default search action
Emilio Coppa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Emilio Coppa, Sebastian Schrittwieser:
Editorial: Special issue on ARES 2022. Comput. Secur. 138: 103662 (2024) - [j10]Emilio Coppa, Alessio Izzillo:
Testing concolic execution through consistency checks. J. Syst. Softw. 211: 112001 (2024) - 2022
- [j9]Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
SENinja: A symbolic execution plugin for Binary Ninja. SoftwareX 20: 101219 (2022) - 2021
- [j8]Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
FUZZOLIC: Mixing fuzzing and concolic execution. Comput. Secur. 108: 102368 (2021) - [j7]Marcel Blöcher, Emilio Coppa, Pascal Kleber, Patrick Eugster, William Culhane, Masoud Saeida Ardekani:
ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others. ACM Trans. Comput. Syst. 39(1-4): 4:1-4:33 (2021) - 2020
- [j6]Daniele Cono D'Elia, Emilio Coppa, Federico Palmaro, Lorenzo Cavallaro:
On the Dissection of Evasive Malware. IEEE Trans. Inf. Forensics Secur. 15: 2750-2765 (2020) - 2019
- [j5]Emilio Coppa, Irene Finocchi, Renan Leon Garcia:
Counting cliques in parallel without a cluster: Engineering a fork/join algorithm for shared-memory platforms. Inf. Sci. 496: 553-571 (2019) - [j4]Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Memory models in symbolic execution: key ideas and new thoughts. Softw. Test. Verification Reliab. 29(8) (2019) - 2018
- [j3]Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
A Survey of Symbolic Execution Techniques. ACM Comput. Surv. 51(3): 50:1-50:39 (2018) - 2015
- [j2]Emilio Coppa:
An interactive visualization framework for performance analysis. EAI Endorsed Trans. Ubiquitous Environ. 2(7): e5 (2015) - 2014
- [j1]Emilio Coppa, Camil Demetrescu, Irene Finocchi:
Input-Sensitive Profiling. IEEE Trans. Software Eng. 40(12): 1185-1205 (2014)
Conference and Workshop Papers
- 2024
- [c22]Claudia Ruggiero, Pietro Mazzini, Emilio Coppa, Simone Lenti, Silvia Bonomi:
SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies. ARES 2024: 43:1-43:13 - [c21]Silvia Bonomi, Stefano Cappai, Emilio Coppa:
Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools. SAFECOMP 2024: 200-217 - [c20]Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. SECRYPT 2024: 568-575 - 2023
- [c19]Silvia Bonomi, Stefano Cappai, Emilio Coppa:
On the Efficacy of Smart Contract Analysis Tools. ISSREW 2023: 37-38 - [c18]Emilio Coppa, Alessio Izzillo, Riccardo Lazzeretti, Simone Lenti:
FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns. VizSec 2023: 1-11 - 2022
- [c17]Luca Borzacchiello, Emilio Coppa, Davide Maiorca, Andrea Columbu, Camil Demetrescu, Giorgio Giacinto:
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. ESORICS (3) 2022: 701-722 - [c16]Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
Handling Memory-Intensive Operations in Symbolic Execution. ISEC 2022: 25:1-25:5 - [c15]Emilio Coppa, Heng Yin, Camil Demetrescu:
SymFusion: Hybrid Instrumentation for Concolic Execution. ASE 2022: 100:1-100:12 - 2021
- [c14]Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia:
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. DSN 2021: 555-568 - [c13]Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
Fuzzing Symbolic Expressions. ICSE 2021: 711-722 - 2020
- [c12]Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa:
WEIZZ: automatic grey-box fuzzing for structured binary formats. ISSTA 2020: 1-13 - 2019
- [c11]Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro:
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS 2019: 15-27 - [c10]Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. CSCML 2019: 121-140 - [c9]Daniele Cono D'Elia, Emilio Coppa, Andrea Salvati, Camil Demetrescu:
Static Analysis of ROP Code. EuroSec@EuroSys 2019: 2:1-2:6 - [c8]Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
The ROP needle: hiding trigger-based injection vectors via code reuse. SAC 2019: 1962-1970 - [c7]Marco Angelini, Graziano Blasilli, Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Simone Lenti, Simone Nicchi, Giuseppe Santucci:
SymNav: Visually Assisting Symbolic Execution. VizSEC 2019: 1-11 - 2018
- [c6]Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci:
ROPMate: Visually Assisting the Creation of ROP-based Exploits. VizSEC 2018: 1-8 - 2017
- [c5]Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Assisting Malware Analysis with Symbolic Execution: A Case Study. CSCML 2017: 171-188 - [c4]Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Rethinking pointer reasoning in symbolic execution. ASE 2017: 613-618 - 2015
- [c3]Emilio Coppa, Irene Finocchi:
On data skewness, stragglers, and MapReduce progress indicators. SoCC 2015: 139-152 - 2014
- [c2]Emilio Coppa, Camil Demetrescu, Irene Finocchi, Romolo Marotta:
Estimating the Empirical Cost Function of Routines with Dynamic Workloads. CGO 2014: 230 - 2012
- [c1]Emilio Coppa, Camil Demetrescu, Irene Finocchi:
Input-sensitive profiling. PLDI 2012: 89-98
Informal and Other Publications
- 2021
- [i6]Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
Fuzzing Symbolic Expressions. CoRR abs/2102.06580 (2021) - 2020
- [i5]Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia:
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. CoRR abs/2012.06658 (2020) - 2019
- [i4]Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa:
WEIZZ: Automatic Grey-box Fuzzing for Structured Binary Formats. CoRR abs/1911.00621 (2019) - 2016
- [i3]Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
A Survey of Symbolic Execution Techniques. CoRR abs/1610.00502 (2016) - 2015
- [i2]Emilio Coppa, Irene Finocchi:
On data skewness, stragglers, and MapReduce progress indicators. CoRR abs/1503.09062 (2015) - 2013
- [i1]Emilio Coppa, Camil Demetrescu, Irene Finocchi, Romolo Marotta:
Multithreaded Input-Sensitive Profiling. CoRR abs/1304.3804 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint