Emilio Coppa

According to our database1, Emilio Coppa authored at least 26 papers between 2013 and 2022.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


SENinja: A symbolic execution plugin for Binary Ninja.
SoftwareX, December, 2022

SymFusion: Hybrid Instrumentation for Concolic Execution.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Handling Memory-Intensive Operations in Symbolic Execution.
Proceedings of the ISEC 2022: 15th Innovations in Software Engineering Conference, Gandhinagar, India, February 24, 2022

Reach Me if You Can: On Native Vulnerability Reachability in Android Apps.
Proceedings of the Computer Security - ESORICS 2022, 2022

ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others.
ACM Trans. Comput. Syst., 2021

FUZZOLIC: Mixing fuzzing and concolic execution.
Comput. Secur., 2021

Fuzzing Symbolic Expressions.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

On the Dissection of Evasive Malware.
IEEE Trans. Inf. Forensics Secur., 2020

WEIZZ: automatic grey-box fuzzing for structured binary formats.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Memory models in symbolic execution: key ideas and new thoughts.
Softw. Test. Verification Reliab., 2019

Counting cliques in parallel without a cluster: Engineering a fork/join algorithm for shared-memory platforms.
Inf. Sci., 2019

SymNav: Visually Assisting Symbolic Execution.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019

The ROP needle: hiding trigger-based injection vectors via code reuse.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Static Analysis of ROP Code.
Proceedings of the 12th European Workshop on Systems Security, 2019

Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Survey of Symbolic Execution Techniques.
ACM Comput. Surv., 2018

ROPMate: Visually Assisting the Creation of ROP-based Exploits.
Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security, 2018

Rethinking pointer reasoning in symbolic execution.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Assisting Malware Analysis with Symbolic Execution: A Case Study.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

An interactive visualization framework for performance analysis.
EAI Endorsed Trans. Ubiquitous Environ., 2015

On data skewness, stragglers, and MapReduce progress indicators.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

Input-Sensitive Profiling.
IEEE Trans. Software Eng., 2014

Estimating the Empirical Cost Function of Routines with Dynamic Workloads.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

Multithreaded Input-Sensitive Profiling
CoRR, 2013