Agostino Cortesi

Orcid: 0000-0002-0946-5440

Affiliations:
  • Ca' Foscari University of Venice, Italy


According to our database1, Agostino Cortesi authored at least 168 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Minimising conflicts among run-time non-functional requirements within DevOps.
Syst. Eng., January, 2024

Study of the Watermark Source's Topology Role on Relational Data Watermarking Robustness.
IEEE Access, 2024

2023
Correlating contexts and NFR conflicts from event logs.
Softw. Syst. Model., December, 2023

Driving the Technology Value Stream by Analyzing App Reviews.
IEEE Trans. Software Eng., July, 2023

Relational data watermarking resilience to brute force attacks in untrusted environments.
Expert Syst. Appl., 2023

Information Flow Analysis for Detecting Non-Determinism in Blockchain (Artifact).
Dagstuhl Artifacts Ser., 2023

An Annexure to the Paper "Driving the Technology Value Stream by Analyzing App Reviews".
CoRR, 2023

A lightweight mutual and transitive authentication mechanism for IoT network.
Ad Hoc Networks, 2023

Zero-shot Learning for Named Entity Recognition in Software Specification Documents.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

A Two-Hop Neighborhood Based Berserk Detection Algorithm for Probabilistic Model of Consensus in Distributed Ledger Systems.
Proceedings of the Computational Collective Intelligence - 15th International Conference, 2023

Information Flow Analysis for Detecting Non-Determinism in Blockchain.
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023

2022
A Patient-Centric Nurse Scheduling Algorithm.
SN Comput. Sci., 2022

A Wearable System for Jump Detection in Inline Figure Skating.
Sensors, 2022

Context-aware OLAP for textual data warehouses.
Int. J. Inf. Manag. Data Insights, 2022

Empirical analysis of the impact of queries on watermarked relational databases.
Expert Syst. Appl., 2022

Reducing Multiple Occurrences of Meta-Mark Selection in Relational Data Watermarking.
IEEE Access, 2022

Relational String Abstract Domains.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2022

Ensuring determinism in blockchain software with GoLiSA: an industrial experience report.
Proceedings of the SOAP '22: 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, 2022

2021
Static analysis for discovering IoT vulnerabilities.
Int. J. Softw. Tools Technol. Transf., 2021

Sentence Embedding Models for Similarity Detection of Software Requirements.
SN Comput. Sci., 2021

NFR-aware prioritization of software requirements.
Syst. Eng., 2021

Construction and distribution of materialized views in Non-binary data space.
Innov. Syst. Softw. Eng., 2021

Requirement-oriented risk management for incremental software development.
Innov. Syst. Softw. Eng., 2021

Skyline computation over multiple points and dimensions.
Innov. Syst. Softw. Eng., 2021

Verifiability in Systems and Data Engineering: Preface by the Special Issue Editors.
Innov. Syst. Softw. Eng., 2021

Completeness of string analysis for dynamic languages.
Inf. Comput., 2021

Semantic-driven watermarking of relational textual databases.
Expert Syst. Appl., 2021

Geographic location based secure, dynamic and opportunistic RPL for distributed networks.
Ad Hoc Networks, 2021

Twinning Automata and Regular Expressions for String Static Analysis.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2021

CARO: A Conflict-Aware Requirement Ordering Tool for DevOps.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Static analysis for dummies: experiencing LiSA.
Proceedings of the SOAP@PLDI 2021: Proceedings of the 10th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, 2021

A Quantile-Based Watermarking Approach for Distortion Minimization.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

ALEA: An Anonymous Leader Election Algorithm for Synchronous Distributed Systems.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

2020
Extending Abstract Interpretation to Dependency Analysis of Database Applications.
IEEE Trans. Software Eng., 2020

Legodroid: A Type-Driven Library for Android and LEGO Mindstorms Interoperability.
Sensors, 2020

From CIL to Java bytecode: Semantics-based translation for static analysis leveraging.
Sci. Comput. Program., 2020

A Double Fragmentation Approach for Improving Virtual Primary Key-Based Watermark Synchronization.
IEEE Access, 2020

Cross-program taint analysis for IoT systems.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Generation of Safety and Liveness Complaint Automata from Goal Model Specifications.
Proceedings of the 16th European Dependable Computing Conference, 2020

Intents Analysis of Android Apps for Confidentiality Leakage Detection.
Proceedings of the Advanced Computing and Systems for Security, 2020

2019
Introduction to the special issue: SAAP-2017 (Static Analysis of Android Apps: Security and Privacy).
J. Comput. Lang., 2019

Static analysis of Android Auto infotainment and on-board diagnostics II apps.
Softw. Pract. Exp., 2019

Black Block Recorder: Immutable Black Box Logging for Robots via Blockchain.
IEEE Robotics Autom. Lett., 2019

Replaceability and negotiation in a cloud service ecosystem.
J. Cloud Comput., 2019

HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data.
Expert Syst. Appl., 2019

Cross-Programming Language Taint Analysis for the IoT Ecosystem.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2019

String Abstraction for Model Checking of C Programs.
Proceedings of the Model Checking Software - 26th International Symposium, 2019

Things as a Service: Service model for IoT.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Preventing Additive Attacks to Relational Database Watermarking.
Proceedings of the Research and Practical Issues of Enterprise Information Systems, 2019

Completeness of Abstract Domains for String Analysis of JavaScript Programs.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31, 2019

Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Type-Driven Cross-Programming for Android and LEGO Mindstorms Interoperability.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Geographic Location Based Dynamic and Opportunistic RPL for Distributed Networks.
Proceedings of the Computer Information Systems and Industrial Management, 2019

2018
Combining Symbolic and Numerical Domains for Information Leakage Analysis.
Trans. Comput. Sci., 2018

SDLI: Static Detection of Leaks Across Intents.
Proceedings of the 17th IEEE International Conference On Trust, 2018

M-String Segmentation: A Refined Abstract Domain for String Analysis in C Programs.
Proceedings of the 2018 International Symposium on Theoretical Aspects of Software Engineering, 2018

Static Analysis of Android Apps Interaction with Automotive CAN.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Procedurally Provisioned Access Control for Robotic Systems.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

CIL to Java-bytecode translation for static analysis leveraging.
Proceedings of the 6th Conference on Formal Methods in Software Engineering, 2018

Node localization for indoor tracking using artificial neural network.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

MySQL Extension Automatic Porting to PDO for PHP Migration and Security Improvement.
Proceedings of the Computer Information Systems and Industrial Management, 2018

Vulnerability analysis of Android auto infotainment apps.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Enhancing Security in ROS.
Proceedings of the Advanced Computing and Systems for Security, 2018

2017
Introduction to special issue on 'intelligent computing and adaptive systems'.
Innov. Syst. Softw. Eng., 2017

High performance encapsulation and networking in Casanova 2.
Entertain. Comput., 2017

Metacasanova: an optimized meta-compiler for domain-specific languages.
Proceedings of the 10th ACM SIGPLAN International Conference on Software Language Engineering, 2017

WiFi-Related Energy Consumption Analysis of Mobile Devices in a Walkable Area by Abstract Interpretation.
Proceedings of the Distributed Computing and Internet Technology, 2017

Blockchain Transaction Analysis Using Dominant Sets.
Proceedings of the Computer Information Systems and Industrial Management, 2017

2016
Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain.
Trans. Large Scale Data Knowl. Centered Syst., 2016

A uniform representation of multi-variant data in intensive-query databases.
Innov. Syst. Softw. Eng., 2016

DAPA: Degradation-Aware Privacy Analysis of Android Apps.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Building Game Scripting DSL's with the Metacasanova Metacompiler.
Proceedings of the Intelligent Technologies for Interactive Entertainment, 2016

ROLAP based data warehouse schema to XML schema conversion.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

2015
A suite of abstract domains for static analysis of string values.
Softw. Pract. Exp., 2015

The abstract domain of Trapezoid Step Functions.
Comput. Lang. Syst. Struct., 2015

Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2015

Casanova: A Simple, High-Performance Language for Game Development.
Proceedings of the Serious Games - First Joint International Conference, 2015

Verification of Hibernate Query Language by Abstract Interpretation.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015

Policy-Based Slicing of Hibernate Query Language.
Proceedings of the Computer Information Systems and Industrial Management, 2015

Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis.
Proceedings of the Computer Information Systems and Industrial Management, 2015

Materialized View Construction Using Linearizable Nonlinear Regression.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

2014
Information leakage analysis of database query languages.
Proceedings of the Symposium on Applied Computing, 2014

A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

Information-Flow Analysis of Hibernate Query Language.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Abstract program slicing on dependence condition graphs.
Sci. Comput. Program., 2013

A Survey on Product Operators in Abstract Interpretation.
Proceedings of the Semantics, 2013

Abstract program slicing of database query languages.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Static analysis techniques for robotics software verification.
Proceedings of the 44th Internationel Symposium on Robotics, 2013

The Domain of Parametric Hypercubes for Static Analysis of Computer Games Software.
Proceedings of the Formal Methods and Software Engineering, 2013

Abstract Interpretation of Recursive Queries.
Proceedings of the Distributed Computing and Internet Technology, 2013

Modeling the Bullwhip Effect in a Multi-Stage Multi-Tier Retail Network by Generalized Stochastic Petri Nets.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
Abstract interpretation of database query languages.
Comput. Lang. Syst. Struct., 2012

SAILS: static analysis of information leakage with sample.
Proceedings of the ACM Symposium on Applied Computing, 2012

Tukra: An Abstract Program Slicing Tool.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

A New Scale for Attribute Dependency in Large Database Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2012

Linear Approximation of Continuous Systems with Trapezoid Step Functions.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Widening and narrowing operators for abstract interpretation.
Comput. Lang. Syst. Struct., 2011

Information Leakage Analysis by Abstract Interpretation.
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011

Cooperative Query Answering by Abstract Interpretation.
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011

Engaging high school students in computer science via challenging applications.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011

Typing Legacy COBOL Code.
Proceedings of the Software and Data Technologies - 6th International Conference, 2011

Type-flow Analysis for Legacy COBOL Code.
Proceedings of the ICSOFT 2011, 2011

Property Driven Program Slicing Refinement.
Proceedings of the ICSOFT 2011, 2011

Static Analysis of String Values.
Proceedings of the Formal Methods and Software Engineering, 2011

KPI-Supported PDCA Model for Innovation Policy Management in Local Government.
Proceedings of the Electronic Government - 10th IFIP WG 8.5 International Conference, 2011

Observation-Based Fine Grained Access Control for XML Documents.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

2010
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison.
J. Univers. Comput. Sci., 2010

Non-repudiation analysis using LySa with annotations.
Comput. Lang. Syst. Struct., 2010

Dependence condition graph for semantics-based abstract program slicing.
Proceedings of the of the Tenth Workshop on Language Descriptions, Tools and Applications, 2010

Obfuscation-based analysis of SQL injection attacks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Fine Grained Access Control for Relational Databases by Abstract Interpretation.
Proceedings of the Software and Data Technologies - 5th International Conference, 2010

Observation-based Fine Grained Access Control for Relational Databases.
Proceedings of the ICSOFT 2010, 2010

Distortion-Free Authentication Watermarking.
Proceedings of the Software and Data Technologies - 5th International Conference, 2010

Database Authentication by Distortion Free Watermarking.
Proceedings of the ICSOFT 2010, 2010

A Persistent Public Watermarking of Relational Databases.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Three-layered QoS for eGovernment web services.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010

2009
Non-repudiation Analysis with LySa.
Proceedings of the Emerging Challenges for Security, 2009

A Distortion Free Watermark Framework for Relational Databases.
Proceedings of the ICSOFT 2009, 2009

A Generic Distortion Free Watermarking Technique for Relational Databases.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Learning by Fixing and Extending Games.
Proceedings of the 30th Annual Conference of the European Association for Computer Graphics, 2009

2008
Information flow security in Boundary Ambients.
Inf. Comput., 2008

An Ontology-based Inquiry Framework.
Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008), 2008

Widening Operators for Abstract Interpretation.
Proceedings of the Sixth IEEE International Conference on Software Engineering and Formal Methods, 2008

2007
Causality-based Abstraction of Multiplicity in Security Protocols.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

A calculus of challenges and responses.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Semantic Hierarchy Refactoring by Abstract Interpretation.
Proceedings of the Verification, 2006

2005
Abstract Interpretation and Object-oriented Programming: Quo Vadis?
Proceedings of the First International Workshop on Abstract Interpretation of Object-oriented Languages, 2005

Preface.
Proceedings of the First International Workshop on Abstract Interpretation of Object-oriented Languages, 2005

Abstract Interpretation-Based Verification of Non-functional Requirements.
Proceedings of the Coordination Models and Languages, 7th International Conference, 2005

2004
Preface by the section editors.
Int. J. Softw. Tools Technol. Transf., 2004

Flow-sensitive Leakage Analysis in Mobile Ambients.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

Nesting analysis of mobile ambients.
Comput. Lang. Syst. Struct., 2004

2003
Static Analysis.
Sci. Comput. Program., 2003

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Information Leakage Detection in Boundary Ambients.
Proceedings of the Computing: the Australasian Theory Symposiumm, 2003

Complexity of Nesting Analysis in Mobile Ambients.
Proceedings of the Verification, 2003

BANANA - A Tool for Boundary Ambients Nesting ANAlysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

2002
Operational and abstract semantics of the query language G-Log.
Theor. Comput. Sci., 2002

Computer languages and security.
Comput. Lang. Syst. Struct., 2002

Security boundaries in mobile ambients.
Comput. Lang. Syst. Struct., 2002

Boundary Inference for Enforcing Security Policies in Mobile Ambients.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

Control Flow Analysis of Mobile Ambients with Security Boundaries.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002

2001
Operational Semantics for Reexecution-based Analysis of Logic Programs with Delay Declarations.
Proceedings of the Declarative Programming, 2001

Information Flow Security in Mobile Ambients.
Proceedings of the International Workshop on Concurrency and Coordination, 2001

An Italian National Curriculum on ICT for Schools.
Proceedings of the Networking the Learner: Computers in Education, 2001

Reexecution-Based Analysis of Logic Programs with Delay Declarations.
Proceedings of the Perspectives of System Informatics, 2001

Distinctness and Sharing Domains for Static Analysis of Java Programs.
Proceedings of the ECOOP 2001, 2001

2000
Combinations of abstract domains for logic programming: open product and generic pattern construction.
Sci. Comput. Program., 2000

Abstract Domains for Reordering CLP(R<sub>Lin</sub>) Programs.
J. Log. Program., 2000

1999
Sharing is Optimal.
J. Log. Program., 1999

Automated Verification of Prolog Programs.
J. Log. Program., 1999

1998
The Quotient of an Abstract Interpretation.
Theor. Comput. Sci., 1998

Operational and Abstract Semantics of a Query Language for Semi-Structured Information.
Proceedings of the 1998 Joint Conference on Declarative Programming, 1998

1997
Complementation in Abstract Interpretation.
ACM Trans. Program. Lang. Syst., 1997

Automated Verification of Behavioural Properties of Prolog Programs.
Proceedings of the Advances in Computing Science, 1997

Automated Behavioural Verification of Prolog Programs.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997

1996
Optimal Groundness Analysis Using Propositional Logic.
J. Log. Program., 1996

Specification-Based Automatic Verification of Prolog Programs.
Proceedings of the Logic Programming Synthesis and Transformation, 1996

1995
Evaluation of the Domain <i>Prop</i>.
J. Log. Program., 1995

Type Analysis of Prolog Using Type Graphs.
J. Log. Program., 1995

1994
Combinations of Abstract Domains for Logic Programming.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

The Quotient of an Abstract Interpretation for Comparing Static Analyses.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
Graph Properties for Normal Logic Programs.
Theor. Comput. Sci., 1993

Comparison and design of abstract domains for sharing analysis.
Proceedings of the 8th Italian Conference on Logic Programming, 1993

1992
Comparison of Abstract Interpretations.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992

1991
Abstract Interpretation of Logic Programs: An Abstract Domain for Groundness, Sharing, Freeness and Compoundness Analysis.
Proceedings of the Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 1991

Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis
Proceedings of the Sixth Annual Symposium on Logic in Computer Science (LICS '91), 1991


  Loading...