default search action
Fausto Spoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Muhammad Bin Saif, Sara Migliorini, Fausto Spoto:
Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain. Future Internet 16(3): 98 (2024) - [j25]Muhammad Bin Saif, Sara Migliorini, Fausto Spoto:
A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements. Future Internet 16(9): 315 (2024) - [j24]Luca Olivieri, Fausto Spoto:
Software verification challenges in the blockchain ecosystem. Int. J. Softw. Tools Technol. Transf. 26(4): 431-444 (2024) - 2023
- [j23]Fausto Spoto, Sara Migliorini, Mauro Gambini, Andrea Benini:
On the use of generic types for smart contracts. Clust. Comput. 26(4): 2099-2113 (2023) - [j22]Marco Crosara, Luca Olivieri, Fausto Spoto, Fabio Tagliaferro:
Fungible and non-fungible tokens with snapshots in Java. Clust. Comput. 26(5): 2701-2718 (2023) - [j21]Luca Olivieri, Luca Negrini, Vincenzo Arceri, Fabio Tagliaferro, Pietro Ferrara, Agostino Cortesi, Fausto Spoto:
Information Flow Analysis for Detecting Non-Determinism in Blockchain (Artifact). Dagstuhl Artifacts Ser. 9(2): 23:1-23:3 (2023) - [c62]Luca Olivieri, Luca Negrini, Vincenzo Arceri, Fabio Tagliaferro, Pietro Ferrara, Agostino Cortesi, Fausto Spoto:
Information Flow Analysis for Detecting Non-Determinism in Blockchain. ECOOP 2023: 23:1-23:25 - [c61]Luca Olivieri, Thomas P. Jensen, Luca Negrini, Fausto Spoto:
MichelsonLiSA: A Static Analyzer for Tezos. PerCom Workshops 2023: 80-85 - 2022
- [c60]Étienne Payet, David J. Pearce, Fausto Spoto:
On the Termination of Borrow Checking in Featherweight Rust. NFM 2022: 411-430 - [c59]Luca Olivieri, Fabio Tagliaferro, Vincenzo Arceri, Marco Ruaro, Luca Negrini, Agostino Cortesi, Pietro Ferrara, Fausto Spoto, Enrico Talin:
Ensuring determinism in blockchain software with GoLiSA: an industrial experience report. SOAP@PLDI 2022: 23-29 - 2021
- [j20]Pietro Ferrara, Luca Olivieri, Fausto Spoto:
Static Privacy Analysis by Flow Reconstruction of Tainted Data. Int. J. Softw. Eng. Knowl. Eng. 31(7): 973-1016 (2021) - [j19]Pietro Ferrara, Amit Kr Mandal, Agostino Cortesi, Fausto Spoto:
Static analysis for discovering IoT vulnerabilities. Int. J. Softw. Tools Technol. Transf. 23(1): 71-88 (2021) - [c58]Andrea Benini, Mauro Gambini, Sara Migliorini, Fausto Spoto:
Power and Pitfalls of Generic Smart Contracts. BCCA 2021: 179-186 - [c57]Marco Crosara, Luca Olivieri, Fausto Spoto, Fabio Tagliaferro:
Re-engineering ERC-20 Smart Contracts with Efficient Snapshots for the Java Virtual Machine. BCCA 2021: 187-194 - [c56]Luca Olivieri, Fausto Spoto, Fabio Tagliaferro:
On-Chain Smart Contract Verification over Tendermint. Financial Cryptography Workshops 2021: 333-347 - [c55]Marco Bozzetti, Luca Olivieri, Fausto Spoto:
Cybersecurity Impacts of the Covid-19 Pandemic in Italy. ITASEC 2021: 145-155 - 2020
- [j18]Pietro Ferrara, Agostino Cortesi, Fausto Spoto:
From CIL to Java bytecode: Semantics-based translation for static analysis leveraging. Sci. Comput. Program. 191: 102392 (2020) - [c54]Rocco Salvia, Agostino Cortesi, Pietro Ferrara, Fausto Spoto:
Intents Analysis of Android Apps for Confidentiality Leakage Detection. ACSS (1) 2020: 43-65 - [c53]Fausto Spoto:
Enforcing Determinism of Java Smart Contracts. Financial Cryptography Workshops 2020: 568-583 - [c52]Amit Kr Mandal, Pietro Ferrara, Yuliy Khlyebnikov, Agostino Cortesi, Fausto Spoto:
Cross-program taint analysis for IoT systems. SAC 2020: 1944-1952 - [c51]Pietro Ferrara, Luca Olivieri, Fausto Spoto:
BackFlow: Backward Context-Sensitive Flow Reconstruction of Taint Analysis Results. VMCAI 2020: 23-43
2010 – 2019
- 2019
- [j17]Pietro Ferrara, Amit Kr Mandal, Agostino Cortesi, Fausto Spoto:
Cross-Programming Language Taint Analysis for the IoT Ecosystem. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 77 (2019) - [j16]Amit Kr Mandal, Federica Panarotto, Agostino Cortesi, Pietro Ferrara, Fausto Spoto:
Static analysis of Android Auto infotainment and on-board diagnostics II apps. Softw. Pract. Exp. 49(7): 1131-1161 (2019) - [j15]Fausto Spoto, Elisa Burato, Michael D. Ernst, Pietro Ferrara, Alberto Lovato, Damiano Macedonio, Ciprian Spiridon:
Static Identification of Injection Attacks in Java. ACM Trans. Program. Lang. Syst. 41(3): 18:1-18:58 (2019) - [c50]Fausto Spoto:
A Java Framework for Smart Contracts. Financial Cryptography Workshops 2019: 122-137 - 2018
- [c49]Pietro Ferrara, Luca Olivieri, Fausto Spoto:
Tailoring Taint Analysis to GDPR. APF 2018: 63-76 - [c48]Étienne Payet, Fausto Spoto:
Checking Array Bounds by Abstract Interpretation and Symbolic Expressions. IJCAR 2018: 706-722 - [c47]Amit Kr Mandal, Agostino Cortesi, Pietro Ferrara, Federica Panarotto, Fausto Spoto:
Vulnerability analysis of Android auto infotainment apps. CF 2018: 183-190 - [c46]Pietro Ferrara, Agostino Cortesi, Fausto Spoto:
CIL to Java-bytecode translation for static analysis leveraging. FormaliSE@ICSE 2018: 40-49 - [c45]Pietro Ferrara, Fausto Spoto:
Static Analysis for GDPR Compliance. ITASEC 2018 - [c44]Federica Panarotto, Agostino Cortesi, Pietro Ferrara, Amit Kr Mandal, Fausto Spoto:
Static Analysis of Android Apps Interaction with Automotive CAN. SmartCom 2018: 114-123 - [c43]Rocco Salvia, Pietro Ferrara, Fausto Spoto, Agostino Cortesi:
SDLI: Static Detection of Leaks Across Intents. TrustCom/BigDataSE 2018: 1002-1007 - 2017
- [c42]Pietro Ferrara, Elisa Burato, Fausto Spoto:
Security Analysis of the OWASP Benchmark with Julia. ITASEC 2017: 242-247 - 2016
- [c41]Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto, Javier Thaine:
Locking discipline inference and checking. ICSE 2016: 1133-1144 - [c40]Michael D. Ernst, Damiano Macedonio, Massimo Merro, Fausto Spoto:
Semantics for Locking Specifications. NFM 2016: 355-372 - [c39]Fausto Spoto:
The Julia Static Analyzer for Java. SAS 2016: 39-57 - [i6]Gabriele Tosadori, Ivan Bestvina, Fausto Spoto, Carlo Laudanna, Giovanni Scardoni:
Creating, generating and comparing random network models with Network Randomizer. F1000Research 5: 2524 (2016) - 2015
- [c38]Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Ciprian Spiridon, Fausto Spoto:
Boolean Formulas for the Static Identification of Injection Attacks in Java. LPAR 2015: 130-145 - [i5]Michael D. Ernst, Damiano Macedonio, Massimo Merro, Fausto Spoto:
Semantics for Locking Specifications. CoRR abs/1501.05338 (2015) - [i4]Giovanni Scardoni, Gabriele Tosadori, Sakshi Pratap, Fausto Spoto, Carlo Laudanna:
Finding the shortest path with PesCa: a tool for network reconstruction. F1000Research 4: 484 (2015) - 2014
- [j14]Enrico Scapin, Fausto Spoto:
Field-sensitive unreachability and non-cyclicity analysis. Sci. Comput. Program. 95: 359-375 (2014) - [c37]Étienne Payet, Fausto Spoto:
An operational semantics for android activities. PEPM 2014: 121-132 - [c36]Alberto Lovato, Damiano Macedonio, Fausto Spoto:
A Thread-Safe Library for Binary Decision Diagrams. SEFM 2014: 35-49 - [i3]Étienne Payet, Fred Mesnard, Fausto Spoto:
Non-Termination Analysis of Java Bytecode. CoRR abs/1401.5292 (2014) - [i2]Giovanni Scardoni, Gabriele Tosadori, Mohammed Faizan, Fausto Spoto, Franco Fabbri, Carlo Laudanna:
Biological network analysis with CentiScaPe: centralities and experimental dataset integration. F1000Research 3: 139 (2014) - 2013
- [j13]Durica Nikolic, Fausto Spoto:
Inferring complete initialization of arrays. Theor. Comput. Sci. 484: 16-40 (2013) - [j12]Durica Nikolic, Fausto Spoto:
Reachability analysis of program variables. ACM Trans. Program. Lang. Syst. 35(4): 14:1-14:68 (2013) - 2012
- [j11]Étienne Payet, Fausto Spoto:
Static analysis of Android programs. Inf. Softw. Technol. 54(11): 1192-1201 (2012) - [c35]Durica Nikolic, Fausto Spoto:
Reachability Analysis of Program Variables. IJCAR 2012: 423-438 - [c34]Durica Nikolic, Fausto Spoto:
Definite Expression Aliasing Analysis for Java Bytecode. ICTAC 2012: 74-89 - [c33]Durica Nikolic, Fausto Spoto:
Automaton-Based Array Initialization Analysis. LATA 2012: 420-432 - 2011
- [j10]Fausto Spoto:
Precise null-pointer analysis. Softw. Syst. Model. 10(2): 219-252 (2011) - [c32]Étienne Payet, Fausto Spoto:
Static Analysis of Android Programs. CADE 2011: 439-445 - [c31]Fausto Spoto, Michael D. Ernst:
Inference of field initialization. ICSE 2011: 231-240 - 2010
- [j9]Fausto Spoto, Étienne Payet:
Magic-sets for localised analysis of Java bytecode. High. Order Symb. Comput. 23(1): 29-86 (2010) - [j8]Fausto Spoto, Fred Mesnard, Étienne Payet:
A termination analyzer for Java bytecode based on path-length. ACM Trans. Program. Lang. Syst. 32(3): 8:1-8:70 (2010) - [c30]Fausto Spoto:
The Nullness Analyser of julia. LPAR (Dakar) 2010: 405-424
2000 – 2009
- 2009
- [c29]Étienne Payet, Fausto Spoto:
Experiments with Non-Termination Analysis for Java Bytecode. BYTECODE@ETAPS 2009: 83-96 - [c28]Fausto Spoto, Lunjin Lu, Fred Mesnard:
Using CLP Simplifications to Improve Java Bytecode Termination Analysis. BYTECODE@ETAPS 2009: 129-144 - 2008
- [c27]Fausto Spoto:
Special track on Software Verification: editorial message. SAC 2008: 326 - [c26]Fausto Spoto:
Nullness Analysis in Boolean Form. SEFM 2008: 21-30 - 2007
- [j7]Fausto Spoto:
Optimality and condensing of information flow through linear refinement. Theor. Comput. Sci. 388(1-3): 53-82 (2007) - [c25]Étienne Payet, Fausto Spoto:
Magic-Sets Transformation for the Analysis of Java Bytecode. SAS 2007: 452-467 - [c24]Marieke Huisman, Fausto Spoto:
Preface. Bytecode@ETAPS 2007: 1 - [e2]Marieke Huisman, Fausto Spoto:
Proceedings of the Second Workshop on Bytecode Semantics, Verification, Analysis and Transformation, Bytecode@ETAPS 2007, Braga, Portugal, March 31, 2007. Electronic Notes in Theoretical Computer Science 190(1), Elsevier 2007 [contents] - 2006
- [j6]Patricia M. Hill, Fausto Spoto:
Deriving escape analysis by abstract interpretation. High. Order Symb. Comput. 19(4): 415-463 (2006) - [c23]Stefano Rossignoli, Fausto Spoto:
Detecting Non-cyclicity by Abstract Compilation into Boolean Functions. VMCAI 2006: 95-110 - [i1]Patricia M. Hill, Fausto Spoto:
Deriving Escape Analysis by Abstract Interpretation: Proofs of results. CoRR abs/cs/0607101 (2006) - 2005
- [c22]Fausto Spoto:
Information Flow Is Linear Refinement of Constancy. ICTAC 2005: 351-365 - [c21]Stefano Secci, Fausto Spoto:
Pair-Sharing Analysis of Object-Oriented Programs. SAS 2005: 320-335 - [c20]Samir Genaim, Fausto Spoto:
Information Flow Analysis for Java Bytecode. VMCAI 2005: 346-362 - [c19]Fausto Spoto:
Preface. Bytecode@ETAPS 2005: 1 - [e1]Fausto Spoto:
Proceedings of the First Workshop on Bytecode Semantics, Verification, Analysis and Transformation, Bytecode@ETAPS 2005, Edinburgh, UK, April 9, 2005. Electronic Notes in Theoretical Computer Science 141(1), Elsevier 2005 [contents] - 2003
- [j5]Patricia M. Hill, Fausto Spoto:
Logic programs as compact denotations. Comput. Lang. Syst. Struct. 29(3): 45-73 (2003) - [j4]Giorgio Levi, Fausto Spoto:
Pair-independence and freeness analysis through linear refinement. Inf. Comput. 182(1): 14-52 (2003) - [j3]Fausto Spoto, Thomas P. Jensen:
Class analyses as abstract interpretations of trace semantics. ACM Trans. Program. Lang. Syst. 25(5): 578-630 (2003) - [c18]S. Bozzoli, Fausto Spoto, Agostino Dovier:
Approximate Protein Folding in Oz through Frequency Analysis. APPIA-GULP-PRODE 2003: 123-134 - [c17]Patricia M. Hill, Fausto Spoto:
Logic Programs as Compact Denotations. PADL 2003: 339-356 - 2002
- [j2]Patricia M. Hill, Fausto Spoto:
Generalizing Def and Pos to Type Analysis. J. Log. Comput. 12(3): 497-542 (2002) - [c16]Patricia M. Hill, Fausto Spoto:
A Foundation of Escape Analysis. AMAST 2002: 380-395 - [c15]Patricia M. Hill, Fausto Spoto:
A Refinement of the Escape Property. VMCAI 2002: 154-166 - 2001
- [c14]Fausto Spoto:
Logic programs as abstract domains. APPIA-GULP-PRODE 2001: 197-211 - [c13]Gianluca Amato, Fausto Spoto:
Abstract Compilation for Sharing Analysis. FLOPS 2001: 311-325 - [c12]Thomas P. Jensen, Fausto Spoto:
Class Analysis of Object-Oriented Programs through Abstract Interpretation. FoSSaCS 2001: 261-275 - [c11]Fausto Spoto:
Watchpoint Semantics: A Tool for Compositional and Focussed Static Analyses. SAS 2001: 127-145 - 2000
- [j1]Fausto Spoto:
Operational and Goal-Independent Denotational Semantics for Prolog with Cut. J. Log. Program. 42(1): 1-46 (2000) - [c10]Patricia M. Hill, Fausto Spoto:
Analysis of Downward Closed Properties of Logic Programs. AMAST 2000: 181-196 - [c9]Giorgio Levi, Fausto Spoto:
Non Pair-Sharing and Freeness Analysis Through Linear Refinement. PEPM 2000: 52-61
1990 – 1999
- 1999
- [c8]Patricia M. Hill, Fausto Spoto:
Freeness Analysis through Linear Refinement. APPIA-GULP-PRODE 1999: 321-337 - [c7]Patricia M. Hill, Fausto Spoto:
Freeness Analysis Through Linear Refinement. SAS 1999: 85-100 - 1998
- [c6]Fausto Spoto, Giorgio Levi:
An Experiment in Domain Refinement: Type Domains and Type Representations for Logic Programs. APPIA-GULP-PRODE 1998: 269-282 - [c5]Roberta Gori, E. Lastres, R. Moreno, Fausto Spoto:
Aproximating the Well-Founded Semantics for Normal Logic Programs using Abstract Interpretation. APPIA-GULP-PRODE 1998: 433-442 - [c4]Fausto Spoto, Giorgio Levi:
Abstract Interpretation of Prolog Programs. AMAST 1998: 455-470 - [c3]Giorgio Levi, Fausto Spoto:
An Experiment in Domain Refinement: Type Domains and Type Representations for Logic Programs. PLILP/ALP 1998: 152-169 - 1997
- [c2]Fausto Spoto, Giorgio Levi:
A Denotational Semantics for Prolog. APPIA-GULP-PRODE 1997: 201-212 - 1996
- [c1]Giorgio Levi, Fausto Spoto:
Accurate Analysis of Prolog with cut. APPIA-GULP-PRODE 1996: 481-492
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint