User profiles for Giovanni Lagorio
Giovanni LagorioAssistant Professor of Computer Science, Università di Genova Verified email at unige.it Cited by 1481 |
Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
Recent work has shown that adversarial Windows malware samples—referred to as
adversarial EXEmples in this article—can bypass machine learning-based detection relying on …
adversarial EXEmples in this article—can bypass machine learning-based detection relying on …
Explaining vulnerabilities of deep learning to adversarial malware binaries
Recent work has shown that deep-learning algorithms for malware detection are also
susceptible to adversarial examples, ie, carefully-crafted perturbations to input malware that …
susceptible to adversarial examples, ie, carefully-crafted perturbations to input malware that …
Functionality-preserving black-box optimization of adversarial windows malware
Windows malware detectors based on machine learning are vulnerable to adversarial
examples, even if the attacker is only given black-box query access to the model. The main …
examples, even if the attacker is only given black-box query access to the model. The main …
Widget-Temp: A novel web-based approach for thermoeconomic analysis and optimization of conventional and innovative cycles
In a deregulated energy market the adoption of multipurpose and flexible software tools for
the optimal design and sizing of energy systems is becoming mandatory. For these reasons, …
the optimal design and sizing of energy systems is becoming mandatory. For these reasons, …
Jam-a smooth extension of java with mixins
In this paper we present Jam, an extension of the Java language supporting mixins, that is,
parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration, …
parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration, …
Jam---designing a Java extension with mixins
In this paper we present Jam, an extension of the Java language supporting mixins, that is,
parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration, …
parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration, …
Waf-a-mole: evading web application firewalls through adversarial machine learning
Web Application Firewalls are widely used in production environments to mitigate security
threats like SQL injections. Many industrial products rely on signature-based techniques, but …
threats like SQL injections. Many industrial products rely on signature-based techniques, but …
Longitudinal study of the prevalence of malware evasive techniques
By their very nature, malware samples employ a variety of techniques to conceal their
malicious behavior and hide it from analysis tools. To mitigate the problem, a large number of …
malicious behavior and hide it from analysis tools. To mitigate the problem, a large number of …
Featherweight jigsaw: A minimal core calculus for modular composition of classes
We present FJig, a simple calculus where basic building blocks are classes in the style of
Featherweight Java, declaring fields, methods and one constructor. However, inheritance has …
Featherweight Java, declaring fields, methods and one constructor. However, inheritance has …
Flexible models for dynamic linking
Dynamic linking supports flexible code deployment: partially linked code links further code
on the fly, as needed; and thus, end-users receive updates automatically. On the down side, …
on the fly, as needed; and thus, end-users receive updates automatically. On the down side, …