BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Date iCal//NONSGML kigkonsult.se iCalcreator 2.20.2//
METHOD:PUBLISH
X-WR-CALNAME;VALUE=TEXT:Eventi DIAG
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:STANDARD
DTSTART:20201025T030000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20200329T020000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RDATE:20210328T020000
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:calendar.21203.field_data.0@www.glad.uniroma1.it
DTSTAMP:20260404T211114Z
CREATED:20200909T185831Z
DESCRIPTION:Emilio Coppa è risultato vincitore della procedura selettiva pe
 r n.1 posto di ricercatore a tempo determinato – tipologia A ai sensi dell
 ’art.24\, comma 3\, lett. b\, legge 240/2010 – per il settore concorsuale 
 09/H1 - settore scientifico disciplinare ING-INF/05 - codice concorso 3/20
 19\, bandito con Decreto Rettorale D.R. n. 3333/2019 del 22/11/2019\, i cu
 i atti sono stati approvati con Decreto Rettorale D.R. n. 158/2020 del 01/
 09/2020. Nell'ambito della procedura ai fini della chiamata da parte del C
 onsiglio di dipartimento\, Emilio Coppa terrà un seminario pubblico sulle 
 attività di ricerca da lui svolte e in corso di svolgimento. Il seminario 
 sarà svolto in modalità telematica su Google Meet ed in presenza presso l'
 aula Magna del DIAG Mercoledì 16 settembre 2020 alle ore 11:00. Per partec
 ipare da remoto\, connettersi all’indirizzo https://meet.google.com/toi-ck
 sq-gef AbstractFinding bugs in software is essential for preventing attack
 ers from crashing our national critical infrastructures\, stealing sensiti
 ve data from our machines\, and more in general performing malicious activ
 ities that could impact our everyday life. Several methodologies for findi
 ng bugs and vulnerabilities have been proposed in the literature during th
 e last decades in the context of software testing and software security. I
 n this talk\, we review two popular approaches\, symbolic execution and so
 ftware fuzzing\, that in the last years have seen large interest from the 
 research community as well as the software industry. After discussing the 
 advantages and disadvantages when applying these two approaches to real-wo
 rld applications\, we present the latest improvements to these techniques\
 , focusing also on hybrid designs that aim at combining them to even get b
 etter results. Finally\, we discuss a few promising research directions th
 at could be pursued in the near future to continue improving the state-of-
 the-art in this context. Short bioEmilio Coppa got the PhD in 2015 from Sa
 pienza University with a thesis on input-sensitive profiling techniques ai
 med at finding scalability issues in software. He has been a PostDoc at DI
 AG since 2016\, studying how program analyses can be applied in the contex
 t of software security for finding bugs and vulnerabilities on real-world 
 programs. He has been a national organizer and a local organizer/instructo
 r for Sapienza for the CyberChallenge.IT program.
DTSTART;TZID=Europe/Paris:20200916T110000
DTEND;TZID=Europe/Paris:20200916T110000
LAST-MODIFIED:20210425T093440Z
LOCATION:Aula Magna DIAG (max 20 posti) e online su piattaforma Google Meet
  codice accesso https://meet.google.com/toi-cksq-gef
SUMMARY:Finding bugs and vulnerabilities in real-world software (public) - 
 \n\n\n  \n  \n\n    \n\n\nEmilio\n\n\nCoppa  \n\n  \n\n    \n\n\n\n\n\nest
 erno\n\n\npagina personale\n\nstanza: \n\nB111\n\ntelefono: \n\n+39 067727
 4114  \n\n  \n\n    \n\nBiografia: \n\n2015: Ph.D. in Computer Science fro
 m Sapienza University of Rome under the supervision of Prof. Irene Finocch
 i with the dissertation Input-sensitive performance analysis of software s
 ystems.\n2017-2019: national organizer of the CyberChallenge.IT training p
 rogram on cybersecurity.\n2017-present: local organizer of the CyberChalle
 nge.IT training program at Sapienza University of Rome.\n2020-Present: ass
 istant professor (RTD-A) at Sapienza University of Rome\n\n\nFunding:\nPRI
 N 2022 - Project FARE (Firmware Analysis for vulneRability dEtection) - co
 -PI/head of research unit\nPRIN 2022 PNRR - Project SETA (Studying thE imp
 act of anti-analysis Techniques in IoT security evAluations) - co-PI/head 
 of research unit\n\n\nInteressi di ricerca: \n\n\nDuring my PhD\, I focuse
 d my work on the study of performance scalability of software systems. Aft
 er the PhD\, I have started to investigate how program analysis techniques
 \, such as symbolic execution and software fuzzing\, can be exploited in t
 he context of cybersecurity.\n\n\n\n \n\n\n\n \n\n\nqualifica_rr: \n\nAssi
 stant professors (ricercatori)
URL;TYPE=URI:http://www.glad.uniroma1.it/node/21203
END:VEVENT
END:VCALENDAR
