Emilio Coppa

Orcid: 0000-0002-8094-871X

According to our database1, Emilio Coppa authored at least 29 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Editorial: Special issue on ARES 2022.
Comput. Secur., March, 2024

2023
FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2023

On the Efficacy of Smart Contract Analysis Tools.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

2022
SENinja: A symbolic execution plugin for Binary Ninja.
SoftwareX, December, 2022

SymFusion: Hybrid Instrumentation for Concolic Execution.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Handling Memory-Intensive Operations in Symbolic Execution.
Proceedings of the ISEC 2022: 15th Innovations in Software Engineering Conference, Gandhinagar, India, February 24, 2022

Reach Me if You Can: On Native Vulnerability Reachability in Android Apps.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others.
ACM Trans. Comput. Syst., 2021

FUZZOLIC: Mixing fuzzing and concolic execution.
Comput. Secur., 2021

Fuzzing Symbolic Expressions.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
On the Dissection of Evasive Malware.
IEEE Trans. Inf. Forensics Secur., 2020

WEIZZ: automatic grey-box fuzzing for structured binary formats.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

2019
Memory models in symbolic execution: key ideas and new thoughts.
Softw. Test. Verification Reliab., 2019

Counting cliques in parallel without a cluster: Engineering a fork/join algorithm for shared-memory platforms.
Inf. Sci., 2019

SymNav: Visually Assisting Symbolic Execution.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019

The ROP needle: hiding trigger-based injection vectors via code reuse.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Static Analysis of ROP Code.
Proceedings of the 12th European Workshop on Systems Security, 2019

Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
A Survey of Symbolic Execution Techniques.
ACM Comput. Surv., 2018

ROPMate: Visually Assisting the Creation of ROP-based Exploits.
Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security, 2018

2017
Rethinking pointer reasoning in symbolic execution.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Assisting Malware Analysis with Symbolic Execution: A Case Study.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2015
An interactive visualization framework for performance analysis.
EAI Endorsed Trans. Ubiquitous Environ., 2015

On data skewness, stragglers, and MapReduce progress indicators.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

2014
Input-Sensitive Profiling.
IEEE Trans. Software Eng., 2014

Estimating the Empirical Cost Function of Routines with Dynamic Workloads.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

2013
Multithreaded Input-Sensitive Profiling
CoRR, 2013


  Loading...