Skip to main content

Showing 1–12 of 12 results for author: D'Elia, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.11143  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks against Binary Similarity Systems

    Authors: Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: In recent years, binary analysis gained traction as a fundamental approach to inspect software and guarantee its security. Due to the exponential increase of devices running software, much research is now moving towards new autonomous solutions based on deep learning models, as they have been showing state-of-the-art performances in solving binary analysis problems. One of the hot topics in this c… ▽ More

    Submitted 3 November, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  2. arXiv:2301.03575  [pdf, other

    cs.IT eess.SP

    On the Coexistence of eMBB and URLLC in Multi-cell Massive MIMO

    Authors: Giovanni Interdonato, Stefano Buzzi, Carmen D'Andrea, Luca Venturino, Ciro D'Elia, Paolo Vendittelli

    Abstract: The non-orthogonal coexistence between the enhanced mobile broadband (eMBB) and the ultra-reliable low-latency communication (URLLC) in the downlink of a multi-cell massive MIMO system is rigorously analyzed in this work. We provide a unified information-theoretic framework blending an infinite-blocklength analysis of the eMBB spectral efficiency (SE) in the ergodic regime with a finite-blocklengt… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Comments: Journal paper submitted for possible publication

  3. arXiv:2211.09568  [pdf, other

    cs.PL cs.SE

    Where Did My Variable Go? Poking Holes in Incomplete Debug Information

    Authors: Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even when optimizations alter program structure extensively. A few recent endeavors have proposed effective methodologies for identifying incorrect instance… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: Full online version (includes an Appendix not in the ASPLOS proceedings)

    Journal ref: Proceedings of ASPLOS 2023 - 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems

  4. Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization

    Authors: Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida

    Abstract: In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means of constant-time programming (i.e., absence of secret-dependent code/data patterns). Unfortunately, writing constant-time code by hand is hard, as evid… ▽ More

    Submitted 14 September, 2021; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2021. Code and BibTeX entry available at https://github.com/pietroborrello/constantine

    ACM Class: D.4.6

  5. Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation

    Authors: Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia

    Abstract: Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that are appealing also for program obfuscation. We explore the popular return-oriented programming paradigm under this light, transforming program functions into ROP chains that coexist seamlessly with the surrounding software stack. We show how to build chains that can withstand popular static and dynami… ▽ More

    Submitted 6 April, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Comments: Published in the proceedings of DSN'21 (51st IEEE/IFIP Int. Conf. on Dependable Systems and Networks). Code and BibTeX entry available at https://github.com/pietroborrello/raindrop

    ACM Class: D.4.6

    Journal ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  6. arXiv:2005.00323  [pdf, other

    cs.CR cs.OS cs.SE

    Designing Robust API Monitoring Solutions

    Authors: Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro

    Abstract: Tracing the sequence of library and system calls that a program makes is very helpful in the characterization of its interactions with the surrounding environment and ultimately of its semantics. Due to entanglements of real-world software stacks, accomplishing this task can be surprisingly challenging as we take accuracy, reliability, and transparency into the equation. To manage these dimensions… ▽ More

    Submitted 11 March, 2021; v1 submitted 1 May, 2020; originally announced May 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  7. WEIZZ: Automatic Grey-box Fuzzing for Structured Binary Formats

    Authors: Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa

    Abstract: Fuzzing technologies have evolved at a fast pace in recent years, revealing bugs in programs with ever increasing depth and speed. Applications working with complex formats are however more difficult to take on, as inputs need to meet certain format-specific characteristics to get through the initial parsing stage and reach deeper behaviors of the program. Unlike prior proposals based on manually… ▽ More

    Submitted 12 August, 2020; v1 submitted 1 November, 2019; originally announced November 2019.

    Journal ref: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

  8. Energy-Efficient Power Control in Cell-Free and User-Centric Massive MIMO at Millimeter Wave

    Authors: Mario Alonzo, Stefano Buzzi, Alessio Zappone, Ciro D'Elia

    Abstract: In a cell-free massive MIMO architecture a very large number of distributed access points simultaneously and jointly serves a much smaller number of mobile stations; a variant of the cell-free technique is the user-centric approach, wherein each access point just serves a reduced set of mobile stations. This paper introduces and analyzes the cell-free and user-centric architectures at millimeter w… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Comments: To appear on the IEEE Transactions on Green Communications and Networking; originally submitted on April 24, 2018 and finally accepted for publication on March 24, 2019

    Journal ref: IEEE Transactions on Green Communications and Networking, 2019

  9. arXiv:1805.07796  [pdf, other

    cs.IT eess.SP

    Co-existence Between a Radar System and a Massive MIMO Wireless Cellular System

    Authors: Stefano Buzzi, Marco Lops, Carmen D'Andrea, Ciro D'Elia

    Abstract: In this paper we consider the uplink of a massive MIMO communication system using 5G New Radio-compliant multiple access, which is to co-exist with a radar system using the same frequency band. We propose a system model taking into account the reverberation (clutter) produced by the radar system at the massive MIMO receiver. Then, we propose several linear receivers for uplink data-detection, rang… ▽ More

    Submitted 20 May, 2018; originally announced May 2018.

    Comments: To be presented at 2018 IEEE SPAWC, Kalamata, Greece, June 2018

  10. arXiv:1708.02512  [pdf, other

    cs.PL

    On-Stack Replacement à la Carte

    Authors: Daniele Cono D'Elia, Camil Demetrescu

    Abstract: On-stack replacement (OSR) dynamically transfers execution between different code versions. This mechanism is used in mainstream runtime systems to support adaptive and speculative optimizations by running code tailored to provide the best expected performance for the actual workload. Current approaches either restrict the program points where OSR can be fired or require complex optimization-speci… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

  11. arXiv:1610.00502  [pdf, other

    cs.SE cs.PL

    A Survey of Symbolic Execution Techniques

    Authors: Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi

    Abstract: Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software vulnerabilities may need to rule out the existence of any backdoor to bypass a program's authentication. One approach would be to test the program using different, possibly random inputs. As the backdoor may onl… ▽ More

    Submitted 2 May, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: This is the authors pre-print copy. If you are considering citing this survey, we would appreciate if you could use the following BibTeX entry: http://goo.gl/Hf5Fvc

    Journal ref: ACM Computing Surveys 51(3), 2018. BibTeX entry: http://goo.gl/Hf5Fvc

  12. arXiv:1304.5197  [pdf, ps, other

    cs.PL cs.PF

    Ball-Larus Path Profiling Across Multiple Loop iterations

    Authors: Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi

    Abstract: Identifying the hottest paths in the control flow graph of a routine can direct optimizations to portions of the code where most resources are consumed. This powerful methodology, called path profiling, was introduced by Ball and Larus in the mid 90s and has received considerable attention in the last 15 years for its practical relevance. A shortcoming of Ball-Larus path profiling was the inabilit… ▽ More

    Submitted 18 April, 2013; originally announced April 2013.

    Comments: 13 pages, 14 figures

    ACM Class: C.4; D.2.2; D.2.5