Zobrazeno 1 - 10
of 110
pro vyhledávání: '"Leonardo�Querzoni"'
Publikováno v:
PeerJ Computer Science, Vol 9, p e1286 (2023)
In this article we propose the first multi-task benchmark for evaluating the performances of machine learning models that work on low level assembly functions. While the use of multi-task benchmark is a standard in the natural language processing (NL
Externí odkaz:
https://doaj.org/article/a6a9f7b9c4a64f13a4d71b43bad05f15
Publikováno v:
IEEE Access, Vol 10, Pp 54136-54148 (2022)
The correctness of debug information included in optimized binaries has been the subject of recent attention by the research community. Indeed, it represents a practically important problem, as most of the software running in production is produced b
Externí odkaz:
https://doaj.org/article/03888f50fb164e078b1b2b8c0b7c2179
Autor:
Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni
Publikováno v:
Information, Vol 11, Iss 6, p 326 (2020)
The vast majority of today’s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analysis): an
Externí odkaz:
https://doaj.org/article/18a55b3bccf34c8cb2ac7aebd58ca99e
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.
The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1c137dc51cb42d6372e502545db35635
Autor:
Claudio Di Ciccio, Massimo Mecella, Mario Caruso, Vincenzo Forte, Ettore Iacomussi, Katharina Rasch, Leonardo Querzoni, Giuseppe Santucci, Giuseppe Tino
Publikováno v:
EAI Endorsed Transactions on Ambient Systems, Vol 1, Iss 1, Pp 1-13 (2011)
Home automation represents a growing market in the industrialized world. Today’s systems are mainly based on ad hoc and proprietary solutions, with little to no interoperability and smart integration. However, in a not so distant future, our homes
Externí odkaz:
https://doaj.org/article/17f05983f6214d65969a617682744c7c
Publikováno v:
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 715-733
STARTPAGE=715;ENDPAGE=733;TITLE=CCS '21
CCS
Borrello, P, D'Elia, D C, Querzoni, L & Giuffrida, C 2021, Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization . in CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, vol. 2021, Association for Computing Machinery, pp. 715-733, 27th ACM Annual Conference on Computer and Communication Security, CCS 2021, Virtual, Online, Korea, Republic of, 15/11/21 . https://doi.org/10.1145/3460120.3484583
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
STARTPAGE=715;ENDPAGE=733;TITLE=CCS '21
CCS
Borrello, P, D'Elia, D C, Querzoni, L & Giuffrida, C 2021, Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization . in CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, vol. 2021, Association for Computing Machinery, pp. 715-733, 27th ACM Annual Conference on Computer and Communication Security, CCS 2021, Virtual, Online, Korea, Republic of, 15/11/21 . https://doi.org/10.1145/3460120.3484583
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd5f40c21a663bf59d3546aa59683456
https://research.vu.nl/en/publications/8df1370a-5797-49f1-86c8-203a6e8a3d93
https://research.vu.nl/en/publications/8df1370a-5797-49f1-86c8-203a6e8a3d93
Publikováno v:
SIGMOD Conference
Modern stream processing engines (SPEs) process large volumes of events propagated at high velocity through multiple queries. To improve performance, existing SPEs generally aim to minimize query output latency by minimizing, in turn, the propagation
Autor:
Davide Italiano, Leonardo Querzoni, Cristiano Giuffrida, Giuseppe Antonio Di Luna, Sebastian Österlund, Luca Massarelli
Publikováno v:
Di Luna, G A, Italiano, D, Massarelli, L, Österlund, S, Giuffrida, C & Querzoni, L 2021, Who's Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries . in ASPLOS 2021 : Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems . Association for Computing Machinery, pp. 1034-1045, 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2021, Virtual, Online, United States, 19/04/21 . https://doi.org/10.1145/3445814.3446695
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems
ASPLOS 2021: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 1034-1045
STARTPAGE=1034;ENDPAGE=1045;TITLE=ASPLOS 2021
ASPLOS
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems
ASPLOS 2021: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 1034-1045
STARTPAGE=1034;ENDPAGE=1045;TITLE=ASPLOS 2021
ASPLOS
Despite the advancements in software testing, bugs still plague deployed software and result in crashes in production. When debugging issues-sometimes caused by "heisenbugs"-there is the need to interpret core dumps and reproduce the issue offline on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ab5c48a1bac94fc65d1ae605cba608b5
http://www.scopus.com/inward/record.url?scp=85104751518&partnerID=8YFLogxK
http://www.scopus.com/inward/record.url?scp=85104751518&partnerID=8YFLogxK
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884178
ESORICS (1)
ESORICS (1)
Distributed execution designs challenge behavioral analyses of anti-malware solutions by spreading seemingly benign chunks of a malicious payload to multiple processes. Researchers have explored methods to chop payloads, spread chunks to victim appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dbff3ed654dfe5b63ae7badd1ba1d705
http://hdl.handle.net/11573/1582497
http://hdl.handle.net/11573/1582497