You are here

Mariano Ceccato

Researcher
  • Phone: 0461314577
  • FBK Povo
Related projects
Publications
  1. Viticchié, Alessio; Basile, Cataldo; Avancini, Andrea; Ceccato, Mariano; Abrath, Bert; Coppens, Bart,
    Reactive attestation: Automatic detection and reaction to software tampering attacks,
    Proceedings of the 2016 ACM Workshop on Software PROtection (SPRO 2016),
    2016
    , pp. 73-
    84
    , (ACM Workshop on Software PROtection (SPRO 2016),
    Vienna, Austria,
    28/10/2016)
  2. Viticchié, Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto,
    Assessment of Source Code Obfuscation Techniques,
    In Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation,
    IEEE,
    2016
    , pp. 11-
    20
    , (16th IEEE International Working Conference on Source Code Analysis and Manipulation,
    Raleigh, NC, Usa,
    October 2-3, 2016)
  3. De Sutter, Bjorn; Basile, Cataldo; Ceccato, Mariano; Falcarin, Paolo; Zunke, Michael; Wyseur, Brecht; D'Annoville, Jerome,
    The ASPIRE Framework for Software Protection,
    Proceedings of the 2016 ACM Workshop on Software PROtection (SPRO 2016),
    2016
    , pp. 91-
    92
    , (Workshop on Software PROtection (SPRO 2016),
    Vienna, Austria,
    October 2016)
  4. Sabatucci, Luca; Ceccato, Mariano; Marchetto, Alessandro; Susi, Angelo,
    in «THE JOURNAL OF SYSTEMS AND SOFTWARE»,
    vol. 109,
    2015
    , pp. 124 -
    136
  5. Ceccato, Mariano; Capiluppi, Andrea; Falcarin, Paolo; Boldyreff, Cornelia,
    in «EMPIRICAL SOFTWARE ENGINEERING»,
    vol. 20,
    n. 6,
    2015
    , pp. 1486 -
    1524
  6. Ceccato, Mariano; Marchetto, Alessandro; Mariani, Leonardo; Nguyen, Cu Duy; Tonella, Paolo,
    in «ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY»,
    vol. 25,
    n. 1,
    2015
    , pp. 5:1 -
    5:38
  7. Itzel Morales-Ramirez; Anna Perini; Mariano Ceccato,
    Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach,
    Lecture Notes in Business Information ProcessingInformation Systems Engineering in Complex Environments,
    2015
    , pp. 215 -
    232
  8. Demissie, Biniam Fisseha; Ceccato, Mariano; Tiella, Roberto,
    Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on,
    IEEE,
    2015
    , pp. 38-
    44
    , (Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on,
    Florence, Italy,
    19 May 2015)
  9. Mariano Ceccato;Massimiliano Di Penta;Paolo Falcarin;Filippo Ricca;Marco Torchiano;Paolo Tonella,
    A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques,
    in «EMPIRICAL SOFTWARE ENGINEERING»,
    vol. 19,
    2014
    , pp. 1040 -
    1074
  10. Mariano Ceccato;Zheng Li;James R. Cordy,
    Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012,
    in «JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION: RESEARCH AND PRACTICE»,
    vol. 26,
    2014
    , pp. 531 -
    532

Pages