BibTeX records: Mariano Ceccato

download as .bib file

@article{DBLP:journals/compsec/RomdhanaMCT23,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Assessing the security of inter-app communications in android through
                  reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103311},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103311},
  doi          = {10.1016/J.COSE.2023.103311},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/SharDCTLJB23,
  author       = {Lwin Khin Shar and
                  Biniam Fisseha Demissie and
                  Mariano Ceccato and
                  Yan Naing Tun and
                  David Lo and
                  Lingxiao Jiang and
                  Christoph Bienert},
  title        = {Experimental comparison of features, analyses, and classifiers for
                  Android malware detection},
  journal      = {Empir. Softw. Eng.},
  volume       = {28},
  number       = {6},
  pages        = {130},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10664-023-10375-y},
  doi          = {10.1007/S10664-023-10375-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/SharDCTLJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/PasquaBCCPC23,
  author       = {Michele Pasqua and
                  Andrea Benini and
                  Filippo Contro and
                  Marco Crosara and
                  Mila Dalla Preda and
                  Mariano Ceccato},
  title        = {Enhancing Ethereum smart-contracts static analysis by computing a
                  precise Control-Flow Graph of Ethereum bytecode},
  journal      = {J. Syst. Softw.},
  volume       = {200},
  pages        = {111653},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jss.2023.111653},
  doi          = {10.1016/J.JSS.2023.111653},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/PasquaBCCPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsiotsec/MarastoniC23,
  author       = {Niccol{\`{o}} Marastoni and
                  Mariano Ceccato},
  editor       = {Magnus Almgren and
                  Earlence Fernandes},
  title        = {Remote Attestation of IoT Devices using Physically Unclonable Functions:
                  Recent Advancements and Open Research Challenges},
  booktitle    = {Proceedings of the 5th Workshop on CPS{\&}IoT Security and Privacy,
                  Copenhagen, Denmark, 26 November 2023},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605758.3623502},
  doi          = {10.1145/3605758.3623502},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpsiotsec/MarastoniC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/PavanelloMOOMLCVNCCCNKZSBVRFSCSCGPKBCCC23,
  author       = {Fabio Pavanello and
                  C{\'{e}}dric Marchand and
                  Ian O'Connor and
                  R{\'{e}}gis Orobtchouk and
                  Fabien Mandorlo and
                  Xavier Letartre and
                  S{\'{e}}bastien Cueff and
                  Elena Ioana Vatajelu and
                  Giorgio Di Natale and
                  Benoit Cluzel and
                  Aurelien Coillet and
                  Beno{\^{\i}}t Charbonnier and
                  Pierre Noe and
                  Frantisek Kavan and
                  Martin Zoldak and
                  Michal Szaj and
                  Peter Bienstman and
                  Thomas Van Vaerenbergh and
                  Ulrich R{\"{u}}hrmair and
                  Paulo F. Flores and
                  Lu{\'{\i}}s Guerra e Silva and
                  Ricardo Chaves and
                  Lu{\'{\i}}s Miguel Silveira and
                  Mariano Ceccato and
                  Dimitris Gizopoulos and
                  George Papadimitriou and
                  Vasileios Karakostas and
                  Axel Brando and
                  Francisco J. Cazorla and
                  Ramon Canal and
                  Pau Closas and
                  Adria Gusi{-}Amigo and
                  Paolo Crovetti and
                  Alessio Carpegna and
                  Tzamn Melendez Carmona and
                  Stefano Di Carlo and
                  Alessandro Savino},
  title        = {{EUROPULS:} NEUROmorphic energy-efficient secure accelerators based
                  on Phase change materials aUgmented siLicon photonicS},
  booktitle    = {{IEEE} European Test Symposium, {ETS} 2023, Venezia, Italy, May 22-26,
                  2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ETS56758.2023.10173974},
  doi          = {10.1109/ETS56758.2023.10173974},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/PavanelloMOOMLCVNCCCNKZSBVRFSCSCGPKBCCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CorradiniPC23,
  author       = {Davide Corradini and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {Automated Black-Box Testing of Mass Assignment Vulnerabilities in
                  RESTful APIs},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {2553--2564},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00213},
  doi          = {10.1109/ICSE48619.2023.00213},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/CorradiniPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/KimCSOPTC23,
  author       = {Myeongsoo Kim and
                  Davide Corradini and
                  Saurabh Sinha and
                  Alessandro Orso and
                  Michele Pasqua and
                  Rachel Tzoref{-}Brill and
                  Mariano Ceccato},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {Enhancing {REST} {API} Testing with {NLP} Techniques},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {1232--1243},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598131},
  doi          = {10.1145/3597926.3598131},
  timestamp    = {Mon, 17 Jul 2023 11:49:17 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/KimCSOPTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01261,
  author       = {Davide Corradini and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {Automated Black-box Testing of Mass Assignment Vulnerabilities in
                  RESTful APIs},
  journal      = {CoRR},
  volume       = {abs/2301.01261},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01261},
  doi          = {10.48550/ARXIV.2301.01261},
  eprinttype    = {arXiv},
  eprint       = {2301.01261},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01261.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-03139,
  author       = {Fabio Pavanello and
                  C{\'{e}}dric Marchand and
                  Ian O'Connor and
                  R{\'{e}}gis Orobtchouk and
                  Fabien Mandorlo and
                  Xavier Letartre and
                  S{\'{e}}bastien Cueff and
                  Elena Ioana Vatajelu and
                  Giorgio Di Natale and
                  Benoit Cluzel and
                  Aurelien Coillet and
                  Beno{\^{\i}}t Charbonnier and
                  Pierre Noe and
                  Frantisek Kavan and
                  Martin Zoldak and
                  Michal Szaj and
                  Peter Bienstman and
                  Thomas Van Vaerenbergh and
                  Ulrich R{\"{u}}hrmair and
                  Paulo F. Flores and
                  Lu{\'{\i}}s Guerra e Silva and
                  Ricardo Chaves and
                  Lu{\'{\i}}s Miguel Silveira and
                  Mariano Ceccato and
                  Dimitris Gizopoulos and
                  George Papadimitriou and
                  Vasileios Karakostas and
                  Axel Brando and
                  Francisco J. Cazorla and
                  Ramon Canal and
                  Pau Closas and
                  Adria Gusi{-}Amigo and
                  Paolo Crovetti and
                  Alessio Carpegna and
                  Tzamn Melendez Carmona and
                  Stefano Di Carlo and
                  Alessandro Savino},
  title        = {{NEUROPULS:} NEUROmorphic energy-efficient secure accelerators based
                  on Phase change materials aUgmented siLicon photonicS},
  journal      = {CoRR},
  volume       = {abs/2305.03139},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.03139},
  doi          = {10.48550/ARXIV.2305.03139},
  eprinttype    = {arXiv},
  eprint       = {2305.03139},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-03139.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-09383,
  author       = {Fabio Pavanello and
                  C{\'{e}}dric Marchand and
                  Paul Jim{\'{e}}nez and
                  Xavier Letartre and
                  Ricardo Chaves and
                  Niccol{\`{o}} Marastoni and
                  Alberto Lovato and
                  Mariano Ceccato and
                  George Papadimitriou and
                  Vasileios Karakostas and
                  Dimitris Gizopoulos and
                  Roberta Bardini and
                  Tzamn Melendez Carmona and
                  Stefano Di Carlo and
                  Alessandro Savino and
                  Laurence Lerch and
                  Ulrich R{\"{u}}hrmair and
                  Sergio Vinagrero Gutierrez and
                  Giorgio Di Natale and
                  Elena Ioana Vatajelu},
  title        = {Security layers and related services within the Horizon Europe {NEUROPULS}
                  project},
  journal      = {CoRR},
  volume       = {abs/2312.09383},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.09383},
  doi          = {10.48550/ARXIV.2312.09383},
  eprinttype    = {arXiv},
  eprint       = {2312.09383},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-09383.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ManfrediCSR22,
  author       = {Salvatore Manfredi and
                  Mariano Ceccato and
                  Giada Sciarretta and
                  Silvio Ranise},
  title        = {Empirical Validation on the Usability of Security Reports for Patching
                  {TLS} Misconfigurations: User- and Case-Studies on Actionable Mitigations},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {56--86},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.056},
  doi          = {10.22667/JOWUA.2022.03.31.056},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/ManfrediCSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/CorradiniZPVDC22,
  author       = {Davide Corradini and
                  Amedeo Zampieri and
                  Michele Pasqua and
                  Emanuele Viglianisi and
                  Michael Dallago and
                  Mariano Ceccato},
  title        = {Automated black-box testing of nominal and error scenarios in RESTful
                  APIs},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {32},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/stvr.1808},
  doi          = {10.1002/STVR.1808},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/CorradiniZPVDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/RomdhanaMCT22,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Deep Reinforcement Learning for Black-box Testing of Android Apps},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {31},
  number       = {4},
  pages        = {65:1--65:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3502868},
  doi          = {10.1145/3502868},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/RomdhanaMCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CeccatoDLLM22,
  author       = {Mariano Ceccato and
                  Youssef Driouich and
                  Ruggero Lanotte and
                  Marco Lucchese and
                  Massimo Merro},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {Towards Reverse Engineering of Industrial Physical Processes},
  booktitle    = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25460-4\_15},
  doi          = {10.1007/978-3-031-25460-4\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CeccatoDLLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/CorradiniZPC22,
  author       = {Davide Corradini and
                  Amedeo Zampieri and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {RestTestGen: An Extensible Framework for Automated Black-box Testing
                  of RESTful APIs},
  booktitle    = {{IEEE} International Conference on Software Maintenance and Evolution,
                  {ICSME} 2022, Limassol, Cyprus, October 3-7, 2022},
  pages        = {504--508},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSME55016.2022.00068},
  doi          = {10.1109/ICSME55016.2022.00068},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/CorradiniZPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/RomdhanaCMT22,
  author       = {Andrea Romdhana and
                  Mariano Ceccato and
                  Alessio Merlo and
                  Paolo Tonella},
  title        = {{IFRIT:} Focused Testing through Deep Reinforcement Learning},
  booktitle    = {15th {IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2022, Valencia, Spain, April 4-14, 2022},
  pages        = {24--34},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICST53961.2022.00013},
  doi          = {10.1109/ICST53961.2022.00013},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/RomdhanaCMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/GaiardelliSPCF22,
  author       = {Sebastiano Gaiardelli and
                  Stefano Spellini and
                  Michele Pasqua and
                  Mariano Ceccato and
                  Franco Fummi},
  title        = {Integrating Smart Contracts in Manufacturing for Automated Assessment
                  of Production Quality},
  booktitle    = {{IECON} 2022 - 48th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Brussels, Belgium, October 17-20, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IECON49645.2022.9968887},
  doi          = {10.1109/IECON49645.2022.9968887},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/GaiardelliSPCF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CeccatoRG22,
  author       = {Mariano Ceccato and
                  Banani Roy and
                  Mohammad Ghafari},
  title        = {Message from the General Chair and Program Co-Chairs {SCAM} 2022},
  booktitle    = {22nd {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2021, Limassol, Cyprus, October 3, 2022},
  pages        = {ix--x},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SCAM55253.2022.00005},
  doi          = {10.1109/SCAM55253.2022.00005},
  timestamp    = {Mon, 23 Jan 2023 22:18:07 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CeccatoRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ManfrediCSR21,
  author       = {Salvatore Manfredi and
                  Mariano Ceccato and
                  Giada Sciarretta and
                  Silvio Ranise},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Do Security Reports Meet Usability?: Lessons Learned from Using Actionable
                  Mitigations for Patching {TLS} Misconfigurations},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {141:1--141:13},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3469187},
  doi          = {10.1145/3465481.3469187},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ManfrediCSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/CorradiniZPC21,
  author       = {Davide Corradini and
                  Amedeo Zampieri and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {Restats: {A} Test Coverage Tool for RESTful APIs},
  booktitle    = {{IEEE} International Conference on Software Maintenance and Evolution,
                  {ICSME} 2021, Luxembourg, September 27 - October 1, 2021},
  pages        = {594--598},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICSME52107.2021.00063},
  doi          = {10.1109/ICSME52107.2021.00063},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsm/CorradiniZPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/ViglianisiCT21,
  author       = {Emanuele Viglianisi and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Summary of: {A} Federated Society of Bots for Smart Contract Testing},
  booktitle    = {14th {IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2021, Porto de Galinhas, Brazil, April 12-16, 2021},
  pages        = {282--283},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICST49551.2021.00040},
  doi          = {10.1109/ICST49551.2021.00040},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/ViglianisiCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/RomdhanaCGMT21,
  author       = {Andrea Romdhana and
                  Mariano Ceccato and
                  Gabriel Claudiu Georgiu and
                  Alessio Merlo and
                  Paolo Tonella},
  title        = {{COSMO:} Code Coverage Made Easier for Android},
  booktitle    = {14th {IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2021, Porto de Galinhas, Brazil, April 12-16, 2021},
  pages        = {417--423},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICST49551.2021.00053},
  doi          = {10.1109/ICST49551.2021.00053},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/RomdhanaCGMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/ControCCP21,
  author       = {Filippo Contro and
                  Marco Crosara and
                  Mariano Ceccato and
                  Mila Dalla Preda},
  title        = {EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum
                  Bytecode},
  booktitle    = {29th {IEEE/ACM} International Conference on Program Comprehension,
                  {ICPC} 2021, Madrid, Spain, May 20-21, 2021},
  pages        = {127--137},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICPC52881.2021.00021},
  doi          = {10.1109/ICPC52881.2021.00021},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwpc/ControCCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CorradiniZPC21,
  author       = {Davide Corradini and
                  Amedeo Zampieri and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {Empirical Comparison of Black-box Test Case Generation Tools for RESTful
                  APIs},
  booktitle    = {21st {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2021, Luxembourg, September 27-28, 2021},
  pages        = {226--236},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SCAM52516.2021.00035},
  doi          = {10.1109/SCAM52516.2021.00035},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/CorradiniZPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-02636,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Deep Reinforcement Learning for Black-Box Testing of Android Apps},
  journal      = {CoRR},
  volume       = {abs/2101.02636},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.02636},
  eprinttype    = {arXiv},
  eprint       = {2101.02636},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-02636.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-09113,
  author       = {Filippo Contro and
                  Marco Crosara and
                  Mariano Ceccato and
                  Mila Dalla Preda},
  title        = {EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum
                  Bytecode},
  journal      = {CoRR},
  volume       = {abs/2103.09113},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.09113},
  eprinttype    = {arXiv},
  eprint       = {2103.09113},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-09113.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08196,
  author       = {Davide Corradini and
                  Amedeo Zampieri and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {Empirical Comparison of Black-box Test Case Generation Tools for RESTful
                  APIs},
  journal      = {CoRR},
  volume       = {abs/2108.08196},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08196},
  eprinttype    = {arXiv},
  eprint       = {2108.08196},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08196.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08209,
  author       = {Davide Corradini and
                  Amedeo Zampieri and
                  Michele Pasqua and
                  Mariano Ceccato},
  title        = {Restats: {A} Test Coverage Tool for RESTful APIs},
  journal      = {CoRR},
  volume       = {abs/2108.08209},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08209},
  eprinttype    = {arXiv},
  eprint       = {2108.08209},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/ViticchieRBTCT20,
  author       = {Alessio Viticchi{\'{e}} and
                  Leonardo Regano and
                  Cataldo Basile and
                  Marco Torchiano and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Empirical assessment of the effort needed to attack programs protected
                  with client/server code splitting},
  journal      = {Empir. Softw. Eng.},
  volume       = {25},
  number       = {1},
  pages        = {1--48},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10664-019-09738-1},
  doi          = {10.1007/S10664-019-09738-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/ViticchieRBTCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/DemissieCS20,
  author       = {Biniam Fisseha Demissie and
                  Mariano Ceccato and
                  Lwin Khin Shar},
  title        = {Security analysis of permission re-delegation vulnerabilities in Android
                  apps},
  journal      = {Empir. Softw. Eng.},
  volume       = {25},
  number       = {6},
  pages        = {5084--5136},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10664-020-09879-8},
  doi          = {10.1007/S10664-020-09879-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/DemissieCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BerlatoC20,
  author       = {Stefano Berlato and
                  Mariano Ceccato},
  title        = {A large-scale study on the adoption of anti-debugging and anti-tampering
                  protections in android apps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102463},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102463},
  doi          = {10.1016/J.JISA.2020.102463},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BerlatoC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/FellinC20,
  author       = {Roberto Fellin and
                  Mariano Ceccato},
  title        = {Experimental assessment of XOR-Masking data obfuscation based on K-Clique
                  opaque constants},
  journal      = {J. Syst. Softw.},
  volume       = {162},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jss.2019.110492},
  doi          = {10.1016/J.JSS.2019.110492},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/FellinC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ViglianisiCT20,
  author       = {Emanuele Viglianisi and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {A federated society of bots for smart contract testing},
  journal      = {J. Syst. Softw.},
  volume       = {168},
  pages        = {110647},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jss.2020.110647},
  doi          = {10.1016/J.JSS.2020.110647},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ViglianisiCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DemissieC20,
  author       = {Biniam Fisseha Demissie and
                  Mariano Ceccato},
  editor       = {David Lo and
                  Leonardo Mariani and
                  Ali Mesbah},
  title        = {Security testing of second order permission re-delegation vulnerabilities
                  in Android apps},
  booktitle    = {MOBILESoft '20: {IEEE/ACM} 7th International Conference on Mobile
                  Software Engineering and Systems, Seoul, Republic of Korea, July 13-15,
                  2020},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3387905.3388592},
  doi          = {10.1145/3387905.3388592},
  timestamp    = {Thu, 27 Jul 2023 16:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/DemissieC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SharDCM20,
  author       = {Lwin Khin Shar and
                  Biniam Fisseha Demissie and
                  Mariano Ceccato and
                  Wei Minn},
  editor       = {David Lo and
                  Leonardo Mariani and
                  Ali Mesbah},
  title        = {Experimental comparison of features and classifiers for Android malware
                  detection},
  booktitle    = {MOBILESoft '20: {IEEE/ACM} 7th International Conference on Mobile
                  Software Engineering and Systems, Seoul, Republic of Korea, July 13-15,
                  2020},
  pages        = {50--60},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3387905.3388596},
  doi          = {10.1145/3387905.3388596},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SharDCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/ViglianisiDC20,
  author       = {Emanuele Viglianisi and
                  Michael Dallago and
                  Mariano Ceccato},
  title        = {{RESTTESTGEN:} Automated Black-Box Testing of RESTful APIs},
  booktitle    = {13th {IEEE} International Conference on Software Testing, Validation
                  and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020},
  pages        = {142--152},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICST46399.2020.00024},
  doi          = {10.1109/ICST46399.2020.00024},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/ViglianisiDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/LeottaBRCT20,
  author       = {Maurizio Leotta and
                  Matteo Biagiola and
                  Filippo Ricca and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {A Family of Experiments to Assess the Impact of Page Object Pattern
                  in Web Test Suite Development},
  booktitle    = {13th {IEEE} International Conference on Software Testing, Validation
                  and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020},
  pages        = {263--273},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICST46399.2020.00035},
  doi          = {10.1109/ICST46399.2020.00035},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/LeottaBRCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/CeccatoCGKMOT20,
  author       = {Mariano Ceccato and
                  Davide Corradini and
                  Luca Gazzola and
                  Fitsum Meshesha Kifetew and
                  Leonardo Mariani and
                  Matteo Orr{\`{u}} and
                  Paolo Tonella},
  title        = {A Framework for In-Vivo Testing of Mobile Applications},
  booktitle    = {13th {IEEE} International Conference on Software Testing, Validation
                  and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020},
  pages        = {286--296},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICST46399.2020.00037},
  doi          = {10.1109/ICST46399.2020.00037},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/CeccatoCGKMOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-01785,
  author       = {Mariano Ceccato and
                  Davide Corradini and
                  Luca Gazzola and
                  Fitsum Meshesha Kifetew and
                  Leonardo Mariani and
                  Matteo Orr{\`{u}} and
                  Paolo Tonella},
  title        = {A Framework for In-Vivo Testing of Mobile Applications},
  journal      = {CoRR},
  volume       = {abs/2002.01785},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.01785},
  eprinttype    = {arXiv},
  eprint       = {2002.01785},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-01785.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/CeccatoTBFTCS19,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cataldo Basile and
                  Paolo Falcarin and
                  Marco Torchiano and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Understanding the behaviour of hackers while performing attack tasks
                  in a professional setting and in a public challenge},
  journal      = {Empir. Softw. Eng.},
  volume       = {24},
  number       = {1},
  pages        = {240--286},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10664-018-9625-6},
  doi          = {10.1007/S10664-018-9625-6},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/CeccatoTBFTCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/CeccatoGKMOT19,
  author       = {Mariano Ceccato and
                  Luca Gazzola and
                  Fitsum Meshesha Kifetew and
                  Leonardo Mariani and
                  Matteo Orr{\`{u}} and
                  Paolo Tonella},
  editor       = {Katinka Wolter and
                  Ina Schieferdecker and
                  Barbara Gallina and
                  Michel Cukier and
                  Roberto Natella and
                  Naghmeh Ramezani Ivaki and
                  Nuno Laranjeiro},
  title        = {Toward In-Vivo Testing of Mobile Applications},
  booktitle    = {{IEEE} International Symposium on Software Reliability Engineering
                  Workshops, {ISSRE} Workshops 2019, Berlin, Germany, October 27-30,
                  2019},
  pages        = {137--143},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISSREW.2019.00063},
  doi          = {10.1109/ISSREW.2019.00063},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issre/CeccatoGKMOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/PizzolottoFC19,
  author       = {Davide Pizzolotto and
                  Roberto Fellin and
                  Mariano Ceccato},
  editor       = {Xinyu Wang and
                  David Lo and
                  Emad Shihab},
  title        = {{OBLIVE:} Seamless Code Obfuscation for Java Programs and Android
                  Apps},
  booktitle    = {26th {IEEE} International Conference on Software Analysis, Evolution
                  and Reengineering, {SANER} 2019, Hangzhou, China, February 24-27,
                  2019},
  pages        = {629--633},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SANER.2019.8667982},
  doi          = {10.1109/SANER.2019.8667982},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/PizzolottoFC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-04942,
  author       = {Davide Pizzolotto and
                  Mariano Ceccato},
  title        = {Obfuscating Java Programs by Translating Selected Portions of Bytecode
                  to Native Libraries},
  journal      = {CoRR},
  volume       = {abs/1901.04942},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.04942},
  eprinttype    = {arXiv},
  eprint       = {1901.04942},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-04942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DemissieCS18,
  author       = {Biniam Fisseha Demissie and
                  Mariano Ceccato and
                  Lwin Khin Shar},
  editor       = {Christine Julien and
                  Grace A. Lewis and
                  Itai Segall},
  title        = {AnFlo: detecting anomalous sensitive information flows in Android
                  apps},
  booktitle    = {Proceedings of the 5th International Conference on Mobile Software
                  Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden,
                  May 27 - 28, 2018},
  pages        = {24--34},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197231.3197238},
  doi          = {10.1145/3197231.3197238},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/DemissieCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/PizzolottoC18,
  author       = {Davide Pizzolotto and
                  Mariano Ceccato},
  title        = {[Research Paper] Obfuscating Java Programs by Translating Selected
                  Portions of Bytecode to Native Libraries},
  booktitle    = {18th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2018, Madrid, Spain, September 23-24, 2018},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SCAM.2018.00012},
  doi          = {10.1109/SCAM.2018.00012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/PizzolottoC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-07894,
  author       = {Biniam Fisseha Demissie and
                  Mariano Ceccato and
                  Lwin Khin Shar},
  title        = {AnFlo: Detecting Anomalous Sensitive Information Flows in Android
                  Apps},
  journal      = {CoRR},
  volume       = {abs/1812.07894},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.07894},
  eprinttype    = {arXiv},
  eprint       = {1812.07894},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-07894.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/CeccatoTBCSFT17,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cataldo Basile and
                  Bart Coppens and
                  Bjorn De Sutter and
                  Paolo Falcarin and
                  Marco Torchiano},
  editor       = {Giuseppe Scanniello and
                  David Lo and
                  Alexander Serebrenik},
  title        = {How professional hackers understand protected code while performing
                  attack tasks},
  booktitle    = {Proceedings of the 25th International Conference on Program Comprehension,
                  {ICPC} 2017, Buenos Aires, Argentina, May 22-23, 2017},
  pages        = {154--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICPC.2017.2},
  doi          = {10.1109/ICPC.2017.2},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/CeccatoTBCSFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/TiellaC17,
  author       = {Roberto Tiella and
                  Mariano Ceccato},
  editor       = {Martin Pinzger and
                  Gabriele Bavota and
                  Andrian Marcus},
  title        = {Automatic generation of opaque constants based on the k-clique problem
                  for resilient data obfuscation},
  booktitle    = {{IEEE} 24th International Conference on Software Analysis, Evolution
                  and Reengineering, {SANER} 2017, Klagenfurt, Austria, February 20-24,
                  2017},
  pages        = {182--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SANER.2017.7884620},
  doi          = {10.1109/SANER.2017.7884620},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/TiellaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ViticchieRTBCTT17,
  author       = {Alessio Viticchi{\'{e}} and
                  Leonardo Regano and
                  Marco Torchiano and
                  Cataldo Basile and
                  Mariano Ceccato and
                  Paolo Tonella and
                  Roberto Tiella},
  title        = {Assessment of Source Code Obfuscation Techniques},
  journal      = {CoRR},
  volume       = {abs/1704.02307},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02307},
  eprinttype    = {arXiv},
  eprint       = {1704.02307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ViticchieRTBCTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CeccatoTBCSFT17,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cataldo Basile and
                  Bart Coppens and
                  Bjorn De Sutter and
                  Paolo Falcarin and
                  Marco Torchiano},
  title        = {How Professional Hackers Understand Protected Code while Performing
                  Attack Tasks},
  journal      = {CoRR},
  volume       = {abs/1704.02774},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02774},
  eprinttype    = {arXiv},
  eprint       = {1704.02774},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CeccatoTBCSFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ViticchieBACAC16,
  author       = {Alessio Viticchi{\'{e}} and
                  Cataldo Basile and
                  Andrea Avancini and
                  Mariano Ceccato and
                  Bert Abrath and
                  Bart Coppens},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Reactive Attestation: Automatic Detection and Reaction to Software
                  Tampering Attacks},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995315},
  doi          = {10.1145/2995306.2995315},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ViticchieBACAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SutterBCFZWD16,
  author       = {Bjorn De Sutter and
                  Cataldo Basile and
                  Mariano Ceccato and
                  Paolo Falcarin and
                  Michael Zunke and
                  Brecht Wyseur and
                  J{\'{e}}r{\^{o}}me d'Annoville},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {The {ASPIRE} Framework for Software Protection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {91--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995316},
  doi          = {10.1145/2995306.2995316},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SutterBCFZWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/CeccatoS16,
  author       = {Mariano Ceccato and
                  Riccardo Scandariato},
  title        = {Static Analysis and Penetration Testing from the Perspective of Maintenance
                  Teams},
  booktitle    = {Proceedings of the 10th {ACM/IEEE} International Symposium on Empirical
                  Software Engineering and Measurement, {ESEM} 2016, Ciudad Real, Spain,
                  September 8-9, 2016},
  pages        = {25:1--25:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2961111.2962611},
  doi          = {10.1145/2961111.2962611},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/CeccatoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DemissieGCA16,
  author       = {Biniam Fisseha Demissie and
                  Davide Ghio and
                  Mariano Ceccato and
                  Andrea Avancini},
  title        = {Identifying Android inter app communication vulnerabilities using
                  static and dynamic analysis},
  booktitle    = {Proceedings of the International Conference on Mobile Software Engineering
                  and Systems, MOBILESoft '16, Austin, Texas, USA, May 14-22, 2016},
  pages        = {255--266},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897073.2897082},
  doi          = {10.1145/2897073.2897082},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/DemissieGCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/CeccatoNAB16,
  author       = {Mariano Ceccato and
                  Cu D. Nguyen and
                  Dennis Appelt and
                  Lionel C. Briand},
  editor       = {David Lo and
                  Sven Apel and
                  Sarfraz Khurshid},
  title        = {{SOFIA:} an automated security oracle for black-box testing of SQL-injection
                  vulnerabilities},
  booktitle    = {Proceedings of the 31st {IEEE/ACM} International Conference on Automated
                  Software Engineering, {ASE} 2016, Singapore, September 3-7, 2016},
  pages        = {167--177},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2970276.2970343},
  doi          = {10.1145/2970276.2970343},
  timestamp    = {Sat, 30 Sep 2023 09:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/CeccatoNAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/ViticchieRTBCTT16,
  author       = {Alessio Viticchi{\'{e}} and
                  Leonardo Regano and
                  Marco Torchiano and
                  Cataldo Basile and
                  Mariano Ceccato and
                  Paolo Tonella and
                  Roberto Tiella},
  title        = {Assessment of Source Code Obfuscation Techniques},
  booktitle    = {16th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2016, Raleigh, NC, USA, October 2-3, 2016},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SCAM.2016.17},
  doi          = {10.1109/SCAM.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/ViticchieRTBCTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssbse/CeccatoFCFS16,
  author       = {Mariano Ceccato and
                  Paolo Falcarin and
                  Alessandro Cabutto and
                  Yosief Weldezghi Frezghi and
                  Cristian{-}Alexandru Staicu},
  editor       = {Federica Sarro and
                  Kalyanmoy Deb},
  title        = {Search Based Clustering for Protecting Software with Diversified Updates},
  booktitle    = {Search Based Software Engineering - 8th International Symposium, {SSBSE}
                  2016, Raleigh, NC, USA, October 8-10, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9962},
  pages        = {159--175},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47106-8\_11},
  doi          = {10.1007/978-3-319-47106-8\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssbse/CeccatoFCFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wicsa/SutterFWBCDZ16,
  author       = {Bjorn De Sutter and
                  Paolo Falcarin and
                  Brecht Wyseur and
                  Cataldo Basile and
                  Mariano Ceccato and
                  J{\'{e}}r{\^{o}}me d'Annoville and
                  Michael Zunke},
  title        = {A Reference Architecture for Software Protection},
  booktitle    = {13th Working {IEEE/IFIP} Conference on Software Architecture, {WICSA}
                  2016, Venice, Italy, April 5-8, 2016},
  pages        = {291--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WICSA.2016.43},
  doi          = {10.1109/WICSA.2016.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wicsa/SutterFWBCDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/CeccatoCFB15,
  author       = {Mariano Ceccato and
                  Andrea Capiluppi and
                  Paolo Falcarin and
                  Cornelia Boldyreff},
  title        = {A large study on the effect of code obfuscation on the quality of
                  java code},
  journal      = {Empir. Softw. Eng.},
  volume       = {20},
  number       = {6},
  pages        = {1486--1524},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10664-014-9321-0},
  doi          = {10.1007/S10664-014-9321-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/CeccatoCFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/SabatucciCMS15,
  author       = {Luca Sabatucci and
                  Mariano Ceccato and
                  Alessandro Marchetto and
                  Angelo Susi},
  title        = {Ahab's legs in scenario-based requirements validation: An experiment
                  to study communication mistakes},
  journal      = {J. Syst. Softw.},
  volume       = {109},
  pages        = {124--136},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jss.2015.07.039},
  doi          = {10.1016/J.JSS.2015.07.039},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/SabatucciCMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/CeccatoMMNT15,
  author       = {Mariano Ceccato and
                  Alessandro Marchetto and
                  Leonardo Mariani and
                  Cu D. Nguyen and
                  Paolo Tonella},
  title        = {Do Automatically Generated Test Cases Make Debugging Easier? An Experimental
                  Assessment of Debugging Effectiveness and Efficiency},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {25},
  number       = {1},
  pages        = {5:1--5:38},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768829},
  doi          = {10.1145/2768829},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/CeccatoMMNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DemissieCT15,
  author       = {Biniam Fisseha Demissie and
                  Mariano Ceccato and
                  Roberto Tiella},
  editor       = {Paolo Falcarin and
                  Brecht Wyseur},
  title        = {Assessment of Data Obfuscation with Residue Number Coding},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
                  2015, Florence, Italy, May 19, 2015},
  pages        = {38--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPRO.2015.15},
  doi          = {10.1109/SPRO.2015.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/DemissieCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/CeccatoPFRTT14,
  author       = {Mariano Ceccato and
                  Massimiliano Di Penta and
                  Paolo Falcarin and
                  Filippo Ricca and
                  Marco Torchiano and
                  Paolo Tonella},
  title        = {A family of experiments to assess the effectiveness and efficiency
                  of source code obfuscation techniques},
  journal      = {Empir. Softw. Eng.},
  volume       = {19},
  number       = {4},
  pages        = {1040--1074},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10664-013-9248-x},
  doi          = {10.1007/S10664-013-9248-X},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/CeccatoPFRTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/CeccatoLC14,
  author       = {Mariano Ceccato and
                  Zheng Li and
                  James R. Cordy},
  title        = {Guest editorial for the special issue on source code analysis and
                  manipulation, {SCAM} 2012},
  journal      = {J. Softw. Evol. Process.},
  volume       = {26},
  number       = {6},
  pages        = {531--532},
  year         = {2014},
  url          = {https://doi.org/10.1002/smr.1655},
  doi          = {10.1002/SMR.1655},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/CeccatoLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/Morales-Ramirez14,
  author       = {Itzel Morales{-}Ramirez and
                  Anna Perini and
                  Mariano Ceccato},
  editor       = {Selmin Nurcan and
                  Elias Pimenidis},
  title        = {Towards Supporting the Analysis of Online Discussions in {OSS} Communities:
                  {A} Speech-Act Based Approach},
  booktitle    = {Information Systems Engineering in Complex Environments - CAiSE Forum
                  2014, Thessaloniki, Greece, June 16-20, 2014, Selected Extended Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {204},
  pages        = {215--232},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19270-3\_14},
  doi          = {10.1007/978-3-319-19270-3\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/Morales-Ramirez14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TonellaCSC14,
  author       = {Paolo Tonella and
                  Mariano Ceccato and
                  Bjorn De Sutter and
                  Bart Coppens},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} {A} Measurement Framework to Quantify Software Protections},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1505--1507},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662360},
  doi          = {10.1145/2660267.2662360},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TonellaCSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/CeccatoMPS14,
  author       = {Mariano Ceccato and
                  Alessandro Marchetto and
                  Anna Perini and
                  Angelo Susi},
  editor       = {Maya Daneva and
                  Richard Berntsson{-}Svensson and
                  Xavier Franch and
                  Nazim H. Madhavji and
                  Sabrina Marczak},
  title        = {How smartphone users assess the value/risk trade-off of apps: An observational
                  study},
  booktitle    = {4th {IEEE} International Workshop on Empirical Requirements Engineering,
                  EmpiRE 2014, Karlskrona, Sweden, August 25, 2014},
  pages        = {17--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/EmpiRE.2014.6890111},
  doi          = {10.1109/EMPIRE.2014.6890111},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/CeccatoMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/AvanciniC13,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  title        = {Comparison and integration of genetic algorithms and dynamic symbolic
                  execution for security testing of cross-site scripting vulnerabilities},
  journal      = {Inf. Softw. Technol.},
  volume       = {55},
  number       = {12},
  pages        = {2209--2222},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.infsof.2013.08.001},
  doi          = {10.1016/J.INFSOF.2013.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/AvanciniC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AvanciniC13,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  editor       = {Hong Zhu and
                  Henry Muccini and
                  Zhenyu Chen},
  title        = {Security testing of the communication among Android applications},
  booktitle    = {8th International Workshop on Automation of Software Test, {AST} 2013,
                  San Francisco, CA, USA, May 18-19, 2013},
  pages        = {57--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IWAST.2013.6595792},
  doi          = {10.1109/IWAST.2013.6595792},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/AvanciniC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/BasileC13,
  author       = {Cataldo Basile and
                  Mariano Ceccato},
  title        = {Towards a unified software attack model to assess software protections},
  booktitle    = {{IEEE} 21st International Conference on Program Comprehension, {ICPC}
                  2013, San Francisco, CA, USA, 20-21 May, 2013},
  pages        = {219--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICPC.2013.6613852},
  doi          = {10.1109/ICPC.2013.6613852},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/BasileC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/AvanciniC13,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {Circe: {A} grammar-based oracle for testing Cross-site scripting in
                  web applications},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {262--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671301},
  doi          = {10.1109/WCRE.2013.6671301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/AvanciniC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/AvanciniC12,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  editor       = {Alessandro Moschitti and
                  Barbara Plank},
  title        = {Security Oracle Based on Tree Kernel Methods},
  booktitle    = {Trustworthy Eternal Systems via Evolving Software, Data and Knowledge
                  - Second International Workshop, EternalS 2012, Montpellier, France,
                  August 28, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {379},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-45260-4\_3},
  doi          = {10.1007/978-3-642-45260-4\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/AvanciniC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AvanciniC12,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  editor       = {Daniel Hoffman and
                  John Hughes and
                  Dianxiang Xu},
  title        = {Grammar based oracle for security testing of web applications},
  booktitle    = {7th International Workshop on Automation of Software Test, {AST} 2012,
                  Zurich, Switzerland, June 2-3, 2012},
  pages        = {15--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWAST.2012.6228984},
  doi          = {10.1109/IWAST.2012.6228984},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/AvanciniC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CeccatoMMNT12,
  author       = {Mariano Ceccato and
                  Alessandro Marchetto and
                  Leonardo Mariani and
                  Cu D. Nguyen and
                  Paolo Tonella},
  editor       = {Martin Glinz and
                  Gail C. Murphy and
                  Mauro Pezz{\`{e}}},
  title        = {An empirical study about the effectiveness of debugging when random
                  test cases are used},
  booktitle    = {34th International Conference on Software Engineering, {ICSE} 2012,
                  June 2-9, 2012, Zurich, Switzerland},
  pages        = {452--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICSE.2012.6227170},
  doi          = {10.1109/ICSE.2012.6227170},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/CeccatoMMNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/CeccatoT11,
  author       = {Mariano Ceccato and
                  Paolo Tonella},
  title        = {CodeBender: Remote Software Protection Using Orthogonal Replacement},
  journal      = {{IEEE} Softw.},
  volume       = {28},
  number       = {2},
  pages        = {28--34},
  year         = {2011},
  url          = {https://doi.org/10.1109/MS.2010.158},
  doi          = {10.1109/MS.2010.158},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/CeccatoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/SabatucciCMS11,
  author       = {Luca Sabatucci and
                  Mariano Ceccato and
                  Alessandro Marchetto and
                  Angelo Susi},
  title        = {Ahab's Leg dilemma: On the design of a controlled experiment},
  booktitle    = {First International Workshop on Empirical Requirements Engineering,
                  EmpiRE 2011, Trento, Italy, August 30, 2011},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EmpiRE.2011.6046258},
  doi          = {10.1109/EMPIRE.2011.6046258},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/SabatucciCMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/AvanciniC11,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  title        = {Security Testing of Web Applications: {A} Search-Based Approach for
                  Cross-Site Scripting Vulnerabilities},
  booktitle    = {11th {IEEE} Working Conference on Source Code Analysis and Manipulation,
                  {SCAM} 2011, Williamsburg, VA, USA, September 25-26, 2011},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SCAM.2011.7},
  doi          = {10.1109/SCAM.2011.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/AvanciniC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/CeccatoDTM10,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella and
                  Davide Marchignoli},
  title        = {Migrating legacy data structures based on variable overlay to Java},
  journal      = {J. Softw. Maintenance Res. Pract.},
  volume       = {22},
  number       = {3},
  pages        = {211--237},
  year         = {2010},
  url          = {https://doi.org/10.1002/smr.418},
  doi          = {10.1002/SMR.418},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/CeccatoDTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/RiccaPTTC10,
  author       = {Filippo Ricca and
                  Massimiliano Di Penta and
                  Marco Torchiano and
                  Paolo Tonella and
                  Mariano Ceccato},
  title        = {How Developers' Experience and Ability Influence Web Application Comprehension
                  Tasks Supported by {UML} Stereotypes: {A} Series of Four Experiments},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {36},
  number       = {1},
  pages        = {96--118},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSE.2009.69},
  doi          = {10.1109/TSE.2009.69},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/RiccaPTTC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AvanciniC10,
  author       = {Andrea Avancini and
                  Mariano Ceccato},
  editor       = {Seok{-}Won Lee and
                  Mattia Monga and
                  Jan J{\"{u}}rjens},
  title        = {Towards security testing with taint analysis and genetic algorithms},
  booktitle    = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
                  2010, May 2, 2010, Cape Town, South Africa},
  pages        = {65--71},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809100.1809110},
  doi          = {10.1145/1809100.1809110},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/AvanciniC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/CeccatoT10,
  author       = {Mariano Ceccato and
                  Paolo Tonella},
  editor       = {Radu Marinescu and
                  Michele Lanza and
                  Andrian Marcus},
  title        = {Static analysis for enforcing intra-thread consistent locks in the
                  migration of a legacy system},
  booktitle    = {26th {IEEE} International Conference on Software Maintenance {(ICSM}
                  2010), September 12-18, 2010, Timisoara, Romania},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICSM.2010.5609727},
  doi          = {10.1109/ICSM.2010.5609727},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/CeccatoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/CeccatoPNCT09,
  author       = {Mariano Ceccato and
                  Mila Dalla Preda and
                  Jasvir Nagra and
                  Christian S. Collberg and
                  Paolo Tonella},
  title        = {Trading-off security and performance in barrier slicing for remote
                  software entrusting},
  journal      = {Autom. Softw. Eng.},
  volume       = {16},
  number       = {2},
  pages        = {235--261},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10515-009-0047-y},
  doi          = {10.1007/S10515-009-0047-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/CeccatoPNCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/CeccatoT09,
  author       = {Mariano Ceccato and
                  Paolo Tonella},
  title        = {Dynamic aspect mining},
  journal      = {{IET} Softw.},
  volume       = {3},
  number       = {4},
  pages        = {321--336},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-sen.2008.0108},
  doi          = {10.1049/IET-SEN.2008.0108},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iee/CeccatoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/RiccaTPCT09,
  author       = {Filippo Ricca and
                  Marco Torchiano and
                  Massimiliano Di Penta and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Using acceptance tests as a support for clarifying requirements: {A}
                  series of experiments},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {2},
  pages        = {270--283},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.01.007},
  doi          = {10.1016/J.INFSOF.2008.01.007},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/RiccaTPCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/CeccatoDT09,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella},
  title        = {Recovering structured data types from a legacy data model with overlays},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {10},
  pages        = {1454--1468},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2009.04.017},
  doi          = {10.1016/J.INFSOF.2009.04.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/CeccatoDT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/BernardiLC09,
  author       = {Mario Luca Bernardi and
                  Giuseppe A. Di Lucca and
                  Mariano Ceccato},
  editor       = {Andreas Winter and
                  Rudolf Ferenc and
                  Jens Knodel},
  title        = {Workshop on Maintenance of Aspect Oriented Systems},
  booktitle    = {13th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2009, Architecture-Centric Maintenance of Large-SCale Software
                  Systems, Kaiserslautern, Germany, 24-27 March 2009},
  pages        = {273--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSMR.2009.46},
  doi          = {10.1109/CSMR.2009.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/BernardiLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/CeccatoPNFRTT09,
  author       = {Mariano Ceccato and
                  Massimiliano Di Penta and
                  Jasvir Nagra and
                  Paolo Falcarin and
                  Filippo Ricca and
                  Marco Torchiano and
                  Paolo Tonella},
  title        = {The effectiveness of source code obfuscation: An experimental assessment},
  booktitle    = {The 17th {IEEE} International Conference on Program Comprehension,
                  {ICPC} 2009, Vancouver, British Columbia, Canada, May 17-19, 2009},
  pages        = {178--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICPC.2009.5090041},
  doi          = {10.1109/ICPC.2009.5090041},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/CeccatoPNFRTT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CeccatoTPM09,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Mila Dalla Preda and
                  Anirban Majumdar},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {Remote software protection by orthogonal client replacement},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {448--455},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529380},
  doi          = {10.1145/1529282.1529380},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/CeccatoTPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CeccatoPNFRTT08,
  author       = {Mariano Ceccato and
                  Massimiliano Di Penta and
                  Jasvir Nagra and
                  Paolo Falcarin and
                  Filippo Ricca and
                  Marco Torchiano and
                  Paolo Tonella},
  editor       = {Andy Ozment and
                  Ketil St{\o}len},
  title        = {Towards experimental evaluation of code obfuscation techniques},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP
                  2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456362.1456371},
  doi          = {10.1145/1456362.1456371},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CeccatoPNFRTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/CeccatoTM08,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cristina Matteotti},
  title        = {Goto Elimination Strategies in the Migration of Legacy Code to Java},
  booktitle    = {12th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2008, April 1-4, 2008, Athens, Greece},
  pages        = {53--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSMR.2008.4493300},
  doi          = {10.1109/CSMR.2008.4493300},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/CeccatoTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/Ceccato08,
  author       = {Mariano Ceccato},
  title        = {Automatic Support for the Migration Towards Aspects},
  booktitle    = {12th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2008, April 1-4, 2008, Athens, Greece},
  pages        = {298--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSMR.2008.4493331},
  doi          = {10.1109/CSMR.2008.4493331},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/Ceccato08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/RiccaPTTCV08,
  author       = {Filippo Ricca and
                  Massimiliano Di Penta and
                  Marco Torchiano and
                  Paolo Tonella and
                  Mariano Ceccato and
                  Corrado Aaron Visaggio},
  editor       = {Wilhelm Sch{\"{a}}fer and
                  Matthew B. Dwyer and
                  Volker Gruhn},
  title        = {Are fit tables really talking?: a series of experiments to understand
                  whether fit tables are useful during evolution tasks},
  booktitle    = {30th International Conference on Software Engineering {(ICSE} 2008),
                  Leipzig, Germany, May 10-18, 2008},
  pages        = {361--370},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368088.1368138},
  doi          = {10.1145/1368088.1368138},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/RiccaPTTCV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/CeccatoNT08,
  author       = {Mariano Ceccato and
                  Jasvir Nagra and
                  Paolo Tonella},
  title        = {Distributing Trust Verification to Increase Application Performance},
  booktitle    = {16th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing {(PDP} 2008), 13-15 February 2008, Toulouse,
                  France},
  pages        = {604--610},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PDP.2008.69},
  doi          = {10.1109/PDP.2008.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/CeccatoNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CeccatoDT08,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella},
  title        = {Using Program Transformations to Add Structure to a Legacy Data Model},
  booktitle    = {Eighth {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation {(SCAM} 2008), 28-29 September 2008, Beijing, China},
  pages        = {197--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SCAM.2008.9},
  doi          = {10.1109/SCAM.2008.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CeccatoDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/CeccatoOT08,
  author       = {Mariano Ceccato and
                  Yoram Ofek and
                  Paolo Tonella},
  editor       = {Viliam Geffert and
                  Juhani Karhum{\"{a}}ki and
                  Alberto Bertoni and
                  Bart Preneel and
                  Pavol N{\'{a}}vrat and
                  M{\'{a}}ria Bielikov{\'{a}}},
  title        = {Remote Entrusting by Run-Time Software Authentication},
  booktitle    = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 19-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4910},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77566-9\_8},
  doi          = {10.1007/978-3-540-77566-9\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/CeccatoOT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/CeccatoDTM08,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella and
                  Davide Marchignoli},
  editor       = {Ahmed E. Hassan and
                  Andy Zaidman and
                  Massimiliano Di Penta},
  title        = {Data Model Reverse Engineering in Migrating a Legacy System to Java},
  booktitle    = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse
                  Engineering, Antwerp, Belgium, October 15-18, 2008},
  pages        = {177--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCRE.2008.27},
  doi          = {10.1109/WCRE.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/CeccatoDTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/RiccaTPCT07,
  author       = {Filippo Ricca and
                  Marco Torchiano and
                  Massimiliano Di Penta and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {The Use of Executable {FIT} Tables to support Maintenance and Evolution
                  Tasks},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {8},
  year         = {2007},
  url          = {https://doi.org/10.14279/tuj.eceasst.8.119},
  doi          = {10.14279/TUJ.ECEASST.8.119},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/RiccaTPCT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/RiccaPTTC07,
  author       = {Filippo Ricca and
                  Massimiliano Di Penta and
                  Marco Torchiano and
                  Paolo Tonella and
                  Mariano Ceccato},
  title        = {How design notations affect the comprehension of Web applications},
  journal      = {J. Softw. Maintenance Res. Pract.},
  volume       = {19},
  number       = {5},
  pages        = {339--359},
  year         = {2007},
  url          = {https://doi.org/10.1002/smr.357},
  doi          = {10.1002/SMR.357},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/RiccaPTTC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/RiccaPTTC07,
  author       = {Filippo Ricca and
                  Massimiliano Di Penta and
                  Marco Torchiano and
                  Paolo Tonella and
                  Mariano Ceccato},
  title        = {The Role of Experience and Ability in Comprehension Tasks Supported
                  by {UML} Stereotypes},
  booktitle    = {29th International Conference on Software Engineering {(ICSE} 2007),
                  Minneapolis, MN, USA, May 20-26, 2007},
  pages        = {375--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSE.2007.86},
  doi          = {10.1109/ICSE.2007.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/RiccaPTTC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/Ceccato07,
  author       = {Mariano Ceccato},
  title        = {Migrating Object Oriented code to Aspect Oriented Programming},
  booktitle    = {23rd {IEEE} International Conference on Software Maintenance {(ICSM}
                  2007), October 2-5, 2007, Paris, France},
  pages        = {497--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSM.2007.4362668},
  doi          = {10.1109/ICSM.2007.4362668},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsm/Ceccato07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpse/RiccaTCT07,
  author       = {Filippo Ricca and
                  Marco Torchiano and
                  Mariano Ceccato and
                  Paolo Tonella},
  editor       = {Massimiliano Di Penta and
                  Michele Lanza},
  title        = {Talking tests: an empirical assessment of the role of fit acceptance
                  tests in clarifying requirements},
  booktitle    = {9th International Workshop on Principles of Software Evolution {(IWPSE}
                  2007), in conjunction with the 6th {ESEC/FSE} joint meeting, Dubrovnik,
                  Croatia, September 3-4, 2007},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1294948.1294962},
  doi          = {10.1145/1294948.1294962},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwpse/RiccaTCT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CeccatoPNCT07,
  author       = {Mariano Ceccato and
                  Mila Dalla Preda and
                  Jasvir Nagra and
                  Christian S. Collberg and
                  Paolo Tonella},
  title        = {Barrier Slicing for Remote Software Trusting},
  booktitle    = {Seventh {IEEE} International Workshop on Source Code Analysis and
                  Manipulation {(SCAM} 2007), September 30 - October 1, 2007, Paris,
                  France},
  pages        = {27--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SCAM.2007.27},
  doi          = {10.1109/SCAM.2007.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CeccatoPNCT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sqj/CeccatoMMMTT06,
  author       = {Mariano Ceccato and
                  Marius Marin and
                  Kim Mens and
                  Leon Moonen and
                  Paolo Tonella and
                  Tom Tourw{\'{e}}},
  title        = {Applying and combining three different aspect Mining Techniques},
  journal      = {Softw. Qual. J.},
  volume       = {14},
  number       = {3},
  pages        = {209--231},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11219-006-9217-3},
  doi          = {10.1007/S11219-006-9217-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sqj/CeccatoMMMTT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BinkleyCHRT06,
  author       = {David W. Binkley and
                  Mariano Ceccato and
                  Mark Harman and
                  Filippo Ricca and
                  Paolo Tonella},
  title        = {Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {32},
  number       = {9},
  pages        = {698--717},
  year         = {2006},
  url          = {https://doi.org/10.1109/TSE.2006.95},
  doi          = {10.1109/TSE.2006.95},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/BinkleyCHRT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/RiccaPTTC06,
  author       = {Filippo Ricca and
                  Massimiliano Di Penta and
                  Marco Torchiano and
                  Paolo Tonella and
                  Mariano Ceccato},
  title        = {An empirical study on the usefulness of Conallen's stereotypes inWeb
                  application comprehension},
  booktitle    = {Eighth {IEEE} International Workshop on Web Site Evolution {(WSE}
                  2006), 22-24 September 2006, Philadelphia, Pennsylvania, {USA}},
  pages        = {58--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/WSE.2006.3},
  doi          = {10.1109/WSE.2006.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wse/RiccaPTTC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0607006,
  author       = {Mariano Ceccato and
                  Marius Marin and
                  Kim Mens and
                  Leon Moonen and
                  Paolo Tonella and
                  Tom Tourw{\'{e}}},
  title        = {Applying and Combining Three Different Aspect Mining Techniques},
  journal      = {CoRR},
  volume       = {abs/cs/0607006},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0607006},
  eprinttype    = {arXiv},
  eprint       = {cs/0607006},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0607006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/TonellaC05,
  author       = {Paolo Tonella and
                  Mariano Ceccato},
  title        = {Refactoring the Aspectizable Interfaces: An Empirical Assessment},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {31},
  number       = {10},
  pages        = {819--832},
  year         = {2005},
  url          = {https://doi.org/10.1109/TSE.2005.115},
  doi          = {10.1109/TSE.2005.115},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/TonellaC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/BinkleyCHRT05,
  author       = {David W. Binkley and
                  Mariano Ceccato and
                  Mark Harman and
                  Filippo Ricca and
                  Paolo Tonella},
  title        = {Automated Refactoring of Object Oriented Code into Aspects},
  booktitle    = {21st {IEEE} International Conference on Software Maintenance {(ICSM}
                  2005), 25-30 September 2005, Budapest, Hungary},
  pages        = {27--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSM.2005.27},
  doi          = {10.1109/ICSM.2005.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/BinkleyCHRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/CeccatoMMMTT05,
  author       = {Mariano Ceccato and
                  Marius Marin and
                  Kim Mens and
                  Leon Moonen and
                  Paolo Tonella and
                  Tom Tourw{\'{e}}},
  title        = {A Qualitative Comparison of Three Aspect Mining Techniques},
  booktitle    = {13th International Workshop on Program Comprehension {(IWPC} 2005),
                  15-16 May 2005, St. Louis, MO, {USA}},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WPC.2005.2},
  doi          = {10.1109/WPC.2005.2},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/CeccatoMMMTT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/TonellaC04,
  author       = {Paolo Tonella and
                  Mariano Ceccato},
  title        = {Migrating Interface Implementation to Aspects},
  booktitle    = {20th International Conference on Software Maintenance {(ICSM} 2004),
                  11-17 September 2004, Chicago, IL, {USA}},
  pages        = {220--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICSM.2004.1357806},
  doi          = {10.1109/ICSM.2004.1357806},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/TonellaC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CeccatoT04,
  author       = {Mariano Ceccato and
                  Paolo Tonella},
  title        = {Adding Distribution to Existing Applications by Means of Aspect Oriented
                  Programming},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {107--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.3},
  doi          = {10.1109/SCAM.2004.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CeccatoT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/TonellaC04,
  author       = {Paolo Tonella and
                  Mariano Ceccato},
  title        = {Aspect Mining through the Formal Concept Analysis of Execution Traces},
  booktitle    = {11th Working Conference on Reverse Engineering, {WCRE} 2004, Delft,
                  The Netherlands, November 8-12, 2004},
  pages        = {112--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/WCRE.2004.13},
  doi          = {10.1109/WCRE.2004.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/TonellaC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics