Search Results - "Ceccato, Mariano"

Refine Results
  1. 1

    Security analysis of permission re-delegation vulnerabilities in Android apps by Demissie, Biniam Fisseha, Ceccato, Mariano, Shar, Lwin Khin

    “…The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication…”
    Get full text
    Journal Article
  2. 2

    A large study on the effect of code obfuscation on the quality of java code by Ceccato, Mariano, Capiluppi, Andrea, Falcarin, Paolo, Boldyreff, Cornelia

    “…Context : Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it…”
    Get full text
    Journal Article
  3. 3

    Empirical assessment of the effort needed to attack programs protected with client/server code splitting by Viticchié, Alessio, Regano, Leonardo, Basile, Cataldo, Torchiano, Marco, Ceccato, Mariano, Tonella, Paolo

    “…Context Code hardening is meant to fight malicious tampering with sensitive code executed on client hosts. Code splitting is a hardening technique that moves…”
    Get full text
    Journal Article
  4. 4

    A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps by Berlato, Stefano, Ceccato, Mariano

    “…Android apps are subject to malicious reverse engineering and code tampering for many reasons, like premium features unlocking and malware piggybacking…”
    Get full text
    Journal Article
  5. 5

    A federated society of bots for smart contract testing by Viglianisi, Emanuele, Ceccato, Mariano, Tonella, Paolo

    Published in The Journal of systems and software (01-10-2020)
    “…Smart contracts are a new type of software that allows its users to perform irreversible transactions on a distributed persistent data storage called the…”
    Get full text
    Journal Article
  6. 6

    Assessing the security of inter-app communications in android through reinforcement learning by Romdhana, Andrea, Merlo, Alessio, Ceccato, Mariano, Tonella, Paolo

    Published in Computers & security (01-08-2023)
    “…A central aspect of the Android platform is Inter-Component Communication (ICC), which allows the reuse of functionality across apps and components through…”
    Get full text
    Journal Article
  7. 7

    Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities by Avancini, Andrea, Ceccato, Mariano

    Published in Information and software technology (01-12-2013)
    “…Cross-site scripting (XSS for short) is considered one of the major threat to the security of web applications. Static analysis supports manual security review…”
    Get full text
    Journal Article
  8. 8

    Experimental assessment of XOR-Masking data obfuscation based on K-Clique opaque constants by Fellin, Roberto, Ceccato, Mariano

    Published in The Journal of systems and software (01-04-2020)
    “…•A novel data obfuscation scheme is proposed•Opaque predicates are exploited to make the obfuscation scheme resilient to static analysis•This novel data…”
    Get full text
    Journal Article
  9. 9

    Hypertesting of Programs: Theoretical Foundation and Automated Test Generation by Pasqua, Michele, Ceccato, Mariano, Tonella, Paolo

    “…Hyperproperties are used to define correctness requirements that involve relations between multiple program executions. This allows, for instance, to model…”
    Get full text
    Conference Proceeding
  10. 10

    Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode by Pasqua, Michele, Benini, Andrea, Contro, Filippo, Crosara, Marco, Dalla Preda, Mila, Ceccato, Mariano

    Published in The Journal of systems and software (01-06-2023)
    “…The immutable nature of Ethereum transactions, and consequently Ethereum smart-contracts, has stimulated the proliferation of many approaches aiming at…”
    Get full text
    Journal Article
  11. 11

    Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs by Corradini, Davide, Pasqua, Michele, Ceccato, Mariano

    “…Mass assignment is one of the most prominent vulnerabilities in RESTful APIs that originates from a misconfiguration in common web frameworks. This allows…”
    Get full text
    Conference Proceeding
  12. 12

    Automated black‐box testing of nominal and error scenarios in RESTful APIs by Corradini, Davide, Zampieri, Amedeo, Pasqua, Michele, Viglianisi, Emanuele, Dallago, Michael, Ceccato, Mariano

    “…RESTful APIs (or REST APIs for short) represent a mainstream approach to design and develop web APIs using the REpresentational State Transfer architectural…”
    Get full text
    Journal Article
  13. 13

    Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge by Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn

    “…When critical assets or functionalities are included in a piece of software accessible to the end users, code protections are used to hinder or delay the…”
    Get full text
    Journal Article
  14. 14

    A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques by Ceccato, Mariano, Di Penta, Massimiliano, Falcarin, Paolo, Ricca, Filippo, Torchiano, Marco, Tonella, Paolo

    “…Context: code obfuscation is intended to obstruct code understanding and, eventually, to delay malicious code changes and ultimately render it uneconomical…”
    Get full text
    Journal Article
  15. 15

    Experimental comparison of features, analyses, and classifiers for Android malware detection by Shar, Lwin Khin, Demissie, Biniam Fisseha, Ceccato, Mariano, Tun, Yan Naing, Lo, David, Jiang, Lingxiao, Bienert, Christoph

    “…Android malware detection has been an active area of research. In the past decade, several machine learning-based approaches based on different types of…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes by Sabatucci, Luca, Ceccato, Mariano, Marchetto, Alessandro, Susi, Angelo

    Published in The Journal of systems and software (01-11-2015)
    “…•The Ahab’s leg (AL) is a known problem of conversion between media.•The validation of requirements may be subject to the problem of AL.•This work is an…”
    Get full text
    Journal Article
  18. 18

    RESTTESTGEN: Automated Black-Box Testing of RESTful APIs by Viglianisi, Emanuele, Dallago, Michael, Ceccato, Mariano

    “…RESTful APIs (or REST APIs for short) represent a mainstream approach to design and develop Web APIs using the REpresentational State Transfer architectural…”
    Get full text
    Conference Proceeding
  19. 19

    AnFlo: detecting anomalous sensitive information flows in Android apps by Demissie, Biniam Fisseha, Ceccato, Mariano, Shar, Lwin Khin

    “…Smartphone apps usually have access to sensitive user data such as contacts, geo-location, and account credentials and they might share such data to external…”
    Get full text
    Conference Proceeding
  20. 20

    Circe: A grammar-based oracle for testing Cross-site scripting in web applications by Avancini, Andrea, Ceccato, Mariano

    “…Security is a crucial concern, especially for those applications, like web-based programs, that are constantly exposed to potentially malicious environments…”
    Get full text
    Conference Proceeding