Skip to main content

Showing 1–6 of 6 results for author: Massarelli, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2011.13994  [pdf, other

    cs.SE

    Who is Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries

    Authors: Giuseppe Antonio Di Luna, Davide Italiano, Luca Massarelli, Sebastian Osterlund, Cristiano Giuffrida, Leonardo Querzoni

    Abstract: Despite the advancements in software testing, bugs still plague deployed software and result in crashes in production. When debugging issues -- sometimes caused by "heisenbugs" -- there is the need to interpret core dumps and reproduce the issue offline on the same binary deployed. This requires the entire toolchain (compiler, linker, debugger) to correctly generate and use debug information. Litt… ▽ More

    Submitted 4 December, 2020; v1 submitted 27 November, 2020; originally announced November 2020.

  2. arXiv:1912.07946  [pdf, other

    cs.LG cs.CL stat.ML

    In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks

    Authors: Fiorella Artuso, Giuseppe Antonio Di Luna, Luca Massarelli, Leonardo Querzoni

    Abstract: In this paper we investigate the problem of automatically naming pieces of assembly code. Where by naming we mean assigning to an assembly function a string of words that would likely be assigned by a human reverse engineer. We formally and precisely define the framework in which our investigation takes place. That is we define the problem, we provide reasonable justifications for the choices that… ▽ More

    Submitted 4 February, 2021; v1 submitted 17 December, 2019; originally announced December 2019.

  3. arXiv:1911.03587  [pdf, other

    cs.CL

    How Decoding Strategies Affect the Verifiability of Generated Text

    Authors: Luca Massarelli, Fabio Petroni, Aleksandra Piktus, Myle Ott, Tim Rocktäschel, Vassilis Plachouras, Fabrizio Silvestri, Sebastian Riedel

    Abstract: Recent progress in pre-trained language models led to systems that are able to generate text of an increasingly high quality. While several works have investigated the fluency and grammatical correctness of such models, it is still unclear to which extent the generated text is consistent with factual world knowledge. Here, we go beyond fluency and also investigate the verifiability of text generat… ▽ More

    Submitted 29 September, 2020; v1 submitted 8 November, 2019; originally announced November 2019.

    Comments: accepted at Findings of EMNLP 2020

  4. arXiv:1811.05296  [pdf, other

    cs.CR cs.LG

    SAFE: Self-Attentive Function Embeddings for Binary Similarity

    Authors: Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni

    Abstract: The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc., and thus have an immediate practical impact. Current solutions compare functions by first… ▽ More

    Submitted 19 December, 2019; v1 submitted 13 November, 2018; originally announced November 2018.

    Comments: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019

  5. arXiv:1810.09683  [pdf, other

    cs.LG cs.DC

    Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks

    Authors: Roberto Baldoni, Giuseppe Antonio Di Luna, Luca Massarelli, Fabio Petroni, Leonardo Querzoni

    Abstract: In this paper we consider the binary similarity problem that consists in determining if two binary functions are similar only considering their compiled form. This problem is know to be crucial in several application scenarios, such as copyright disputes, malware analysis, vulnerability detection, etc. The current state-of-the-art solutions in this field work by creating an embedding model that ma… ▽ More

    Submitted 13 November, 2018; v1 submitted 23 October, 2018; originally announced October 2018.

  6. arXiv:1709.00875  [pdf, other

    cs.CR

    Android Malware Family Classification Based on Resource Consumption over Time

    Authors: Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni

    Abstract: The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families. Static malware analysis is known to fall short against techniques that change static characteristics of the malware (e.g. code obfuscation), while d… ▽ More

    Submitted 4 September, 2017; originally announced September 2017.

    Comments: Extended Version