Skip to content
View Mhackiori's full-sized avatar
🎹
Playing with keys
🎹
Playing with keys

Highlights

  • Pro

Block or report Mhackiori

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Mhackiori/README.md

MasterHead

Hi, I'm Francesco πŸ‘‹

I'm a PhD Student in Brain, Mind and Computer Science at the University of Padua with a Master's degree in Cybersecurity. Here, I am part of the Security and Privacy (SPRITZ) research group. My research interests lie primarily in Automotive Security, focusing on Machine Learning and Deep Learning applications. I am also interested in Adversarial Attacks, Cyber Threat Intelligence, and Quantum Cryptography and Computing.

πŸ”Ž About Me

πŸ“– | PhD Brain, Mind and Computer Science (2022 - Present)
πŸŽ“ | MSc Cybersecurity (2020 - 2022)
πŸŽ“ | BSc Information Engineering (2017 - 2020)
🏭 | Internship @ Leonardo (March 2022 - June 2022)

πŸ“š Latest Publications

  • Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, and Mauro Conti. 2024. 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '24). Preprint: https://arxiv.org/abs/2403.17494
  • Francesco Marchiori and Mauro Conti. 2024. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. In Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning (WiseML '24). Association for Computing Machinery, New York, NY, USA. Preprint: https://arxiv.org/abs/2404.04648
  • Filippo Perrina, Francesco Marchiori, Mauro Conti, and Nino Vincenzo Verde. 2023. AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. 2023 IEEE International Conference on Big Data (Big Data '23), Sorrento, Italy, 2023. https://doi.org/10.1109/BigData59044.2023.10386116
  • Francesco Marchiori and Mauro Conti. 2023. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Association for Computing Machinery, New York, NY, USA, 105–119. https://doi.org/10.1145/3576915.3623179
  • Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, and Luca Pajola. 2023. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID '23). Association for Computing Machinery, New York, NY, USA, 315–329. https://doi.org/10.1145/3607199.3607227
  • Francesco Marchiori, Mauro Conti, and Nino Vincenzo Verde. 2023. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. In Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 3, 1–11. https://doi.org/10.1145/3600160.3600182

πŸ’» Languages and Tools

Python

TensorFlow

PyTorch

Java

C

C++

HTML

CSS

JavaScript

MatLab

Jupyter

VS Code

Linux

Bash



πŸ“¬ Find Me

Gmail Badge Github Badge Linkedin Badge Twitter Discord Skype

πŸ“ˆ GitHub Stats

Francesco Marchiori's Github Stats

Pinned Loading

  1. STIXnet STIXnet Public

    A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

    Python 19 4

  2. DUMB DUMB Public

    Formalizing Attacker Scenarios for Adversarial Transferability

    Jupyter Notebook 3

  3. DCAuth DCAuth Public

    Safeguarding Against Counterfeit Batteries with Authentication

    Jupyter Notebook 1

  4. EISthentication EISthentication Public

    Safeguarding Against Counterfeit Batteries with Authentication

    Jupyter Notebook 1 1

  5. CVE-2021-3156 CVE-2021-3156 Public

    Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerability

    C 4

  6. Quantum-Teleportation Quantum-Teleportation Public

    Simulations and Execution on a Quantum Computer through IBM Quantum Experience

    Jupyter Notebook