Search Results - "Cimitile, Aniello"
-
1
Talos: no more ransomware victims with formal methods
Published in International journal of information security (01-11-2018)“…Ransomware is a very effective form of malware that is recently spreading out on an impressive number of workstations and smartphones. This malware blocks the…”
Get full text
Journal Article -
2
Evaluating model checking for cyber threats code obfuscation identification
Published in Journal of parallel and distributed computing (01-09-2018)“…Code obfuscation is a set of transformations that make code programs harder to understand. The goal of code obfuscation is to make reverse engineering of…”
Get full text
Journal Article -
3
An exploratory study on the evolution of Android malware quality
Published in Journal of software : evolution and process (01-11-2018)“…In the context of software engineering, product software quality measures how well a software artifact is designed and coded. Software products must satisfy…”
Get full text
Journal Article -
4
Evaluating performances of pair designing in industry
Published in The Journal of systems and software (01-08-2007)“…Pair programming has attracted an increasing interest from practitioners and researchers: there is initial empirical evidence that it has positive effects on…”
Get full text
Journal Article -
5
Conditioned program slicing
Published in Information and software technology (01-12-1998)“…Slicing is a technique to decompose programs based on the analysis of the control and data flow. In the original Weiser's definition, a slice consists of any…”
Get full text
Journal Article -
6
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique
Published in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (01-06-2017)“…Android represents the most widespread mobile environment. This increasing diffusion is the reason why attackers are attracted to develop malware targeting…”
Get full text
Conference Proceeding -
7
Assessing staffing needs for a software maintenance project through queuing simulation
Published in IEEE transactions on software engineering (01-01-2004)“…We present an approach based on queuing theory and stochastic simulation to help planning, managing, and controlling the project staffing and the resulting…”
Get full text
Journal Article -
8
Model Checking for Mobile Android Malware Evolution
Published in 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE) (01-05-2017)“…Software engineering researchers have largely demonstrated that newer versions of software make use of previous versions of existing software. No exception to…”
Get full text
Conference Proceeding -
9
Decomposing legacy programs: a first step towards migrating to client–server platforms
Published in The Journal of systems and software (15-10-2000)“…A solution to the problem of salvaging the past investments in centralised, mainframe-oriented software development, while keeping competitive in the dynamic…”
Get full text
Journal Article -
10
Mobile Malware Detection in the Real World
Published in 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C) (01-05-2016)“…Several works in literature address the mobile malware detection problem by classifying features obtained from real world application and using well-known…”
Get full text
Conference Proceeding -
11
Identifying objects in legacy systems using design metrics
Published in The Journal of systems and software (1999)“…Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development…”
Get full text
Journal Article -
12
An extensible system for source code analysis
Published in IEEE transactions on software engineering (01-09-1998)“…Constructing code analyzers may be costly and error prone if inadequate technologies and tools are used. If they are written in a conventional programming…”
Get full text
Journal Article -
13
A logic-based approach to reverse engineering tools production
Published in IEEE transactions on software engineering (01-12-1992)“…Difficulties arising in the use of documents produced by reverse engineering tools are analyzed. With reference to intermodular data flow analysis for Pascal…”
Get full text
Journal Article -
14
Announcement
Published in Journal of software maintenance and evolution (01-01-2001)Get full text
Journal Article -
15
Announcement
Published in Journal of software maintenance and evolution (01-01-2001)Get full text
Journal Article -
16
Announcement
Published in Journal of software maintenance and evolution (01-01-2001)Get full text
Journal Article -
17
Towards reuse reengineering of old software
Published in Fourth International Conference on Software Engineering and Knowledge Engineering : proceedings (1992)“…With reference to the setting up of software reuse reengineering processes this paper describes the high level organizational paradigm adopted in the reuse…”
Get full text
Conference Proceeding Journal Article -
18
Migrating legacy systems to the Web: an experience report
Published in Proceedings Fifth European Conference on Software Maintenance and Reengineering (2001)“…A key to successfully moving to the Internet while salvaging past investments in centralised, mainframe-oriented software development is migrating core legacy…”
Get full text
Conference Proceeding -
19
Performances of pair designing on software evolution: a controlled experiment
Published in Conference on Software Maintenance and Reengineering (CSMR'06) (2006)“…Evolving software design is a critical activity for many reasons: inadequate documentation, loss of strategic knowledge due to personnel's turnover, intrinsic…”
Get full text
Conference Proceeding -
20
FlowManager: a workflow management system based on Petri nets
Published in Proceedings - International Computer Software & Applications Conference (2002)“…The use of workflow technology to provide automated support to the management and execution of software engineering processes has become of great interest for…”
Get full text
Conference Proceeding Journal Article