Latest News

  • Apr 2019: Invited in the TPC of AISec (CCS workshop).
  • Mar 2019: Camera ready of TESSERACT now available.
  • Mar 2019: Our paper “DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans” has been accepted at IEEE TDSC! More details soon.
  • Feb 2019: Our paper “TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time” has been accepted at USENIX Security Symposium 2019!
  • Feb 2019: Member of TPC for Poster Track of IEEE S&P (Oakland).
  • Feb 2019: Invited in the TPC of IEEE NCA 2019.
  • Jan 2019: Attending USENIX ENIGMA 2019, where Prof. Cavallaro will present some of our findings on experimental bias in ML for security. See you in San Francisco! ✈
  • Dec 2018: Invited as PC Member of IJCAI 2019.
  • Oct 2018: Attending ACM CCS 2018. See you in Toronto! ✈
  • Sep 2018: Accepted POSTER paper at ACM CCS 2018
  • Sep 2018: Invited in Artifact Evaluation PC of ACSAC 2018 (2nd tier security conference)
  • Sep 2018: Invited in TPC of AAAI 2019
  • Aug 2018: Attending ACM KDD 2018. See you in London! ✈

Experience

 
 
 
 
 
Sep 2018 – Present
United Kingdom

Visiting Research Associate

King’s College London

 
 
 
 
 
Oct 2017 – Present
United Kingdom

PostDoctoral Researcher

Royal Holloway, University of London

 
 
 
 
 
Jan 2017 – Sep 2017
Italy

PostDoctoral Researcher

University of Modena and Reggio Emilia

 
 
 
 
 
Jan 2016 – Nov 2016
USA

Visiting Research Scholar

University of Maryland, College Park

Selected Articles

. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. USENIX Security Symposium, 2019.

PDF Code Dataset Project Site USENIX ENIGMA talk

. DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. IEEE Transactions on Dependable and Secure Computing (TDSC), 2019.

. Detection and Threat Prioritization of Pivoting Attacks in Large Networks. IEEE Transactions on Emerging Topics in Computing (TETC), 2017.

PDF

. EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. IEEE Transactions on Dependable and Secure Computing (TDSC), 2017.

PDF

. A Probabilistic Logic of Cyber Deception. IEEE Transactions on Information Forensics and Security (TIFS), 2017.

PDF

. Analysis of High Volumes of Network Traffic for Advanced Persistent Threat Detection. Elsevier Computer Networks Journal (ComNet), 2016.

PDF

Selected Talks

Service

Technical Program Committee

  • 2019: AAAI, IJCAI, Poster Track of IEEE S&P (Oakland), CARDS, AISec (CCS workshop), IEEE Network Computing and Applications (NCA)
  • 2018: IJCAI-ECAI, IEEE BDAA Workshop, IEEE Smart Industries Workshop
  • 2017: IEEE Network Computing and Applications (NCA)

Shadow Technical Program Committee

  • 2019: IEEE Symp. S&P (Oakland)
  • 2018: IEEE Symp. S&P (Oakland)

Artifact Evaluation PC

  • 2018: ACSAC

Workshop Chair

Review Service

  • 2019: IEEE Trans. Neural Networks and Learning Systems (TNNLS), IEEE S&P Magazine, IEEE Trans. Big Data, Elsevier FGCS, Springer Books
  • 2018: IEEE Trans. Information Forensics and Security (TIFS), IEEE Trans. Neural Networks and Learning Systems (TNNLS), Elsevier Computer Networks Journal, International Journal of Machine Learning and Cybernetics (JMLC), Elsevier Journal of Information Security and Applications, Elsevier Expert Systems With Applications
  • 2017: IEEE Trans. Information Forensics and Security (TIFS), Elsevier Journal of Information Security and Applications, Elsevier Expert Systems With Applications
  • 2016: IEEE Trans. Computational Social Systems (TCSS)

Sub-review service

  • 2019: USENIX Security, ACM The Web Conference (WWW), IEEE Euro S&P, DIMVA, RAID
  • 2018: ACM CCS, ACSAC, ARES Conference, Deep Learning for Security (DLS) Workshop (co-located IEEE Symp. S&P), ACM CODASPY
  • 2017: IEEE Trans. on Cloud Computing (TCC)
  • 2016: IEEE International Conference on Communications (ICC), IEEE NetSciCom
  • 2015: IEEE Network Computing and Applications (NCA), Elsevier Expert Systems With Applications

Teaching & Seminars

2019

  • Two-day module on “Machine Learning for Security” at Cyber Academy, a specialization course on cybersecurity at the University of Modena and Reggio Emilia, Italy

  • Seminars on “Machine Learning for Security”, as part of Malicious Software course, BSc in Information Security, Royal Holloway, University of London, UK

2018

  • Seminar on “Authentication and Access Control”, as part of Security Engineering course, MSc Computer Science, King’s College London, UK
  • T.A. and Seminars on “Machine Learning for Security”, as part of Malicious Software course, BSc in Information Security, Royal Holloway, University of London, UK

2017

  • Several lectures and lab tutor for part of the “Network Systems and Applications” course, MSc in Computer Engineering, University of Modena and Reggio Emilia, Italy

2016

  • Seminars and T.A. for the “Computer Security” course, MSc in Computer Engineering, University of Modena and Reggio Emilia, Italy

2015

  • Several lectures and lab tutor for part of the “Network Systems and Applications” course, MSc in Computer Engineering, University of Modena and Reggio Emilia, Italy
  • Seminars and T.A. for the “Computer Security” course, MSc in Computer Engineering, University of Modena and Reggio Emilia, Italy

2014

  • Seminars and T.A. for “Network Systems and Applications” course, MSc in Computer Engineering, University of Modena and Reggio Emilia, Italy

Recent Posts

This post gives an introduction to the use of Python multiprocessing.

Skills

Python

Machine Learning

Systems Security

Malware Detection

NIDS

Web Development

Contact

  • fabio.pierazzi@kcl.ac.uk
  • King’s College London, Department of Informatics, Bush House, London
  • Email to book an appointment