A survey of symbolic execution techniques R Baldoni, E Coppa, DC D’elia, C Demetrescu, I Finocchi ACM Computing Surveys (CSUR) 51 (3), 1-39, 2018 | 887 | 2018 |
Input-sensitive profiling E Coppa, C Demetrescu, I Finocchi ACM SIGPLAN Notices 47 (6), 89-98, 2012 | 131 | 2012 |
SoK: Using dynamic binary instrumentation for security (and how you may get caught red handed) DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 73 | 2019 |
WEIZZ: Automatic grey-box fuzzing for structured binary formats A Fioraldi, DC D'Elia, E Coppa Proceedings of the 29th ACM SIGSOFT international symposium on software …, 2020 | 68 | 2020 |
On the dissection of evasive malware DC D’Elia, E Coppa, F Palmaro, L Cavallaro IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020 | 63 | 2020 |
On data skewness, stragglers, and mapreduce progress indicators E Coppa, I Finocchi Proceedings of the Sixth ACM Symposium on Cloud Computing, 139-152, 2015 | 41 | 2015 |
FUZZOLIC: Mixing fuzzing and concolic execution L Borzacchiello, E Coppa, C Demetrescu Computers & Security 108, 102368, 2021 | 40 | 2021 |
Assisting malware analysis with symbolic execution: A case study R Baldoni, E Coppa, DC D’Elia, C Demetrescu Cyber Security Cryptography and Machine Learning: First International …, 2017 | 37 | 2017 |
Estimating the empirical cost function of routines with dynamic workloads E Coppa, C Demetrescu, I Finocchi, R Marotta Proceedings of Annual IEEE/ACM International Symposium on Code Generation …, 2014 | 31* | 2014 |
Rethinking pointer reasoning in symbolic execution E Coppa, DC D'Elia, C Demetrescu 2017 32nd IEEE/ACM International Conference on Automated Software …, 2017 | 28 | 2017 |
Fuzzing symbolic expressions L Borzacchiello, E Coppa, C Demetrescu 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 27 | 2021 |
Memory models in symbolic execution: key ideas and new thoughts L Borzacchiello, E Coppa, D Cono D'Elia, C Demetrescu Software Testing, Verification and Reliability 29 (8), e1722, 2019 | 26 | 2019 |
Ropmate: Visually assisting the creation of rop-based exploits M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ... 2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018 | 21 | 2018 |
Input-sensitive profiling E Coppa, C Demetrescu, I Finocchi IEEE Transactions on Software Engineering 40 (12), 1185-1205, 2014 | 21 | 2014 |
SymNav: Visually assisting symbolic execution M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ... 2019 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-11, 2019 | 19 | 2019 |
The ROP needle: hiding trigger-based injection vectors via code reuse P Borrello, E Coppa, DC D'Elia, C Demetrescu Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1962-1970, 2019 | 15 | 2019 |
Reconstructing C2 servers for remote access trojans with symbolic execution L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu Cyber Security Cryptography and Machine Learning: Third International …, 2019 | 13 | 2019 |
Hiding in the particles: When return-oriented programming meets program obfuscation P Borrello, E Coppa, DC D’Elia 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 12 | 2021 |
Symfusion: hybrid instrumentation for concolic execution E Coppa, H Yin, C Demetrescu Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 10 | 2022 |
Counting cliques in parallel without a cluster: engineering a fork/join algorithm for shared-memory platforms E Coppa, I Finocchi, RL Garcia Information Sciences 496, 553-571, 2019 | 7 | 2019 |