User profiles for Giovanni Lagorio

Giovanni Lagorio

Assistant Professor of Computer Science, Università di Genova
Verified email at unige.it
Cited by 1481

Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection

L Demetrio, SE Coull, B Biggio, G Lagorio… - ACM Transactions on …, 2021 - dl.acm.org
Recent work has shown that adversarial Windows malware samples—referred to as
adversarial EXEmples in this article—can bypass machine learning-based detection relying on …

Explaining vulnerabilities of deep learning to adversarial malware binaries

L Demetrio, B Biggio, G Lagorio, F Roli… - arXiv preprint arXiv …, 2019 - arxiv.org
Recent work has shown that deep-learning algorithms for malware detection are also
susceptible to adversarial examples, ie, carefully-crafted perturbations to input malware that …

Functionality-preserving black-box optimization of adversarial windows malware

L Demetrio, B Biggio, G Lagorio, F Roli… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Windows malware detectors based on machine learning are vulnerable to adversarial
examples, even if the attacker is only given black-box query access to the model. The main …

Widget-Temp: A novel web-based approach for thermoeconomic analysis and optimization of conventional and innovative cycles

…, W Cazzola, G Lagorio - … Expo: Power for …, 2004 - asmedigitalcollection.asme.org
In a deregulated energy market the adoption of multipurpose and flexible software tools for
the optimal design and sizing of energy systems is becoming mandatory. For these reasons, …

Jam-a smooth extension of java with mixins

D Ancona, G Lagorio, E Zucca - European Conference on Object-Oriented …, 2000 - Springer
In this paper we present Jam, an extension of the Java language supporting mixins, that is,
parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration, …

Jam---designing a Java extension with mixins

D Ancona, G Lagorio, E Zucca - ACM Transactions on Programming …, 2003 - dl.acm.org
In this paper we present Jam, an extension of the Java language supporting mixins, that is,
parametric heir classes. A mixin declaration in Jam is similar to a Java heir class declaration, …

Waf-a-mole: evading web application firewalls through adversarial machine learning

L Demetrio, A Valenza, G Costa, G Lagorio - Proceedings of the 35th …, 2020 - dl.acm.org
Web Application Firewalls are widely used in production environments to mitigate security
threats like SQL injections. Many industrial products rely on signature-based techniques, but …

Longitudinal study of the prevalence of malware evasive techniques

L Maffia, D Nisi, P Kotzias, G Lagorio, S Aonzo… - arXiv preprint arXiv …, 2021 - arxiv.org
By their very nature, malware samples employ a variety of techniques to conceal their
malicious behavior and hide it from analysis tools. To mitigate the problem, a large number of …

Featherweight jigsaw: A minimal core calculus for modular composition of classes

G Lagorio, M Servetto, E Zucca - … Conference, Genoa, Italy, July 6-10 …, 2009 - Springer
We present FJig, a simple calculus where basic building blocks are classes in the style of
Featherweight Java, declaring fields, methods and one constructor. However, inheritance has …

Flexible models for dynamic linking

S Drossopoulou, G Lagorio, S Eisenbach - European Symposium on …, 2003 - Springer
Dynamic linking supports flexible code deployment: partially linked code links further code
on the fly, as needed; and thus, end-users receive updates automatically. On the down side, …