Travelled to:
1 × Belgium
1 × Canada
1 × China
1 × Greece
1 × Hungary
1 × Romania
1 × Switzerland
1 × The Netherlands
2 × France
2 × Germany
7 × USA
Collaborated with:
P.Tonella A.Avancini ∅ F.Ricca J.Nagra C.Basile T.R.Dean M.D.Penta M.Torchiano C.D.Nguyen M.D.Preda C.Matteotti P.Falcarin A.Majumdar D.Marchignoli D.Appelt L.C.Briand A.Marchetto L.Mariani C.S.Collberg D.Binkley M.Harman C.A.Visaggio M.Marin K.Mens L.Moonen T.Tourwé B.D.Sutter Brecht Wyseur Jérôme d'Annoville Michael Zunke
Talks about:
aspect (7) migrat (6) softwar (5) orient (4) legaci (4) applic (4) test (4) code (4) protect (3) program (3)
♂ Person: Mariano Ceccato
DBLP: Ceccato:Mariano
Facilitated 3 volumes:
Contributed to:
Wrote 23 papers:
- ICPC-2013-BasileC #towards
- Towards a unified software attack model to assess software protections (CB, MC), pp. 219–222.
- WCRE-2013-AvanciniC #grammarware #named #testing #web
- Circe: A grammar-based oracle for testing Cross-site scripting in web applications (AA, MC), pp. 262–271.
- ICSE-2012-CeccatoMMNT #debugging #effectiveness #empirical #random testing #testing
- An empirical study about the effectiveness of debugging when random test cases are used (MC, AM, LM, CDN, PT), pp. 452–462.
- SCAM-2011-AvanciniC #approach #search-based #security #testing #web
- Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
- ICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread
- Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
- ICPC-2009-CeccatoPNFRTT #assessment #effectiveness #obfuscation #source code
- The effectiveness of source code obfuscation: An experimental assessment (MC, MDP, JN, PF, FR, MT, PT), pp. 178–187.
- SAC-2009-CeccatoTPM #orthogonal
- Remote software protection by orthogonal client replacement (MC, PT, MDP, AM), pp. 448–455.
- CSMR-2008-Ceccato #aspect-oriented #automation #migration #towards
- Automatic Support for the Migration Towards Aspects (MC), pp. 298–301.
- CSMR-2008-CeccatoTM #goto #java #legacy #migration
- Goto Elimination Strategies in the Migration of Legacy Code to Java (MC, PT, CM), pp. 53–62.
- ICSE-2008-RiccaPTTCV #evolution
- Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks (FR, MDP, MT, PT, MC, CAV), pp. 361–370.
- PDP-2008-CeccatoNT #performance #trust #verification
- Distributing Trust Verification to Increase Application Performance (MC, JN, PT), pp. 604–610.
- SCAM-2008-CeccatoDT #legacy #program transformation #using
- Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
- WCRE-2008-CeccatoDTM #java #legacy #migration #reverse engineering
- Data Model Reverse Engineering in Migrating a Legacy System to Java (MC, TRD, PT, DM), pp. 177–186.
- ICSE-2007-RiccaPTTC #comprehension #experience #uml
- The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes (FR, MDP, MT, PT, MC), pp. 375–384.
- ICSM-2007-Ceccato #aspect-oriented #migration #object-oriented #programming
- Migrating Object Oriented code to Aspect Oriented Programming (MC), pp. 497–498.
- SCAM-2007-CeccatoPNCT #slicing
- Barrier Slicing for Remote Software Trusting (MC, MDP, JN, CSC, PT), pp. 27–36.
- ICSM-2005-BinkleyCHRT #aspect-oriented #automation #object-oriented #refactoring
- Automated Refactoring of Object Oriented Code into Aspects (DB, MC, MH, FR, PT), pp. 27–36.
- IWPC-2005-CeccatoMMMTT #comparison #mining
- A Qualitative Comparison of Three Aspect Mining Techniques (MC, MM, KM, LM, PT, TT), pp. 13–22.
- ICSM-2004-TonellaC #aspect-oriented #implementation #interface #migration
- Migrating Interface Implementation to Aspects (PT, MC), pp. 220–229.
- SCAM-2004-CeccatoT #aspect-oriented #programming
- Adding Distribution to Existing Applications by Means of Aspect Oriented Programming (MC, PT), pp. 107–116.
- WCRE-2004-TonellaC #concept analysis #execution #mining
- Aspect Mining through the Formal Concept Analysis of Execution Traces (PT, MC), pp. 112–121.
- ASE-2016-CeccatoNAB #automation #black box #injection #named #security #testing
- SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities (MC, CDN, DA, LCB), pp. 167–177.
- WICSA-2016-SutterFWBCDZ #architecture
- A Reference Architecture for Software Protection (BDS, PF, BW, CB, MC, Jd, MZ), pp. 291–294.