Pubblicazioni di Baldoni Roberto
2021
Massarelli Luca, Di Luna Giuseppe Antonio, Petroni Fabio, Querzoni Leonardo, Baldoni Roberto
Function Representations for Binary Similarity. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: -
2020
Massarelli Luca, Aniello Leonardo, Ciccotelli Claudio, Querzoni Leonardo, Ucci Daniele, Baldoni Roberto
AndroDFA: Android Malware Classification Based on Resource Consumption. INFORMATION 2020: -
Pitolli Gregorio, Laurenza Giuseppe, Aniello Leonardo, Querzoni Leonardo, Baldoni Roberto
MalFamAware: Automatic Family Identification and Malware Classification Through Online Clustering. INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2020: -
2019
Massarelli Luca, DI LUNA GIUSEPPE ANTONIO, Petroni Fabio, Querzoni Leonardo, Baldoni Roberto
Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis. Proceedings BAR 2019 Workshop on Binary Analysis Research 2019: 1-11
Lombardi F., Muti A., Aniello L., Baldoni R., Bonomi S., Querzoni L.
PASCAL: An architecture for proactive auto-scaling of distributed services. FUTURE GENERATION COMPUTER SYSTEMS 2019: 342-361
Massarelli Luca, Di Luna Giuseppe Antonio, Petroni Fabio, Baldoni Roberto, Querzoni Leonardo
SAFE: Self-Attentive Function Embeddings for Binary Similarity. Detection of Intrusions and Malware, and Vulnerability Assessment 2019: 309-329
Ucci Daniele, Aniello Leonardo, Baldoni Roberto
Survey of Machine Learning Techniques for Malware Analysis. COMPUTERS & SECURITY 2019: 123-147
2018
Aniello Leonardo, Baldoni Roberto, Lombardi Federico
A Blockchain-Based Solution for Enabling Log-Based Resolution of Disputes in Multi-party Transactions. Proceedings of 5th International Conference in Software Engineeringfor Defence Applications SEDA 2016 2018: 53-58
Baldoni Roberto, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Finocchi Irene
A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -
Shaer A., Dolev S., Bonomi S., Raynal M., Baldoni R.
Bee’s strategy against byzantines replacing byzantine participants: (Extended Abstract). Stabilization, Safety, and Security of Distributed Systems 2018: 139-153
Baldoni Roberto, De Nicola Rocco, Prinetto Paolo, Anglano COSIMO FILOMENO, Aniello Leonardo, Antinori Arije, Armando Alessandro, Aversa Rocco, Baldi Marco, Barili Antonio, Bartoletti Massimo, Basile Basile, Bellini Marco, Bergadano Francesco, Bernardeschi Cinzia, Bertino , Elisa Bianchi, Giuseppe , Biancotti Claudia, Bistarelli Stefano, Blefari Melazzi Nicola, Boetti Milena, Bondavalli Andrea, Bonomi Silvia, Buccafurri Francesco, Cambiaso Enrico, Caputo Barbara, Carminati Barbara, Cataliotti Francesco Saverio, Catarci Tiziana, Ceccarelli Andrea, Cesa Bianchi Nicolò, Chiaraluce Franco, Colajanni Michele, Conti Marco, Conti Mauro, Coppolino Luigi, Costa Gabriele, Costamagna Valerio, Cotroneo Domenico, Crispo Bruno, Cucchiara Rita, D’Antonio Salvatore, Damiani Ernesto, De Nicola Rocco, De Santis Alfredo, Di Battista Giuseppe, Di Martino Beniamino, Degiovanni Ivo Pietro, Demetrescu Camil, Di Corinto Arturo, Di Luna Antonio, Di Natale Giorgio, Dini Gianluca, Evangelisti Marco, Falcinelli Daniela, Figà Gianna, Ferretti Marco, Ficco Massimo, Flocchini Paola, Flottes Marie-Lise, Focardi Riccardo, Franchina Luisa, Furfaro Angelo, Girdinio Paola, Guida Franco, Italiano Giuseppe F., Lain Daniele, Laurenti Nicola, Lioy Antonio, Loreti Michele, Malerba Donato, Mancini Luigi Vincenzo, Marchetti Spaccamela Alberto, Marcialis Gianluca, Margheri Andrea, Marrella Andrea, Martinelli Fabio, Martinelli Maurizio, Martino Luigi, Massacci Fabio, Mayer Marco, Mecella Massimo, Mensi Maurizio, Merlo Alessio, Miculan Marino, Montanari Luca, Morana Marco, Mosco Gian Domenico, Mostarda Leonardo, Murino Vittorio, Nardi Daniele, Navigli Roberto, Palazzi Andrea, Palmieri Francesco, Panetta Ida, Passarella Andrea, Pellegrini Alessandro, Pelosi Gerardo, Pellegrino Giancarlo, Pirlo Giuseppe, Piuri Vincenzo, Pizzonia Maurizio, Pogliani Marcello, Polino Mario, Pontil Massimiliano, Prinetto Paolo, Quaglia Francesco, Quattrociocchi Walter, Querzoni Leonardo, Rak Massimiliano, Ranise Silvio, Ricci Elisa, Rossi Lorenzo, Rota Paolo, Russo Ludovico Orlando, Samarati Pierangela, Santoro Nicola, Santucci Beppe, Sassone Vladimiro, Scala Antonio, Scotti Fabio, Servida Andrea, Spagnoletti Paolo, Spalazzi Luca, Spidalieri Francesca, Spoto Austo, Squarcina Marco, Stefanelli Stefania, Vecchio Alessio, Venticinque Salvatore, Villoresi Paolo, Visaggio Aaron, Vitaletti Andrea, Zanero Stefano
De Angelis S., Aniello L., Baldoni R., Lombardi F., Margheri A., Sassone V.
PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. Proceedings of the Second Italian Conference on Cybersecurity ITASEC18 2018: -
Elingiusti M., Aniello L., Querzoni L., Baldoni R.
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques. Cyber Threat Intelligence 2018: 169-191
Baldoni R., De Nicola R., Prinetto P., Anglano C., Aniello L., Antinori A., Armando A., Aversa R., Baldi Marco, Barili A., Bartoletti M., Bellini M., Bergadano F., Bernardeschi C., Bianchi E., Biancotti C., Bistarelli S., Blefari Melazzi N., Boetti M., Bondavalli A., Bonomi ., Buccafurri F., Cambiaso E., Caputo B., Carminati B., Cataliotti F. S., Catarci T., Ceccarelli A., Cesa Bianchi N., Chiaraluce F., Colajanni M., Conti M., Conti M., Coppolino L., Costa G., Costamagna V., Cotroneo D., Crispo B., Cucchiara R., D’Antonio S., Damiani E., De Nicola R., De Santis A., Di Battista G., Di Martino B., Degiovanni I. P., Demetrescu C., Di Corinto A., Di Luna A., Di Natale G., Dini G., Evangelisti M., Falcinelli D., Figà G., Ferretti M., Ficco M., Flocchini P., Flottes M., Focardi R., Furfaro Franchina., Girdinio P., Guida F., Italiano G. F., Lain D., Laurenti N., Lioy A., Loreti M., Malerba D., Mancini L. V., Marchetti Spaccamela A., Marcialis G., Margheri A., Marrella A., Martinelli F., Martinelli M., Martino L., Massacci F., Mayer M., Mecella M., Mensi M., Merlo A., Miculan M., Montanari L., Morana M., Mosco G. D., Mostarda L., Murino V., Nardi D., Navigli R., Palazzi A., Palmieri F., Panetta I. C., Passarella A., Pellegrini A., Pelosi G., Pellegrino G., Pirlo G., Piuri V., Pizzonia M., Pogliani M., Polino M., Pontil M., Prinetto P., Quaglia F., Quattrociocchi W., Querzoni L., Rak M., Ranise S., Ricci E., Rossi L., Rota P., Russo L. O., Samarati P., Santoro N., Santucci B., Sassone V., Scala A., Scotti F., Servida A., Spagnoletti P., Spalazzi L., Spidalieri F., Spoto A., Squarcina M., Stefanelli S., Vecchio A., Venticinque S., Villoresi P., Visaggio A., Vitaletti A., Zanero S.
Baldoni Roberto, DI LUNA GIUSEPPE ANTONIO, Massarelli Luca, Petroni Fabio, Querzoni Leonardo
2017
Aniello Leonardo, Baldoni Roberto, Gaetani Edoardo, Lombardi Federico, Andrea Margheri, Vladimiro Sassone
A Prototype Evaluation of a Tamper-resistant High Performance Blockchain-based Transaction Log for a Distributed Database. 2017 13th European Dependable Computing Conference (EDCC) 2017: 151-154
Massarelli Luca, Aniello Leonardo, Ciccotelli Claudio, Querzoni Leonardo, Ucci Daniele, Baldoni Roberto
Android Malware Family Classification Based on Resource Consumption over Time. Computing Research Repository 2017: -
Massarelli L, Aniello L, Ciccotelli C, Querzoni L., Ucci D., Baldoni R.
Android malware family classification based on resource consumption over time. Proceedings of the 2017 12th International Conference on Malicious and Unwanted Software, MALWARE 2017 2017: 31-38
Baldoni Roberto, Coppa Emilio, D’Elia Daniele Cono, Demetrescu Camil
Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188
Gaetani Edoardo, Aniello Leonardo, Baldoni Roberto, Lombardi Federico, Margheri Andrea, Sassone Vladimiro
Blockchain-based database to ensure data integrity in cloud computing environments. Proceedings of the First Italian Conference on Cybersecurity (ITASEC17) 2017: 146-155
DEL POZZO Antonella, Bonomi Silvia, Lazzeretti Riccardo, Baldoni Roberto
Building Regular Registers with Rational Malicious Servers and Anonymous Clients. Cyber Security Cryptography and Machine Learning 2017: 50-67
Baldoni Roberto, Beraldi Roberto, Quéma Vivien, Querzoni Leonardo, Tucci Piergiovanni Sara
DEBS 10 Years Time Award. TERA: Topic-based Event Routing for peer-to-peer Architectures 2017: -
Pitolli Gregorio, Aniello Leonardo, Laurenza Giuseppe, Querzoni Leonardo, Baldoni Roberto
Malware Family Identification with BIRCH Clustering. 2017 International Carnahan Conference on Security Technology (ICCST) 2017: -
Laurenza Giuseppe, Aniello Leonardo, Lazzeretti Riccardo, Baldoni Roberto
Malware Triage Based on Static Features and Public APT Reports. Cyber Security Cryptographyand Machine Learning 2017: 288-305
Armando A., Baldoni R., Focardi R.
Preface. CEUR Workshop Proceedings 2017: -
Ucci Daniele, Aniello Leonardo, Baldoni Roberto
Share a pie? Privacy-preserving knowledge base export through count-min sketches. CODASPY '17 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy 2017: 95-106
2016
Aniello Leonardo, Baldoni Roberto, Lombardi Federico
Laurenza Giuseppe, Ucci Daniele, Aniello Leonardo, Baldoni Roberto
An Architecture for Semi-Automatic Collaborative Malware Analysis for CIs. 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) 2016: 137-142
Baldoni Roberto, Bonomi Silvia, Raynal Michel
Implementing set objects in dynamic distributed systems. JOURNAL OF COMPUTER AND SYSTEM SCIENCES 2016: 654-689
Di Martino Lelio C., Baldoni R.
Message from the Tutorial Chairs. Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016 2016: xv-xv
Sora Daniele, Mecella Massimo, Leotta Francesco, Querzoni Leonardo, Baldoni Roberto, Bracone Giuseppe, Buonanno Daniele, Caruso Mario, Cerocchi Adriano, Leva Mariano
Micro-accounting for optimizing and saving energy in smart buildings. Advanced Information Systems Engineering Workshops 2016: 143-154
DI LUNA GIUSEPPE ANTONIO, Baldoni Roberto
Non trivial computations in anonymous dynamic networks. 19th International Conference On Principles Of Distributed Systems OPODIS’15 2016: 33.1-33.16
Shehu Zigrid, Ciccotelli Caludio, Ucci Daniele, Aniello Leonardo, Baldoni Roberto
Towards the usage of invariant-based app behavioral fingerprinting for the detection of obfuscated versions of known malware. 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST) 2016: 121-126
2015
García Valls Marisol, Baldoni Roberto
Adaptive middleware design for CPS: Considerations on the OS, resource managers, and the network run-time. Proceedings of the 14th Workshop on Adaptive and Reflective Middleware, ARM 2015 2015: -
Baldoni Roberto, Nicola Rocco De, Spaccamela Albertomarchetti, Domenicomosco Gian, Panetta Ida Claudia, Prinetto Paolo
Capitolo 1 - Introduzione. Il Futuro della Cyber Security in Italia 2015: 1-5
Baldoni Roberto, Bonomi Silvia, Platania Marco, Querzoni Leonardo
Efficient notification ordering for geo-distributed pub/sub systems. IEEE TRANSACTIONS ON COMPUTERS 2015: 2796-2808
Aniello Leonardo, Querzoni Leonardo, Baldoni Roberto
High frequency batch-oriented computations over large sliding time windows. FUTURE GENERATION COMPUTER SYSTEMS 2015: 1-11
DI LUNA GIUSEPPE ANTONIO, Baldoni Roberto
Investigating the Cost of Anonymity on Dynamic Networks. PODC '15 Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing 2015: 339-341
Ciccotelli Caludio, Aniello Leonardo, Lombardi Federico, Montanari Luca, Querzoni Leonardo, Baldoni Roberto
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) 2015: 11-20
Baldoni Roberto, Montanari Luca, Rizzuto Marco
On-line failure prediction in safety-critical systems. FUTURE GENERATION COMPUTER SYSTEMS 2015: 123-132
2014
Aniello Leonardo, Armenia Stefano, Baldoni Roberto, D'Amore Fabrizio, Annachiara Di Paolo, Franchina Luisa, Montanari Luca, Panetta Ida Claudia, Querzoni Leonardo, Giovanni Rellini Lerz, Vincenzo Verde Nino
Baldoni Roberto, D'Amore Fabrizio, Mecella Massimo, Ucci Daniele
A Software Architecture for Progressive Scanning of On-line Communities. 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops 2014: 207-212
Aniello Leonardo, Bonomi Silvia, Lombardi Federico, Alessandro Zelli, Baldoni Roberto
An architecture for automatic scaling of replicated services. Networked Systems 2014: 122-137
G. Lodi, Aniello Leonardo, DI LUNA GIUSEPPE ANTONIO, Baldoni Roberto
An event-based platform for collaborative threats detection and monitoring. INFORMATION SYSTEMS 2014: 175-195
DI LUNA GIUSEPPE ANTONIO, Baldoni Roberto, Bonomi Silvia, Chatzigiannakis Ioannis
Conscious and unconscious counting on anonymous dynamic networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014: 257-271