Skip to main content

Showing 1–6 of 6 results for author: Ginesin, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.10908  [pdf, ps, other

    cs.LG cs.MS cs.PL

    The State of Julia for Scientific Machine Learning

    Authors: Edward Berman, Jacob Ginesin

    Abstract: Julia has been heralded as a potential successor to Python for scientific machine learning and numerical computing, boasting ergonomic and performance improvements. Since Julia's inception in 2012 and declaration of language goals in 2017, its ecosystem and language-level features have grown tremendously. In this paper, we take a modern look at Julia's features and ecosystem, assess the current st… ▽ More

    Submitted 20 December, 2024; v1 submitted 13 October, 2024; originally announced October 2024.

    Comments: Presented at the 2024 NeurIPS Machine Learning and the Physical Sciences Workshop

  2. arXiv:2408.12743  [pdf, ps, other

    cs.CR

    The Matrix Reloaded: A Mechanized Formal Analysis of the Matrix Cryptographic Suite

    Authors: Jacob Ginesin, Cristina Nita-Rotaru

    Abstract: Secure instant group messaging applications such as WhatsApp, Facebook Messenger, Matrix, and the Signal Application have become ubiquitous in today's internet, cumulatively serving billions of users. Unlike WhatsApp, for example, Matrix can be deployed in a federated manner, allowing users to choose which server manages their chats. To account for this difference in architecture, Matrix employs t… ▽ More

    Submitted 7 December, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

    Comments: 16 pages, 6 figures

    ACM Class: C.2.2; E.3

  3. arXiv:2403.05663  [pdf, other

    cs.CR

    A Formal Analysis of SCTP: Attack Synthesis and Patch Verification

    Authors: Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tüxen

    Abstract: SCTP is a transport protocol offering features such as multi-homing, multi-streaming, and message-oriented delivery. Its two main implementations were subjected to conformance tests using the PacketDrill tool. Conformance testing is not exhaustive and a recent vulnerability (CVE-2021-3772) showed SCTP is not immune to attacks. Changes addressing the vulnerability were implemented, but the question… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  4. arXiv:2312.12450  [pdf, other

    cs.SE cs.AI cs.LG cs.PL

    Can It Edit? Evaluating the Ability of Large Language Models to Follow Code Editing Instructions

    Authors: Federico Cassano, Luisa Li, Akul Sethi, Noah Shinn, Abby Brennan-Jones, Jacob Ginesin, Edward Berman, George Chakhnashvili, Anton Lozhkov, Carolyn Jane Anderson, Arjun Guha

    Abstract: A significant amount of research is focused on developing and evaluating large language models for a variety of code synthesis tasks. These include synthesizing code from natural language, synthesizing tests from code, and synthesizing explanations of code. In contrast, the behavior of instructional code editing with LLMs is understudied. These are tasks in which the model is provided a block of c… ▽ More

    Submitted 23 September, 2024; v1 submitted 10 December, 2023; originally announced December 2023.

  5. Understanding DNS Query Composition at B-Root

    Authors: Jacob Ginesin, Jelena Mirkovic

    Abstract: The Domain Name System (DNS) is part of critical internet infrastructure, as DNS is invoked whenever a remote server is accessed (an URL is visited, an API request is made, etc.) by any application. DNS queries are served in hierarchical manner, with most queries served locally from cached data, and a small fraction propagating to the top of the hierarchy - DNS root name servers. Our research aims… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: 20 pages with 18 figures and 1 table. Published and presented at the 2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)

    ACM Class: C.2.2

  6. arXiv:2305.06092  [pdf, ps, other

    cs.CR cs.PL

    SafeLLVM: LLVM Without The ROP Gadgets!

    Authors: Federico Cassano, Charles Bershatsky, Jacob Ginesin, Sasha Bashenko

    Abstract: Memory safety is a cornerstone of secure and robust software systems, as it prevents a wide range of vulnerabilities and exploitation techniques. Among these, we focus on Return-Oriented Programming (ROP). ROP works as such: the attacker takes control of the program's execution flow via a memory corruption attack, then takes advantages of code snippets already in the program's memory, dubbed "gadg… ▽ More

    Submitted 1 November, 2023; v1 submitted 10 May, 2023; originally announced May 2023.