Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mariano Ceccato
@article{DBLP:journals/compsec/RomdhanaMCT23, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Assessing the security of inter-app communications in android through reinforcement learning}, journal = {Comput. Secur.}, volume = {131}, pages = {103311}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103311}, doi = {10.1016/J.COSE.2023.103311}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/SharDCTLJB23, author = {Lwin Khin Shar and Biniam Fisseha Demissie and Mariano Ceccato and Yan Naing Tun and David Lo and Lingxiao Jiang and Christoph Bienert}, title = {Experimental comparison of features, analyses, and classifiers for Android malware detection}, journal = {Empir. Softw. Eng.}, volume = {28}, number = {6}, pages = {130}, year = {2023}, url = {https://doi.org/10.1007/s10664-023-10375-y}, doi = {10.1007/S10664-023-10375-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/SharDCTLJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PasquaBCCPC23, author = {Michele Pasqua and Andrea Benini and Filippo Contro and Marco Crosara and Mila Dalla Preda and Mariano Ceccato}, title = {Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode}, journal = {J. Syst. Softw.}, volume = {200}, pages = {111653}, year = {2023}, url = {https://doi.org/10.1016/j.jss.2023.111653}, doi = {10.1016/J.JSS.2023.111653}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/PasquaBCCPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsiotsec/MarastoniC23, author = {Niccol{\`{o}} Marastoni and Mariano Ceccato}, editor = {Magnus Almgren and Earlence Fernandes}, title = {Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges}, booktitle = {Proceedings of the 5th Workshop on CPS{\&}IoT Security and Privacy, Copenhagen, Denmark, 26 November 2023}, pages = {25--36}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605758.3623502}, doi = {10.1145/3605758.3623502}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpsiotsec/MarastoniC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/PavanelloMOOMLCVNCCCNKZSBVRFSCSCGPKBCCC23, author = {Fabio Pavanello and C{\'{e}}dric Marchand and Ian O'Connor and R{\'{e}}gis Orobtchouk and Fabien Mandorlo and Xavier Letartre and S{\'{e}}bastien Cueff and Elena Ioana Vatajelu and Giorgio Di Natale and Benoit Cluzel and Aurelien Coillet and Beno{\^{\i}}t Charbonnier and Pierre Noe and Frantisek Kavan and Martin Zoldak and Michal Szaj and Peter Bienstman and Thomas Van Vaerenbergh and Ulrich R{\"{u}}hrmair and Paulo F. Flores and Lu{\'{\i}}s Guerra e Silva and Ricardo Chaves and Lu{\'{\i}}s Miguel Silveira and Mariano Ceccato and Dimitris Gizopoulos and George Papadimitriou and Vasileios Karakostas and Axel Brando and Francisco J. Cazorla and Ramon Canal and Pau Closas and Adria Gusi{-}Amigo and Paolo Crovetti and Alessio Carpegna and Tzamn Melendez Carmona and Stefano Di Carlo and Alessandro Savino}, title = {{EUROPULS:} NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS}, booktitle = {{IEEE} European Test Symposium, {ETS} 2023, Venezia, Italy, May 22-26, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ETS56758.2023.10173974}, doi = {10.1109/ETS56758.2023.10173974}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ets/PavanelloMOOMLCVNCCCNKZSBVRFSCSCGPKBCCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CorradiniPC23, author = {Davide Corradini and Michele Pasqua and Mariano Ceccato}, title = {Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {2553--2564}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00213}, doi = {10.1109/ICSE48619.2023.00213}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/CorradiniPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/KimCSOPTC23, author = {Myeongsoo Kim and Davide Corradini and Saurabh Sinha and Alessandro Orso and Michele Pasqua and Rachel Tzoref{-}Brill and Mariano Ceccato}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {Enhancing {REST} {API} Testing with {NLP} Techniques}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {1232--1243}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598131}, doi = {10.1145/3597926.3598131}, timestamp = {Mon, 17 Jul 2023 11:49:17 +0200}, biburl = {https://dblp.org/rec/conf/issta/KimCSOPTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01261, author = {Davide Corradini and Michele Pasqua and Mariano Ceccato}, title = {Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs}, journal = {CoRR}, volume = {abs/2301.01261}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01261}, doi = {10.48550/ARXIV.2301.01261}, eprinttype = {arXiv}, eprint = {2301.01261}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01261.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-03139, author = {Fabio Pavanello and C{\'{e}}dric Marchand and Ian O'Connor and R{\'{e}}gis Orobtchouk and Fabien Mandorlo and Xavier Letartre and S{\'{e}}bastien Cueff and Elena Ioana Vatajelu and Giorgio Di Natale and Benoit Cluzel and Aurelien Coillet and Beno{\^{\i}}t Charbonnier and Pierre Noe and Frantisek Kavan and Martin Zoldak and Michal Szaj and Peter Bienstman and Thomas Van Vaerenbergh and Ulrich R{\"{u}}hrmair and Paulo F. Flores and Lu{\'{\i}}s Guerra e Silva and Ricardo Chaves and Lu{\'{\i}}s Miguel Silveira and Mariano Ceccato and Dimitris Gizopoulos and George Papadimitriou and Vasileios Karakostas and Axel Brando and Francisco J. Cazorla and Ramon Canal and Pau Closas and Adria Gusi{-}Amigo and Paolo Crovetti and Alessio Carpegna and Tzamn Melendez Carmona and Stefano Di Carlo and Alessandro Savino}, title = {{NEUROPULS:} NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS}, journal = {CoRR}, volume = {abs/2305.03139}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.03139}, doi = {10.48550/ARXIV.2305.03139}, eprinttype = {arXiv}, eprint = {2305.03139}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-03139.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-09383, author = {Fabio Pavanello and C{\'{e}}dric Marchand and Paul Jim{\'{e}}nez and Xavier Letartre and Ricardo Chaves and Niccol{\`{o}} Marastoni and Alberto Lovato and Mariano Ceccato and George Papadimitriou and Vasileios Karakostas and Dimitris Gizopoulos and Roberta Bardini and Tzamn Melendez Carmona and Stefano Di Carlo and Alessandro Savino and Laurence Lerch and Ulrich R{\"{u}}hrmair and Sergio Vinagrero Gutierrez and Giorgio Di Natale and Elena Ioana Vatajelu}, title = {Security layers and related services within the Horizon Europe {NEUROPULS} project}, journal = {CoRR}, volume = {abs/2312.09383}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.09383}, doi = {10.48550/ARXIV.2312.09383}, eprinttype = {arXiv}, eprint = {2312.09383}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-09383.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ManfrediCSR22, author = {Salvatore Manfredi and Mariano Ceccato and Giada Sciarretta and Silvio Ranise}, title = {Empirical Validation on the Usability of Security Reports for Patching {TLS} Misconfigurations: User- and Case-Studies on Actionable Mitigations}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {56--86}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.056}, doi = {10.22667/JOWUA.2022.03.31.056}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/ManfrediCSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/CorradiniZPVDC22, author = {Davide Corradini and Amedeo Zampieri and Michele Pasqua and Emanuele Viglianisi and Michael Dallago and Mariano Ceccato}, title = {Automated black-box testing of nominal and error scenarios in RESTful APIs}, journal = {Softw. Test. Verification Reliab.}, volume = {32}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/stvr.1808}, doi = {10.1002/STVR.1808}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/CorradiniZPVDC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/RomdhanaMCT22, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Deep Reinforcement Learning for Black-box Testing of Android Apps}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {31}, number = {4}, pages = {65:1--65:29}, year = {2022}, url = {https://doi.org/10.1145/3502868}, doi = {10.1145/3502868}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/RomdhanaMCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CeccatoDLLM22, author = {Mariano Ceccato and Youssef Driouich and Ruggero Lanotte and Marco Lucchese and Massimo Merro}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {Towards Reverse Engineering of Industrial Physical Processes}, booktitle = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, pages = {273--290}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25460-4\_15}, doi = {10.1007/978-3-031-25460-4\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CeccatoDLLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/CorradiniZPC22, author = {Davide Corradini and Amedeo Zampieri and Michele Pasqua and Mariano Ceccato}, title = {RestTestGen: An Extensible Framework for Automated Black-box Testing of RESTful APIs}, booktitle = {{IEEE} International Conference on Software Maintenance and Evolution, {ICSME} 2022, Limassol, Cyprus, October 3-7, 2022}, pages = {504--508}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSME55016.2022.00068}, doi = {10.1109/ICSME55016.2022.00068}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/CorradiniZPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/RomdhanaCMT22, author = {Andrea Romdhana and Mariano Ceccato and Alessio Merlo and Paolo Tonella}, title = {{IFRIT:} Focused Testing through Deep Reinforcement Learning}, booktitle = {15th {IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2022, Valencia, Spain, April 4-14, 2022}, pages = {24--34}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICST53961.2022.00013}, doi = {10.1109/ICST53961.2022.00013}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/RomdhanaCMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/GaiardelliSPCF22, author = {Sebastiano Gaiardelli and Stefano Spellini and Michele Pasqua and Mariano Ceccato and Franco Fummi}, title = {Integrating Smart Contracts in Manufacturing for Automated Assessment of Production Quality}, booktitle = {{IECON} 2022 - 48th Annual Conference of the {IEEE} Industrial Electronics Society, Brussels, Belgium, October 17-20, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IECON49645.2022.9968887}, doi = {10.1109/IECON49645.2022.9968887}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/GaiardelliSPCF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CeccatoRG22, author = {Mariano Ceccato and Banani Roy and Mohammad Ghafari}, title = {Message from the General Chair and Program Co-Chairs {SCAM} 2022}, booktitle = {22nd {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2021, Limassol, Cyprus, October 3, 2022}, pages = {ix--x}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SCAM55253.2022.00005}, doi = {10.1109/SCAM55253.2022.00005}, timestamp = {Mon, 23 Jan 2023 22:18:07 +0100}, biburl = {https://dblp.org/rec/conf/scam/CeccatoRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ManfrediCSR21, author = {Salvatore Manfredi and Mariano Ceccato and Giada Sciarretta and Silvio Ranise}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching {TLS} Misconfigurations}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {141:1--141:13}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3469187}, doi = {10.1145/3465481.3469187}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ManfrediCSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/CorradiniZPC21, author = {Davide Corradini and Amedeo Zampieri and Michele Pasqua and Mariano Ceccato}, title = {Restats: {A} Test Coverage Tool for RESTful APIs}, booktitle = {{IEEE} International Conference on Software Maintenance and Evolution, {ICSME} 2021, Luxembourg, September 27 - October 1, 2021}, pages = {594--598}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSME52107.2021.00063}, doi = {10.1109/ICSME52107.2021.00063}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsm/CorradiniZPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/ViglianisiCT21, author = {Emanuele Viglianisi and Mariano Ceccato and Paolo Tonella}, title = {Summary of: {A} Federated Society of Bots for Smart Contract Testing}, booktitle = {14th {IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2021, Porto de Galinhas, Brazil, April 12-16, 2021}, pages = {282--283}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICST49551.2021.00040}, doi = {10.1109/ICST49551.2021.00040}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/ViglianisiCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/RomdhanaCGMT21, author = {Andrea Romdhana and Mariano Ceccato and Gabriel Claudiu Georgiu and Alessio Merlo and Paolo Tonella}, title = {{COSMO:} Code Coverage Made Easier for Android}, booktitle = {14th {IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2021, Porto de Galinhas, Brazil, April 12-16, 2021}, pages = {417--423}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICST49551.2021.00053}, doi = {10.1109/ICST49551.2021.00053}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/RomdhanaCGMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/ControCCP21, author = {Filippo Contro and Marco Crosara and Mariano Ceccato and Mila Dalla Preda}, title = {EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode}, booktitle = {29th {IEEE/ACM} International Conference on Program Comprehension, {ICPC} 2021, Madrid, Spain, May 20-21, 2021}, pages = {127--137}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICPC52881.2021.00021}, doi = {10.1109/ICPC52881.2021.00021}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwpc/ControCCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CorradiniZPC21, author = {Davide Corradini and Amedeo Zampieri and Michele Pasqua and Mariano Ceccato}, title = {Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs}, booktitle = {21st {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2021, Luxembourg, September 27-28, 2021}, pages = {226--236}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SCAM52516.2021.00035}, doi = {10.1109/SCAM52516.2021.00035}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/CorradiniZPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-02636, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Deep Reinforcement Learning for Black-Box Testing of Android Apps}, journal = {CoRR}, volume = {abs/2101.02636}, year = {2021}, url = {https://arxiv.org/abs/2101.02636}, eprinttype = {arXiv}, eprint = {2101.02636}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-02636.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-09113, author = {Filippo Contro and Marco Crosara and Mariano Ceccato and Mila Dalla Preda}, title = {EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode}, journal = {CoRR}, volume = {abs/2103.09113}, year = {2021}, url = {https://arxiv.org/abs/2103.09113}, eprinttype = {arXiv}, eprint = {2103.09113}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-09113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08196, author = {Davide Corradini and Amedeo Zampieri and Michele Pasqua and Mariano Ceccato}, title = {Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs}, journal = {CoRR}, volume = {abs/2108.08196}, year = {2021}, url = {https://arxiv.org/abs/2108.08196}, eprinttype = {arXiv}, eprint = {2108.08196}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08196.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08209, author = {Davide Corradini and Amedeo Zampieri and Michele Pasqua and Mariano Ceccato}, title = {Restats: {A} Test Coverage Tool for RESTful APIs}, journal = {CoRR}, volume = {abs/2108.08209}, year = {2021}, url = {https://arxiv.org/abs/2108.08209}, eprinttype = {arXiv}, eprint = {2108.08209}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/ViticchieRBTCT20, author = {Alessio Viticchi{\'{e}} and Leonardo Regano and Cataldo Basile and Marco Torchiano and Mariano Ceccato and Paolo Tonella}, title = {Empirical assessment of the effort needed to attack programs protected with client/server code splitting}, journal = {Empir. Softw. Eng.}, volume = {25}, number = {1}, pages = {1--48}, year = {2020}, url = {https://doi.org/10.1007/s10664-019-09738-1}, doi = {10.1007/S10664-019-09738-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/ViticchieRBTCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/DemissieCS20, author = {Biniam Fisseha Demissie and Mariano Ceccato and Lwin Khin Shar}, title = {Security analysis of permission re-delegation vulnerabilities in Android apps}, journal = {Empir. Softw. Eng.}, volume = {25}, number = {6}, pages = {5084--5136}, year = {2020}, url = {https://doi.org/10.1007/s10664-020-09879-8}, doi = {10.1007/S10664-020-09879-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/DemissieCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BerlatoC20, author = {Stefano Berlato and Mariano Ceccato}, title = {A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102463}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102463}, doi = {10.1016/J.JISA.2020.102463}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BerlatoC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/FellinC20, author = {Roberto Fellin and Mariano Ceccato}, title = {Experimental assessment of XOR-Masking data obfuscation based on K-Clique opaque constants}, journal = {J. Syst. Softw.}, volume = {162}, year = {2020}, url = {https://doi.org/10.1016/j.jss.2019.110492}, doi = {10.1016/J.JSS.2019.110492}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/FellinC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ViglianisiCT20, author = {Emanuele Viglianisi and Mariano Ceccato and Paolo Tonella}, title = {A federated society of bots for smart contract testing}, journal = {J. Syst. Softw.}, volume = {168}, pages = {110647}, year = {2020}, url = {https://doi.org/10.1016/j.jss.2020.110647}, doi = {10.1016/J.JSS.2020.110647}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ViglianisiCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DemissieC20, author = {Biniam Fisseha Demissie and Mariano Ceccato}, editor = {David Lo and Leonardo Mariani and Ali Mesbah}, title = {Security testing of second order permission re-delegation vulnerabilities in Android apps}, booktitle = {MOBILESoft '20: {IEEE/ACM} 7th International Conference on Mobile Software Engineering and Systems, Seoul, Republic of Korea, July 13-15, 2020}, pages = {1--11}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3387905.3388592}, doi = {10.1145/3387905.3388592}, timestamp = {Thu, 27 Jul 2023 16:07:53 +0200}, biburl = {https://dblp.org/rec/conf/icse/DemissieC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SharDCM20, author = {Lwin Khin Shar and Biniam Fisseha Demissie and Mariano Ceccato and Wei Minn}, editor = {David Lo and Leonardo Mariani and Ali Mesbah}, title = {Experimental comparison of features and classifiers for Android malware detection}, booktitle = {MOBILESoft '20: {IEEE/ACM} 7th International Conference on Mobile Software Engineering and Systems, Seoul, Republic of Korea, July 13-15, 2020}, pages = {50--60}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3387905.3388596}, doi = {10.1145/3387905.3388596}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SharDCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/ViglianisiDC20, author = {Emanuele Viglianisi and Michael Dallago and Mariano Ceccato}, title = {{RESTTESTGEN:} Automated Black-Box Testing of RESTful APIs}, booktitle = {13th {IEEE} International Conference on Software Testing, Validation and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020}, pages = {142--152}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICST46399.2020.00024}, doi = {10.1109/ICST46399.2020.00024}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/ViglianisiDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/LeottaBRCT20, author = {Maurizio Leotta and Matteo Biagiola and Filippo Ricca and Mariano Ceccato and Paolo Tonella}, title = {A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development}, booktitle = {13th {IEEE} International Conference on Software Testing, Validation and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020}, pages = {263--273}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICST46399.2020.00035}, doi = {10.1109/ICST46399.2020.00035}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/LeottaBRCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/CeccatoCGKMOT20, author = {Mariano Ceccato and Davide Corradini and Luca Gazzola and Fitsum Meshesha Kifetew and Leonardo Mariani and Matteo Orr{\`{u}} and Paolo Tonella}, title = {A Framework for In-Vivo Testing of Mobile Applications}, booktitle = {13th {IEEE} International Conference on Software Testing, Validation and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020}, pages = {286--296}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICST46399.2020.00037}, doi = {10.1109/ICST46399.2020.00037}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/CeccatoCGKMOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-01785, author = {Mariano Ceccato and Davide Corradini and Luca Gazzola and Fitsum Meshesha Kifetew and Leonardo Mariani and Matteo Orr{\`{u}} and Paolo Tonella}, title = {A Framework for In-Vivo Testing of Mobile Applications}, journal = {CoRR}, volume = {abs/2002.01785}, year = {2020}, url = {https://arxiv.org/abs/2002.01785}, eprinttype = {arXiv}, eprint = {2002.01785}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-01785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/CeccatoTBFTCS19, author = {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Paolo Falcarin and Marco Torchiano and Bart Coppens and Bjorn De Sutter}, title = {Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge}, journal = {Empir. Softw. Eng.}, volume = {24}, number = {1}, pages = {240--286}, year = {2019}, url = {https://doi.org/10.1007/s10664-018-9625-6}, doi = {10.1007/S10664-018-9625-6}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/CeccatoTBFTCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/CeccatoGKMOT19, author = {Mariano Ceccato and Luca Gazzola and Fitsum Meshesha Kifetew and Leonardo Mariani and Matteo Orr{\`{u}} and Paolo Tonella}, editor = {Katinka Wolter and Ina Schieferdecker and Barbara Gallina and Michel Cukier and Roberto Natella and Naghmeh Ramezani Ivaki and Nuno Laranjeiro}, title = {Toward In-Vivo Testing of Mobile Applications}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} Workshops 2019, Berlin, Germany, October 27-30, 2019}, pages = {137--143}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISSREW.2019.00063}, doi = {10.1109/ISSREW.2019.00063}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issre/CeccatoGKMOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/PizzolottoFC19, author = {Davide Pizzolotto and Roberto Fellin and Mariano Ceccato}, editor = {Xinyu Wang and David Lo and Emad Shihab}, title = {{OBLIVE:} Seamless Code Obfuscation for Java Programs and Android Apps}, booktitle = {26th {IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2019, Hangzhou, China, February 24-27, 2019}, pages = {629--633}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SANER.2019.8667982}, doi = {10.1109/SANER.2019.8667982}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcre/PizzolottoFC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-04942, author = {Davide Pizzolotto and Mariano Ceccato}, title = {Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries}, journal = {CoRR}, volume = {abs/1901.04942}, year = {2019}, url = {http://arxiv.org/abs/1901.04942}, eprinttype = {arXiv}, eprint = {1901.04942}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-04942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DemissieCS18, author = {Biniam Fisseha Demissie and Mariano Ceccato and Lwin Khin Shar}, editor = {Christine Julien and Grace A. Lewis and Itai Segall}, title = {AnFlo: detecting anomalous sensitive information flows in Android apps}, booktitle = {Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27 - 28, 2018}, pages = {24--34}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197231.3197238}, doi = {10.1145/3197231.3197238}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/DemissieCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/PizzolottoC18, author = {Davide Pizzolotto and Mariano Ceccato}, title = {[Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries}, booktitle = {18th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2018, Madrid, Spain, September 23-24, 2018}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SCAM.2018.00012}, doi = {10.1109/SCAM.2018.00012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/PizzolottoC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-07894, author = {Biniam Fisseha Demissie and Mariano Ceccato and Lwin Khin Shar}, title = {AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps}, journal = {CoRR}, volume = {abs/1812.07894}, year = {2018}, url = {http://arxiv.org/abs/1812.07894}, eprinttype = {arXiv}, eprint = {1812.07894}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-07894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/CeccatoTBCSFT17, author = {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Bart Coppens and Bjorn De Sutter and Paolo Falcarin and Marco Torchiano}, editor = {Giuseppe Scanniello and David Lo and Alexander Serebrenik}, title = {How professional hackers understand protected code while performing attack tasks}, booktitle = {Proceedings of the 25th International Conference on Program Comprehension, {ICPC} 2017, Buenos Aires, Argentina, May 22-23, 2017}, pages = {154--164}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICPC.2017.2}, doi = {10.1109/ICPC.2017.2}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/CeccatoTBCSFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/TiellaC17, author = {Roberto Tiella and Mariano Ceccato}, editor = {Martin Pinzger and Gabriele Bavota and Andrian Marcus}, title = {Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation}, booktitle = {{IEEE} 24th International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2017, Klagenfurt, Austria, February 20-24, 2017}, pages = {182--192}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SANER.2017.7884620}, doi = {10.1109/SANER.2017.7884620}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/TiellaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ViticchieRTBCTT17, author = {Alessio Viticchi{\'{e}} and Leonardo Regano and Marco Torchiano and Cataldo Basile and Mariano Ceccato and Paolo Tonella and Roberto Tiella}, title = {Assessment of Source Code Obfuscation Techniques}, journal = {CoRR}, volume = {abs/1704.02307}, year = {2017}, url = {http://arxiv.org/abs/1704.02307}, eprinttype = {arXiv}, eprint = {1704.02307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ViticchieRTBCTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CeccatoTBCSFT17, author = {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Bart Coppens and Bjorn De Sutter and Paolo Falcarin and Marco Torchiano}, title = {How Professional Hackers Understand Protected Code while Performing Attack Tasks}, journal = {CoRR}, volume = {abs/1704.02774}, year = {2017}, url = {http://arxiv.org/abs/1704.02774}, eprinttype = {arXiv}, eprint = {1704.02774}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CeccatoTBCSFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ViticchieBACAC16, author = {Alessio Viticchi{\'{e}} and Cataldo Basile and Andrea Avancini and Mariano Ceccato and Bert Abrath and Bart Coppens}, editor = {Brecht Wyseur and Bjorn De Sutter}, title = {Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016}, pages = {73--84}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995306.2995315}, doi = {10.1145/2995306.2995315}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ViticchieBACAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SutterBCFZWD16, author = {Bjorn De Sutter and Cataldo Basile and Mariano Ceccato and Paolo Falcarin and Michael Zunke and Brecht Wyseur and J{\'{e}}r{\^{o}}me d'Annoville}, editor = {Brecht Wyseur and Bjorn De Sutter}, title = {The {ASPIRE} Framework for Software Protection}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016}, pages = {91--92}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995306.2995316}, doi = {10.1145/2995306.2995316}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SutterBCFZWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/CeccatoS16, author = {Mariano Ceccato and Riccardo Scandariato}, title = {Static Analysis and Penetration Testing from the Perspective of Maintenance Teams}, booktitle = {Proceedings of the 10th {ACM/IEEE} International Symposium on Empirical Software Engineering and Measurement, {ESEM} 2016, Ciudad Real, Spain, September 8-9, 2016}, pages = {25:1--25:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2961111.2962611}, doi = {10.1145/2961111.2962611}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esem/CeccatoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DemissieGCA16, author = {Biniam Fisseha Demissie and Davide Ghio and Mariano Ceccato and Andrea Avancini}, title = {Identifying Android inter app communication vulnerabilities using static and dynamic analysis}, booktitle = {Proceedings of the International Conference on Mobile Software Engineering and Systems, MOBILESoft '16, Austin, Texas, USA, May 14-22, 2016}, pages = {255--266}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897073.2897082}, doi = {10.1145/2897073.2897082}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/DemissieGCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/CeccatoNAB16, author = {Mariano Ceccato and Cu D. Nguyen and Dennis Appelt and Lionel C. Briand}, editor = {David Lo and Sven Apel and Sarfraz Khurshid}, title = {{SOFIA:} an automated security oracle for black-box testing of SQL-injection vulnerabilities}, booktitle = {Proceedings of the 31st {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2016, Singapore, September 3-7, 2016}, pages = {167--177}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2970276.2970343}, doi = {10.1145/2970276.2970343}, timestamp = {Sat, 30 Sep 2023 09:51:40 +0200}, biburl = {https://dblp.org/rec/conf/kbse/CeccatoNAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/ViticchieRTBCTT16, author = {Alessio Viticchi{\'{e}} and Leonardo Regano and Marco Torchiano and Cataldo Basile and Mariano Ceccato and Paolo Tonella and Roberto Tiella}, title = {Assessment of Source Code Obfuscation Techniques}, booktitle = {16th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2016, Raleigh, NC, USA, October 2-3, 2016}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SCAM.2016.17}, doi = {10.1109/SCAM.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/ViticchieRTBCTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssbse/CeccatoFCFS16, author = {Mariano Ceccato and Paolo Falcarin and Alessandro Cabutto and Yosief Weldezghi Frezghi and Cristian{-}Alexandru Staicu}, editor = {Federica Sarro and Kalyanmoy Deb}, title = {Search Based Clustering for Protecting Software with Diversified Updates}, booktitle = {Search Based Software Engineering - 8th International Symposium, {SSBSE} 2016, Raleigh, NC, USA, October 8-10, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9962}, pages = {159--175}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47106-8\_11}, doi = {10.1007/978-3-319-47106-8\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssbse/CeccatoFCFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicsa/SutterFWBCDZ16, author = {Bjorn De Sutter and Paolo Falcarin and Brecht Wyseur and Cataldo Basile and Mariano Ceccato and J{\'{e}}r{\^{o}}me d'Annoville and Michael Zunke}, title = {A Reference Architecture for Software Protection}, booktitle = {13th Working {IEEE/IFIP} Conference on Software Architecture, {WICSA} 2016, Venice, Italy, April 5-8, 2016}, pages = {291--294}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WICSA.2016.43}, doi = {10.1109/WICSA.2016.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wicsa/SutterFWBCDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/CeccatoCFB15, author = {Mariano Ceccato and Andrea Capiluppi and Paolo Falcarin and Cornelia Boldyreff}, title = {A large study on the effect of code obfuscation on the quality of java code}, journal = {Empir. Softw. Eng.}, volume = {20}, number = {6}, pages = {1486--1524}, year = {2015}, url = {https://doi.org/10.1007/s10664-014-9321-0}, doi = {10.1007/S10664-014-9321-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/CeccatoCFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SabatucciCMS15, author = {Luca Sabatucci and Mariano Ceccato and Alessandro Marchetto and Angelo Susi}, title = {Ahab's legs in scenario-based requirements validation: An experiment to study communication mistakes}, journal = {J. Syst. Softw.}, volume = {109}, pages = {124--136}, year = {2015}, url = {https://doi.org/10.1016/j.jss.2015.07.039}, doi = {10.1016/J.JSS.2015.07.039}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/SabatucciCMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/CeccatoMMNT15, author = {Mariano Ceccato and Alessandro Marchetto and Leonardo Mariani and Cu D. Nguyen and Paolo Tonella}, title = {Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {25}, number = {1}, pages = {5:1--5:38}, year = {2015}, url = {https://doi.org/10.1145/2768829}, doi = {10.1145/2768829}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/CeccatoMMNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DemissieCT15, author = {Biniam Fisseha Demissie and Mariano Ceccato and Roberto Tiella}, editor = {Paolo Falcarin and Brecht Wyseur}, title = {Assessment of Data Obfuscation with Residue Number Coding}, booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO} 2015, Florence, Italy, May 19, 2015}, pages = {38--44}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPRO.2015.15}, doi = {10.1109/SPRO.2015.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/DemissieCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/CeccatoPFRTT14, author = {Mariano Ceccato and Massimiliano Di Penta and Paolo Falcarin and Filippo Ricca and Marco Torchiano and Paolo Tonella}, title = {A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques}, journal = {Empir. Softw. Eng.}, volume = {19}, number = {4}, pages = {1040--1074}, year = {2014}, url = {https://doi.org/10.1007/s10664-013-9248-x}, doi = {10.1007/S10664-013-9248-X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/CeccatoPFRTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/CeccatoLC14, author = {Mariano Ceccato and Zheng Li and James R. Cordy}, title = {Guest editorial for the special issue on source code analysis and manipulation, {SCAM} 2012}, journal = {J. Softw. Evol. Process.}, volume = {26}, number = {6}, pages = {531--532}, year = {2014}, url = {https://doi.org/10.1002/smr.1655}, doi = {10.1002/SMR.1655}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/CeccatoLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/Morales-Ramirez14, author = {Itzel Morales{-}Ramirez and Anna Perini and Mariano Ceccato}, editor = {Selmin Nurcan and Elias Pimenidis}, title = {Towards Supporting the Analysis of Online Discussions in {OSS} Communities: {A} Speech-Act Based Approach}, booktitle = {Information Systems Engineering in Complex Environments - CAiSE Forum 2014, Thessaloniki, Greece, June 16-20, 2014, Selected Extended Papers}, series = {Lecture Notes in Business Information Processing}, volume = {204}, pages = {215--232}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19270-3\_14}, doi = {10.1007/978-3-319-19270-3\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/Morales-Ramirez14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TonellaCSC14, author = {Paolo Tonella and Mariano Ceccato and Bjorn De Sutter and Bart Coppens}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {A} Measurement Framework to Quantify Software Protections}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1505--1507}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662360}, doi = {10.1145/2660267.2662360}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TonellaCSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/CeccatoMPS14, author = {Mariano Ceccato and Alessandro Marchetto and Anna Perini and Angelo Susi}, editor = {Maya Daneva and Richard Berntsson{-}Svensson and Xavier Franch and Nazim H. Madhavji and Sabrina Marczak}, title = {How smartphone users assess the value/risk trade-off of apps: An observational study}, booktitle = {4th {IEEE} International Workshop on Empirical Requirements Engineering, EmpiRE 2014, Karlskrona, Sweden, August 25, 2014}, pages = {17--24}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/EmpiRE.2014.6890111}, doi = {10.1109/EMPIRE.2014.6890111}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/CeccatoMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/AvanciniC13, author = {Andrea Avancini and Mariano Ceccato}, title = {Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities}, journal = {Inf. Softw. Technol.}, volume = {55}, number = {12}, pages = {2209--2222}, year = {2013}, url = {https://doi.org/10.1016/j.infsof.2013.08.001}, doi = {10.1016/J.INFSOF.2013.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/AvanciniC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AvanciniC13, author = {Andrea Avancini and Mariano Ceccato}, editor = {Hong Zhu and Henry Muccini and Zhenyu Chen}, title = {Security testing of the communication among Android applications}, booktitle = {8th International Workshop on Automation of Software Test, {AST} 2013, San Francisco, CA, USA, May 18-19, 2013}, pages = {57--63}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IWAST.2013.6595792}, doi = {10.1109/IWAST.2013.6595792}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/AvanciniC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/BasileC13, author = {Cataldo Basile and Mariano Ceccato}, title = {Towards a unified software attack model to assess software protections}, booktitle = {{IEEE} 21st International Conference on Program Comprehension, {ICPC} 2013, San Francisco, CA, USA, 20-21 May, 2013}, pages = {219--222}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICPC.2013.6613852}, doi = {10.1109/ICPC.2013.6613852}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/BasileC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/AvanciniC13, author = {Andrea Avancini and Mariano Ceccato}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {Circe: {A} grammar-based oracle for testing Cross-site scripting in web applications}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {262--271}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671301}, doi = {10.1109/WCRE.2013.6671301}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/AvanciniC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/AvanciniC12, author = {Andrea Avancini and Mariano Ceccato}, editor = {Alessandro Moschitti and Barbara Plank}, title = {Security Oracle Based on Tree Kernel Methods}, booktitle = {Trustworthy Eternal Systems via Evolving Software, Data and Knowledge - Second International Workshop, EternalS 2012, Montpellier, France, August 28, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {379}, pages = {30--43}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-45260-4\_3}, doi = {10.1007/978-3-642-45260-4\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai/AvanciniC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AvanciniC12, author = {Andrea Avancini and Mariano Ceccato}, editor = {Daniel Hoffman and John Hughes and Dianxiang Xu}, title = {Grammar based oracle for security testing of web applications}, booktitle = {7th International Workshop on Automation of Software Test, {AST} 2012, Zurich, Switzerland, June 2-3, 2012}, pages = {15--21}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IWAST.2012.6228984}, doi = {10.1109/IWAST.2012.6228984}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/AvanciniC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CeccatoMMNT12, author = {Mariano Ceccato and Alessandro Marchetto and Leonardo Mariani and Cu D. Nguyen and Paolo Tonella}, editor = {Martin Glinz and Gail C. Murphy and Mauro Pezz{\`{e}}}, title = {An empirical study about the effectiveness of debugging when random test cases are used}, booktitle = {34th International Conference on Software Engineering, {ICSE} 2012, June 2-9, 2012, Zurich, Switzerland}, pages = {452--462}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICSE.2012.6227170}, doi = {10.1109/ICSE.2012.6227170}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/CeccatoMMNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/CeccatoT11, author = {Mariano Ceccato and Paolo Tonella}, title = {CodeBender: Remote Software Protection Using Orthogonal Replacement}, journal = {{IEEE} Softw.}, volume = {28}, number = {2}, pages = {28--34}, year = {2011}, url = {https://doi.org/10.1109/MS.2010.158}, doi = {10.1109/MS.2010.158}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/CeccatoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SabatucciCMS11, author = {Luca Sabatucci and Mariano Ceccato and Alessandro Marchetto and Angelo Susi}, title = {Ahab's Leg dilemma: On the design of a controlled experiment}, booktitle = {First International Workshop on Empirical Requirements Engineering, EmpiRE 2011, Trento, Italy, August 30, 2011}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/EmpiRE.2011.6046258}, doi = {10.1109/EMPIRE.2011.6046258}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/SabatucciCMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/AvanciniC11, author = {Andrea Avancini and Mariano Ceccato}, title = {Security Testing of Web Applications: {A} Search-Based Approach for Cross-Site Scripting Vulnerabilities}, booktitle = {11th {IEEE} Working Conference on Source Code Analysis and Manipulation, {SCAM} 2011, Williamsburg, VA, USA, September 25-26, 2011}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SCAM.2011.7}, doi = {10.1109/SCAM.2011.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/AvanciniC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/CeccatoDTM10, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella and Davide Marchignoli}, title = {Migrating legacy data structures based on variable overlay to Java}, journal = {J. Softw. Maintenance Res. Pract.}, volume = {22}, number = {3}, pages = {211--237}, year = {2010}, url = {https://doi.org/10.1002/smr.418}, doi = {10.1002/SMR.418}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/CeccatoDTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/RiccaPTTC10, author = {Filippo Ricca and Massimiliano Di Penta and Marco Torchiano and Paolo Tonella and Mariano Ceccato}, title = {How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by {UML} Stereotypes: {A} Series of Four Experiments}, journal = {{IEEE} Trans. Software Eng.}, volume = {36}, number = {1}, pages = {96--118}, year = {2010}, url = {https://doi.org/10.1109/TSE.2009.69}, doi = {10.1109/TSE.2009.69}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/RiccaPTTC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AvanciniC10, author = {Andrea Avancini and Mariano Ceccato}, editor = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, title = {Towards security testing with taint analysis and genetic algorithms}, booktitle = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS} 2010, May 2, 2010, Cape Town, South Africa}, pages = {65--71}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809100.1809110}, doi = {10.1145/1809100.1809110}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/AvanciniC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/CeccatoT10, author = {Mariano Ceccato and Paolo Tonella}, editor = {Radu Marinescu and Michele Lanza and Andrian Marcus}, title = {Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system}, booktitle = {26th {IEEE} International Conference on Software Maintenance {(ICSM} 2010), September 12-18, 2010, Timisoara, Romania}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICSM.2010.5609727}, doi = {10.1109/ICSM.2010.5609727}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/CeccatoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/CeccatoPNCT09, author = {Mariano Ceccato and Mila Dalla Preda and Jasvir Nagra and Christian S. Collberg and Paolo Tonella}, title = {Trading-off security and performance in barrier slicing for remote software entrusting}, journal = {Autom. Softw. Eng.}, volume = {16}, number = {2}, pages = {235--261}, year = {2009}, url = {https://doi.org/10.1007/s10515-009-0047-y}, doi = {10.1007/S10515-009-0047-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/CeccatoPNCT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/CeccatoT09, author = {Mariano Ceccato and Paolo Tonella}, title = {Dynamic aspect mining}, journal = {{IET} Softw.}, volume = {3}, number = {4}, pages = {321--336}, year = {2009}, url = {https://doi.org/10.1049/iet-sen.2008.0108}, doi = {10.1049/IET-SEN.2008.0108}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iee/CeccatoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/RiccaTPCT09, author = {Filippo Ricca and Marco Torchiano and Massimiliano Di Penta and Mariano Ceccato and Paolo Tonella}, title = {Using acceptance tests as a support for clarifying requirements: {A} series of experiments}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {2}, pages = {270--283}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.01.007}, doi = {10.1016/J.INFSOF.2008.01.007}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/RiccaTPCT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/CeccatoDT09, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella}, title = {Recovering structured data types from a legacy data model with overlays}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {10}, pages = {1454--1468}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2009.04.017}, doi = {10.1016/J.INFSOF.2009.04.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/CeccatoDT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/BernardiLC09, author = {Mario Luca Bernardi and Giuseppe A. Di Lucca and Mariano Ceccato}, editor = {Andreas Winter and Rudolf Ferenc and Jens Knodel}, title = {Workshop on Maintenance of Aspect Oriented Systems}, booktitle = {13th European Conference on Software Maintenance and Reengineering, {CSMR} 2009, Architecture-Centric Maintenance of Large-SCale Software Systems, Kaiserslautern, Germany, 24-27 March 2009}, pages = {273--274}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSMR.2009.46}, doi = {10.1109/CSMR.2009.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/BernardiLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/CeccatoPNFRTT09, author = {Mariano Ceccato and Massimiliano Di Penta and Jasvir Nagra and Paolo Falcarin and Filippo Ricca and Marco Torchiano and Paolo Tonella}, title = {The effectiveness of source code obfuscation: An experimental assessment}, booktitle = {The 17th {IEEE} International Conference on Program Comprehension, {ICPC} 2009, Vancouver, British Columbia, Canada, May 17-19, 2009}, pages = {178--187}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICPC.2009.5090041}, doi = {10.1109/ICPC.2009.5090041}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/CeccatoPNFRTT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CeccatoTPM09, author = {Mariano Ceccato and Paolo Tonella and Mila Dalla Preda and Anirban Majumdar}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {Remote software protection by orthogonal client replacement}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {448--455}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529380}, doi = {10.1145/1529282.1529380}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/CeccatoTPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CeccatoPNFRTT08, author = {Mariano Ceccato and Massimiliano Di Penta and Jasvir Nagra and Paolo Falcarin and Filippo Ricca and Marco Torchiano and Paolo Tonella}, editor = {Andy Ozment and Ketil St{\o}len}, title = {Towards experimental evaluation of code obfuscation techniques}, booktitle = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008}, pages = {39--46}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456362.1456371}, doi = {10.1145/1456362.1456371}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CeccatoPNFRTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/CeccatoTM08, author = {Mariano Ceccato and Paolo Tonella and Cristina Matteotti}, title = {Goto Elimination Strategies in the Migration of Legacy Code to Java}, booktitle = {12th European Conference on Software Maintenance and Reengineering, {CSMR} 2008, April 1-4, 2008, Athens, Greece}, pages = {53--62}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSMR.2008.4493300}, doi = {10.1109/CSMR.2008.4493300}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/CeccatoTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/Ceccato08, author = {Mariano Ceccato}, title = {Automatic Support for the Migration Towards Aspects}, booktitle = {12th European Conference on Software Maintenance and Reengineering, {CSMR} 2008, April 1-4, 2008, Athens, Greece}, pages = {298--301}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSMR.2008.4493331}, doi = {10.1109/CSMR.2008.4493331}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/Ceccato08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/RiccaPTTCV08, author = {Filippo Ricca and Massimiliano Di Penta and Marco Torchiano and Paolo Tonella and Mariano Ceccato and Corrado Aaron Visaggio}, editor = {Wilhelm Sch{\"{a}}fer and Matthew B. Dwyer and Volker Gruhn}, title = {Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks}, booktitle = {30th International Conference on Software Engineering {(ICSE} 2008), Leipzig, Germany, May 10-18, 2008}, pages = {361--370}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368088.1368138}, doi = {10.1145/1368088.1368138}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/RiccaPTTCV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/CeccatoNT08, author = {Mariano Ceccato and Jasvir Nagra and Paolo Tonella}, title = {Distributing Trust Verification to Increase Application Performance}, booktitle = {16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing {(PDP} 2008), 13-15 February 2008, Toulouse, France}, pages = {604--610}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PDP.2008.69}, doi = {10.1109/PDP.2008.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/CeccatoNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CeccatoDT08, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella}, title = {Using Program Transformations to Add Structure to a Legacy Data Model}, booktitle = {Eighth {IEEE} International Working Conference on Source Code Analysis and Manipulation {(SCAM} 2008), 28-29 September 2008, Beijing, China}, pages = {197--206}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SCAM.2008.9}, doi = {10.1109/SCAM.2008.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CeccatoDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/CeccatoOT08, author = {Mariano Ceccato and Yoram Ofek and Paolo Tonella}, editor = {Viliam Geffert and Juhani Karhum{\"{a}}ki and Alberto Bertoni and Bart Preneel and Pavol N{\'{a}}vrat and M{\'{a}}ria Bielikov{\'{a}}}, title = {Remote Entrusting by Run-Time Software Authentication}, booktitle = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 19-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4910}, pages = {83--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77566-9\_8}, doi = {10.1007/978-3-540-77566-9\_8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/CeccatoOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/CeccatoDTM08, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella and Davide Marchignoli}, editor = {Ahmed E. Hassan and Andy Zaidman and Massimiliano Di Penta}, title = {Data Model Reverse Engineering in Migrating a Legacy System to Java}, booktitle = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 15-18, 2008}, pages = {177--186}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WCRE.2008.27}, doi = {10.1109/WCRE.2008.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/CeccatoDTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/RiccaTPCT07, author = {Filippo Ricca and Marco Torchiano and Massimiliano Di Penta and Mariano Ceccato and Paolo Tonella}, title = {The Use of Executable {FIT} Tables to support Maintenance and Evolution Tasks}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {8}, year = {2007}, url = {https://doi.org/10.14279/tuj.eceasst.8.119}, doi = {10.14279/TUJ.ECEASST.8.119}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/RiccaTPCT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/RiccaPTTC07, author = {Filippo Ricca and Massimiliano Di Penta and Marco Torchiano and Paolo Tonella and Mariano Ceccato}, title = {How design notations affect the comprehension of Web applications}, journal = {J. Softw. Maintenance Res. Pract.}, volume = {19}, number = {5}, pages = {339--359}, year = {2007}, url = {https://doi.org/10.1002/smr.357}, doi = {10.1002/SMR.357}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/RiccaPTTC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/RiccaPTTC07, author = {Filippo Ricca and Massimiliano Di Penta and Marco Torchiano and Paolo Tonella and Mariano Ceccato}, title = {The Role of Experience and Ability in Comprehension Tasks Supported by {UML} Stereotypes}, booktitle = {29th International Conference on Software Engineering {(ICSE} 2007), Minneapolis, MN, USA, May 20-26, 2007}, pages = {375--384}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSE.2007.86}, doi = {10.1109/ICSE.2007.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/RiccaPTTC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/Ceccato07, author = {Mariano Ceccato}, title = {Migrating Object Oriented code to Aspect Oriented Programming}, booktitle = {23rd {IEEE} International Conference on Software Maintenance {(ICSM} 2007), October 2-5, 2007, Paris, France}, pages = {497--498}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSM.2007.4362668}, doi = {10.1109/ICSM.2007.4362668}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsm/Ceccato07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpse/RiccaTCT07, author = {Filippo Ricca and Marco Torchiano and Mariano Ceccato and Paolo Tonella}, editor = {Massimiliano Di Penta and Michele Lanza}, title = {Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements}, booktitle = {9th International Workshop on Principles of Software Evolution {(IWPSE} 2007), in conjunction with the 6th {ESEC/FSE} joint meeting, Dubrovnik, Croatia, September 3-4, 2007}, pages = {51--58}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1294948.1294962}, doi = {10.1145/1294948.1294962}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwpse/RiccaTCT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CeccatoPNCT07, author = {Mariano Ceccato and Mila Dalla Preda and Jasvir Nagra and Christian S. Collberg and Paolo Tonella}, title = {Barrier Slicing for Remote Software Trusting}, booktitle = {Seventh {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2007), September 30 - October 1, 2007, Paris, France}, pages = {27--36}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SCAM.2007.27}, doi = {10.1109/SCAM.2007.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CeccatoPNCT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sqj/CeccatoMMMTT06, author = {Mariano Ceccato and Marius Marin and Kim Mens and Leon Moonen and Paolo Tonella and Tom Tourw{\'{e}}}, title = {Applying and combining three different aspect Mining Techniques}, journal = {Softw. Qual. J.}, volume = {14}, number = {3}, pages = {209--231}, year = {2006}, url = {https://doi.org/10.1007/s11219-006-9217-3}, doi = {10.1007/S11219-006-9217-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sqj/CeccatoMMMTT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BinkleyCHRT06, author = {David W. Binkley and Mariano Ceccato and Mark Harman and Filippo Ricca and Paolo Tonella}, title = {Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects}, journal = {{IEEE} Trans. Software Eng.}, volume = {32}, number = {9}, pages = {698--717}, year = {2006}, url = {https://doi.org/10.1109/TSE.2006.95}, doi = {10.1109/TSE.2006.95}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/BinkleyCHRT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/RiccaPTTC06, author = {Filippo Ricca and Massimiliano Di Penta and Marco Torchiano and Paolo Tonella and Mariano Ceccato}, title = {An empirical study on the usefulness of Conallen's stereotypes inWeb application comprehension}, booktitle = {Eighth {IEEE} International Workshop on Web Site Evolution {(WSE} 2006), 22-24 September 2006, Philadelphia, Pennsylvania, {USA}}, pages = {58--68}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WSE.2006.3}, doi = {10.1109/WSE.2006.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wse/RiccaPTTC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0607006, author = {Mariano Ceccato and Marius Marin and Kim Mens and Leon Moonen and Paolo Tonella and Tom Tourw{\'{e}}}, title = {Applying and Combining Three Different Aspect Mining Techniques}, journal = {CoRR}, volume = {abs/cs/0607006}, year = {2006}, url = {http://arxiv.org/abs/cs/0607006}, eprinttype = {arXiv}, eprint = {cs/0607006}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0607006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/TonellaC05, author = {Paolo Tonella and Mariano Ceccato}, title = {Refactoring the Aspectizable Interfaces: An Empirical Assessment}, journal = {{IEEE} Trans. Software Eng.}, volume = {31}, number = {10}, pages = {819--832}, year = {2005}, url = {https://doi.org/10.1109/TSE.2005.115}, doi = {10.1109/TSE.2005.115}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/TonellaC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/BinkleyCHRT05, author = {David W. Binkley and Mariano Ceccato and Mark Harman and Filippo Ricca and Paolo Tonella}, title = {Automated Refactoring of Object Oriented Code into Aspects}, booktitle = {21st {IEEE} International Conference on Software Maintenance {(ICSM} 2005), 25-30 September 2005, Budapest, Hungary}, pages = {27--36}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICSM.2005.27}, doi = {10.1109/ICSM.2005.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/BinkleyCHRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/CeccatoMMMTT05, author = {Mariano Ceccato and Marius Marin and Kim Mens and Leon Moonen and Paolo Tonella and Tom Tourw{\'{e}}}, title = {A Qualitative Comparison of Three Aspect Mining Techniques}, booktitle = {13th International Workshop on Program Comprehension {(IWPC} 2005), 15-16 May 2005, St. Louis, MO, {USA}}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WPC.2005.2}, doi = {10.1109/WPC.2005.2}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/CeccatoMMMTT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/TonellaC04, author = {Paolo Tonella and Mariano Ceccato}, title = {Migrating Interface Implementation to Aspects}, booktitle = {20th International Conference on Software Maintenance {(ICSM} 2004), 11-17 September 2004, Chicago, IL, {USA}}, pages = {220--229}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICSM.2004.1357806}, doi = {10.1109/ICSM.2004.1357806}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/TonellaC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CeccatoT04, author = {Mariano Ceccato and Paolo Tonella}, title = {Adding Distribution to Existing Applications by Means of Aspect Oriented Programming}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {107--116}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.3}, doi = {10.1109/SCAM.2004.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CeccatoT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/TonellaC04, author = {Paolo Tonella and Mariano Ceccato}, title = {Aspect Mining through the Formal Concept Analysis of Execution Traces}, booktitle = {11th Working Conference on Reverse Engineering, {WCRE} 2004, Delft, The Netherlands, November 8-12, 2004}, pages = {112--121}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/WCRE.2004.13}, doi = {10.1109/WCRE.2004.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/TonellaC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.