
Fausto Spoto
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j22]Pietro Ferrara, Agostino Cortesi
, Fausto Spoto:
From CIL to Java bytecode: Semantics-based translation for static analysis leveraging. Sci. Comput. Program. 191: 102392 (2020) - [c50]Rocco Salvia, Agostino Cortesi, Pietro Ferrara, Fausto Spoto:
Intents Analysis of Android Apps for Confidentiality Leakage Detection. ACSS (1) 2020: 43-65 - [c49]Fausto Spoto:
Enforcing Determinism of Java Smart Contracts. Financial Cryptography Workshops 2020: 568-583 - [c48]Amit Kr Mandal, Pietro Ferrara, Yuliy Khlyebnikov, Agostino Cortesi
, Fausto Spoto:
Cross-program taint analysis for IoT systems. SAC 2020: 1944-1952 - [c47]Pietro Ferrara, Luca Olivieri, Fausto Spoto:
BackFlow: Backward Context-Sensitive Flow Reconstruction of Taint Analysis Results. VMCAI 2020: 23-43
2010 – 2019
- 2019
- [j21]Pietro Ferrara, Amit Kr Mandal, Agostino Cortesi
, Fausto Spoto:
Cross-Programming Language Taint Analysis for the IoT Ecosystem. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 77 (2019) - [j20]Amit Kr Mandal, Federica Panarotto, Agostino Cortesi
, Pietro Ferrara, Fausto Spoto:
Static analysis of Android Auto infotainment and on-board diagnostics II apps. Softw. Pract. Exp. 49(7): 1131-1161 (2019) - [j19]Fausto Spoto, Elisa Burato, Michael D. Ernst, Pietro Ferrara, Alberto Lovato, Damiano Macedonio, Ciprian Spiridon:
Static Identification of Injection Attacks in Java. ACM Trans. Program. Lang. Syst. 41(3): 18:1-18:58 (2019) - [c46]Fausto Spoto
:
A Java Framework for Smart Contracts. Financial Cryptography Workshops 2019: 122-137 - 2018
- [c45]Pietro Ferrara, Luca Olivieri, Fausto Spoto:
Tailoring Taint Analysis to GDPR. APF 2018: 63-76 - [c44]Étienne Payet, Fausto Spoto:
Checking Array Bounds by Abstract Interpretation and Symbolic Expressions. IJCAR 2018: 706-722 - [c43]Amit Kr Mandal, Agostino Cortesi
, Pietro Ferrara
, Federica Panarotto, Fausto Spoto:
Vulnerability analysis of Android auto infotainment apps. CF 2018: 183-190 - [c42]Pietro Ferrara
, Agostino Cortesi
, Fausto Spoto:
CIL to Java-bytecode translation for static analysis leveraging. FormaliSE@ICSE 2018: 40-49 - [c41]Pietro Ferrara, Fausto Spoto:
Static Analysis for GDPR Compliance. ITASEC 2018 - [c40]Federica Panarotto, Agostino Cortesi
, Pietro Ferrara, Amit Kr Mandal, Fausto Spoto:
Static Analysis of Android Apps Interaction with Automotive CAN. SmartCom 2018: 114-123 - [c39]Rocco Salvia, Pietro Ferrara
, Fausto Spoto, Agostino Cortesi
:
SDLI: Static Detection of Leaks Across Intents. TrustCom/BigDataSE 2018: 1002-1007 - 2017
- [c38]Pietro Ferrara, Elisa Burato, Fausto Spoto:
Security Analysis of the OWASP Benchmark with Julia. ITASEC 2017: 242-247 - 2016
- [c37]Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto, Javier Thaine:
Locking discipline inference and checking. ICSE 2016: 1133-1144 - [c36]Michael D. Ernst, Damiano Macedonio, Massimo Merro, Fausto Spoto:
Semantics for Locking Specifications. NFM 2016: 355-372 - [c35]Fausto Spoto:
The Julia Static Analyzer for Java. SAS 2016: 39-57 - 2015
- [c34]Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Ciprian Spiridon, Fausto Spoto:
Boolean Formulas for the Static Identification of Injection Attacks in Java. LPAR 2015: 130-145 - [i3]Michael D. Ernst, Damiano Macedonio, Massimo Merro, Fausto Spoto:
Semantics for Locking Specifications. CoRR abs/1501.05338 (2015) - 2014
- [j18]Enrico Scapin
, Fausto Spoto
:
Field-sensitive unreachability and non-cyclicity analysis. Sci. Comput. Program. 95: 359-375 (2014) - [c33]Étienne Payet, Fausto Spoto:
An operational semantics for android activities. PEPM 2014: 121-132 - [c32]Alberto Lovato, Damiano Macedonio, Fausto Spoto:
A Thread-Safe Library for Binary Decision Diagrams. SEFM 2014: 35-49 - [i2]Étienne Payet, Fred Mesnard, Fausto Spoto:
Non-Termination Analysis of Java Bytecode. CoRR abs/1401.5292 (2014) - 2013
- [j17]Durica Nikolic, Fausto Spoto:
Inferring complete initialization of arrays. Theor. Comput. Sci. 484: 16-40 (2013) - [j16]Durica Nikolic, Fausto Spoto:
Reachability analysis of program variables. ACM Trans. Program. Lang. Syst. 35(4): 14:1-14:68 (2013) - 2012
- [j15]Étienne Payet, Fausto Spoto:
Static analysis of Android programs. Inf. Softw. Technol. 54(11): 1192-1201 (2012) - [c31]Durica Nikolic, Fausto Spoto:
Reachability Analysis of Program Variables. IJCAR 2012: 423-438 - [c30]Durica Nikolic, Fausto Spoto:
Definite Expression Aliasing Analysis for Java Bytecode. ICTAC 2012: 74-89 - [c29]Durica Nikolic, Fausto Spoto:
Automaton-Based Array Initialization Analysis. LATA 2012: 420-432 - 2011
- [j14]Fausto Spoto:
Precise null-pointer analysis. Softw. Syst. Model. 10(2): 219-252 (2011) - [c28]Étienne Payet, Fausto Spoto:
Static Analysis of Android Programs. CADE 2011: 439-445 - [c27]Fausto Spoto, Michael D. Ernst:
Inference of field initialization. ICSE 2011: 231-240 - 2010
- [j13]Fausto Spoto, Étienne Payet:
Magic-sets for localised analysis of Java bytecode. High. Order Symb. Comput. 23(1): 29-86 (2010) - [j12]Fausto Spoto, Fred Mesnard, Étienne Payet:
A termination analyzer for Java bytecode based on path-length. ACM Trans. Program. Lang. Syst. 32(3): 8:1-8:70 (2010) - [c26]Fausto Spoto:
The Nullness Analyser of julia. LPAR (Dakar) 2010: 405-424
2000 – 2009
- 2009
- [j11]Étienne Payet, Fausto Spoto:
Experiments with Non-Termination Analysis for Java Bytecode. Electron. Notes Theor. Comput. Sci. 253(5): 83-96 (2009) - [j10]Fausto Spoto, Lunjin Lu, Fred Mesnard:
Using CLP Simplifications to Improve Java Bytecode Termination Analysis. Electron. Notes Theor. Comput. Sci. 253(5): 129-144 (2009) - 2008
- [c25]Fausto Spoto:
Special track on Software Verification: editorial message. SAC 2008: 326 - [c24]Fausto Spoto:
Nullness Analysis in Boolean Form. SEFM 2008: 21-30 - 2007
- [j9]Marieke Huisman
, Fausto Spoto:
Preface. Electron. Notes Theor. Comput. Sci. 190(1): 1 (2007) - [j8]Fausto Spoto:
Optimality and condensing of information flow through linear refinement. Theor. Comput. Sci. 388(1-3): 53-82 (2007) - [c23]Étienne Payet, Fausto Spoto:
Magic-Sets Transformation for the Analysis of Java Bytecode. SAS 2007: 452-467 - 2006
- [j7]Patricia M. Hill, Fausto Spoto:
Deriving escape analysis by abstract interpretation. High. Order Symb. Comput. 19(4): 415-463 (2006) - [c22]Stefano Rossignoli, Fausto Spoto:
Detecting Non-cyclicity by Abstract Compilation into Boolean Functions. VMCAI 2006: 95-110 - [i1]Patricia M. Hill, Fausto Spoto:
Deriving Escape Analysis by Abstract Interpretation: Proofs of results. CoRR abs/cs/0607101 (2006) - 2005
- [j6]Fausto Spoto:
Preface. Electron. Notes Theor. Comput. Sci. 141(1): 1 (2005) - [c21]Fausto Spoto:
Information Flow Is Linear Refinement of Constancy. ICTAC 2005: 351-365 - [c20]Stefano Secci, Fausto Spoto:
Pair-Sharing Analysis of Object-Oriented Programs. SAS 2005: 320-335 - [c19]Samir Genaim, Fausto Spoto:
Information Flow Analysis for Java Bytecode. VMCAI 2005: 346-362 - 2003
- [j5]Patricia M. Hill, Fausto Spoto:
Logic programs as compact denotations. Comput. Lang. Syst. Struct. 29(3): 45-73 (2003) - [j4]Giorgio Levi, Fausto Spoto:
Pair-independence and freeness analysis through linear refinement. Inf. Comput. 182(1): 14-52 (2003) - [j3]Fausto Spoto, Thomas P. Jensen:
Class analyses as abstract interpretations of trace semantics. ACM Trans. Program. Lang. Syst. 25(5): 578-630 (2003) - [c18]S. Bozzoli, Fausto Spoto, Agostino Dovier:
Approximate Protein Folding in Oz through Frequency Analysis. APPIA-GULP-PRODE 2003: 123-134 - [c17]Patricia M. Hill, Fausto Spoto:
Logic Programs as Compact Denotations. PADL 2003: 339-356 - 2002
- [j2]Patricia M. Hill, Fausto Spoto:
Generalizing Def and Pos to Type Analysis. J. Log. Comput. 12(3): 497-542 (2002) - [c16]Patricia M. Hill, Fausto Spoto:
A Foundation of Escape Analysis. AMAST 2002: 380-395 - [c15]Patricia M. Hill, Fausto Spoto:
A Refinement of the Escape Property. VMCAI 2002: 154-166 - 2001
- [c14]Fausto Spoto:
Logic programs as abstract domains. APPIA-GULP-PRODE 2001: 197-211 - [c13]Gianluca Amato, Fausto Spoto:
Abstract Compilation for Sharing Analysis. FLOPS 2001: 311-325 - [c12]Thomas P. Jensen, Fausto Spoto:
Class Analysis of Object-Oriented Programs through Abstract Interpretation. FoSSaCS 2001: 261-275 - [c11]Fausto Spoto:
Watchpoint Semantics: A Tool for Compositional and Focussed Static Analyses. SAS 2001: 127-145 - 2000
- [j1]Fausto Spoto:
Operational and Goal-Independent Denotational Semantics for Prolog with Cut. J. Log. Program. 42(1): 1-46 (2000) - [c10]Patricia M. Hill, Fausto Spoto:
Analysis of Downward Closed Properties of Logic Programs. AMAST 2000: 181-196 - [c9]Giorgio Levi, Fausto Spoto:
Non Pair-Sharing and Freeness Analysis Through Linear Refinement. PEPM 2000: 52-61
1990 – 1999
- 1999
- [c8]Patricia M. Hill, Fausto Spoto:
Freeness Analysis through Linear Refinement. APPIA-GULP-PRODE 1999: 321-337 - [c7]Patricia M. Hill, Fausto Spoto:
Freeness Analysis Through Linear Refinement. SAS 1999: 85-100 - 1998
- [c6]Fausto Spoto, Giorgio Levi:
An Experiment in Domain Refinement: Type Domains and Type Representations for Logic Programs. APPIA-GULP-PRODE 1998: 269-282 - [c5]Roberta Gori, E. Lastres, R. Moreno, Fausto Spoto:
Aproximating the Well-Founded Semantics for Normal Logic Programs using Abstract Interpretation. APPIA-GULP-PRODE 1998: 433-442 - [c4]Fausto Spoto, Giorgio Levi:
Abstract Interpretation of Prolog Programs. AMAST 1998: 455-470 - [c3]Giorgio Levi, Fausto Spoto:
An Experiment in Domain Refinement: Type Domains and Type Representations for Logic Programs. PLILP/ALP 1998: 152-169 - 1997
- [c2]Fausto Spoto, Giorgio Levi:
A Denotational Semantics for Prolog. APPIA-GULP-PRODE 1997: 201-212 - 1996
- [c1]Giorgio Levi, Fausto Spoto:
Accurate Analysis of Prolog with cut. APPIA-GULP-PRODE 1996: 481-492
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-06 19:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint