Skip to main content

Showing 1–9 of 9 results for author: Baldoni, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1811.05296  [pdf, other

    cs.CR cs.LG

    SAFE: Self-Attentive Function Embeddings for Binary Similarity

    Authors: Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni

    Abstract: The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc., and thus have an immediate practical impact. Current solutions compare functions by first… ▽ More

    Submitted 19 December, 2019; v1 submitted 13 November, 2018; originally announced November 2018.

    Comments: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019

  2. arXiv:1810.09683  [pdf, other

    cs.LG cs.DC

    Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks

    Authors: Roberto Baldoni, Giuseppe Antonio Di Luna, Luca Massarelli, Fabio Petroni, Leonardo Querzoni

    Abstract: In this paper we consider the binary similarity problem that consists in determining if two binary functions are similar only considering their compiled form. This problem is know to be crucial in several application scenarios, such as copyright disputes, malware analysis, vulnerability detection, etc. The current state-of-the-art solutions in this field work by creating an embedding model that ma… ▽ More

    Submitted 13 November, 2018; v1 submitted 23 October, 2018; originally announced October 2018.

  3. Survey of Machine Learning Techniques for Malware Analysis

    Authors: Daniele Ucci, Leonardo Aniello, Roberto Baldoni

    Abstract: Co** with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind such complexity, and to develop technologies to keep pace with malware evolution. This survey aims at providing an overview on the way machine learnin… ▽ More

    Submitted 26 November, 2018; v1 submitted 23 October, 2017; originally announced October 2017.

    Comments: 55 pages, 4 figures, 8 tables, added new references, corrected typos, and revised manuscript. Forthcoming in Computers & Security

  4. arXiv:1709.00875  [pdf, other

    cs.CR

    Android Malware Family Classification Based on Resource Consumption over Time

    Authors: Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni

    Abstract: The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families. Static malware analysis is known to fall short against techniques that change static characteristics of the malware (e.g. code obfuscation), while d… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: Extended Version

  5. arXiv:1704.05521  [pdf, ps, other

    cs.DC cs.CR

    Building Regular Registers with Rational Malicious Servers and Anonymous Clients -- Extended Version

    Authors: Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni

    Abstract: The paper addresses the problem of emulating a regular register in a synchronous distributed system where clients invoking ${\sf read}()$ and ${\sf write}()$ operations are anonymous while server processes maintaining the state of the register may be compromised by rational adversaries (i.e., a server might behave as \emph{rational malicious Byzantine} process). We first model our problem as a Bay… ▽ More

    Submitted 18 April, 2017; originally announced April 2017.

    Comments: Extended version of paper accepted at 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2017)

    MSC Class: 68

  6. arXiv:1610.00502  [pdf, other

    cs.SE cs.PL

    A Survey of Symbolic Execution Techniques

    Authors: Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi

    Abstract: Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software vulnerabilities may need to rule out the existence of any backdoor to bypass a program's authentication. One approach would be to test the program using different, possibly random inputs. As the backdoor may onl… ▽ More

    Submitted 2 May, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: This is the authors pre-print copy. If you are considering citing this survey, we would appreciate if you could use the following BibTeX entry: http://goo.gl/Hf5Fvc

    Journal ref: ACM Computing Surveys 51(3), 2018. BibTeX entry: http://goo.gl/Hf5Fvc

  7. arXiv:1505.03509  [pdf, other

    cs.DC

    Investigating the Cost of Anonymity on Dynamic Networks

    Authors: Giuseppe Antonio Di Luna, Roberto Baldoni

    Abstract: In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To count in such setting, it has been shown that the presence of a leader is necessary. We focus on a particularly interesting subset of dynamic net… ▽ More

    Submitted 13 May, 2015; originally announced May 2015.

  8. arXiv:1405.2992  [pdf, other

    cs.NI

    Correlating power consumption and network traffic for improving data centers resiliency

    Authors: Roberto Baldoni, Mario Caruso, Adriano Cerocchi, Claudio Ciccotelli, Luca Montanari, Luca Nicoletti

    Abstract: The deployment of business critical applications and information infrastructures are moving to the cloud. This means they are hosted in large scale data centers with other business applications and infrastructures with less (or none) mission critical constraints. This mixed and complex environment makes very challenging the process of monitoring critical applications and handling (detecting and re… ▽ More

    Submitted 12 May, 2014; originally announced May 2014.

    Comments: EDCC-2014, BIG4CIP-2014

    Report number: BIG4CIP/2014/02

  9. arXiv:cs/9910019  [pdf, ps, other

    cs.DB cs.DC

    Consistent Checkpointing in Distributed Databases: Towards a Formal Approach

    Authors: R. Baldoni, F. Quaglia, M. Raynal

    Abstract: Whether it is for audit or for recovery purposes, data checkpointing is an important problem of distributed database systems. Actually, transactions establish dependence relations on data checkpoints taken by data object managers. So, given an arbitrary set of data checkpoints (including at least a single data checkpoint from a data manager, and at most a data checkpoint from each data manager),… ▽ More

    Submitted 22 October, 1999; originally announced October 1999.

    Comments: 13 pages, 3 figures

    Report number: Rapporto di Ricerca, Dipartimento di Informatica e Sistemistica, Universita' di Roma "La Sapienza"-(Italy) n. 27-97, July 1997 ACM Class: C.2.4; H.2