Search Results for author: Leonardo Querzoni

Found 6 papers, 3 papers with code

Adversarial Attacks against Binary Similarity Systems

no code implementations20 Mar 2023 Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

In recent years, binary analysis gained traction as a fundamental approach to inspect software and guarantee its security.

BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer

no code implementations13 Aug 2022 Fiorella Artuso, Marco Mormando, Giuseppe A. Di Luna, Leonardo Querzoni

An instruction embedding model is a neural network that transforms sequences of assembly instructions into embedding vectors.

General Knowledge

In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks

1 code implementation17 Dec 2019 Fiorella Artuso, Giuseppe Antonio Di Luna, Luca Massarelli, Leonardo Querzoni

We investigate the applicability of tine-tuning (i. e., taking a model already trained on a large generic corpora and retraining it for a specific task).

SAFE: Self-Attentive Function Embeddings for Binary Similarity

3 code implementations13 Nov 2018 Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni

We report the results from a quantitative and qualitative analysis that show how SAFE provides a noticeable performance improvement with respect to previous solutions.

Malware Analysis Vulnerability Detection

Android Malware Family Classification Based on Resource Consumption over Time

1 code implementation4 Sep 2017 Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni

An important task of malware analysis is the classification of malware samples into known families.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.