default search action
Mariano Ceccato
Person information
- affiliation: University of Verona, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Davide Pizzolotto, Stefano Berlato, Mariano Ceccato:
Mitigating Debugger-based Attacks to Java Applications with Self-debugging. ACM Trans. Softw. Eng. Methodol. 33(4): 107:1-107:38 (2024) - [c71]Fabio Pavanello, Cédric Marchand, Paul Jiménez, Xavier Letartre, Ricardo Chaves, Niccolò Marastoni, Alberto Lovato, Mariano Ceccato, George Papadimitriou, Vasileios Karakostas, Dimitris Gizopoulos, Roberta Bardini, Tzamn Melendez Carmona, Stefano Di Carlo, Alessandro Savino, Laurence Lerch, Ulrich Rührmair, Sergio Vinagrero Gutierrez, Giorgio Di Natale, Elena-Ioana Vatajelu:
Security Layers and Related Services within the Horizon Europe NEUROPULS Project. DATE 2024: 1-6 - [c70]Michele Pasqua, Mariano Ceccato, Paolo Tonella:
Hypertesting of Programs: Theoretical Foundation and Automated Test Generation. ICSE 2024: 115:1-115:12 - [i14]Davide Corradini, Zeno Montolli, Michele Pasqua, Mariano Ceccato:
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning. CoRR abs/2408.08594 (2024) - 2023
- [j30]Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Assessing the security of inter-app communications in android through reinforcement learning. Comput. Secur. 131: 103311 (2023) - [j29]Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Yan Naing Tun, David Lo, Lingxiao Jiang, Christoph Bienert:
Experimental comparison of features, analyses, and classifiers for Android malware detection. Empir. Softw. Eng. 28(6): 130 (2023) - [j28]Michele Pasqua, Andrea Benini, Filippo Contro, Marco Crosara, Mila Dalla Preda, Mariano Ceccato:
Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode. J. Syst. Softw. 200: 111653 (2023) - [c69]Niccolò Marastoni, Mariano Ceccato:
Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges. CPSIOTSEC@CCS 2023: 25-36 - [c68]Fabio Pavanello, Cédric Marchand, Ian O'Connor, Régis Orobtchouk, Fabien Mandorlo, Xavier Letartre, Sébastien Cueff, Elena-Ioana Vatajelu, Giorgio Di Natale, Benoit Cluzel, Aurelien Coillet, Benoît Charbonnier, Pierre Noe, Frantisek Kavan, Martin Zoldak, Michal Szaj, Peter Bienstman, Thomas Van Vaerenbergh, Ulrich Rührmair, Paulo F. Flores, Luís Guerra e Silva, Ricardo Chaves, Luís Miguel Silveira, Mariano Ceccato, Dimitris Gizopoulos, George Papadimitriou, Vasileios Karakostas, Axel Brando, Francisco J. Cazorla, Ramon Canal, Pau Closas, Adria Gusi-Amigo, Paolo Crovetti, Alessio Carpegna, Tzamn Melendez Carmona, Stefano Di Carlo, Alessandro Savino:
EUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS. ETS 2023: 1-6 - [c67]Davide Corradini, Michele Pasqua, Mariano Ceccato:
Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs. ICSE 2023: 2553-2564 - [c66]Myeongsoo Kim, Davide Corradini, Saurabh Sinha, Alessandro Orso, Michele Pasqua, Rachel Tzoref-Brill, Mariano Ceccato:
Enhancing REST API Testing with NLP Techniques. ISSTA 2023: 1232-1243 - [i13]Davide Corradini, Michele Pasqua, Mariano Ceccato:
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs. CoRR abs/2301.01261 (2023) - [i12]Fabio Pavanello, Cédric Marchand, Ian O'Connor, Régis Orobtchouk, Fabien Mandorlo, Xavier Letartre, Sébastien Cueff, Elena-Ioana Vatajelu, Giorgio Di Natale, Benoit Cluzel, Aurelien Coillet, Benoît Charbonnier, Pierre Noe, Frantisek Kavan, Martin Zoldak, Michal Szaj, Peter Bienstman, Thomas Van Vaerenbergh, Ulrich Rührmair, Paulo F. Flores, Luís Guerra e Silva, Ricardo Chaves, Luís Miguel Silveira, Mariano Ceccato, Dimitris Gizopoulos, George Papadimitriou, Vasileios Karakostas, Axel Brando, Francisco J. Cazorla, Ramon Canal, Pau Closas, Adria Gusi-Amigo, Paolo Crovetti, Alessio Carpegna, Tzamn Melendez Carmona, Stefano Di Carlo, Alessandro Savino:
NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS. CoRR abs/2305.03139 (2023) - [i11]Fabio Pavanello, Cédric Marchand, Paul Jiménez, Xavier Letartre, Ricardo Chaves, Niccolò Marastoni, Alberto Lovato, Mariano Ceccato, George Papadimitriou, Vasileios Karakostas, Dimitris Gizopoulos, Roberta Bardini, Tzamn Melendez Carmona, Stefano Di Carlo, Alessandro Savino, Laurence Lerch, Ulrich Rührmair, Sergio Vinagrero Gutierrez, Giorgio Di Natale, Elena-Ioana Vatajelu:
Security layers and related services within the Horizon Europe NEUROPULS project. CoRR abs/2312.09383 (2023) - 2022
- [j27]Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise:
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 56-86 (2022) - [j26]Davide Corradini, Amedeo Zampieri, Michele Pasqua, Emanuele Viglianisi, Michael Dallago, Mariano Ceccato:
Automated black-box testing of nominal and error scenarios in RESTful APIs. Softw. Test. Verification Reliab. 32(5) (2022) - [j25]Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Deep Reinforcement Learning for Black-box Testing of Android Apps. ACM Trans. Softw. Eng. Methodol. 31(4): 65:1-65:29 (2022) - [c65]Mariano Ceccato, Youssef Driouich, Ruggero Lanotte, Marco Lucchese, Massimo Merro:
Towards Reverse Engineering of Industrial Physical Processes. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 273-290 - [c64]Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato:
RestTestGen: An Extensible Framework for Automated Black-box Testing of RESTful APIs. ICSME 2022: 504-508 - [c63]Andrea Romdhana, Mariano Ceccato, Alessio Merlo, Paolo Tonella:
IFRIT: Focused Testing through Deep Reinforcement Learning. ICST 2022: 24-34 - [c62]Sebastiano Gaiardelli, Stefano Spellini, Michele Pasqua, Mariano Ceccato, Franco Fummi:
Integrating Smart Contracts in Manufacturing for Automated Assessment of Production Quality. IECON 2022: 1-6 - [c61]Mariano Ceccato, Banani Roy, Mohammad Ghafari:
Message from the General Chair and Program Co-Chairs SCAM 2022. SCAM 2022: ix-x - 2021
- [c60]Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise:
Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations. ARES 2021: 141:1-141:13 - [c59]Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato:
Restats: A Test Coverage Tool for RESTful APIs. ICSME 2021: 594-598 - [c58]Emanuele Viglianisi, Mariano Ceccato, Paolo Tonella:
Summary of: A Federated Society of Bots for Smart Contract Testing. ICST 2021: 282-283 - [c57]Andrea Romdhana, Mariano Ceccato, Gabriel Claudiu Georgiu, Alessio Merlo, Paolo Tonella:
COSMO: Code Coverage Made Easier for Android. ICST 2021: 417-423 - [c56]Filippo Contro, Marco Crosara, Mariano Ceccato, Mila Dalla Preda:
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode. ICPC 2021: 127-137 - [c55]Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato:
Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs. SCAM 2021: 226-236 - [i10]Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Deep Reinforcement Learning for Black-Box Testing of Android Apps. CoRR abs/2101.02636 (2021) - [i9]Filippo Contro, Marco Crosara, Mariano Ceccato, Mila Dalla Preda:
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode. CoRR abs/2103.09113 (2021) - [i8]Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato:
Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs. CoRR abs/2108.08196 (2021) - [i7]Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato:
Restats: A Test Coverage Tool for RESTful APIs. CoRR abs/2108.08209 (2021) - 2020
- [j24]Alessio Viticchié, Leonardo Regano, Cataldo Basile, Marco Torchiano, Mariano Ceccato, Paolo Tonella:
Empirical assessment of the effort needed to attack programs protected with client/server code splitting. Empir. Softw. Eng. 25(1): 1-48 (2020) - [j23]Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar:
Security analysis of permission re-delegation vulnerabilities in Android apps. Empir. Softw. Eng. 25(6): 5084-5136 (2020) - [j22]Stefano Berlato, Mariano Ceccato:
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. J. Inf. Secur. Appl. 52: 102463 (2020) - [j21]Roberto Fellin, Mariano Ceccato:
Experimental assessment of XOR-Masking data obfuscation based on K-Clique opaque constants. J. Syst. Softw. 162 (2020) - [j20]Emanuele Viglianisi, Mariano Ceccato, Paolo Tonella:
A federated society of bots for smart contract testing. J. Syst. Softw. 168: 110647 (2020) - [c54]Biniam Fisseha Demissie, Mariano Ceccato:
Security testing of second order permission re-delegation vulnerabilities in Android apps. MOBILESoft@ICSE 2020: 1-11 - [c53]Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Wei Minn:
Experimental comparison of features and classifiers for Android malware detection. MOBILESoft@ICSE 2020: 50-60 - [c52]Emanuele Viglianisi, Michael Dallago, Mariano Ceccato:
RESTTESTGEN: Automated Black-Box Testing of RESTful APIs. ICST 2020: 142-152 - [c51]Maurizio Leotta, Matteo Biagiola, Filippo Ricca, Mariano Ceccato, Paolo Tonella:
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development. ICST 2020: 263-273 - [c50]Mariano Ceccato, Davide Corradini, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
A Framework for In-Vivo Testing of Mobile Applications. ICST 2020: 286-296 - [i6]Mariano Ceccato, Davide Corradini, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
A Framework for In-Vivo Testing of Mobile Applications. CoRR abs/2002.01785 (2020)
2010 – 2019
- 2019
- [j19]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter:
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Empir. Softw. Eng. 24(1): 240-286 (2019) - [c49]Mariano Ceccato, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
Toward In-Vivo Testing of Mobile Applications. ISSRE Workshops 2019: 137-143 - [c48]Davide Pizzolotto, Roberto Fellin, Mariano Ceccato:
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps. SANER 2019: 629-633 - [i5]Davide Pizzolotto, Mariano Ceccato:
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries. CoRR abs/1901.04942 (2019) - 2018
- [c47]Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar:
AnFlo: detecting anomalous sensitive information flows in Android apps. MOBILESoft@ICSE 2018: 24-34 - [c46]Davide Pizzolotto, Mariano Ceccato:
[Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries. SCAM 2018: 40-49 - [i4]Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar:
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps. CoRR abs/1812.07894 (2018) - 2017
- [c45]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How professional hackers understand protected code while performing attack tasks. ICPC 2017: 154-164 - [c44]Roberto Tiella, Mariano Ceccato:
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation. SANER 2017: 182-192 - [i3]Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella:
Assessment of Source Code Obfuscation Techniques. CoRR abs/1704.02307 (2017) - [i2]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How Professional Hackers Understand Protected Code while Performing Attack Tasks. CoRR abs/1704.02774 (2017) - 2016
- [c43]Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens:
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks. SPRO@CCS 2016: 73-84 - [c42]Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jérôme d'Annoville:
The ASPIRE Framework for Software Protection. SPRO@CCS 2016: 91-92 - [c41]Mariano Ceccato, Riccardo Scandariato:
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams. ESEM 2016: 25:1-25:6 - [c40]Biniam Fisseha Demissie, Davide Ghio, Mariano Ceccato, Andrea Avancini:
Identifying Android inter app communication vulnerabilities using static and dynamic analysis. MOBILESoft 2016: 255-266 - [c39]Mariano Ceccato, Cu D. Nguyen, Dennis Appelt, Lionel C. Briand:
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities. ASE 2016: 167-177 - [c38]Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella:
Assessment of Source Code Obfuscation Techniques. SCAM 2016: 11-20 - [c37]Mariano Ceccato, Paolo Falcarin, Alessandro Cabutto, Yosief Weldezghi Frezghi, Cristian-Alexandru Staicu:
Search Based Clustering for Protecting Software with Diversified Updates. SSBSE 2016: 159-175 - [c36]Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jérôme d'Annoville, Michael Zunke:
A Reference Architecture for Software Protection. WICSA 2016: 291-294 - 2015
- [j18]Mariano Ceccato, Andrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff:
A large study on the effect of code obfuscation on the quality of java code. Empir. Softw. Eng. 20(6): 1486-1524 (2015) - [j17]Luca Sabatucci, Mariano Ceccato, Alessandro Marchetto, Angelo Susi:
Ahab's legs in scenario-based requirements validation: An experiment to study communication mistakes. J. Syst. Softw. 109: 124-136 (2015) - [j16]Mariano Ceccato, Alessandro Marchetto, Leonardo Mariani, Cu D. Nguyen, Paolo Tonella:
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency. ACM Trans. Softw. Eng. Methodol. 25(1): 5:1-5:38 (2015) - [c35]Biniam Fisseha Demissie, Mariano Ceccato, Roberto Tiella:
Assessment of Data Obfuscation with Residue Number Coding. SPRO@ICSE 2015: 38-44 - 2014
- [j15]Mariano Ceccato, Massimiliano Di Penta, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4): 1040-1074 (2014) - [j14]Mariano Ceccato, Zheng Li, James R. Cordy:
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012. J. Softw. Evol. Process. 26(6): 531-532 (2014) - [c34]Itzel Morales-Ramirez, Anna Perini, Mariano Ceccato:
Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach. CAiSE Forum (Selected Extended Papers) 2014: 215-232 - [c33]Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens:
POSTER: A Measurement Framework to Quantify Software Protections. CCS 2014: 1505-1507 - [c32]Mariano Ceccato, Alessandro Marchetto, Anna Perini, Angelo Susi:
How smartphone users assess the value/risk trade-off of apps: An observational study. EmpiRE 2014: 17-24 - 2013
- [j13]Andrea Avancini, Mariano Ceccato:
Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities. Inf. Softw. Technol. 55(12): 2209-2222 (2013) - [c31]Andrea Avancini, Mariano Ceccato:
Security testing of the communication among Android applications. AST 2013: 57-63 - [c30]Cataldo Basile, Mariano Ceccato:
Towards a unified software attack model to assess software protections. ICPC 2013: 219-222 - [c29]Andrea Avancini, Mariano Ceccato:
Circe: A grammar-based oracle for testing Cross-site scripting in web applications. WCRE 2013: 262-271 - 2012
- [c28]Andrea Avancini, Mariano Ceccato:
Security Oracle Based on Tree Kernel Methods. EternalS@ECAI 2012: 30-43 - [c27]Andrea Avancini, Mariano Ceccato:
Grammar based oracle for security testing of web applications. AST 2012: 15-21 - [c26]Mariano Ceccato, Alessandro Marchetto, Leonardo Mariani, Cu D. Nguyen, Paolo Tonella:
An empirical study about the effectiveness of debugging when random test cases are used. ICSE 2012: 452-462 - 2011
- [j12]Mariano Ceccato, Paolo Tonella:
CodeBender: Remote Software Protection Using Orthogonal Replacement. IEEE Softw. 28(2): 28-34 (2011) - [c25]Luca Sabatucci, Mariano Ceccato, Alessandro Marchetto, Angelo Susi:
Ahab's Leg dilemma: On the design of a controlled experiment. EmpiRE 2011: 69-76 - [c24]Andrea Avancini, Mariano Ceccato:
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities. SCAM 2011: 85-94 - 2010
- [j11]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, Davide Marchignoli:
Migrating legacy data structures based on variable overlay to Java. J. Softw. Maintenance Res. Pract. 22(3): 211-237 (2010) - [j10]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: A Series of Four Experiments. IEEE Trans. Software Eng. 36(1): 96-118 (2010) - [c23]Andrea Avancini, Mariano Ceccato:
Towards security testing with taint analysis and genetic algorithms. SESS@ICSE 2010: 65-71 - [c22]Mariano Ceccato, Paolo Tonella:
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system. ICSM 2010: 1-9
2000 – 2009
- 2009
- [j9]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Trading-off security and performance in barrier slicing for remote software entrusting. Autom. Softw. Eng. 16(2): 235-261 (2009) - [j8]Mariano Ceccato, Paolo Tonella:
Dynamic aspect mining. IET Softw. 3(4): 321-336 (2009) - [j7]Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella:
Using acceptance tests as a support for clarifying requirements: A series of experiments. Inf. Softw. Technol. 51(2): 270-283 (2009) - [j6]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Recovering structured data types from a legacy data model with overlays. Inf. Softw. Technol. 51(10): 1454-1468 (2009) - [c21]Mario Luca Bernardi, Giuseppe A. Di Lucca, Mariano Ceccato:
Workshop on Maintenance of Aspect Oriented Systems. CSMR 2009: 273-274 - [c20]Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
The effectiveness of source code obfuscation: An experimental assessment. ICPC 2009: 178-187 - [c19]Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar:
Remote software protection by orthogonal client replacement. SAC 2009: 448-455 - 2008
- [c18]Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
Towards experimental evaluation of code obfuscation techniques. QoP 2008: 39-46 - [c17]Mariano Ceccato, Paolo Tonella, Cristina Matteotti:
Goto Elimination Strategies in the Migration of Legacy Code to Java. CSMR 2008: 53-62 - [c16]Mariano Ceccato:
Automatic Support for the Migration Towards Aspects. CSMR 2008: 298-301 - [c15]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato, Corrado Aaron Visaggio:
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks. ICSE 2008: 361-370 - [c14]Mariano Ceccato, Jasvir Nagra, Paolo Tonella:
Distributing Trust Verification to Increase Application Performance. PDP 2008: 604-610 - [c13]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Using Program Transformations to Add Structure to a Legacy Data Model. SCAM 2008: 197-206 - [c12]Mariano Ceccato, Yoram Ofek, Paolo Tonella:
Remote Entrusting by Run-Time Software Authentication. SOFSEM 2008: 83-97 - [c11]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, Davide Marchignoli:
Data Model Reverse Engineering in Migrating a Legacy System to Java. WCRE 2008: 177-186 - 2007
- [j5]Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella:
The Use of Executable FIT Tables to support Maintenance and Evolution Tasks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 8 (2007) - [j4]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
How design notations affect the comprehension of Web applications. J. Softw. Maintenance Res. Pract. 19(5): 339-359 (2007) - [c10]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes. ICSE 2007: 375-384 - [c9]Mariano Ceccato:
Migrating Object Oriented code to Aspect Oriented Programming. ICSM 2007: 497-498 - [c8]Filippo Ricca, Marco Torchiano, Mariano Ceccato, Paolo Tonella:
Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements. IWPSE 2007: 51-58 - [c7]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Barrier Slicing for Remote Software Trusting. SCAM 2007: 27-36 - 2006
- [j3]Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, Tom Tourwé:
Applying and combining three different aspect Mining Techniques. Softw. Qual. J. 14(3): 209-231 (2006) - [j2]David W. Binkley, Mariano Ceccato, Mark Harman, Filippo Ricca, Paolo Tonella:
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects. IEEE Trans. Software Eng. 32(9): 698-717 (2006) - [c6]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
An empirical study on the usefulness of Conallen's stereotypes inWeb application comprehension. WSE 2006: 58-68 - [i1]Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, Tom Tourwé:
Applying and Combining Three Different Aspect Mining Techniques. CoRR abs/cs/0607006 (2006) - 2005
- [j1]Paolo Tonella, Mariano Ceccato:
Refactoring the Aspectizable Interfaces: An Empirical Assessment. IEEE Trans. Software Eng. 31(10): 819-832 (2005) - [c5]David W. Binkley, Mariano Ceccato, Mark Harman, Filippo Ricca, Paolo Tonella:
Automated Refactoring of Object Oriented Code into Aspects. ICSM 2005: 27-36 - [c4]Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, Tom Tourwé:
A Qualitative Comparison of Three Aspect Mining Techniques. IWPC 2005: 13-22 - 2004
- [c3]Paolo Tonella, Mariano Ceccato:
Migrating Interface Implementation to Aspects. ICSM 2004: 220-229 - [c2]Mariano Ceccato, Paolo Tonella:
Adding Distribution to Existing Applications by Means of Aspect Oriented Programming. SCAM 2004: 107-116 - [c1]Paolo Tonella, Mariano Ceccato:
Aspect Mining through the Formal Concept Analysis of Execution Traces. WCRE 2004: 112-121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint