Giovanni Lagorio

Orcid: 0000-0002-6632-1523

According to our database1, Giovanni Lagorio authored at least 46 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fight silent horror unit test methods by consulting a TestWizard.
J. Softw. Evol. Process., April, 2023

2022
Automatic Challenge Generation for Hands-on Cybersecurity Training.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection.
ACM Trans. Priv. Secur., 2021

Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware.
IEEE Trans. Inf. Forensics Secur., 2021

Longitudinal Study of the Prevalence of Malware Evasive Techniques.
CoRR, 2021

Capture the Flag competitions for Higher Education.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs.
SoftwareX, 2020

Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations.
CoRR, 2020

CyberChallenge.IT@Unige: Ethical Hacking for Young Talents.
Proceedings of the Adjunct Publication of the 28th ACM Conference on User Modeling, 2020

WAF-A-MoLE: evading web application firewalls through adversarial machine learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
TickEth, a ticketing system built on ethereum.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries.
Proceedings of the Third Italian Conference on Cyber Security, 2019

ZenHackAdemy: Ethical Hacking @ DIBRIS.
Proceedings of the 11th International Conference on Computer Supported Education, 2019

2017
RmPerm: A Tool for Android Permissions Removal.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2012
Featherweight Jigsaw - Replacing inheritance by composition in Java-like languages.
Inf. Comput., 2012

Static Single Information Form for Abstract Compilation.
Proceedings of the Theoretical Computer Science, 2012

2011
Strong exception-safety for checked and unchecked exceptions.
J. Object Technol., 2011

Idealized coinductive type systems for imperative object-oriented programs.
RAIRO Theor. Informatics Appl., 2011

2010
Coinductive subtyping for abstract compilation of object-oriented languages into Horn formulas
Proceedings of the Proceedings First Symposium on Games, 2010

Abstract Compilation of Object-Oriented Languages into Coinductive CLP(X): Can Type Inference Meet Verification?
Proceedings of the Formal Verification of Object-Oriented Software, 2010

Strong exception-safety for Java-like languages.
Proceedings of the 12th Workshop on Formal Techniques for Java-Like Programs, 2010

Complete coinductive subtyping for abstract compilation of object-oriented languages.
Proceedings of the 12th Workshop on Formal Techniques for Java-Like Programs, 2010

2009
A Lightweight Approach to Customizable Composition Operators for Java-like Classes.
Proceedings of the 6th International Workshop on Formal Aspects of Component Software, 2009

Customizable composition operators for Java-like classes.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

An idealized coinductive type system for imperative object-oriented programs.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

Featherweight Jigsaw: A Minimal Core Calculus for Modular Composition of Classes.
Proceedings of the ECOOP 2009, 2009

Coinductive Type Systems for Object-Oriented Languages.
Proceedings of the ECOOP 2009, 2009

2008
Type Inference by Coinductive Logic Programming.
Proceedings of the Types for Proofs and Programs, International Conference, 2008

Gesper: Support to Capitalize on Experience in a Network of SMEs.
Proceedings of the Leveraging Applications of Formal Methods, 2008

2007
Just: Safe Unknown Types in Java-like Languages.
J. Object Technol., 2007

Modelling a JVM for polymorphic bytecode.
J. Object Technol., 2007

Type inference for polymorphic methods in Java-like languages.
Proceedings of the Theoretical Computer Science, 10th Italian Conference, 2007

2006
A flexible model for dynamic linking in Java and C#.
Theor. Comput. Sci., 2006

Introducing safe unknown types in Java-like languages.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Flexible Type-Safe Linking of Components for Java-Like Languages.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

2004
Type system for Java separate compilation and selective recompilation.
PhD thesis, 2004

Capturing ghost dependencies in Java sources.
J. Object Technol., 2004

Stronger Typings for Separate Compilation of Java-like Languages .
J. Object Technol., 2004

Another step towards a smart compilation manager for Java.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
Jam - designing a Java extension with mixins.
ACM Trans. Program. Lang. Syst., 2003

Towards a Smart Compilation Manager for Java.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Flexible Models for Dynamic Linking.
Proceedings of the Programming Languages and Systems, 2003

2002
True separate compilation of Java classes.
Proceedings of the 4th international ACM SIGPLAN conference on Principles and practice of declarative programming, 2002

A Formal Framework for Java Separate Compilation.
Proceedings of the ECOOP 2002, 2002

2001
A Core Calculus for Java Exceptions.
Proceedings of the 2001 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2001

2000
Jam - A Smooth Extension of Java with Mixins.
Proceedings of the ECOOP 2000, 2000


  Loading...