Zobrazeno 1 - 10
of 292
pro vyhledávání: '"Baldoni, Roberto"'
Autor:
Massarelli, Luca, Di Luna, Giuseppe Antonio, Petroni, Fabio, Querzoni, Leonardo, Baldoni, Roberto
The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright
Externí odkaz:
http://arxiv.org/abs/1811.05296
Autor:
Baldoni, Roberto, Di Luna, Giuseppe Antonio, Massarelli, Luca, Petroni, Fabio, Querzoni, Leonardo
In this paper we consider the binary similarity problem that consists in determining if two binary functions are similar only considering their compiled form. This problem is know to be crucial in several application scenarios, such as copyright disp
Externí odkaz:
http://arxiv.org/abs/1810.09683
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind
Externí odkaz:
http://arxiv.org/abs/1710.08189
Autor:
Massarelli, Luca, Aniello, Leonardo, Ciccotelli, Claudio, Querzoni, Leonardo, Ucci, Daniele, Baldoni, Roberto
The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families
Externí odkaz:
http://arxiv.org/abs/1709.00875
Building Regular Registers with Rational Malicious Servers and Anonymous Clients -- Extended Version
The paper addresses the problem of emulating a regular register in a synchronous distributed system where clients invoking ${\sf read}()$ and ${\sf write}()$ operations are anonymous while server processes maintaining the state of the register may be
Externí odkaz:
http://arxiv.org/abs/1704.05521
Publikováno v:
ACM Computing Surveys 51(3), 2018. BibTeX entry: http://goo.gl/Hf5Fvc
Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software vulnerabilities may need to rule out the existence of any bac
Externí odkaz:
http://arxiv.org/abs/1610.00502
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change
Externí odkaz:
http://arxiv.org/abs/1505.03509
Autor:
Baldoni, Roberto, Caruso, Mario, Cerocchi, Adriano, Ciccotelli, Claudio, Montanari, Luca, Nicoletti, Luca
The deployment of business critical applications and information infrastructures are moving to the cloud. This means they are hosted in large scale data centers with other business applications and infrastructures with less (or none) mission critical
Externí odkaz:
http://arxiv.org/abs/1405.2992
Publikováno v:
In Computers & Security March 2019 81:123-147