Microphone identification based on the intrinsic
physical features has received significant attention by the research
community in recent years. Such properties can be exploited
in security and forensics applications in order to assess the
authenticity of a certain audio track or for audio...
04b Atto di convegno in volume
-
-
Social media and messaging apps have become major communication platforms. Multimedia contents promote improved user engagement and have thus become a very important communication tool. However, fake news and manipulated content can easily go viral, so, being able to verify the source of videos and...
-
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake VideosThe ability of artificial intelligence techniques to build synthesized brand new videos or to alter the facial expression of already existing ones has been efficiently demonstrated in the literature. The identification of such new threat generally known as Deepfake, but consisting of different...
-
The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even when optimizations alter program structure...
-
Artificial diversification of a software program can be a versatile tool in a wide range of software engineering and security scenarios. For example, randomizing implementation aspects can increase the costs for attackers as it prevents them from benefiting of precise knowledge of their target. A...
-
Despite the advancements in software testing, bugs still plague deployed software and result in crashes in production. When debugging issues-sometimes caused by "heisenbugs"-there is the need to interpret core dumps and reproduce the issue offline on the same binary deployed. This requires the...
-
Distributed execution designs challenge behavioral analyses of anti-malware solutions by spreading seemingly benign chunks of a malicious payload to multiple processes. Researchers have explored methods to chop payloads, spread chunks to victim applications through process injection techniques, and...
-
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means of constant-time programming (i.e., absence of...
-
Industry 4.0, or Smart Manufacturing, is driving the evolution of industrial scenarios worldwide through an extensive introduction of Information Technologies as an integration to Operational Technologies. Access and use of data have become determinant factors of the efficacy of innovation...
-
The paper investigates the Lattice Agreement (LA) problem in asynchronous systems. In LA each process proposes an element e from a predetermined lattice, and has to decide on an element e′ of the lattice such that e ≤ e′. Moreover, decisions of different processes have to be comparable (no two...