Skip to main content

Showing 1–28 of 28 results for author: Di Luna, G A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.15132  [pdf, other

    cs.DC

    Black Hole Search by a Set of Scattered Agents in Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro

    Abstract: In this paper we investigate the problem of searching for a black hole in a dynamic graph by a set of scattered agents (i.e., the agents start from arbitrary locations of the graph). The black hole is a node that silently destroys any agent visiting it. This kind of malicious node nicely models network failures such as a crashed host or a virus that erases the visiting agents. The black hole searc… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2005.07453

  2. arXiv:2303.11143  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks against Binary Similarity Systems

    Authors: Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: In recent years, binary analysis gained traction as a fundamental approach to inspect software and guarantee its security. Due to the exponential increase of devices running software, much research is now moving towards new autonomous solutions based on deep learning models, as they have been showing state-of-the-art performances in solving binary analysis problems. One of the hot topics in this c… ▽ More

    Submitted 3 November, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  3. arXiv:2301.07849  [pdf, other

    cs.DC cs.DM

    Efficient Computation in Congested Anonymous Dynamic Networks

    Authors: Giuseppe A. Di Luna, Giovanni Viglietta

    Abstract: An anonymous dynamic network is a network of indistinguishable processes whose communication links may appear or disappear unpredictably over time. Previous research has shown that deterministically computing an arbitrary function of a multiset of input values given to these processes takes only a linear number of communication rounds (Di Luna-Viglietta, FOCS 2022). However, fast algorithms for… ▽ More

    Submitted 29 June, 2024; v1 submitted 18 January, 2023; originally announced January 2023.

    Comments: 26 pages, 2 figures

  4. arXiv:2211.09568  [pdf, other

    cs.PL cs.SE

    Where Did My Variable Go? Poking Holes in Incomplete Debug Information

    Authors: Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even when optimizations alter program structure extensively. A few recent endeavors have proposed effective methodologies for identifying incorrect instance… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: Full online version (includes an Appendix not in the ASPLOS proceedings)

    Journal ref: Proceedings of ASPLOS 2023 - 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems

  5. arXiv:2208.06692  [pdf, other

    cs.CR cs.LG

    BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer

    Authors: Fiorella Artuso, Marco Mormando, Giuseppe A. Di Luna, Leonardo Querzoni

    Abstract: A recent trend in binary code analysis promotes the use of neural solutions based on instruction embedding models. An instruction embedding model is a neural network that transforms sequences of assembly instructions into embedding vectors. If the embedding network is trained such that the translation from code to vectors partially preserves the semantic, the network effectively represents an asse… ▽ More

    Submitted 13 August, 2022; originally announced August 2022.

  6. arXiv:2207.08061  [pdf, other

    cs.DC cs.DM

    Optimal Computation in Anonymous Dynamic Networks

    Authors: Giuseppe A. Di Luna, Giovanni Viglietta

    Abstract: We give a simple characterization of which functions can be computed deterministically by anonymous processes in dynamic networks, depending on the number of leaders in the network. In addition, we provide efficient distributed algorithms for computing all such functions assuming minimal or no knowledge about the network. Each of our algorithms comes in two versions: one that terminates with the c… ▽ More

    Submitted 5 April, 2024; v1 submitted 16 July, 2022; originally announced July 2022.

    Comments: 50 pages, 10 figures

  7. arXiv:2204.02128  [pdf, other

    cs.DC cs.DM cs.DS

    Computing in Anonymous Dynamic Networks Is Linear

    Authors: Giuseppe A. Di Luna, Giovanni Viglietta

    Abstract: We give the first linear-time counting algorithm for processes in anonymous 1-interval-connected dynamic networks with a leader. As a byproduct, we are able to compute in $3n$ rounds every function that is deterministically computable in such networks. If explicit termination is not required, the running time improves to $2n$ rounds, which we show to be optimal up to a small additive constant (thi… ▽ More

    Submitted 20 February, 2024; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: 34 pages, 8 figures

  8. arXiv:2011.13994  [pdf, other

    cs.SE

    Who is Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries

    Authors: Giuseppe Antonio Di Luna, Davide Italiano, Luca Massarelli, Sebastian Osterlund, Cristiano Giuffrida, Leonardo Querzoni

    Abstract: Despite the advancements in software testing, bugs still plague deployed software and result in crashes in production. When debugging issues -- sometimes caused by "heisenbugs" -- there is the need to interpret core dumps and reproduce the issue offline on the same binary deployed. This requires the entire toolchain (compiler, linker, debugger) to correctly generate and use debug information. Litt… ▽ More

    Submitted 4 December, 2020; v1 submitted 27 November, 2020; originally announced November 2020.

  9. arXiv:2005.07917  [pdf, other

    cs.DC cs.CG cs.RO

    Gathering on a Circle with Limited Visibility by Anonymous Oblivious Robots

    Authors: Giuseppe A. Di Luna, Ryuhei Uehara, Giovanni Viglietta, Yukiko Yamauchi

    Abstract: A swarm of anonymous oblivious mobile robots, operating in deterministic Look-Compute-Move cycles, is confined within a circular track. All robots agree on the clockwise direction (chirality), they are activated by an adversarial semi-synchronous scheduler (SSYNCH), and an active robot always reaches the destination point it computes (rigidity). Robots have limited visibility: each robot can see o… ▽ More

    Submitted 28 September, 2023; v1 submitted 16 May, 2020; originally announced May 2020.

    Comments: 33 pages, 9 figures

  10. arXiv:2005.07453  [pdf, other

    cs.DC

    Tight Bounds for Black Hole Search in Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro

    Abstract: In this paper, we start the investigation of distributed computing by mobile agents in dangerous dynamic networks. The danger is posed by the presence in the network of a black hole BH, a harmful site that destroys all incoming agents without leaving any trace. The problem of determining the location of the black hole in a network, known as black hole search BHS, has been extensively studied in th… ▽ More

    Submitted 1 August, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

  11. arXiv:2002.03384  [pdf, other

    cs.DC

    Mobile RAM and Shape Formation by Programmable Particles

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Yukiko Yamauchi

    Abstract: We investigate computational issues in the distributed model Amoebots of programmable matter. In this model, the computational entities, called particles, are anonymous finite-state machines that operate and move on an hexagonal tasselation of the plane. In this paper we show how a constant number of such weak particles can simulate a powerful Turing-complete entity that is able to move on the pla… ▽ More

    Submitted 29 May, 2020; v1 submitted 9 February, 2020; originally announced February 2020.

  12. arXiv:2001.02670  [pdf, other

    cs.DC

    Synchronous Byzantine Lattice Agreement in ${\cal O}(\log (f))$ Rounds

    Authors: Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Silvia Bonomi, Leonardo Querzoni

    Abstract: In the Lattice Agreement (LA) problem, originally proposed by Attiya et al. \cite{Attiya:1995}, a set of processes has to decide on a chain of a lattice. More precisely, each correct process proposes an element $e$ of a certain join-semi lattice $L$ and it has to decide on a value that contains $e$. Moreover, any pair $p_i,p_j$ of correct processes has to decide two values $dec_i$ and $dec_j$ that… ▽ More

    Submitted 13 January, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

  13. arXiv:1912.07946  [pdf, other

    cs.LG cs.CL stat.ML

    In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks

    Authors: Fiorella Artuso, Giuseppe Antonio Di Luna, Luca Massarelli, Leonardo Querzoni

    Abstract: In this paper we investigate the problem of automatically naming pieces of assembly code. Where by naming we mean assigning to an assembly function a string of words that would likely be assigned by a human reverse engineer. We formally and precisely define the framework in which our investigation takes place. That is we define the problem, we provide reasonable justifications for the choices that… ▽ More

    Submitted 4 February, 2021; v1 submitted 17 December, 2019; originally announced December 2019.

  14. arXiv:1911.05239  [pdf, other

    cs.DC cs.RO

    Oblivious Permutations on the Plane

    Authors: Shantanu Das, Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Masafumi Yamashita

    Abstract: We consider a distributed system of n identical mobile robots operating in the two dimensional Euclidian plane. As in the previous studies, we consider the robots to be anonymous, oblivious, dis-oriented, and without any communication capabilities, operating based on the Look-Compute-Move model where the next location of a robot depends only on its view of the current configuration. Even in this s… ▽ More

    Submitted 12 November, 2019; originally announced November 2019.

    Comments: This is the full version of the article with the same title published at OPODIS 2019

  15. arXiv:1910.05768  [pdf, other

    cs.DC

    Byzantine Generalized Lattice Agreement

    Authors: Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Leonardo Querzoni

    Abstract: The paper investigates the Lattice Agreement (LA) problem in asynchronous systems. In LA each process proposes an element $e$ from a predetermined lattice, and has to decide on an element $e'$ of the lattice such that $e \leq e'$. Moreover, decisions of different processes have to be comparable (no two processes can decide two elements $e$ and $e'$ such that… ▽ More

    Submitted 13 February, 2020; v1 submitted 13 October, 2019; originally announced October 2019.

  16. arXiv:1811.05296  [pdf, other

    cs.CR cs.LG

    SAFE: Self-Attentive Function Embeddings for Binary Similarity

    Authors: Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni

    Abstract: The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc., and thus have an immediate practical impact. Current solutions compare functions by first… ▽ More

    Submitted 19 December, 2019; v1 submitted 13 November, 2018; originally announced November 2018.

    Comments: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019

  17. arXiv:1810.09683  [pdf, other

    cs.LG cs.DC

    Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks

    Authors: Roberto Baldoni, Giuseppe Antonio Di Luna, Luca Massarelli, Fabio Petroni, Leonardo Querzoni

    Abstract: In this paper we consider the binary similarity problem that consists in determining if two binary functions are similar only considering their compiled form. This problem is know to be crucial in several application scenarios, such as copyright disputes, malware analysis, vulnerability detection, etc. The current state-of-the-art solutions in this field work by creating an embedding model that ma… ▽ More

    Submitted 13 November, 2018; v1 submitted 23 October, 2018; originally announced October 2018.

  18. arXiv:1808.04349  [pdf, other

    cs.DC

    Patrolling on Dynamic Ring Networks

    Authors: Shantanu Das, Giuseppe Antonio Di Luna, Leszek A. Gasieniec

    Abstract: We study the problem of patrolling the nodes of a network collaboratively by a team of mobile agents, such that each node of the network is visited by at least one agent once in every $I(n)$ time units, with the objective of minimizing the idle time $I(n)$. While patrolling has been studied previously for static networks, we investigate the problem on dynamic networks with a fixed set of nodes, bu… ▽ More

    Submitted 13 August, 2018; originally announced August 2018.

  19. arXiv:1709.08800  [pdf, other

    cs.DC cs.CG cs.RO

    TuringMobile: A Turing Machine of Oblivious Mobile Robots with Limited Visibility and its Applications

    Authors: Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta

    Abstract: In this paper we investigate the computational power of a set of mobile robots with limited visibility. At each iteration, a robot takes a snapshot of its surroundings, uses the snapshot to compute a destination point, and it moves toward its destination. Each robot is punctiform and memoryless, it operates in $\mathbb{R}^m$, it has a local reference system independent of the other robots' ones, a… ▽ More

    Submitted 6 August, 2018; v1 submitted 25 September, 2017; originally announced September 2017.

    Comments: 27 pages, 9 figures

  20. arXiv:1705.03538  [pdf, other

    cs.DC cs.RO

    Shape Formation by Programmable Particles

    Authors: Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Yukiko Yamauchi

    Abstract: Shape formation is a basic distributed problem for systems of computational mobile entities. Intensively studied for systems of autonomous mobile robots, it has recently been investigated in the realm of programmable matter. Namely, it has been studied in the geometric Amoebot model, where the anonymous entities, called particles, operate on a hexagonal tessellation of the plane and have limited c… ▽ More

    Submitted 9 September, 2017; v1 submitted 9 May, 2017; originally announced May 2017.

    Comments: 71 pages, 9 figures

  21. arXiv:1705.00324  [pdf, other

    cs.DC cs.CG cs.RO

    Meeting in a Polygon by Anonymous Oblivious Robots

    Authors: Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Masafumi Yamashita

    Abstract: The Meeting problem for $k\geq 2$ searchers in a polygon $P$ (possibly with holes) consists in making the searchers move within $P$, according to a distributed algorithm, in such a way that at least two of them eventually come to see each other, regardless of their initial positions. The polygon is initially unknown to the searchers, and its edges obstruct both movement and vision. Depending on th… ▽ More

    Submitted 6 July, 2019; v1 submitted 30 April, 2017; originally announced May 2017.

    Comments: 37 pages, 9 figures

  22. arXiv:1704.02427  [pdf, other

    cs.DC

    Gathering in Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Linda Pagli, Giuseppe Prencipe, Nicola Santoro, Giovanni Viglietta

    Abstract: The gathering problem requires a set of mobile agents, arbitrarily positioned at different nodes of a network to group within finite time at the same location, not fixed in advanced. The extensive existing literature on this problem shares the same fundamental assumption: the topological structure does not change during the rendezvous or the gathering; this is true also for those investigations… ▽ More

    Submitted 11 April, 2017; v1 submitted 7 April, 2017; originally announced April 2017.

  23. arXiv:1611.06864  [pdf, other

    cs.DC

    Population Protocols with Faulty Interactions: the Impact of a Leader

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta

    Abstract: We consider the problem of simulating traditional population protocols under weaker models of communication, which include one-way interactions (as opposed to two-way interactions) and omission faults (i.e., failure by an agent to read its partner's state during an interaction), which in turn may be detectable or undetectable. We focus on the impact of a leader, and we give a complete characteriza… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

  24. arXiv:1610.09435  [pdf, other

    cs.DC

    On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta

    Abstract: In this paper we investigate the computational power of Population Protocols (PP) under some unreliable and/or weaker interaction models. More precisely, we focus on two features related to the power of interactions: omission failures and one-way communications. An omission failure, a notion that this paper introduces for the first time in the context of PP, is the loss by one or both parties of t… ▽ More

    Submitted 1 November, 2016; v1 submitted 28 October, 2016; originally announced October 2016.

  25. arXiv:1512.05306  [pdf, other

    cs.DC

    Live Exploration of Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Stefan Dobrev, Paola Flocchini, Nicola Santoro

    Abstract: In the graph exploration problem, a team of mobile computational entities, called agents, arbitrarily positioned at some nodes of a graph, must cooperate so that each node is eventually visited by at least one agent. In the literature, the main focus has been on graphs that are static; that is, the topology is either invariant in time or subject to localized changes. The few studies on exploration… ▽ More

    Submitted 18 May, 2018; v1 submitted 16 December, 2015; originally announced December 2015.

  26. arXiv:1505.03509  [pdf, other

    cs.DC

    Investigating the Cost of Anonymity on Dynamic Networks

    Authors: Giuseppe Antonio Di Luna, Roberto Baldoni

    Abstract: In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To count in such setting, it has been shown that the presence of a leader is necessary. We focus on a particularly interesting subset of dynamic net… ▽ More

    Submitted 13 May, 2015; originally announced May 2015.

  27. arXiv:1503.04347  [pdf, other

    cs.DC cs.CG cs.RO

    Mutual Visibility by Luminous Robots Without Collisions

    Authors: G. A. Di Luna, P. Flocchini, S. Gan Chaudhuri, F. Poloni, N. Santoro, G. Viglietta

    Abstract: Consider a finite set of identical computational entities that can move freely in the Euclidean plane operating in Look-Compute-Move cycles. Let p(t) denote the location of entity p at time t; entity p can see entity q at time t if at that time no other entity lies in the line segment p(t)q(t). We consider the basic problem called Mutual Visibility: starting from arbitrary distinct locations, with… ▽ More

    Submitted 1 July, 2015; v1 submitted 14 March, 2015; originally announced March 2015.

    Comments: 60 pages, 15 figures

  28. arXiv:1405.2430  [pdf, other

    cs.DC cs.RO

    Robots with Lights: Overcoming Obstructed Visibility Without Colliding

    Authors: G. A. Di Luna, P. Flocchini, S. Gan Chaudhuri, N. Santoro, G. Viglietta

    Abstract: Robots with lights is a model of autonomous mobile computational entities operating in the plane in Look-Compute-Move cycles: each agent has an externally visible light which can assume colors from a fixed set; the lights are persistent (i.e., the color is not erased at the end of a cycle), but otherwise the agents are oblivious. The investigation of computability in this model, initially suggeste… ▽ More

    Submitted 10 May, 2014; originally announced May 2014.