263 results on '"Roberto Giacobazzi"'
Search Results
2. How Fitting is Your Abstract Domain?
3. A Formal Framework to Measure the Incompleteness of Abstract Interpretations.
4. A Correctness and Incorrectness Program Logic.
5. Property-Driven Code Obfuscations Reinterpreting Jones-Optimality in Abstract Interpretation.
6. On the Properties of Partial Completeness in Abstract Interpretation.
7. Abstract interpretation repair.
8. Adversities in Abstract Interpretation - Accommodating Robustness by Abstract Interpretation.
9. Partial (In)Completeness in abstract interpretation: limiting the imprecision in program analysis.
10. History of Abstract Interpretation.
11. A Logic for Locally Complete Abstract Interpretations.
12. Formal Framework for Reasoning About the Precision of Dynamic Analysis.
13. Data augmentation and transfer learning to classify malware images in a deep learning context.
14. Learning metamorphic malware signatures from samples.
15. Abstract Interpretation of Indexed Grammars.
16. Computing Abstract Distances in Logic Programs.
17. Abstract extensionality: on the properties of incomplete abstract interpretations.
18. Code Obfuscation Against Abstract Model Checking Attacks.
19. Program Analysis Is Harder Than Verification: A Computability Perspective.
20. Sound up-to techniques and Complete abstract domains.
21. A deep learning approach to program similarity.
22. A²I: abstract² interpretation.
23. Code obfuscation against abstraction refinement attacks.
24. Abstract Non-Interference: A Unifying Framework for Weakening Information-flow.
25. Completeness in Approximate Transduction.
26. Active Android malware analysis: an approach based on stochastic games.
27. Maximal incompleteness as obfuscation potency.
28. Analyzing Program Analyses.
29. Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables.
30. Making abstract models complete.
31. Weakening Additivity in Adjoining Closures.
32. Analyzing program dependencies for malware detection.
33. A Formal Framework for Property-Driven Obfuscation Strategies.
34. Fast location of similar code fragments using semantic 'juice'.
35. Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation.
36. Strong Preservation by Model Deformation.
37. Twisting Additivity in Program Obfuscation.
38. Software Security by Obscurity - A Programming Language Perspective.
39. Obfuscation by partial evaluation of distorted interpreters.
40. Intensional and extensional aspects of computation: From computability and complexity to program analysis and security (NII Shonan Meeting 2018-1).
41. Example-Guided Abstraction Simplification.
42. Modelling Metamorphism by Abstract Interpretation.
43. Static Analysis, Abstract Interpretation and Verification in (Constraint Logic) Programming.
44. Unveiling metamorphism by abstract interpretation of code properties.
45. Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking.
46. Hiding Software Watermarks in Loop Structures.
47. Transforming Abstract Interpretations by Abstract Interpretation.
48. A Fast Implementation of the Octagon Abstract Domain on Graphics Hardware.
49. Opaque Predicates Detection by Abstract Interpretation.
50. Semantic-Based Code Obfuscation by Abstract Interpretation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.