Emilio Coppa

Pubblicazioni

Titolo Pubblicato in Anno
Do you Trust your Device? Open Challenges in IoT Security Analysis Proceedings of the International Conference on Security and Cryptography 2024
SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies 19th International Conference on Availability, Reliability and Security (ARES 2024) 2024
Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools 43rd International Conference on Safety, Reliability and Security of Computer-based Systems, SAFECOMP 2024 2024
FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns International Workshop on Visualization for Cyber Security 2023
Handling Memory-Intensive Operations in Symbolic Execution ISEC 2022: 15th Innovations in Software Engineering Conference 2022
ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others ACM TRANSACTIONS ON COMPUTER SYSTEMS 2022
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022
SymFusion: Hybrid Instrumentation for Concolic Execution Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) 2022
SENinja: A symbolic execution plugin for Binary Ninja SOFTWAREX 2022
Fuzzing Symbolic Expressions 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) 2021
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021
FUZZOLIC: Mixing fuzzing and concolic execution COMPUTERS & SECURITY 2021
On the Dissection of Evasive Malware IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020
WEIZZ: Automatic grey-box fuzzing for structured binary formats ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020
Counting cliques in parallel without a cluster: engineering a fork/join algorithm for shared-memory platforms INFORMATION SCIENCES 2019
Static analysis of ROP code EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019
The ROP needle: Hiding trigger-based injection vectors via code reuse SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution Cyber Security Cryptography and Machine Learning 2019
Memory Models in Symbolic Execution: Key Ideas and New Thoughts SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019

ERC

  • PE6_3
  • PE6_5

Keywords

software testing
cybersecurity

Gruppi di ricerca

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma