Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aristide Fattori is active.

Publication


Featured researches published by Aristide Fattori.


recent advances in intrusion detection | 2010

Live and trustworthy forensic analysis of commodity production systems

Lorenzo Martignoni; Aristide Fattori; Roberto Paleari; Lorenzo Cavallaro

We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodity hardware to securely perform live forensic analysis of potentially compromised production systems. HyperSleuth provides a trusted execution environment that guarantees four fundamental properties. First, an attacker controlling the system cannot interfere with the analysis and cannot tamper the results. Second, the framework can be installed as the system runs, without a reboot and without loosing any volatile data. Third, the analysis performed is completely transparent to the OS and to an attacker. Finally, the analysis can be periodically and safely interrupted to resume normal execution of the system. On top of HyperSleuth we implemented three forensic analysis applications: a lazy physical memory dumper, a lie detector, and a system call tracer. The experimental evaluation we conducted demonstrated that even time consuming analysis, such as the dump of the content of the physical memory, can be securely performed without interrupting the services offered by the system.


automated software engineering | 2010

Dynamic and transparent analysis of commodity production systems

Aristide Fattori; Roberto Paleari; Lorenzo Martignoni; Mattia Monga

We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for virtualization available nowadays on all commodity machines, our framework is completely transparent to the system under analysis and it guarantees isolation of the analysis tools running on top of it. Thus, the internals of the kernel of the running system needs not to be modified and the whole platform runs unaware of the framework. Moreover, errors in the analysis tools do not affect the running system and the framework. This is accomplished by installing a minimalistic virtual machine monitor and migrating the system, as it runs, into a virtual machine. In order to demonstrate the potentials of our framework we developed an interactive kernel debugger, named HyperDbg. HyperDbg can be used to debug any critical kernel component, and even to single step the execution of exception and interrupt handlers.


international conference on detection of intrusions and malware and vulnerability assessment | 2010

Take a deep breath: a stealthy, resilient and cost-effective botnet using skype

Antonio Nappa; Aristide Fattori; Marco Balduzzi; Matteo Dell'Amico; Lorenzo Cavallaro

Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed source application, an API allows developers to build custom plugins which interact over the Skype network, taking advantage of its reliability and capability to easily bypass firewalls and NAT devices. Since the protocol is completely undocumented, Skype traffic is particularly hard to analyze and to reverse engineer. We propose a novel botnet model that exploits an overlay network such as Skype to build a parasitic overlay, making it extremely difficult to track the botmaster and disrupt the botnet without damaging legitimate Skype users. While Skype is particularly valid for this purpose due to its abundance of features and its widespread installed base, ourmodel is generically applicable to distributed applications that employ overlay networks to send direct messages between nodes (e.g., peer-to-peer software with messaging capabilities). We are convinced that similar bot-netmodels are likely to appear into the wild in the near future and that the threats they pose should not be underestimated. Our contribution strives to provide the tools to correctly evaluate and understand the possible evolution and deployment of this phenomenon.


mobile data management | 2013

On the Privacy of Real-World Friend-Finder Services

Aristide Fattori; Alessandro Reina; Andrea Gerino; Sergio Mascetti

Privacy protection in the deployment of location based services is a hot topic both in CS research and in the development of mobile applications. In this paper we consider a location based service that currently has hundreds of millions of users and we show how we developed a software that is able to discover their exact positions, by only using information publicly disclosed by the service. Our software does not exploit a specific limitation of the considered service. Rather this contribution shows that there is an entire class of services that is subject to the attack we present.


european workshop on system security | 2014

Improving Mac OS X security through gray box fuzzing technique

Stefano Bianchi Mazzone; Mattia Pagnozzi; Aristide Fattori; Alessandro Reina; Andrea Lanzi; Danilo Bruschi

The kernel is the core of any operating system, and its security is of vital importance. A vulnerability, in any of its parts, compromises the whole system security model. Unprivileged users that find such vulnerabilities can easily crash the attacked system, or obtain administration privileges. In this paper we propose LynxFuzzer, a framework to test kernel extensions, i.e., the dynamically loadable components of Mac OS X kernel. To overcome the challenges posed by interacting with kernel-level software, LynxFuzzer includes a bare-metal hardware-assisted hypervisor, that allows to seamlessly inspect the state of a running kernel and its components. We implemented and evaluated LynxFuzzer on Mac OS X Mountain Lion and we obtained unexpected results: we indivuated 6 bugs in 17 kernel extensions we tested, thus proving the usefulness and effectiveness of our framework.


network and distributed system security symposium | 2015

CopperDroid: Automatic Reconstruction of Android Malware Behaviors

Kimberly Tam; Salahuddin J. Khan; Aristide Fattori; Lorenzo Cavallaro


annual computer security applications conference | 2012

When hardware meets software: a bulletproof solution to forensic memory acquisition

Alessandro Reina; Aristide Fattori; Fabio Pagani; Lorenzo Cavallaro; Danilo Bruschi


arXiv: Cryptography and Security | 2014

PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.

Andrea Gianazza; Federico Maggi; Aristide Fattori; Lorenzo Cavallaro; Stefano Zanero


Ercim News | 2012

Peering into the Muddy Waters of Pastebin.

Srdjan Matic; Aristide Fattori; Danilo Bruschi; Lorenzo Cavallaro


Archive | 2010

Take a Deep Breath

Marco Balduzzi; Lorenzo Cavallaro; Matteo Dell'Amico; Aristide Fattori; Antonio Nappa

Collaboration


Dive into the Aristide Fattori's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge