Skip to main content

Showing 1–9 of 9 results for author: D'Elia, D C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.11143  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks against Binary Similarity Systems

    Authors: Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: In recent years, binary analysis gained traction as a fundamental approach to inspect software and guarantee its security. Due to the exponential increase of devices running software, much research is now moving towards new autonomous solutions based on deep learning models, as they have been showing state-of-the-art performances in solving binary analysis problems. One of the hot topics in this c… ▽ More

    Submitted 3 November, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  2. arXiv:2211.09568  [pdf, other

    cs.PL cs.SE

    Where Did My Variable Go? Poking Holes in Incomplete Debug Information

    Authors: Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even when optimizations alter program structure extensively. A few recent endeavors have proposed effective methodologies for identifying incorrect instance… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: Full online version (includes an Appendix not in the ASPLOS proceedings)

    Journal ref: Proceedings of ASPLOS 2023 - 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems

  3. Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization

    Authors: Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida

    Abstract: In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means of constant-time programming (i.e., absence of secret-dependent code/data patterns). Unfortunately, writing constant-time code by hand is hard, as evid… ▽ More

    Submitted 14 September, 2021; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2021. Code and BibTeX entry available at https://github.com/pietroborrello/constantine

    ACM Class: D.4.6

  4. Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation

    Authors: Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia

    Abstract: Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that are appealing also for program obfuscation. We explore the popular return-oriented programming paradigm under this light, transforming program functions into ROP chains that coexist seamlessly with the surrounding software stack. We show how to build chains that can withstand popular static and dynami… ▽ More

    Submitted 6 April, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Comments: Published in the proceedings of DSN'21 (51st IEEE/IFIP Int. Conf. on Dependable Systems and Networks). Code and BibTeX entry available at https://github.com/pietroborrello/raindrop

    ACM Class: D.4.6

    Journal ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  5. arXiv:2005.00323  [pdf, other

    cs.CR cs.OS cs.SE

    Designing Robust API Monitoring Solutions

    Authors: Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro

    Abstract: Tracing the sequence of library and system calls that a program makes is very helpful in the characterization of its interactions with the surrounding environment and ultimately of its semantics. Due to entanglements of real-world software stacks, accomplishing this task can be surprisingly challenging as we take accuracy, reliability, and transparency into the equation. To manage these dimensions… ▽ More

    Submitted 11 March, 2021; v1 submitted 1 May, 2020; originally announced May 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  6. WEIZZ: Automatic Grey-box Fuzzing for Structured Binary Formats

    Authors: Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa

    Abstract: Fuzzing technologies have evolved at a fast pace in recent years, revealing bugs in programs with ever increasing depth and speed. Applications working with complex formats are however more difficult to take on, as inputs need to meet certain format-specific characteristics to get through the initial parsing stage and reach deeper behaviors of the program. Unlike prior proposals based on manually… ▽ More

    Submitted 12 August, 2020; v1 submitted 1 November, 2019; originally announced November 2019.

    Journal ref: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

  7. arXiv:1708.02512  [pdf, other

    cs.PL

    On-Stack Replacement à la Carte

    Authors: Daniele Cono D'Elia, Camil Demetrescu

    Abstract: On-stack replacement (OSR) dynamically transfers execution between different code versions. This mechanism is used in mainstream runtime systems to support adaptive and speculative optimizations by running code tailored to provide the best expected performance for the actual workload. Current approaches either restrict the program points where OSR can be fired or require complex optimization-speci… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

  8. arXiv:1610.00502  [pdf, other

    cs.SE cs.PL

    A Survey of Symbolic Execution Techniques

    Authors: Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi

    Abstract: Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software vulnerabilities may need to rule out the existence of any backdoor to bypass a program's authentication. One approach would be to test the program using different, possibly random inputs. As the backdoor may onl… ▽ More

    Submitted 2 May, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: This is the authors pre-print copy. If you are considering citing this survey, we would appreciate if you could use the following BibTeX entry: http://goo.gl/Hf5Fvc

    Journal ref: ACM Computing Surveys 51(3), 2018. BibTeX entry: http://goo.gl/Hf5Fvc

  9. arXiv:1304.5197  [pdf, ps, other

    cs.PL cs.PF

    Ball-Larus Path Profiling Across Multiple Loop iterations

    Authors: Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi

    Abstract: Identifying the hottest paths in the control flow graph of a routine can direct optimizations to portions of the code where most resources are consumed. This powerful methodology, called path profiling, was introduced by Ball and Larus in the mid 90s and has received considerable attention in the last 15 years for its practical relevance. A shortcoming of Ball-Larus path profiling was the inabilit… ▽ More

    Submitted 18 April, 2013; originally announced April 2013.

    Comments: 13 pages, 14 figures

    ACM Class: C.4; D.2.2; D.2.5