Skip to main content

Showing 1–14 of 14 results for author: Querzoni, L

Searching in archive cs. Search in all archives.
.
  1. A Systematization of Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector

    Authors: Maria Patrizia Carello, Alberto Marchetti Spaccamela, Leonardo Querzoni, Marco Angelini

    Abstract: The growing adoption of IT solutions in the healthcare sector is leading to a steady increase in the number of cybersecurity incidents. As a result, organizations worldwide have introduced regulations, standards, and best practices to address cybersecurity and data protection issues in this sector. However, the application of this large corpus of documents presents operational difficulties, and op… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: 14 pages

    ACM Class: K.6.5; K.5

    Journal ref: Proceedings of IEEE ISI 2023 - 20th Annual IEEE International Conference on Intelligence and Security Informatics (ISI)

  2. arXiv:2303.11143  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks against Binary Similarity Systems

    Authors: Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: In recent years, binary analysis gained traction as a fundamental approach to inspect software and guarantee its security. Due to the exponential increase of devices running software, much research is now moving towards new autonomous solutions based on deep learning models, as they have been showing state-of-the-art performances in solving binary analysis problems. One of the hot topics in this c… ▽ More

    Submitted 3 November, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  3. arXiv:2211.09568  [pdf, other

    cs.PL cs.SE

    Where Did My Variable Go? Poking Holes in Incomplete Debug Information

    Authors: Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even when optimizations alter program structure extensively. A few recent endeavors have proposed effective methodologies for identifying incorrect instance… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: Full online version (includes an Appendix not in the ASPLOS proceedings)

    Journal ref: Proceedings of ASPLOS 2023 - 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems

  4. arXiv:2208.06692  [pdf, other

    cs.CR cs.LG

    BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer

    Authors: Fiorella Artuso, Marco Mormando, Giuseppe A. Di Luna, Leonardo Querzoni

    Abstract: A recent trend in binary code analysis promotes the use of neural solutions based on instruction embedding models. An instruction embedding model is a neural network that transforms sequences of assembly instructions into embedding vectors. If the embedding network is trained such that the translation from code to vectors partially preserves the semantic, the network effectively represents an asse… ▽ More

    Submitted 13 August, 2022; originally announced August 2022.

  5. Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization

    Authors: Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida

    Abstract: In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means of constant-time programming (i.e., absence of secret-dependent code/data patterns). Unfortunately, writing constant-time code by hand is hard, as evid… ▽ More

    Submitted 14 September, 2021; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2021. Code and BibTeX entry available at https://github.com/pietroborrello/constantine

    ACM Class: D.4.6

  6. arXiv:2011.13994  [pdf, other

    cs.SE

    Who is Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries

    Authors: Giuseppe Antonio Di Luna, Davide Italiano, Luca Massarelli, Sebastian Osterlund, Cristiano Giuffrida, Leonardo Querzoni

    Abstract: Despite the advancements in software testing, bugs still plague deployed software and result in crashes in production. When debugging issues -- sometimes caused by "heisenbugs" -- there is the need to interpret core dumps and reproduce the issue offline on the same binary deployed. This requires the entire toolchain (compiler, linker, debugger) to correctly generate and use debug information. Litt… ▽ More

    Submitted 4 December, 2020; v1 submitted 27 November, 2020; originally announced November 2020.

  7. arXiv:2001.02670  [pdf, other

    cs.DC

    Synchronous Byzantine Lattice Agreement in ${\cal O}(\log (f))$ Rounds

    Authors: Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Silvia Bonomi, Leonardo Querzoni

    Abstract: In the Lattice Agreement (LA) problem, originally proposed by Attiya et al. \cite{Attiya:1995}, a set of processes has to decide on a chain of a lattice. More precisely, each correct process proposes an element $e$ of a certain join-semi lattice $L$ and it has to decide on a value that contains $e$. Moreover, any pair $p_i,p_j$ of correct processes has to decide two values $dec_i$ and $dec_j$ that… ▽ More

    Submitted 13 January, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

  8. arXiv:1912.07946  [pdf, other

    cs.LG cs.CL stat.ML

    In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks

    Authors: Fiorella Artuso, Giuseppe Antonio Di Luna, Luca Massarelli, Leonardo Querzoni

    Abstract: In this paper we investigate the problem of automatically naming pieces of assembly code. Where by naming we mean assigning to an assembly function a string of words that would likely be assigned by a human reverse engineer. We formally and precisely define the framework in which our investigation takes place. That is we define the problem, we provide reasonable justifications for the choices that… ▽ More

    Submitted 4 February, 2021; v1 submitted 17 December, 2019; originally announced December 2019.

  9. arXiv:1910.05768  [pdf, other

    cs.DC

    Byzantine Generalized Lattice Agreement

    Authors: Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Leonardo Querzoni

    Abstract: The paper investigates the Lattice Agreement (LA) problem in asynchronous systems. In LA each process proposes an element $e$ from a predetermined lattice, and has to decide on an element $e'$ of the lattice such that $e \leq e'$. Moreover, decisions of different processes have to be comparable (no two processes can decide two elements $e$ and $e'$ such that… ▽ More

    Submitted 13 February, 2020; v1 submitted 13 October, 2019; originally announced October 2019.

  10. arXiv:1901.04434  [pdf, other

    cs.CR

    Peel the onion: Recognition of Android apps behind the Tor Network

    Authors: Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni

    Abstract: In this work we show that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. For this purpose, we describe a general methodology for performing an attack that allows to deanonymize the apps running on a target smartphone using Tor, which is the victim of the attack. Then, we discuss a Proof-of-Concept, implementing the methodology, that shows how… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

  11. arXiv:1811.05296  [pdf, other

    cs.CR cs.LG

    SAFE: Self-Attentive Function Embeddings for Binary Similarity

    Authors: Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni

    Abstract: The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc., and thus have an immediate practical impact. Current solutions compare functions by first… ▽ More

    Submitted 19 December, 2019; v1 submitted 13 November, 2018; originally announced November 2018.

    Comments: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019

  12. arXiv:1810.09683  [pdf, other

    cs.LG cs.DC

    Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks

    Authors: Roberto Baldoni, Giuseppe Antonio Di Luna, Luca Massarelli, Fabio Petroni, Leonardo Querzoni

    Abstract: In this paper we consider the binary similarity problem that consists in determining if two binary functions are similar only considering their compiled form. This problem is know to be crucial in several application scenarios, such as copyright disputes, malware analysis, vulnerability detection, etc. The current state-of-the-art solutions in this field work by creating an embedding model that ma… ▽ More

    Submitted 13 November, 2018; v1 submitted 23 October, 2018; originally announced October 2018.

  13. arXiv:1709.00875  [pdf, other

    cs.CR

    Android Malware Family Classification Based on Resource Consumption over Time

    Authors: Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni

    Abstract: The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families. Static malware analysis is known to fall short against techniques that change static characteristics of the malware (e.g. code obfuscation), while d… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: Extended Version

  14. arXiv:1405.0325  [pdf, other

    cs.SE

    Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities

    Authors: L. Aniello, A. Bondavalli, A. Ceccarelli, C. Ciccotelli, M. Cinque, F. Frattini, A. Guzzo, A. Pecchia, A. Pugliese, L. Querzoni, S. Russo

    Abstract: Critical Infrastructures (CIs), such as smart power grids, transport systems, and financial infrastructures, are more and more vulnerable to cyber threats, due to the adoption of commodity computing facilities. Despite the use of several monitoring tools, recent attacks have proven that current defensive mechanisms for CIs are not effective enough against most advanced threats. In this paper we ex… ▽ More

    Submitted 7 May, 2014; v1 submitted 1 May, 2014; originally announced May 2014.

    Comments: EDCC-2014, BIG4CIP-2014