[CyCon17] Scalable Architecture for Online Prioritisation of Cyber Threats
 Conference Pierazzi, F., Apruzzese, G., Colajanni, M., Guido, A., & Marchetti, M.,  IEEE International Conference on Cyber Conflict, 2017 
 Oneliner: My very first paper! 
 Conference Pierazzi, F., Apruzzese, G., Colajanni, M., Guido, A., & Marchetti, M.,  IEEE International Conference on Cyber Conflict, 2017 
 Oneliner: My very first paper! 
 Conference Apruzzese, G., Marchetti, M., Colajanni, M., Zoccoli, G. G., & Guido, A.,  IEEE International Symposium on Network Computing and Applications, 2017 
 Oneliner: Use one to find many (apparently, this paper has been integrated into a real SIEM product!) 
 Journal Apruzzese, G., Pierazzi, F., Colajanni, M., & Marchetti, M.,  IEEE Transactions on Emerging Topics in Computing, 2017 
 Oneliner: How to detect lateral movement (through pivoting) using Network Flows. 
 Conference Apruzzese, G., Colajanni, M. Ferretti, L., Guido, A., & Marchetti, M.,  IEEE International Conference on Cyber Conflict, 2018 
 Oneliner: The right paper, at the right time, in the right place? 
  Conference Apruzzese, G., & Colajanni, M.,  IEEE International Symposium on Network Computing and Applications [BEST STUDENT PAPER AWARD], 2018 
 Oneliner: The first paper using adversarial examples against Botnet Detectors (yes, the title has a typo). 
 Conference Apruzzese, G., Colajanni, M., Ferretti, L., & Marchetti, M.,  International Conference on Cyber Conflict, 2019 
 Oneliner: This is not just a review! We also propose an original defense against Poisoning! 
  Conference Apruzzese, G., Colajanni, M., & Marchetti, M.,  IEEE International Symposium on Network Computing and Applications [BEST STUDENT PAPER AWARD], 2019 
 Oneliner: Previously, in [NCA18], we evaded 1 classifier on 1 dataset. Now, we evade 12 classifiers on 4 datasets! 
 Journal Apruzzese, G., Andreolini, M., Marchetti, M., Colacino, V. G., & Russo, G.,  Symmetry, 2020 
 Oneliner: Ensembling ensembles: each detector focuses on a specific attack against a specific network application! 
 Journal Apruzzese, G., Andreolini, M., Colajanni, M., & Marchetti, M.,  IEEE Transactions on Emerging Topics in Computational Intelligence, 2020 
 Oneliner: Applying Defensive Distillation to Random Forest! 
 Journal Apruzzese, G., Andreolini, M., Marchetti, M., Venturi, A., & Colajanni, M.,  IEEE Transactions on Network and Service Management, 2020 
 Oneliner: Offense is the best Defense! At little-to-no performance degradation. 
 Journal Venturi, A., Apruzzese, G., Andreolini, M., Colajanni, M., & Marchetti, M.,  Data in Brief, 2021 
 Oneliner: Dataset, code snippet and tutorial for [TNSM20]. 
 Workshop Husák, M., Apruzzese, G., Yang, S. J., & Werner, G.,  IFIP/IEEE International Symposium on Integrated Network Management, 2021 
 Oneliner: Uh-oh! It appears that detecting pivoting on external traffic is unfeasible! 
 Journal Apruzzese, G., Andreolini, M., Ferretti, L., Marchetti, M., & Colajanni, M.,  ACM Digital Threats: Research and Practice, 2021 
 Oneliner: Using adversarial examples against ML-NIDS is not a feasible strategy. 
 Conference Corsini, A., Yang, S. J., & Apruzzese, G.,  International Conference on Availability, Reliability and Security, 2021 
 Oneliner: Are temporal patterns useful for ML-NIDS? Let's test this out with a fair comparison between LSTM and traditional FNN. 
 Journal Apruzzese, G., Pajola, L., & Conti, M.,  IEEE Transactions on Network and Service Management, 2022 
 Oneliner: Let's mix 'n match those datasets! 
 Workshop Schneider, J., & Apruzzese, G.,  IEEE Symposium on Security and Privacy – Deep Learning and Security Workshop, 2022 
 Oneliner: What's the point of minimal perturbations if we want to fool humans? 
 Journal Apruzzese, G., Laskov, P., de Oca, E. M., Mallouli, W., Rapa, L. B., Grammatopoulos, A. V., & Franco, F. D.,  ACM Digital Threats: Research and Practice, 2022 
 Oneliner: Explaining ML & Cybersecurity in a notation-free way -- a joint effort involving Researchers, Practitioners and Regulatory Bodies. 
   Conference Apruzzese, G., Laskov, P., & Tastemirova, A.,  IEEE European Symposium on Security and Privacy [OUTSTANDING PRESENTATION AWARD], 2022 
 Oneliner: How to properly evaluate semisupervised learning methods. 
 Journal Apruzzese, G., Vladimirov, R., Tastemirova, A., & Laskov, P.,  IEEE Transactions on Network and Service Management, 2022 
 Oneliner: Introducing the "myopic" threat model for adversarial ML attacks. 
 Journal Apruzzese, G., & Subrahmanian, V.S.,  IEEE Transactions on Dependable and Secure Computing, 2022 
 Oneliner: A new phishing dataset, and a new defensive mechanism based on feature randomization. 
 Conference  Apruzzese, G., Conti, M., & Yuan, Y.,  Annual Computer Security Applications Conference, 2022 
 Oneliner: Revisiting adversarial attacks against phishing website detectors—even real ones. (Artifact: Reusable) 
 Workshop Meyer, J. & Apruzzese, G.,  Industrial Control System Security Workshop (co-located with ACSAC), 2022 
 Oneliner: Elucidating the disconnection between Research and Practice. 
 Conference Apruzzese, G., Anderson, H. S., Dambra, S., Freeman, D., Pierazzi, F., & Roundy, K. A.,  IEEE Conference on Secure and Trustworthy Machine Learning, 2023 
 Oneliner: Let's change the domain of adversarial ML. For real. 
 Conference Tricomi, P. P., Facciolo, L., Apruzzese, G., & Conti, M.,  ACM Conference on Data and Application Security and Privacy, 2023 
 Oneliner: We discovered a privacy issue affecting millions of video gamers! 
 Journal Schneider, J., & Apruzzese, G.,  Journal of Information Security and Applications, 2023 
 Oneliner: We extend the [DLS22] paper and we also carry out a user-study! 
 Conference Apruzzese, G., Laskov, P., & Schneider, J.,  IEEE European Symposium on Security and Privacy, 2023 
 Oneliner: Changing the evaluation methodology of research papers on ML applications for NIDS. 
 Conference Lee, J., Xin, Z., Ng. M. P. S., Sabharwal, K., Apruzzese, G., Divakaran. D. M.,  European Symposium on Research In Computer Security, 2023 
 Oneliner: A novel attack against state-of-the-art DL methods for logo identification, validated via two user-studies. 
  Conference Draganovic, A., Dambra, S., Aldana Iuit, J., Roundy, K., Apruzzese, G.,  APWG Symposium on Electronic Crime Research [Runner-up for BEST PAPER AWARD], 2023 
 Oneliner: The first user-study assessing the human capabilities to recognize real "adversarial" phishing webpages that evaded a real phishing detection system based on deep learning 
 Journal Yuan, Y. and Apruzzese, G., and Conti. M.,  ACM Digital Threats: Research and Practice, 2023 
 Oneliner: We extend the [ACSAC'22] paper with new experiments by _mixing_ the perturbation spaces! 
 Conference Koh, F., Grosse, K., Apruzzese, G.,  Hawaii International Conference on System Sciences, 2024 
 Oneliner: What do AI practitioners think about the European regulation? 
 Conference Braun, T., Pekaric, I., Apruzzese, G.,  ACM Symposium on Applied Computing, 2024 
 Oneliner: Nobody ever questioned "how labelling is done by cybersecurity practitioners". We try to uncover this mystery. 
 Conference  Yuan, Y., Hao, Q., Apruzzese, G., Conti, M., & Gang, W.,  The Web Conference, 2024 
 Oneliner: This work is orthogonal to [eCrime23]: adversarial webpages should be compared to non-adversarial ones! 
 Workshop Rizvani, A., Laskov, P., Apruzzese, G.,  Workshop on Attackers and Cyber-Crime Operations, 2024 
 Oneliner: We delve into the security of machine learning applications in computational finance. 
 Conference Lange, K., Fontana, F., Rossi, F., Varile, M., Apruzzese, G.,  IEEE Space Computing Conference, 2024 
 Oneliner: A joint work with space-industry practitioners. 
 Conference Eisele, L., Apruzzese, G.,  IEEE Conference on Games, 2024 
 Oneliner: Apparently, game-related research overlooks the privacy risks of the video-gaming ecosystem. 
 Conference Hao, Q., Yuan, Y., Diwan, N., Apruzzese, G., Conti, M., & Gang, W.,  USENIX Security Symposium, 2024 
 Oneliner: We design a new attack that bypasses 3 SOTA visual-based phishing website detection systems in an end-to-end fashion, as well as end-users (humans) 
  Conference Ziche, C., Apruzzese, G.,  Business Process Management Conference -- Industry Forum [BEST INDUSTRY FORUM PAPER AWARD], 2024 
 Oneliner: How can LLM be used at the Hilti group for BPM? 
 Journal Yuan, Y. and Apruzzese, G., and Conti. M.,  Computers & Security, 2024 
 Oneliner: Apparently, most research on phishing website detection only focused on the Western side of the world... 
  Conference Weinz, M., Schröer, S. L., & Apruzzese, G.,  APWG Symposium on Electronic Crime Research, 2024 
 Oneliner: There is a functionality of the Google Assistant that needs to be looked at... 
 Workshop Eisele, L., Apruzzese, G.,  Annual Symposium on Computer-Human Interaction in Play (WiP track), 2024 
 Oneliner: Game-related user studies should validate the responses collected via AMT. 
 Workshop Apruzzese, G., Fass, A., & Pierazzi, F.,  ACM Workshop on Artificial Intelligence Security, 2024 
 Oneliner: What happens when two popular phenomena in ML security join forces? 
 Journal Suguranaj, N. and Balaji, S. R. A. and Subash Chandar, B. and Rajagopalan, P. and Kose, U. and Loper, D. C. and Mahfuz, T. and Chakraborty, P. and Ahmad, S. and Kim, T. and Apruzzese, G. and Dubey, A. and Strezoski, L. and Blakely, B. and Ghosh, S. and Bharata Reddy, M. J. and Padullaparti, H. V. and Ranganathan, P.,  IEEE Communications Surveys & Tutorials, 2025 
 Oneliner: A comprehensive and security-focused review on the broad domain of DERMS 
 Conference Pekaric, I., Apruzzese, G.,  Hawaii International Conference on System Sciences, 2025 
 Oneliner: Only a tiny fraction of the HICSS papers published in 2017--2024 have a functional and publicly available repository. 
  Conference Schröer, S. L., Apruzzese, G., Human, S., Laskov, P., Anderson, H. S., Bernroider, E. W. N., Fass, A., Nassi, B., Rimmer, V., Roli, F., Salam, S., Shen, A., Sunyaev, A., Wadhwa-Brown, T., Wagner, I., Wang, G.,  IEEE Conference on Secure and Trustworthy Machine Learning, 2025 
 Oneliner: A long-term and community-driven effort to systematize and address the threat of "offensive AI"... 
 Conference Rizvani, A., Apruzzese, G., & Laskov, P.,  ACM Conference on Data and Application Security and Privacy, 2025 
 Oneliner: Did you know that very little has been done in the adversarial ML domain w.r.t. ML applications in computational finance? 
 Conference Pajola, L., Schroeer, S. L., Tricomi, P. P., Conti, M., Apruzzese, G.,  International AAAI Conference on Web and Social Media, 2025 
 Oneliner: What has been done in 17 years of research on online social networks? We investigate this question by creating and analysing the Minerva-OSN dataset. 
 Journal Schröer, S. L., Seideman, J. D., and Luo, S., and Apruzzese, G., and Dietrich, S., and Laskov, P.,  ACM Digital Threats: Research and Practice, 2025 
 Oneliner: We carry out (among others) a user study with CTI practitioners: what do they _want_? And how do they see scholarly literature in CTI? 
  Workshop Pajola, L., Caripoti, Banzer, S., E., Pizzi, S., Conti, M. and Apruzzese, G.,  ACM Workshop on Artificial Intelligence Security [BEST PAPER AWARD], 2025 
 Oneliner: Most research in phishing email detection uses outdated datasets, so we try to make things a bit better. 
 Conference Weinz, M., Zannone, N., Allodi, L., & Apruzzese, G.,  ACM Asia Conference on Computer and Communications Security, 2025 
 Oneliner: We (are the first to) carry out a large-scale and cross-organizational user study on the effectiveness of quishing and LLM-written phishing emails (spoiler alert: they work very well). 
  Conference Pfister, M., Apruzzese, G., & Pekaric, I.,  APWG Symposium on Electronic Crime Research, 2025 
 Oneliner: Takeaway: instead of looking at an entire organization, security-awareness campaigns should focus on specific departments (as trivial as it may sound, not many papers did this). 
 Journal Schröer, S. L., Pajola, L., Castagnaro, A., Apruzzese, G., & Conti, M.,  IEEE Intelligent Systems, 2025 
 Oneliner: There are far too many terms associated to "AI." We examine and clarify them a bit. 
 Journal Rosenzweig, B., Dalla Valle, V., Apruzzese, G., Fass, A.,  ACM Transactions on the Web, 2025 
 Oneliner: Nobody really _tried_ to use supervised ML to detect browser extensions. So, we tried. Results were... 
My first conference presentation!
I briefly presented my research to the other lab members of DSAIL!
The beginning of my future…
After not even two months, I am back to Boston…
An intriguing research project I participated in during my PhD.
Data Analytics and Cybersecurity for dummies.
I was the Moderator between Academia and Industry!
Addressing the resilience of AICA against adversarial ML attacks.
Anticipation of the [TNSM22b] paper at Huawei!
Teaching some MSc. students the link between ML and Cybersecurity
Anticipation of [DLS22] and [EuroSP22] @ TU Delft!
The only presentation done physically at [DLS22]!
Once upon a time…
A very negative (informal) talk!
Going back (close) to my origin!
Revealing some overlooked aspects of ML & Cybersecurity research
These findings are thanks to an excellent BSc. student.
A joint effort with UniPD, casting light on some overlooked aspects of adversarial ML in the context of phishing website detection.
Besides the content of the paper, the talk has a meta-message.
Revisiting ML in Network Intrusion Detection
We propose and evade transformers for logo-identification, and validate our attack with user-studies.
Yet-another talk based on our SaTML23 paper
A breath of fresh air… from the real world.
What do AI practitioners think about the European regulation?
Apparently, game-related research overlooks the privacy risks of the video-gaming ecosystem.
…looks like the issue has been patched!
What happens when two popular phenomena in ML security join forces?
What are some ways in which AI can be used in the context of phishing websites?
We quantify the efforts of prior research on Online Social Networks.
This was my first talk to a Summer School (and I loved it).
We (are the first to) carry out a large-scale and cross-organizational user study on the effectiveness of quishing and LLM-written phishing emails (spoiler alert: they work very well).
Most research in phishing email detection uses outdated datasets, so we try to make things a bit better.