Zobrazeno 1 - 10
of 4 883
pro vyhledávání: '"Cotroneo"'
Vulnerability prediction is valuable in identifying security issues more efficiently, even though it requires the source code of the target software system, which is a restrictive hypothesis. This paper presents an experimental study to predict vulne
Externí odkaz:
http://arxiv.org/abs/2412.07538
Autor:
Ahyoune, S., Altenmueller, K., Antolin, I., Basso, S., Brun, P., Candon, F. R., Castel, J. F., Cebrian, S., Chouhan, D., Della Ceca, R., Cervera-Cortes, M., Chernov, V., Civitani, M. M., Cogollos, C., Costa, E., Cotroneo, V., Dafni, T., Derbin, A., Desch, K., Diaz-Martin, M. C., Diaz-Morcillo, A., Diez-Ibanez, D., Pardos, C. Diez, Dinter, M., Doebrich, B., Drachnev, I., Dudarev, A., Ezquerro, A., Fabiani, S., Ferrer-Ribas, E., Finelli, F., Fleck, I., Galan, J., Galanti, G., Galaverni, M., Garcia, J. A., Garcia-Barcelo, J. M., Gastaldo, L., Giannotti, M., Giganon, A., Goblin, C., Goyal, N., Gu, Y., Hagge, L., Helary, L., Hengstler, D., Heuchel, D., Hoof, S., Iglesias-Marzoa, R., Iguaz, F. J., Iniguez, C., Irastorza, I. G., Jakovcic, K., Kaefer, D., Kaminski, J., Karstensen, S., Law, M., Lindner, A., Loidl, M., Loiseau, C., Lopez-Alegre, G., Lozano-Guerrero, A., Lubsandorzhiev, B., Luzon, G., Manthos, I., Margalejo, C., Marin-Franch, A., Marques, J., Marutzky, F., Menneglier, C., Mentink, M., Mertens, S., Miralda-Escude, J., Mirallas, H., Muleri, F., Muratova, V., Navarro-Madrid, J. R., Navick, X. F., Nikolopoulos, K., Notari, A., Nozik, A., Obis, L., Ortiz-de-Solorzano, A., O'Shea, T., von Oy, J., Pareschi, G., Papaevangelou, T., Perez, K., Perez, O., Picatoste, E., Pivovaroff, M. J., Porron, J., Puyuelo, M. J., Quintana, A., Redondo, J., Reuther, D., Ringwald, A., Rodrigues, M., Rubini, A., Rueda-Teruel, S., Rueda-Teruel, F., Ruiz-Choliz, E., Ruz, J., Schaffran, J., Schiffer, T., Schmidt, S., Schneekloth, U., Schoenfeld, L., Schott, M., Segui, L., Singh, U. R., Soffitta, P., Spiga, D., Stern, M., Straniero, O., Tavecchio, F., Unzhakov, E., Ushakov, N. A., Vecchi, G., Vogel, J. K., Voronin, D. M., Ward, R., Weltman, A., Wiesinger, C., Wolf, R., Yanes-Diaz, A., Yu, Y.
BabyIAXO is the intermediate stage of the International Axion Observatory (IAXO) to be hosted at DESY. Its primary goal is the detection of solar axions following the axion helioscope technique. Axions are converted into photons in a large magnet tha
Externí odkaz:
http://arxiv.org/abs/2411.13915
This practical experience report explores Neural Machine Translation (NMT) models' capability to generate offensive security code from natural language (NL) descriptions, highlighting the significance of contextual understanding and its impact on mod
Externí odkaz:
http://arxiv.org/abs/2408.02402
Context: AI code generators are revolutionizing code writing and software development, but their training on large datasets, including potentially untrusted source code, raises security concerns. Furthermore, these generators can produce incomplete c
Externí odkaz:
http://arxiv.org/abs/2404.07548
Autor:
Cotroneo, Domenico, Liguori, Pietro
Traditional software fault injection methods, while foundational, face limitations in adequately representing real-world faults, offering customization, and requiring significant manual effort and expertise. This paper introduces a novel methodology
Externí odkaz:
http://arxiv.org/abs/2404.07491
Publikováno v:
IEEE Security & Privacy, Early Access, February 2024
Recent advances of artificial intelligence (AI) code generators are opening new opportunities in software security research, including misuse by malicious actors. We review use cases for AI code generators for security and introduce an evaluation ben
Externí odkaz:
http://arxiv.org/abs/2402.01219
Advanced Persistent Threats (APTs) represent the most threatening form of attack nowadays since they can stay undetected for a long time. Adversary emulation is a proactive approach for preparing against these attacks. However, adversary emulation to
Externí odkaz:
http://arxiv.org/abs/2311.08274
Evaluating the correctness of code generated by AI is a challenging open problem. In this paper, we propose a fully automated method, named ACCA, to evaluate the correctness of AI-generated code for security purposes. The method uses symbolic executi
Externí odkaz:
http://arxiv.org/abs/2310.18834
Autor:
Pierpaolo Falco, Naomi Krauzig, Pasquale Castagno, Angela Garzia, Riccardo Martellucci, Yuri Cotroneo, Daniela Flocco, Milena Menna, Annunziata Pirro, Elena Mauri, Francesco Memmola, Cosimo Solidoro, Massimo Pacciaroni, Giulio Notarstefano, Giorgio Budillon, Enrico Zambianchi
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-10 (2024)
Abstract The Ross Ice Shelf floats above the southern sector of the Ross Sea and creates a cavity where critical ocean-ice interactions take place. Crucial processes occurring in this cavity include the formation of Ice Shelf Water, the coldest ocean
Externí odkaz:
https://doaj.org/article/47e81de0062943eabbbe4f790c5baeb0