Skip to main content

Showing 1–3 of 3 results for author: Barresi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12901  [pdf, other

    physics.ins-det cs.LG hep-ex physics.data-an

    Interpretable machine learning approach for electron antineutrino selection in a large liquid scintillator detector

    Authors: A. Gavrikov, V. Cerrone, A. Serafini, R. Brugnera, A. Garfagnini, M. Grassi, B. Jelmini, L. Lastrucci, S. Aiello, G. Andronico, V. Antonelli, A. Barresi, D. Basilico, M. Beretta, A. Bergnoli, M. Borghesi, A. Brigatti, R. Bruno, A. Budano, B. Caccianiga, A. Cammi, R. Caruso, D. Chiesa, C. Clementi, S. Dusini , et al. (43 additional authors not shown)

    Abstract: Several neutrino detectors, KamLAND, Daya Bay, Double Chooz, RENO, and the forthcoming large-scale JUNO, rely on liquid scintillator to detect reactor antineutrino interactions. In this context, inverse beta decay represents the golden channel for antineutrino detection, providing a pair of correlated events, thus a strong experimental signature to distinguish the signal from a variety of backgrou… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  2. arXiv:1901.05674  [pdf, other

    cs.CR

    Easy to Fool? Testing the Anti-evasion Capabilities of PDF Malware Scanners

    Authors: Saeed Ehteshamifar, Antonio Barresi, Thomas R. Gross, Michael Pradel

    Abstract: Malware scanners try to protect users from opening malicious documents by statically or dynamically analyzing documents. However, malware developers may apply evasions that conceal the maliciousness of a document. Given the variety of existing evasions, systematically assessing the impact of evasions on malware scanners remains an open challenge. This paper presents a novel methodology for testing… ▽ More

    Submitted 22 January, 2019; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: 14 pages, 8 figures

  3. Lockdown: Dynamic Control-Flow Integrity

    Authors: Mathias Payer, Antonio Barresi, Thomas R. Gross

    Abstract: Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers gain code execution capabilities through such applications despite all currently deployed defenses by exploiting memory corruption vulnerabilities. Control-Flow Integrity (CFI) is a promising defense mechanism that restricts open control-flow transfers to a static set of w… ▽ More

    Submitted 2 July, 2014; originally announced July 2014.

    Comments: ETH Technical Report