellers, retailers and carriers. In recent times, there is a great debate in both practitioners and academic’ worlds about the impacts of these new technologies on the traditional logistic operations. The perspective of extant literature on technology adoption in logistics is quite fragmented: in fact, a stream of literature studies how a technology might provide improvements in logistics processes (e.g. warehouse management, goods distribution) and/or logistics management objectives (e.g. warehouse efficiency), while other research works focus on the impact of technology adoption in terms of overall business performance. Moreover, despite the amount of articles, reports and news regarding innovations in logistics, one of the last literature review about existing technologies applied in logistics has been published almost ten years ago and it is limited only to ICT technologies. Therefore, we reckon the need for an updated view on the literature in this field. Through a systematic literature review, we try to give an answer to the following research questions: i) how the interest in this topic changed in the last ten years from the point of view of scientific literature; ii) what are the main approaches and methodologies used in addressing this issue; iii) what are the most applied innovative technologies in the logistics field

    Explaining vulnerabilities of deep learning to adversarial malware binaries

    Get PDF
    Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted perturbations to input malware that enable misleading classification. Although this has questioned their suitability for this task, it is not yet clear why such algorithms are easily fooled also in this particular application domain. In this work, we take a first step to tackle this issue by leveraging explainable machine-learning algorithms developed to interpret the black-box decisions of deep neural networks. In particular, we use an explainable technique known as feature attribution to identify the most influential input features contributing to each decision, and adapt it to provide meaningful explanations to the classification of malware binaries. In this case, we find that a recently-proposed convolutional neural network does not learn any meaningful characteristic for malware detection from the data and text sections of executable files, but rather tends to learn to discriminate between benign and malware samples based on the characteristics found in the file header. Based on this finding, we propose a novel attack algorithm that generates adversarial malware binaries by only changing few tens of bytes in the file header. With respect to the other state-of-the-art attack algorithms, our attack does not require injecting any padding bytes at the end of the file, and it is much more efficient, as it requires manipulating much fewer bytes

    ZenHackAdemy: Ethical Hacking @ DIBRIS

    Get PDF
    Cybersecurity attacks are on the rise, and the current response is not effective enough. The need for a competent workforce, able to face attackers, is increasing. At the moment, the gap between academia and real-world skills is huge and academia cannot provide students with skills that match those of an attacker. To pass on these skills, teachers have to train students in scenarios as close as possible to real-world ones. Capture the Flag (CTF) competitions are a great tool to achieve this goal, since they encourage students to think as an attacker does, thus creating more awareness on the modalities and consequences of an attack. We describe our experience in running an educational activity on ethical hacking, which we proposed to computer science and computer engineering students. We organized seminars, outside formal classes, and provided online support on the hands-on part of the training. We delivered different types of exercises and held a final CTF competition. These activities resulted in growing a community of students and researchers interested in cybersecurity, and some of them have formed ZenHack, an official CTF team

    Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries

    Get PDF
    Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted perturbations to input malware that enable misleading classification. Although this has questioned their suitability for this task, it is not yet clear why such algorithms are easily fooled also in this particular application domain. In this work, we take a first step to tackle this issue by leveraging explainable machine-learning algorithms developed to interpret the black-box decisions of deep neural networks. In particular, we use an explainable technique known as feature attribution to identify the most influential input features contributing to each decision, and adapt it to provide meaningful explanations to the classification of malware binaries. In this case, we find that a recently-proposed convolutional neural network does not learn any meaningful characteristic for malware detection from the data and text sections of executable files, but rather tends to learn to discriminate between benign and malware samples based on the characteristics found in the file header. Based on this finding, we propose a novel attack algorithm that generates adversarial malware binaries by only changing few tens of bytes in the file header. With respect to the other state-of-the-art attack algorithms, our attack does not require injecting any padding bytes at the end of the file, and it is much more efficient, as it requires manipulating much fewer bytes

    The Collection-And-Delivery Points Implementation Process from the Courier, Express and Parcel Operator's Perspective

    Get PDF
    Collection-and-Delivery Points (CDP) have become increasingly important for couriers operating in the e-commerce sector. Through this way of delivery, it is possible to mitigate many issues related to the traditional home delivery (e.g. missing delivery, complex routing planning, and traffic delays). Despite this, there are still obstacles that prevent the CDP to become a dominant mode of parcel delivery. Through semi-structured interviews to companies working in the courier, express and parcel sector, this work aims to understand the enablers and barriers to the spread of the CDP mode of delivery, with a focus on the Italian market

    A flexible model for dynamic linking in Java and C#

    Get PDF
    Dynamic linking supports flexible code deployment, allowing partially linked code to link further code on the fly, as needed. Thus, end-users enjoy the advantage of automatically receiving any updates, without any need for any explicit actions on their side, such as re-compilation, or re-linking. On the down side, two executions of a program may link in different versions of code, which in some cases causes subtle errors, and may mystify end-users. Dynamic linking in Java and C# are similar: the same linking phases are involved, soundness is based on similar ideas, and executions which do not throw linking errors give the same result. They are, however, not identical: the linking phases are combined differently, and take place in different order. Consequently, linking errors may be detected at different times by Java and C# runtime systems. We develop a non-deterministic model, which describes the behaviour of both Java and C# program executions. The nondeterminism allows us to describe the design space, to distill the similarities between the two languages, and to use one proof of soundness for both. We also prove that all execution strategies are equivalent with respect to terminating executions that do not throw link errors: they give the same results

    Functionality-preserving Black-box Optimization of Adversarial Windows Malware

    Full text link
    Windows malware detectors based on machine learning are vulnerable to adversarial examples, even if the attacker is only given black-box query access to the model. The main drawback of these attacks is that: (i) they are query-inefficient, as they rely on iteratively applying random transformations to the input malware; and (ii) they may also require executing the adversarial malware in a sandbox at each iteration of the optimization process, to ensure that its intrusive functionality is preserved. In this paper, we overcome these issues by presenting a novel family of black-box attacks that are both query-efficient and functionality-preserving, as they rely on the injection of benign content - which will never be executed - either at the end of the malicious file, or within some newly-created sections. Our attacks are formalized as a constrained minimization problem which also enables optimizing the trade-off between the probability of evading detection and the size of the injected payload. We empirically investigate this trade-off on two popular static Windows malware detectors, and show that our black-box attacks can bypass them with only few queries and small payloads, even when they only return the predicted labels. We also evaluate whether our attacks transfer to other commercial antivirus solutions, and surprisingly find that they can evade, on average, more than 12 commercial antivirus engines. We conclude by discussing the limitations of our approach, and its possible future extensions to target malware classifiers based on dynamic analysis
    corecore