Enrico Mariconti

ORCID: 0000-0003-3005-8214
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Hate Speech and Cyberbullying Detection
  • Software Testing and Debugging Techniques
  • Cybercrime and Law Enforcement Studies
  • Forensic Anthropology and Bioarchaeology Studies
  • Anomaly Detection Techniques and Applications
  • Paleopathology and ancient diseases
  • Mobile and Web Applications
  • Autonomous Vehicle Technology and Safety
  • Virology and Viral Diseases
  • Textile materials and evaluations
  • Computational and Text Analysis Methods
  • Sexuality, Behavior, and Technology
  • Ethics and Social Impacts of AI
  • Forensic and Genetic Research
  • Digital and Cyber Forensics
  • Imbalanced Data Classification Techniques
  • Information and Cyber Security
  • Bullying, Victimization, and Aggression
  • Artificial Intelligence in Healthcare and Education
  • Data Quality and Management
  • Authorship Attribution and Profiling

University College London
2016-2024

UCL Australia
2016

The rise in popularity of the Android platform has resulted an explosion malware threats targeting it.As both and operating system itself constantly evolve, it is very challenging to design robust mitigation techniques that can operate for long periods time without need modifications or costly re-training.In this paper, we present MAMADROID, detection relies on app behavior.MAMADROID builds a behavioral model, form Markov chain, from sequence abstracted API calls performed by app, uses...

10.14722/ndss.2017.23353 article EN 2017-01-01

As Android has become increasingly popular, so malware targeting it, thus motivating the research community to propose different detection techniques. However, constant evolution of ecosystem, and itself, makes it hard design robust tools that can operate for long periods time without need modifications or costly re-training. Aiming address this issue, we set detect from a behavioral point view, modeled as sequence abstracted API calls. We introduce M A D ROID , static-analysis-based system...

10.1145/3313391 article EN ACM Transactions on Privacy and Security 2019-04-09

Cybercriminals steal access credentials to webmail accounts and then misuse them for their own profit, release publicly, or sell on the underground market. Despite importance of this problem, research community still lacks a comprehensive understanding what these stolen are used for. In paper, we aim shed light modus operandi miscreants accessing Gmail accounts. We developed an infrastructure that is able monitor activity performed by users accounts, leaked 100 under our control through...

10.1145/2987443.2987475 article EN 2016-11-10

Summary Intrusion detection systems (IDS) are aimed at analyzing and detecting security problems. The IDS may be structured into misuse anomaly detection. former often signature/rule that detect malicious software by inspecting the content of packets or files looking for a “signature” labeling malware. They very efficient, but their drawback stands in weakness information to check (eg, signature), which quickly dated, computation time because each packet file needs inspected. based on and,...

10.1002/dac.3225 article EN International Journal of Communication Systems 2016-10-18

Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance this phenomenon, however, online services lack effective countermeasures to mitigate it. Unlike well-studied problems spam phishing, coordinated aggressive behavior both targets is perpetrated humans, making...

10.1145/3359309 article EN Proceedings of the ACM on Human-Computer Interaction 2019-11-07

With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also predict specific steps that will be taken by an adversary when performing attack. However this still open research problem, and previous in predicting events looked at binary outcomes (e.g., whether attack would happen or not), attacker undertake. To fill gap we present Tiresias, system leverages Recurrent Neural Networks (RNNs) future on...

10.1145/3243734.3243811 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Following the increasing popularity of mobile ecosystem, cybercriminals have increasingly targeted ecosystems, designing and distributing malicious apps that steal information or cause harm to device's owner. Aiming counter them, detection techniques based on either static dynamic analysis model Android malware, been proposed. While pros cons these are known, they usually compared in context their limitations e.g., is not able capture runtime behaviors, full code coverage achieved during...

10.1109/pst.2018.8514191 article EN 2018-08-01

As Android has become increasingly popular, so malware targeting it, thus pushing the research community to propose different detection techniques. However, constant evolution of ecosystem, and itself, makes it hard design robust tools that can operate for long periods time without need modifications or costly re-training. Aiming address this issue, we set detect from a behavioral point view, modeled as sequence abstracted API calls. We introduce MaMaDroid, static-analysis based system...

10.48550/arxiv.1711.07477 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Web browsers have become the predominant means for developing and deploying applications, thus they often handle sensitive data such as social interactions or financial credentials information. As a consequence, defensive measures TLS, Same-Origin Policy (SOP), Content Security (CSP) are critical ensuring that remains in trusted hands.

10.1145/3134600.3134632 article EN 2017-12-04

Users on Twitter are commonly identified by their profile names. These names used when directly addressing users Twitter, part of page URLs, and can become a trademark for popular accounts, with people referring to celebrities real name name, interchangeably. however, has chosen not permanently link corresponding user accounts. In fact, allows change afterwards makes the old available other take.

10.1145/3038912.3052589 article EN 2017-04-03

Botnets continue to be a threat organizations, thus various machine learning-based botnet detectors have been proposed. However, the capability of such systems in detecting new or unseen botnets is crucial ensure its robustness against rapid evolution botnets. Moreover, it prolongs effectiveness system bots, avoiding frequent and time-consuming classifier re-training. We present BOTection, privacy-preserving bot detection that models network flow behavior as Markov Chain. The Chain state...

10.1145/3320269.3372202 article EN 2020-10-05

Abstract Issues The sale of illicit drugs online has expanded to mainstream social media apps. These platforms provide access a wide audience, especially children and adolescents. Research is in its infancy scattered due the multidisciplinary aspects phenomena. Approach We present systematic scoping review on advertisement young people. Peer‐reviewed studies written English, Spanish French were searched for period 2015 2022. extracted data users, studied, rate posts, terminology used study...

10.1111/dar.13716 article EN cc-by Drug and Alcohol Review 2023-07-31

Online communities are groups of people who interact primarily via the Internet, often sharing common interests. Some these groups, particularly supporters Q created far-right conspiracy theory known as QAnon, highly toxic and controversial. These banned from various mainstream online social networks due to their controversy. This study examines deplatforming subsequent migrations QAnon adherents, following a two-step process. We analyze Reddit data, finding that users opt for Voat an...

10.1145/3614419.3644021 article EN 2024-04-17

Traditional age estimation methods are prone to subjectivity, leading a decrease in the reliability and repeatability of estimated ages skeletal assemblages. In an attempt reduce level this research applied computational method designed analyze surface topography, Dirichlet Normal Energy (DNE), provide mathematical assessment age-related degeneration auricular surface. Reconstructed 3D models 153 archaeological individuals were created by laser scanning analyzed using R studio package MolaR....

10.1016/j.fri.2024.200579 article EN cc-by-nc-nd Forensic Imaging 2024-01-19

Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance this phenomenon, however, online services lack effective countermeasures to mitigate it. Unlike well-studied problems spam phishing, coordinated aggressive behavior both targets is perpetrated humans, making...

10.48550/arxiv.1805.08168 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Twitter allows their users to change profile name at discretion. Unfortunately, this design decision can be used by attackers effortlessly hijack user names of popular accounts. We call practice squatting. In paper, we investigate squatting phenomenon, and show how mount impersonation attacks attract a larger number victims potentially malicious content. observe that are already performing attack on measure its prevalence. provide insights into the characteristics such users, argue these...

10.1145/2905760.2905762 article EN 2016-04-07

Users on Twitter are commonly identified by their profile names. These names used when directly addressing users Twitter, part of page URLs, and can become a trademark for popular accounts, with people referring to celebrities real name name, interchangeably. however, has chosen not permanently link corresponding user accounts. In fact, allows change afterwards makes the old available other take. this paper, we provide large-scale study phenomenon reuse Twitter. We show that is uncommon,...

10.48550/arxiv.1702.04256 preprint EN other-oa arXiv (Cornell University) 2017-01-01
Coming Soon ...