Search Results - "Cimitile, Aniello"

Refine Results
  1. 1

    Talos: no more ransomware victims with formal methods by Cimitile, Aniello, Mercaldo, Francesco, Nardone, Vittoria, Santone, Antonella, Visaggio, Corrado Aaron

    “…Ransomware is a very effective form of malware that is recently spreading out on an impressive number of workstations and smartphones. This malware blocks the…”
    Get full text
    Journal Article
  2. 2

    Evaluating model checking for cyber threats code obfuscation identification by Martinelli, Fabio, Mercaldo, Francesco, Nardone, Vittoria, Santone, Antonella, Sangaiah, Arun Kumar, Cimitile, Aniello

    “…Code obfuscation is a set of transformations that make code programs harder to understand. The goal of code obfuscation is to make reverse engineering of…”
    Get full text
    Journal Article
  3. 3

    An exploratory study on the evolution of Android malware quality by Mercaldo, Francesco, Di Sorbo, Andrea, Visaggio, Corrado Aaron, Cimitile, Aniello, Martinelli, Fabio, Gerardo, Canfora

    “…In the context of software engineering, product software quality measures how well a software artifact is designed and coded. Software products must satisfy…”
    Get full text
    Journal Article
  4. 4

    Evaluating performances of pair designing in industry by Canfora, Gerardo, Cimitile, Aniello, Garcia, Felix, Piattini, Mario, Visaggio, Corrado Aaron

    Published in The Journal of systems and software (01-08-2007)
    “…Pair programming has attracted an increasing interest from practitioners and researchers: there is initial empirical evidence that it has positive effects on…”
    Get full text
    Journal Article
  5. 5

    Conditioned program slicing by Canfora, Gerardo, Cimitile, Aniello, De Lucia, Andrea

    Published in Information and software technology (01-12-1998)
    “…Slicing is a technique to decompose programs based on the analysis of the control and data flow. In the original Weiser's definition, a slice consists of any…”
    Get full text
    Journal Article
  6. 6

    Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique by Cimitile, Aniello, Martinelli, Fabio, Mercaldo, Francesco, Nardone, Vittoria, Santone, Antonella

    “…Android represents the most widespread mobile environment. This increasing diffusion is the reason why attackers are attracted to develop malware targeting…”
    Get full text
    Conference Proceeding
  7. 7

    Assessing staffing needs for a software maintenance project through queuing simulation by Antoniol, G., Cimitile, A., Di Lucca, G.A., Di Penta, M.

    Published in IEEE transactions on software engineering (01-01-2004)
    “…We present an approach based on queuing theory and stochastic simulation to help planning, managing, and controlling the project staffing and the resulting…”
    Get full text
    Journal Article
  8. 8

    Model Checking for Mobile Android Malware Evolution by Cimitile, Aniello, Martinelli, Fabio, Mercaldo, Francesco, Nardone, Vittoria, Santone, Antonella, Vaglini, Gigliola

    “…Software engineering researchers have largely demonstrated that newer versions of software make use of previous versions of existing software. No exception to…”
    Get full text
    Conference Proceeding
  9. 9

    Decomposing legacy programs: a first step towards migrating to client–server platforms by Canfora, Gerardo, Cimitile, Aniello, De Lucia, Andrea, Di Lucca, Giuseppe A.

    Published in The Journal of systems and software (15-10-2000)
    “…A solution to the problem of salvaging the past investments in centralised, mainframe-oriented software development, while keeping competitive in the dynamic…”
    Get full text
    Journal Article
  10. 10

    Mobile Malware Detection in the Real World by Mercaldo, Francesco, Visaggio, Corrado Aaron, Canfora, Gerardo, Cimitile, Aniello

    “…Several works in literature address the mobile malware detection problem by classifying features obtained from real world application and using well-known…”
    Get full text
    Conference Proceeding
  11. 11

    Identifying objects in legacy systems using design metrics by Cimitile, Aniello, De Lucia, Andrea, Antonio Di Lucca, Giuseppe, Rita Fasolino, Anna

    “…Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development…”
    Get full text
    Journal Article
  12. 12

    An extensible system for source code analysis by Canfora, G., Cimitile, A., De Carlini, U., De Lucia, A.

    Published in IEEE transactions on software engineering (01-09-1998)
    “…Constructing code analyzers may be costly and error prone if inadequate technologies and tools are used. If they are written in a conventional programming…”
    Get full text
    Journal Article
  13. 13

    A logic-based approach to reverse engineering tools production by Canfora, G., Cimitile, A., de Carlini, U.

    Published in IEEE transactions on software engineering (01-12-1992)
    “…Difficulties arising in the use of documents produced by reverse engineering tools are analyzed. With reference to intermodular data flow analysis for Pascal…”
    Get full text
    Journal Article
  14. 14
  15. 15
  16. 16
  17. 17

    Towards reuse reengineering of old software by Cimitile, A.

    “…With reference to the setting up of software reuse reengineering processes this paper describes the high level organizational paradigm adopted in the reuse…”
    Get full text
    Conference Proceeding Journal Article
  18. 18

    Migrating legacy systems to the Web: an experience report by Aversano, L., Canfora, G., Cimitile, A., De Lucia, A.

    “…A key to successfully moving to the Internet while salvaging past investments in centralised, mainframe-oriented software development is migrating core legacy…”
    Get full text
    Conference Proceeding
  19. 19

    Performances of pair designing on software evolution: a controlled experiment by Canfora, G., Cimitile, A., Garcia, F., Piattini, M., Visaggio, C.A.

    “…Evolving software design is a critical activity for many reasons: inadequate documentation, loss of strategic knowledge due to personnel's turnover, intrinsic…”
    Get full text
    Conference Proceeding
  20. 20

    FlowManager: a workflow management system based on Petri nets by Aversano, L., Cimitile, A., Gallucci, P., Villani, M.L.

    “…The use of workflow technology to provide automated support to the management and execution of software engineering processes has become of great interest for…”
    Get full text
    Conference Proceeding Journal Article