Skip to main content

Showing 1–5 of 5 results for author: Orbinato, V

  1. arXiv:2404.12893  [pdf, other

    cs.CR cs.SE

    The Power of Words: Generating PowerShell Attacks from Natural Language

    Authors: Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese

    Abstract: As the Windows OS stands out as one of the most targeted systems, the PowerShell language has become a key tool for malicious actors and cybersecurity professionals (e.g., for penetration testing). This work explores an uncharted domain in AI code generation by automatically generating offensive PowerShell code from natural language descriptions using Neural Machine Translation (NMT). For training… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: 18th USENIX WOOT Conference on Offensive Technologies, GitHub Repo: https://github.com/dessertlab/powershell-offensive-code-generation

  2. Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection

    Authors: Vittorio Orbinato, Marco Carlo Feliciano, Domenico Cotroneo, Roberto Natella

    Abstract: Advanced Persistent Threats (APTs) represent the most threatening form of attack nowadays since they can stay undetected for a long time. Adversary emulation is a proactive approach for preparing against these attacks. However, adversary emulation tools lack the anti-detection abilities of APTs. We introduce Laccolith, a hypervisor-based solution for adversary emulation with anti-detection to fill… ▽ More

    Submitted 29 April, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  3. arXiv:2208.12144  [pdf, other

    cs.CR cs.CL cs.LG

    Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

    Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo

    Abstract: Proactive approaches to security, such as adversary emulation, leverage information about threat actors and their techniques (Cyber Threat Intelligence, CTI). However, most CTI still comes in unstructured forms (i.e., natural language), such as incident reports and leaked documents. To support proactive security efforts, we present an experimental study on the automatic classification of unstructu… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

    Comments: 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)

  4. arXiv:2112.11233  [pdf, other

    cs.CR cs.AI

    A next-generation platform for Cyber Range-as-a-Service

    Authors: Vittorio Orbinato

    Abstract: In the last years, Cyber Ranges have become a widespread solution to train professionals for responding to cyber threats and attacks. Cloud computing plays a key role in this context since it enables the creation of virtual infrastructures on which Cyber Ranges are based. However, the setup and management of Cyber Ranges are expensive and time-consuming activities. In this paper, we highlight the… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  5. EVIL: Exploiting Software via Natural Language

    Authors: Pietro Liguori, Erfan Al-Hossami, Vittorio Orbinato, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic

    Abstract: Writing exploits for security assessment is a challenging task. The writer needs to master programming and obfuscation techniques to develop a successful exploit. To make the task easier, we propose an approach (EVIL) to automatically generate exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: Paper accepted at the 32nd International Symposium on Software Reliability Engineering (ISSRE 2021)