Luca Allodi

ORCID: 0000-0003-1600-0868
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Cybercrime and Law Enforcement Studies
  • Misinformation and Its Impacts
  • Software Reliability and Analysis Research
  • Internet Traffic Analysis and Secure E-voting
  • Software Engineering Research
  • Complex Network Analysis Techniques
  • Smart Grid Security and Resilience
  • Opinion Dynamics and Social Influence
  • Crime, Illicit Activities, and Governance
  • User Authentication and Security Systems
  • Digital and Cyber Forensics
  • Evolutionary Game Theory and Cooperation
  • Privacy, Security, and Data Protection
  • Precipitation Measurement and Analysis
  • IPv6, Mobility, Handover, Networks, Security
  • Suicide and Self-Harm Studies
  • Complex Systems and Decision Making
  • Peer-to-Peer Network Technologies
  • Sentiment Analysis and Opinion Mining
  • Ethics and Social Impacts of AI
  • Web Application Security Vulnerabilities

Eindhoven University of Technology
2017-2024

Institute of Electrical and Electronics Engineers
2020

IEEE Computer Society
2020

Regional Municipality of Niagara
2020

Solutions Inc. (Japan)
2019

Arizona State University
2019

University of Cambridge
2019

Google (United States)
2019

University of Trento
2011-2015

University of Milan
2011

(U.S.) Rule-based policies for mitigating software risk suggest using the CVSS score to measure of an individual vulnerability and act accordingly. A key issue is whether ‘danger’ does actually match exploitation in wild, if how such a could be improved. To address this question, we propose case-control study methodology similar procedure used link lung cancer smoking 1950s. allows researcher draw conclusions on relation between some factor (e.g., smoking) effect cancer) by looking backward...

10.1145/2630069 article EN ACM Transactions on Information and System Security 2014-08-01

Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, malware. Whereas revenue streams cyber attackers have been studied multiple times in literature, no quantitative account currently exists on economics acquisition deployment. Yet, this understanding is critical to characterize production (traded) economy that drives it, its effects overall scenario. In paper we provide an empirical investigation exploitation, market factors likelihood...

10.1145/3133956.3133960 preprint EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

Current industry standards for estimating cybersecurity risk are based on qualitative matrices as opposed to quantitative estimates. In contrast, assessment in most other sectors aims at deriving estimations (e.g., Basel II Finance). This article presents a model and methodology leverage the large amount of data available from IT infrastructure an organization's security operation center quantitatively estimate probability attack. Our specifically addresses untargeted attacks delivered by...

10.1111/risa.12864 article EN Risk Analysis 2017-08-01

In this study, we provide extensive analysis of the (unique) characteristics phishing and spear-phishing attacks, argue that attacks cannot be well captured by current countermeasures, identify ways forward, analyze an advanced campaign targeting white-collar workers in 32 countries.

10.1109/msec.2019.2940952 article EN IEEE Security & Privacy 2019-10-01

Phishing attacks are a main threat to organizations and individuals. Current widespread defenses based on spam filters domain blacklisting unfortunately insufficient. Prior work identifies phishing reporting as key, largely untapped resource mitigate threats. Yet, its practice suffers from very low rates generally too an uptake users. Whereas it is known that behavior affected by number of 'human factors', comprehensive view the different theories their effects (intent to) report not yet...

10.1145/3544548.3580985 article EN public-domain 2023-04-19

NVD and Exploit-DB are the de facto standard databases used for research on vulnerabilities, CVSS score is measure risk. On open question whether such scores actually representative of attacks found in wild. To address this we have constructed a database (EKITS) based vulnerabilities currently exploit kits from black market extracted another Symantec's Threat Database (SYM). Our final conclusion that EDB not reliable source information exploits wild, even after controlling exploitability...

10.1145/2382416.2382427 article EN 2012-10-15

The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for development and advancement empirical SE research, making it particularly difficult to identify space open research questions that can be addressed empirically. This encompasses on attack conditions, employed experimental methods, interactions with underlying cognitive aspects. As a consequence, much potential in breadth existing its mapping actual processes aims measure is left untapped. In this...

10.1145/3635149 article EN cc-by ACM Transactions on Computer-Human Interaction 2023-11-30

Abstract Assessing the risks of software vulnerabilities is a key process development and security management. This assessment requires to consider multiple factors (technical features, operational environment, involved assets, status vulnerability lifecycle, etc.) may depend from assessor’s knowledge skills. In this work, we tackle with an important part problem by measuring accuracy technical assessments assessors different level type knowledge. We report experiment compare how accurately...

10.1007/s10664-019-09797-4 article EN cc-by Empirical Software Engineering 2020-01-20

Many Security Operations Centers (SOCs) today still heavily rely on signature-based Network Intrusion Detection Systems (NIDS) such as Suricata. The specificity of intrusion detection rules and the coverage provided by rulesets are common concerns within professional community surrounding SOCs, which impact effectiveness automated alert post-processing approaches. We postulate a better understanding factors influencing quality can help address current SOC issues. In this paper, we...

10.1145/3708821.3710823 preprint EN arXiv (Cornell University) 2025-01-16

Cybercrime is notoriously maintained and empowered by the underground economy, manifested in black markets. In such markets, attack tools vulnerability exploits are constantly traded. this paper, we focus on making a quantitative assessment of risk attacks coming from investigating expected reduction overall against final users if, for example, vulnerabilities traded markets were all to be promptly patched. order conduct analysis, mainly use data (a) bundled 90+ collected us; (b) actual...

10.1109/spw.2013.16 article EN 2013-05-01

Cybercrime activities are supported by infrastructures and services originating from an underground economy. The current understanding of this phenomenon is that the cybercrime economy ought to be fraught with information asymmetry adverse selection problems. They should make effects we observe every day impossible sustain. In paper, show market structure design used cyber criminals have evolved toward a similar legitimate, thriving, online forum markets such as eBay. We illustrate evolution...

10.1109/tetc.2015.2397395 article EN IEEE Transactions on Emerging Topics in Computing 2015-02-18

The assessment of new vulnerabilities is an activity that accounts for information from several data sources and produces a `severity' score the vulnerability. Common Vulnerability Scoring System (\CVSS) reference standard this assessment. Yet, no guidance currently exists on \emph{which information} aids correct should therefore be considered. In paper we address problem by evaluating which cues increase (or decrease) accuracy. We devise block design experiment with 67 software engineering...

10.1145/3176258.3176340 preprint EN 2018-03-13

In this paper we employ quantitative measurements of cognitive vulnerability triggers in phishing emails to predict the degree success an attack. To achieve rely on psychology literature and develop automated fully method based machine learning econometrics construct a triaging mechanism built around features email; showcase our approach relying data from anti-phishing division large financial organization Europe. Our evaluation shows empirically that effective for can be put place by...

10.48550/arxiv.1905.02162 preprint EN other-oa arXiv (Cornell University) 2019-01-01

In this paper we provide evidence of an emerging criminal infrastructure enabling impersonation attacks at scale. Impersonation-as-a-Service (IMPaaS) allows attackers to systematically collect and enforce user profiles (consisting credentials, cookies, device behavioural fingerprints, other metadata) circumvent risk-based authentication system effectively bypass multi-factor mechanisms. We present the IMPaaS model evaluate its implementation by analysing operation a large, invite-only,...

10.1145/3372297.3417892 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Organizations are experiencing more and sophisticated attacks specifically targeting their employees customers. These exploit tailored information on the victim or organization to increase credibility. To date, no study has evaluated role of 'traditional' phishing cognitive effects in these advanced settings. In this paper, we run a field experiment 747 subjects employed two organizations (a university large international consultancy company) evaluate interaction between persuasion...

10.1145/3407023.3409178 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2020-08-25

Organizations are increasingly facing sophisticated social engineering attacks that exploit human vulnerabilities and overcome commonly available countermeasures. Spear-phishing campaigns becoming the most prevalent attack source of compromise for organizations. We argue existing prevention detection countermeasures fundamentally ineffective against this class attacks. In work, we propose a novel approach to address limitations Our proposition is new course action capabilities as basis...

10.1109/eurospw51379.2020.00069 article EN 2020-09-01

Phishing attacks arrive in high numbers and often spread quickly, meaning that after-the-fact countermeasures such as domain blacklisting are limited efficacy. Visual similarity-based approaches have the potential of detecting previously unseen phishing webpages. These approaches, however, require identifying legitimate webpage(s) they reproduce. Existing rely on textual feature analysis for target identification, with misclassification rates approximately 1%; most websites a user might...

10.1145/3465481.3470112 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2021-08-16

Abstract The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose new attacker model, based on dynamic optimization, where we demonstrate large, initial, fixed costs of development induce attackers to delay implementation deployment exploits vulnerabilities. theoretical model predicts mass preferably (i) only one vulnerability per software version, (ii)...

10.1111/risa.13732 article EN cc-by Risk Analysis 2021-05-07

A common conceit is that the typical cyber attacker assumed to be all powerful and able exploit possible vulnerabilities with almost equal likelihood. In this paper we present, empirically validate, a novel more realistic model. The intuition of our model mass will optimally choose whether act weaponize new vulnerability, or keep using existing toolkits if there are enough vulnerable users. predicts attackers may i) only one vulnerability per software version, ii) include low attack...

10.2139/ssrn.2862299 article EN SSRN Electronic Journal 2017-01-01

In this paper we present, showcase, and analize a novel framework to dissect Social Engineering (SE) attacks. The is based on extant theories in the cognitive sciences, meant as an instrument for researchers practitioners alike structure analyze SE attacks of varying sophistication, isolating specific features their effects at level, providing common comparisons across different We showcase against reproduced academic literature well real (highly-targeted) reported wild, relating techniques...

10.1109/eurospw54576.2021.00024 article EN 2021-09-01

Phishing emails are becoming more and sophisticated, making current detection techniques ineffective. The reporting of phishing from users is, thus, crucial for organizations to detect attacks mitigate their effect. Despite extensive research on how the believability a email affects rates, there is little no about relationship between associated rate. In this work, we present controlled experiment with 446 subjects evaluate rate linked its Our results show that decreases as increases around...

10.1109/eurospw55150.2022.00018 article EN 2022-06-01
Coming Soon ...