SlideShare a Scribd company logo
1 of 28
Download to read offline
What “Exactly” a PhD is or..
what the PhD has meant to me
Andrea Avancini

anavancini@fbk.eu

PostDoctoral researcher, SE Unit
Who am I? (The not so technical background)
Who am I? (The not so technical background)
Someone who decided to study computer science
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Worked for 2 years as bartender
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Worked for 2 years as bartender
Joined Software Engineering unit in 2008 (as Software Engineer)
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Worked for 2 years as bartender
Joined Software Engineering unit in 2008 (as Software Engineer)
Then… more

stuff, master@University of Trento
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Worked for 2 years as bartender
Joined Software Engineering unit in 2008 (as Software Engineer)
Then… more

stuff, master@University of Trento

Joined PhD program in 2009 (25th cycle)
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Worked for 2 years as bartender
Joined Software Engineering unit in 2008 (as Software Engineer)
Then… more

stuff, master@University of Trento

Joined PhD program in 2009 (25th cycle)
Got my PhD in December 2013 with the thesis

“Security Testing of Web and Smartphone Applications”
Who am I? (The not so technical background)
Someone who decided to study computer science
bachelor@University of Trento
Worked for 2 years as bartender
Joined Software Engineering unit in 2008 (as Software Engineer)
Then… more

stuff, master@University of Trento

Joined PhD program in 2009 (25th cycle)
Got my PhD in December 2013 with the thesis

“Security Testing of Web and Smartphone Applications”
PostDoc with the Software Engineering unit
The Software Engineering unit
Requirements

Which functionalities is the system going to provide 

and why?

Test Cases

Is the system delivering the expected functionalities

and how?

Software
System

Quality of the resulting system depends

on the quality of requirement specification

and on the quality of testing

Research projects:
!  Requirements elicitation and
analysis for complex SocioTechnical Systems
! 

International Conferences:
•  ISSTA 2010: ACM Int. Symp. on Software Testing and Analysis
•  RE 2011: IEEE Int. Requirements Eng. Conf.
•  ICSM 2012: IEEE Int. Conf. on Software Maintenance

! 
! 

Mixing participatory and goaloriented elicitation approaches [Acube, Made in Italy]
Regulatory compliance and risk
analysis [RISCOSS]

Code analysis and testing
! 
! 
! 

Reverse and re-engineering [CERN,
IBT]
Web testing and automated test
case generation [FITTEST]
Security testing and software
protection [ASPIRE]
What the PhD is..aka The illustrated guide to PhD

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is..aka The illustrated guide to PhD

The human knowledge

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is..aka The illustrated guide to PhD

The human knowledge

After elementary school

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is..aka The illustrated guide to PhD

The human knowledge

After elementary school

After high school

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is..aka The illustrated guide to PhD

The human knowledge

After elementary school

After high school

After the bachelor

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is..aka The illustrated guide to PhD

The human knowledge

After elementary school

After high school

After the bachelor

After the master

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is..aka The illustrated guide to PhD

The human knowledge

After elementary school

After high school

After the master

After the bachelor

Reading papers

http://matt.might.net/articles/phd-school-in-pictures/
What the PhD is (2)
What the PhD is (2)

Once at the
boundaries, you focus
What the PhD is (2)

Once at the
boundaries, you focus

Then, one day…
What the PhD is (2)
In any case, don’t forget the
big picture
…
keep pushing!
What my Phd was..aka first contact with PhD world
My first official presentation was at the
6th International Workshop on Software Engineering
for Secure Systems in 2010
Towards security testing with taint analysis and genetic algorithms,
Andrea Avancini and Mariano Ceccato
What my Phd was..aka first contact with PhD world
My first official presentation was at the
6th International Workshop on Software Engineering
for Secure Systems in 2010
Towards security testing with taint analysis and genetic algorithms,
Andrea Avancini and Mariano Ceccato

[Real reproduction of my
face that morning]
After that…we published some works..
•

Avancini A., Ceccato M., Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities,
in «INFORMATION AND SOFTWARE TECHNOLOGY», vol. 55, 2013 , pp. 2209 - 2222

•

Avancini A., Ceccato M., Security Oracle Based on Tree Kernel Methods, Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, 2013 , pp. 30 43

•

Andrea Avancini, Mariano Ceccato, Circe: A grammar-based oracle for testing Cross-site scripting in web applications, in Proceedings of the 20th Conference on
Reverse Engineering, WCRE, 2013, pp. 262-271, (20th International Conference on Reverse Engineering, Koblenz, Germany, November 2013)

•

Andrea Avancini, Mariano Ceccato, Security Testing of the Communication among Android Applications, Proceedings of the 8th International Workshop on
Automation of Software Test, IEEE computer society, 2013 , pp. 57- 63 , (8th International Workshop on Automation of Software Test, San Francisco, CA, USA,
18-19 May 2013)

•

Andrea Avancini, Mariano Ceccato, Security Testing of Web Applications: A Research Plan, in IEEE, Proceedings of 34th International Conference on Software
Engineering (ICSE 2012), 2012 , (ICSE 2012, Zurigo, da 06/02/2012 a 06/09/2012)

•

Andrea Avancini, Mariano Ceccato, Grammar Based Oracle for Security Testing of Web Applications, Proceedings of the 7th International Workshop on Automation
of Software Test (AST), IEEE, 2012 , pp. 15- 21 , (7th International Workshop on Automation of Software Test (AST), Zurich, Switzerland, 02/06/2012)

•

A. Avancini, M. Ceccato, Towards a Security Oracle Based on Tree Kernel Methods, Proceedings of 2012 Joint Workshop on Intelligent Methods for Software
System Engineering, 2012 , pp. 1- 4 , (2012 Joint Workshop on Intelligent Methods for Software System Engineering, Montpellier, Francia, 08/28/2012)

•

Andrea Avancini, Mariano Ceccato, Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities, Proceedings of Eleventh
IEEE International Working Conference on Source Code Analysis and Manipulation, IEEE Computer Society, 2011 , pp. 85- 94 , (2011 11th IEEE International
Working Conference on Source Code Analysis and Manipulation, Williamsburg, VA, USA, da 25/09/2011 a 26/09/2011)
After that…I participated some conferences and events..

..which means that I met a lot of people..
After that…I’ve visited some places..
In summary… A PhD helps you to..
•

Learn how to communicate

•

Learn how to learn and to discover on your own

•

Learn how to get stuff done

•

Learn how to work with other people

More Related Content

What's hot

Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Phu H. Nguyen
 
ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...
ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...
ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...Tao Xie
 
MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...
MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...
MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...Tao Xie
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Tao Xie
 
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
Reverse Engineering android Malware analysis
Reverse Engineering android Malware analysisReverse Engineering android Malware analysis
Reverse Engineering android Malware analysisAnik Ralhan
 
Security Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and VerificationSecurity Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and VerificationHironori Washizaki
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software AnalyticsMargaret-Anne Storey
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information ManagementAlexander Deucalion
 
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven ResearchISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven ResearchTao Xie
 

What's hot (11)

Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015
 
ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...
ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...
ISEC'18 Keynote: Intelligent Software Engineering: Synergy between AI and Sof...
 
MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...
MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...
MSRA 2018: Intelligent Software Engineering: Synergy between AI and Software ...
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...
 
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
ACM Chicago March 2019 meeting: Software Engineering and AI - Prof. Tao Xie, ...
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Reverse Engineering android Malware analysis
Reverse Engineering android Malware analysisReverse Engineering android Malware analysis
Reverse Engineering android Malware analysis
 
Security Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and VerificationSecurity Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and Verification
 
Visualization for Software Analytics
Visualization for Software AnalyticsVisualization for Software Analytics
Visualization for Software Analytics
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven ResearchISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
ISEC'18 Tutorial: Research Methodology on Pursuing Impact-Driven Research
 

Similar to PhD Welcome Day 2014

Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
 
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)Radu Marinescu
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Christo Ananth
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 

Similar to PhD Welcome Day 2014 (20)

Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics:  Why Big Data Needs Rich DataLies, Damned Lies and Software Analytics:  Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
 
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
The Good the Bad and the Ugly of Dealing with Smelly Code (ITAKE Unconference)
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
 
International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)International Journal of Software Engineering & Applications (IJSEA)
International Journal of Software Engineering & Applications (IJSEA)
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”Special Session on “Applications of Artificial Intelligence in IoT Security”
Special Session on “Applications of Artificial Intelligence in IoT Security”
 
Resume bnkr
Resume bnkrResume bnkr
Resume bnkr
 
Resume bnkr
Resume bnkrResume bnkr
Resume bnkr
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
Ijseea
IjseeaIjseea
Ijseea
 
Resume bnkr
Resume bnkrResume bnkr
Resume bnkr
 
Ijseea
IjseeaIjseea
Ijseea
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

PhD Welcome Day 2014

  • 1. What “Exactly” a PhD is or.. what the PhD has meant to me Andrea Avancini anavancini@fbk.eu PostDoctoral researcher, SE Unit
  • 2. Who am I? (The not so technical background)
  • 3. Who am I? (The not so technical background) Someone who decided to study computer science
  • 4. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento
  • 5. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento Worked for 2 years as bartender
  • 6. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento Worked for 2 years as bartender Joined Software Engineering unit in 2008 (as Software Engineer)
  • 7. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento Worked for 2 years as bartender Joined Software Engineering unit in 2008 (as Software Engineer) Then… more stuff, master@University of Trento
  • 8. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento Worked for 2 years as bartender Joined Software Engineering unit in 2008 (as Software Engineer) Then… more stuff, master@University of Trento Joined PhD program in 2009 (25th cycle)
  • 9. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento Worked for 2 years as bartender Joined Software Engineering unit in 2008 (as Software Engineer) Then… more stuff, master@University of Trento Joined PhD program in 2009 (25th cycle) Got my PhD in December 2013 with the thesis “Security Testing of Web and Smartphone Applications”
  • 10. Who am I? (The not so technical background) Someone who decided to study computer science bachelor@University of Trento Worked for 2 years as bartender Joined Software Engineering unit in 2008 (as Software Engineer) Then… more stuff, master@University of Trento Joined PhD program in 2009 (25th cycle) Got my PhD in December 2013 with the thesis “Security Testing of Web and Smartphone Applications” PostDoc with the Software Engineering unit
  • 11. The Software Engineering unit Requirements Which functionalities is the system going to provide and why? Test Cases Is the system delivering the expected functionalities and how? Software System Quality of the resulting system depends on the quality of requirement specification and on the quality of testing Research projects: !  Requirements elicitation and analysis for complex SocioTechnical Systems !  International Conferences: •  ISSTA 2010: ACM Int. Symp. on Software Testing and Analysis •  RE 2011: IEEE Int. Requirements Eng. Conf. •  ICSM 2012: IEEE Int. Conf. on Software Maintenance !  !  Mixing participatory and goaloriented elicitation approaches [Acube, Made in Italy] Regulatory compliance and risk analysis [RISCOSS] Code analysis and testing !  !  !  Reverse and re-engineering [CERN, IBT] Web testing and automated test case generation [FITTEST] Security testing and software protection [ASPIRE]
  • 12. What the PhD is..aka The illustrated guide to PhD http://matt.might.net/articles/phd-school-in-pictures/
  • 13. What the PhD is..aka The illustrated guide to PhD The human knowledge http://matt.might.net/articles/phd-school-in-pictures/
  • 14. What the PhD is..aka The illustrated guide to PhD The human knowledge After elementary school http://matt.might.net/articles/phd-school-in-pictures/
  • 15. What the PhD is..aka The illustrated guide to PhD The human knowledge After elementary school After high school http://matt.might.net/articles/phd-school-in-pictures/
  • 16. What the PhD is..aka The illustrated guide to PhD The human knowledge After elementary school After high school After the bachelor http://matt.might.net/articles/phd-school-in-pictures/
  • 17. What the PhD is..aka The illustrated guide to PhD The human knowledge After elementary school After high school After the bachelor After the master http://matt.might.net/articles/phd-school-in-pictures/
  • 18. What the PhD is..aka The illustrated guide to PhD The human knowledge After elementary school After high school After the master After the bachelor Reading papers http://matt.might.net/articles/phd-school-in-pictures/
  • 19. What the PhD is (2)
  • 20. What the PhD is (2) Once at the boundaries, you focus
  • 21. What the PhD is (2) Once at the boundaries, you focus Then, one day…
  • 22. What the PhD is (2) In any case, don’t forget the big picture … keep pushing!
  • 23. What my Phd was..aka first contact with PhD world My first official presentation was at the 6th International Workshop on Software Engineering for Secure Systems in 2010 Towards security testing with taint analysis and genetic algorithms, Andrea Avancini and Mariano Ceccato
  • 24. What my Phd was..aka first contact with PhD world My first official presentation was at the 6th International Workshop on Software Engineering for Secure Systems in 2010 Towards security testing with taint analysis and genetic algorithms, Andrea Avancini and Mariano Ceccato [Real reproduction of my face that morning]
  • 25. After that…we published some works.. • Avancini A., Ceccato M., Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities, in «INFORMATION AND SOFTWARE TECHNOLOGY», vol. 55, 2013 , pp. 2209 - 2222 • Avancini A., Ceccato M., Security Oracle Based on Tree Kernel Methods, Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, 2013 , pp. 30 43 • Andrea Avancini, Mariano Ceccato, Circe: A grammar-based oracle for testing Cross-site scripting in web applications, in Proceedings of the 20th Conference on Reverse Engineering, WCRE, 2013, pp. 262-271, (20th International Conference on Reverse Engineering, Koblenz, Germany, November 2013) • Andrea Avancini, Mariano Ceccato, Security Testing of the Communication among Android Applications, Proceedings of the 8th International Workshop on Automation of Software Test, IEEE computer society, 2013 , pp. 57- 63 , (8th International Workshop on Automation of Software Test, San Francisco, CA, USA, 18-19 May 2013) • Andrea Avancini, Mariano Ceccato, Security Testing of Web Applications: A Research Plan, in IEEE, Proceedings of 34th International Conference on Software Engineering (ICSE 2012), 2012 , (ICSE 2012, Zurigo, da 06/02/2012 a 06/09/2012) • Andrea Avancini, Mariano Ceccato, Grammar Based Oracle for Security Testing of Web Applications, Proceedings of the 7th International Workshop on Automation of Software Test (AST), IEEE, 2012 , pp. 15- 21 , (7th International Workshop on Automation of Software Test (AST), Zurich, Switzerland, 02/06/2012) • A. Avancini, M. Ceccato, Towards a Security Oracle Based on Tree Kernel Methods, Proceedings of 2012 Joint Workshop on Intelligent Methods for Software System Engineering, 2012 , pp. 1- 4 , (2012 Joint Workshop on Intelligent Methods for Software System Engineering, Montpellier, Francia, 08/28/2012) • Andrea Avancini, Mariano Ceccato, Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities, Proceedings of Eleventh IEEE International Working Conference on Source Code Analysis and Manipulation, IEEE Computer Society, 2011 , pp. 85- 94 , (2011 11th IEEE International Working Conference on Source Code Analysis and Manipulation, Williamsburg, VA, USA, da 25/09/2011 a 26/09/2011)
  • 26. After that…I participated some conferences and events.. ..which means that I met a lot of people..
  • 28. In summary… A PhD helps you to.. • Learn how to communicate • Learn how to learn and to discover on your own • Learn how to get stuff done • Learn how to work with other people