Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 43
1.
  • A Survey of Symbolic Execut... A Survey of Symbolic Execution Techniques
    Baldoni, Roberto; Coppa, Emilio; D’elia, Daniele Cono ... ACM computing surveys, 05/2019, Volume: 51, Issue: 3
    Journal Article
    Peer reviewed

    Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
2.
  • SENinja: A symbolic executi... SENinja: A symbolic execution plugin for Binary Ninja
    Borzacchiello, Luca; Coppa, Emilio; Demetrescu, Camil SoftwareX, December 2022, 2022-12-00, 2022-12-01, Volume: 20
    Journal Article
    Peer reviewed
    Open access

    Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • Testing concolic execution ... Testing concolic execution through consistency checks
    Coppa, Emilio; Izzillo, Alessio Journal of systems and software/˜The œJournal of systems and software, 20/May , Volume: 211
    Journal Article
    Peer reviewed
    Open access

    Symbolic execution is a well-known software testing technique that evaluates how a program runs when considering a symbolic input, i.e., an input that can initially assume any concrete value ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
5.
  • FUZZOLIC: Mixing fuzzing an... FUZZOLIC: Mixing fuzzing and concolic execution
    Borzacchiello, Luca; Coppa, Emilio; Demetrescu, Camil Computers & security, September 2021, 2021-09-00, 20210901, Volume: 108
    Journal Article
    Peer reviewed

    In the last few years, a large variety of approaches and methodologies have been explored in the context of software testing, ranging from black-box techniques, such as fuzzing, to white-box ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
6.
  • Counting cliques in paralle... Counting cliques in parallel without a cluster: Engineering a fork/join algorithm for shared-memory platforms
    Coppa, Emilio; Finocchi, Irene; Garcia, Renan Leon Information sciences, September 2019, 2019-09-00, Volume: 496
    Journal Article
    Peer reviewed

    In this paper we develop simple and fast multicore parallel algorithms for counting the number of k-cliques in large undirected graphs, for any small constant k ≥ 4. Clique counting is an important ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • Fuzzing Symbolic Expressions Fuzzing Symbolic Expressions
    Borzacchiello, Luca; Coppa, Emilio; Demetrescu, Camil 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 05/2021
    Conference Proceeding

    Recent years have witnessed a wide array of results in software testing, exploring different approaches and methodologies ranging from fuzzers to symbolic engines, with a full spectrum of instances ...
Full text
Available for: NUK, UL

PDF
8.
  • On the Dissection of Evasiv... On the Dissection of Evasive Malware
    DElia, Daniele Cono; Coppa, Emilio; Palmaro, Federico ... IEEE transactions on information forensics and security, 01/2020, Volume: 15
    Journal Article
    Peer reviewed
    Open access

    Complex malware samples feature measures to impede automatic and manual analyses, making their investigation cumbersome. While automatic characterization of malware benefits from recently proposed ...
Full text
Available for: IJS, NUK, UL

PDF
9.
  • Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
    Borrello, Pietro; Coppa, Emilio; D'Elia, Daniele Cono 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021-June
    Conference Proceeding

    Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that are appealing also for program obfuscation. We explore the popular return-oriented programming ...
Full text
Available for: IJS, NUK, UL, UM

PDF
10.
  • ROME: All Overlays Lead to ... ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others
    Blöcher, Marcel; Coppa, Emilio; Kleber, Pascal ... ACM transactions on computer systems, 11/2021, Volume: 39, Issue: 1-4
    Journal Article
    Peer reviewed
    Open access

    Aggregation is common in data analytics and crucial to distilling information from large datasets, but current data analytics frameworks do not fully exploit the potential for optimization in such ...
Full text
Available for: NUK, UL
1 2 3 4 5
hits: 43

Load filters