Fuzzing evolved into the most popular technique to detect bugs in software. Its combination with sanitizers has shown tremendous efficacy in uncovering memory safety errors, such as buffer overflows, that haunt C and C++ programmers. However, an important class of such issues, the so-called use-of-...
04b Atto di convegno in volume
-
-
Binary function similarity, which often relies on learning-based algorithms to identify what functions in a pool are most similar to a given query function, is a soughtafter topic in different communities, including machine learning, software engineering, and security. Its importance stems from the...
-
Ensuring the security and confidentiality of cloud computing workloads is essential. To this end, major cloud providers offer computing instances based on trusted execution environments (TEEs) to support confidential computing in vir- tual machines. TEEs are hardware-based shielded environments...
-
Monitoring how a program utilizes userland APIs is behind much dependability and security research. To intercept and study their invocations, the established practice targets the prologue of API implementations for inserting hooks. This paper questions the validity of this design for security uses...
-
The term 'Metaverse' first appeared in Neal Stephenson's 1992 science fiction novel Snow Crash. It was defined as a virtual environment shared through the Internet in which avatars represent persons in three dimensions and users can build what they wish. Since the publication of Stephenson's novel...
-
Delays in communication and diverse workflows impact healthcare organizations, due to a lack of interoperability and data management issues. Patients generate a large amount of health data to be acquired, retained and distributed. In recent years, electronic health records (EHRs) are becoming...
-
The COVID-19 emergency has exposed the fragility of many Health Care Systems around the world. Two major critical factors have been related to the management of critical care accesses and the availability of healthcare operators. COVID-like diseases are generally transmitted by airborne pathogens...
-
Glider pilots are confronted with several challenges specific to this kind of flight, the major one being the need to maintain adequate separation from other gliders while still operating theaircraft effectively and safely. In this paper, we present an XR intelligent interface, GlideRX, to help...
-
The Varroa destructor mite poses a critical threat to global honey bee populations, contributing to colony collapse through parasitic infestation. Current detection methods rely on labor-intensive visual inspections, which are prone to human error and impractical for large-scale monitoring. To...
-
Several recent approaches in reinforcement learning are studying a conceptual architecture where the environment is simultaneously represented at two (or more) levels of abstraction, with the environment providing two traces of data/events/features/fluents, one at a lower-level/finer grain and one...