Picture for Fabio Pierazzi

Fabio Pierazzi

DRMD: Deep Reinforcement Learning for Malware Detection under Concept Drift

Add code
Aug 26, 2025
Viaarxiv icon

KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs

Add code
Jun 24, 2025
Viaarxiv icon

Unveiling ECC Vulnerabilities: LSTM Networks for Operation Recognition in Side-Channel Attacks

Add code
Feb 24, 2025
Viaarxiv icon

How to Train your Antivirus: RL-based Hardening through the Problem-Space

Add code
Feb 29, 2024
Figure 1 for How to Train your Antivirus: RL-based Hardening through the Problem-Space
Figure 2 for How to Train your Antivirus: RL-based Hardening through the Problem-Space
Figure 3 for How to Train your Antivirus: RL-based Hardening through the Problem-Space
Figure 4 for How to Train your Antivirus: RL-based Hardening through the Problem-Space
Viaarxiv icon

Unraveling the Key of Machine Learning Solutions for Android Malware Detection

Add code
Feb 05, 2024
Figure 1 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 2 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 3 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Figure 4 for Unraveling the Key of Machine Learning Solutions for Android Malware Detection
Viaarxiv icon

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

Add code
Feb 02, 2024
Figure 1 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Figure 2 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Figure 3 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Figure 4 for TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Viaarxiv icon

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

Add code
Dec 20, 2023
Viaarxiv icon

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice

Add code
Dec 29, 2022
Figure 1 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 2 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 3 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 4 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Viaarxiv icon

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers

Add code
Feb 11, 2022
Figure 1 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 2 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 3 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Figure 4 for Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Viaarxiv icon

Universal Adversarial Perturbations for Malware

Add code
Feb 12, 2021
Figure 1 for Universal Adversarial Perturbations for Malware
Figure 2 for Universal Adversarial Perturbations for Malware
Figure 3 for Universal Adversarial Perturbations for Malware
Figure 4 for Universal Adversarial Perturbations for Malware
Viaarxiv icon