Prof. Dr. Prof. Dr. Yves Le Traon
|
|
||||||
| Faculté ou Centre | Interdisciplinary Centre for Security, Reliability and Trust | ||||||
| Department | SerVal | ||||||
| Adresse postale |
Campus Kirchberg, Université du Luxembourg 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg |
||||||
| Bureau sur le campus | E 101 | ||||||
|
|
|||||||
| Téléphone | (+352) 46 66 44 5262 | ||||||
| Fax | (+352) 46 66 44 35262 | ||||||
Sous presse
2021
Evasion Attack STeganography: Turning Vulnerability Of Machine Learning ToAdversarial Attacks Into A Real-world Application; ; ;
in Proceedings of International Conference on Computer Vision 2021 (2021)
A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests; ; ; ;
in 18th International Conference on Mining Software Repositories (2021, May)
Test Selection for Deep Learning Systems; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2021), 30(2), 131--1322
Killing Stubborn Mutants with Symbolic Execution; ; ;
in ACM Transactions on Software Engineering and Methodology (2021), 30(2), 191--1923
2020
Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach; ; ;
in Communications in Computer and Information Science (2020, February 15)
Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach; ; ; ; ;
E-print/Working paper (2020)
Search-based adversarial testing and improvement of constrained credit scoring systems; ; ; ; ; ;
in ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020 (2020)
FeatureNET: Diversity-driven Generation of Deep Learning Models; ; ;
in International Conference on Software Engineering (ICSE) (2020)
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique; ; ;
Scientific Conference (2020)
Data-driven simulation and optimization for covid-19 exit strategies; ; ; ; ; ; ;
in Ghamizi, Salah; Rwemalika, Renaud; Cordy, Maxime; Veiber, Lisa; Bissyande, Tegawendé François D Assise; Papadakis, Mike; Klein, Jacques; Le Traon, Yves (Eds.) Data-driven simulation and optimization for covid-19 exit strategies (2020, August)
LOVBench: Ontology Ranking Benchmark; ; ;
in Proceedings of The Web Conference 2020 (WWW '20) (2020, April)
FixMiner: Mining relevant fix patterns for automated program repair; ; ; ; ; ;
in Empirical Software Engineering (2020)
On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs; ; ; ; ; ; ; ; ;
in 42nd ACM/IEEE International Conference on Software Engineering (ICSE) (2020, May)
Load approximation for uncertain topologies in the low-voltage grid; ;
in INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (2020, November)
A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0; ;
in Sensors (2020), 20(24),
Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework; ;
in ACM/IEEE International Conference on Automation of Software Test (AST) 2020 (2020)
2019
Désérialisation Java : Une brève introduction au ROP de haut niveau; ;
Article for general public (2019)
MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks; ;
in IEEE Transactions on Information Forensics and Security (2019)
TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0; ;
in Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society (2019)
Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems; ; ;
in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)
Automated Search for Configurations of Deep Neural Network Architectures; ; ;
in Automated Search for Configurations of Convolutional Neural Network Architectures (2019)
An Empirical Study on Vulnerability Prediction of Open-Source Software Releases; ; ; ; ;
in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)
The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities; ; ; ; ;
in Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)
Popularity-driven Ontology Ranking using Qualitative Features; ;
in The Semantic Web - ISWC 2019 (2019)
Linked Vocabulary Recommendation Tools for Internet of Things: A Survey; ; ; ;
in ACM Computing Surveys (2019)
iFixR: bug report driven program repair; ; ; ; ; ;
in ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019, August)
Assessing Transition-based Test Selection Algorithms at Google; ; ; ;
in International Conference on Software Engineering (ICSE) (2019)
Watch out for This Commit! A Study of Influential Software Changes; ; ; ; ;
in Journal of Software: Evolution and Process (2019)
Revisiting the impact of common libraries for android-related investigations; ; ; ; ;
in Journal of Systems and Software (2019), 154
Learning to Spot and Refactor Inconsistent Method Names; ; ; ; ; ; ;
in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)
You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems; ; ; ; ;
in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)
Semantic Fuzzing with Zest; ; ; ;
in ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)
Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era; ;
in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)
An industrial study on the differences between pre-release and post-release bugs; ; ; ;
in Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (2019, September 30)
On the Evolution of Keyword-Driven Test Suites; ; ; ;
in 12th IEEE International Conference on Software Testing, Verification and Validation (2019)
A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate; ; ; ;
in International Conference on Social Networks Analysis, Management and Security (2019)
Mart: A Mutant Generation Tool for LLVM; ;
in Titcheu Chekam, Thierry; Papadakis, Mike; Le Traon, Yves (Eds.) Mart: A Mutant Generation Tool for LLVM (2019)
2018
Cloud Providers Viability: How to Address it from an IT and Legal Perspective?; ; ;
in Electron Markets (2018), 28(1), 53-75
O-MI/O-DF vs. MQTT: a performance analysis; ; ;
in O-MI/O-DF vs. MQTT: a performance analysis (2018, June 21)
TUNA: TUning Naturalness-based Analysis; ; ;
in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)
On the impact of tokenizer and parameters on N-gram based Code Analysis; ; ;
Scientific Conference (2018, September)
Enabling the Continous Analysis of Security Vulnerabilities with VulData7; ;
in IEEE International Working Conference on Source Code Analysis and Manipulation (2018)
Are mutants really natural? A study on how “naturalness” helps mutant selection; ; ; ; ; ;
in Proceedings of 12th International Symposium on Empirical Software Engineering and Measurement (ESEM'18) (2018, October 11)
FaCoY - A Code-to-Code Search Engine; ; ; ; ; ;
in International Conference on Software Engineering (ICSE 2018) (2018, May 27)
How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults; ; ; ; ;
in Empirical Software Engineering (2018)
Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index; ; ; ; ;
in Knowledge-Based Systems (2018)
Comparison of metadata quality in open data portals using the Analytic Hierarchy Process; ; ; ;
in Government Information Quarterly (2018)
Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification; ; ; ;
in 21st International Conference on Extending Database Technology (2018, March)
Mining Fix Patterns for FindBugs Violations; ; ; ;
in IEEE Transactions on Software Engineering (2018)
A Closer Look at Real-World Patches; ; ; ; ;
in 34th IEEE International Conference on Software Maintenance and Evolution (ICSME) (2018, September)
Towards Estimating and Predicting User Perception on Software Product Variants; ; ; ; ; ; ; ;
in 17th International Conference on Software Reuse (ICSR) (2018, May)
Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants; ; ; ; ;
in Information and Software Technology (2018)
Mutant Quality Indicators; ;
in 13th International Workshop on Mutation Analysis (MUTATION'18) (2018)
Can we automate away the main challenges of end-to-end testing?; ; ;
Scientific Conference (2018, December 11)
Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search; ; ; ; ;
in Empirical Software Engineering (2018), 90
Predicting the Fault Revelation Utility of Mutants; ; ;
in 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018 (2018)
2017
Raising Time Awareness in Model-Driven Engineering; ; ; ; ; ;
in 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (2017, September)
Analyzing Complex Data in Motion at Scale with Temporal Graphs; ; ; ;
in Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (2017, July)
The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling; ; ;
in Software & Systems Modeling (2017)
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware; ; ; ; ; ;
in MSR 2017 (2017, May 21)
Detecting Trivial Mutant Equivalences via Compiler Optimisations; ; ; ; ;
in IEEE Transactions on Software Engineering (2017)
Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services; ; ; ;
in 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings (2017, July)
PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem; ; ;
in Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2017, November 07)
Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components; ; ; ;
in Modeling and Using Context (2017, July)
Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices; ; ; ;
in Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices (2017, July 10)
Comparison of metadata quality in open data portals using the Analytic Hierarchy Process; ; ; ;
in Government Information Quarterly (2017)
Assessing and Improving the Mutation Testing Practice of PIT; ; ; ; ;
in 10th IEEE International Conference on Software Testing, Verification and Validation (2017)
Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements; ; ;
in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)
Static Analysis of Android Apps: A Systematic Literature Review; ; ; ; ; ; ;
in Information and Software Technology (2017)
On Locating Malicious Code in Piggybacked Android Apps; ; ; ; ; ;
in Journal of Computer Science and Technology (2017)
Automatically Locating Malicious Packages in Piggybacked Android Apps; ; ; ; ; ;
in Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017) (2017, May)
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting; ; ; ; ; ;
in IEEE Transactions on Information Forensics and Security (2017)
Weaving Rules into Models@run.time for Embedded Smart Systems; ; ; ; ;
in Mouline, Ludovic; Hartmann, Thomas; Fouquet, François; Le Traon, Yves; Bourcier, Johann; Barais, Olivier (Eds.) Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming (2017, April)
Efficiently computing the likelihoods of cyclically interdependent risk scenarios; ; ; ;
in Computers and Security (2017), 64
Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search; ; ; ; ;
Report (2017)
An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption; ; ;
in International Conference on Software Engineering (ICSE 2017) (2017, May 28)
2016
AndroZoo: Collecting Millions of Android Apps for the Research Community; ; ;
in Proceedings of the 13th International Workshop on Mining Software Repositories (2016, May)
Cloud Providers Viability: How to Address it from an IT and Legal Perspective?; ; ;
in Altmann, Jörn; Silaghi, Gheorghe Cosmin; Rana, Omer F. (Eds.) Economics of Grids, Clouds, Systems, and Services (2016)
Privacy Challenges in Ambient Intelligence Systems; ; ; ;
in Journal of Ambient Intelligence and Smart Environments (2016)
Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time; ; ; ; ;
in 31st Annual ACM Symposium on Applied Computing (SAC'16) (2016, April)
Comparing White-box and Black-box Test Prioritization; ; ; ;
in 38th International Conference on Software Engineering (ICSE'16) (2016)
On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware; ; ; ;
in Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (2016)
An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel; ;
in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December)
Vulnerability Prediction Models: A case study on the Linux Kernel; ;
in 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016 (2016, October)
Open Data Portal Quality Comparison using AHP; ; ; ;
in Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (2016, June 07)
A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications; ; ; ;
in Expert Systems with Applications (2016), 65
DSCo-NG: A Practical Language Modeling Approach for Time Series Classification; ; ;
in The 15th International Symposium on Intelligent Data Analysis (2016, October)
Time Series Classification with Discrete Wavelet Transformed Data; ; ;
in International Journal of Software Engineering and Knowledge Engineering (2016), 26(9&10), 13611377
Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study; ; ;
in The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016) (2016, July)
Profiling household appliance electricity usage with n-gram language modeling; ; ; ;
in The 2016 IEEE International Conference on Industrial Technology (ICIT 2016) (2016, March)
DSCo: A Language Modeling Approach for Time Series Classification; ; ; ;
in 12th International Conference on Machine Learning and Data Mining (MLDM 2016) (2016, July)
Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps; ; ;
in The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (2016, March)
An Investigation into the Use of Common Libraries in Android Apps; ; ;
in The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (2016, March)
Accessing Inaccessible Android APIs: An Empirical Study; ; ;
in The 32nd International Conference on Software Maintenance and Evolution (ICSME) (2016, October)
Towards a Generic Framework for Automating Extensive Analysis of Android Applications; ; ; ; ;
in The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016) (2016, April)
Mining Families of Android Applications for Extractive SPL Adoption; ; ; ; ;
in The 20th International Systems and Software Product Line Conference (SPLC 2016) (2016)
UAV degradation identification for pilot notification using machine learning techniques; ; ; ;
in Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016 (2016, September 06)
Name Suggestions during Feature Identification: The VariClouds Approach; ; ; ;
in 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings (2016)
Feature Location Benchmark for Software Families using Eclipse Community Releases; ; ; ; ;
in Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings (2016)
“Overloaded!” — A Model-based Approach to Database Stress Testing; ; ; ;
in International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016 (2016)
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures; ; ; ; ;
in International Conference on Critical Information Infrastructures Security (2016)
Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis; ; ; ; ; ; ;
in The 43rd Symposium on Principles of Programming Languages (POPL 2016) (2016, January)
Threats to the validity of mutation-based test assessment; ; ; ;
in International Symposium on Software Testing and Analysis, ISSTA 2016 (2016)
Micro-billing framework for IoT: Research & Technological foundations; ;
in International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria (2016)
O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis; ; ;
in O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis (2016)
A systematic review on the engineering of software for ubiquitous systems; ;
in Journal of Systems and Software (2016), 118
2015
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection; ; ;
in Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (2015)
Formal verification techniques for model transformations: A tridimensional classification; ; ; ; ; ; ;
in Journal of Object Technology (2015), 14(3),
Sound and Quasi-Complete Detection of Infeasible Test Requirements; ; ; ; ; ;
in 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15) (2015)
Cloud Providers Viability: How to Address it from an IT and Legal Perspective?; ; ;
in Economics of Grids, Clouds, Systems, and Services (2015, September 16)
Similarity testing for access control; ; ; ; ; ; ; ;
in Information and Software Technology (2015), 58
Towards a full support of obligations in XACML; ; ; ;
in Lecture Notes in Computer Science (2015), 8924
Conviviality-driven access control policy; ; ; ; ; ;
in Requirements Engineering (2015), 20(4), 363-382
Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time; ; ; ; ;
in Lethbridge, Timothy; Cabot, Jordi; Egyed, Alexander (Eds.) 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (2015, September)
Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning; ; ; ; ; ;
in 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm) (2015, November)
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines; ; ;
in 37th International Conference on Software Engineering (ICSE 2015) (2015)
Flattening or not of the combinatorial interaction testing models; ;
in Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (2015, April)
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis; ; ; ;
in International Conference on ICT Systems Security and Privacy Protection (SEC 2015) (2015, May)
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps; ; ; ; ; ; ; ; ;
in 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015) (2015)
An Investigation into the Use of Common Libraries in Android Apps; ; ;
in arXiv preprint arXiv:1511.06554 (2015)
Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps; ; ;
Scientific Conference (2015, March)
Automating the Extraction of Model-based Software Product Lines from Model Variants; ; ; ;
in 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015) (2015)
Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services; ; ; ;
in The 30th Annual ACM Symposium on Applied Computing (2015, April)
Beyond Discrete Modeling: A Continuous and Efficient Model for IoT; ; ; ; ;
in Lethbridge, Timothy; Cabot, Jordi; Egyed, Alexander (Eds.) 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (2015, September)
An Extensive Systematic Review on the Model-Driven Development of Secure Systems; ; ;
in Information and Software Technology (2015), 68(December 2015), 62-81
SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems; ; ; ; ;
in Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (2015, October)
Metallaxis-FL: mutation-based fault localization;
in Software Testing : Verification & Reliability (2015), 25
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique; ; ;
in 37th International Conference on Software Engineering (ICSE 2015) (2015)
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets; ; ; ;
in IEEE Transactions on Computers (2015), 64(9), 2490-2505
Roundtable: Research Opportunities and Challenges for Emerging Software Systems; ; ; ;
in Journal of Computer Science and Technology (2015), 30(5), 935-941
2014
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing; ; ;
in 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (2014)
Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios; ; ; ; ;
in Empirical Software Engineering (2014)
Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality; ; ; ; ;
in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (2014, March)
A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected?; ; ; ; ;
in Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (2014, July)
A Survey of Formal Verification Techniques for Model Transformations: A Tridimensional Classification; ; ; ; ; ; ;
in Journal of Technology (2014)
FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps; ; ; ; ; ; ; ;
Scientific Conference (2014, June)
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android; ; ;
in IEEE Transactions on Software Engineering (2014), 40(6), 617-632
Coverage-based Test Cases Selection for XACML Policies; ; ; ;
in IEEE International Conference on Software Testing Verification and Validation Workshops (2014)
Tools for Conviviality in Multi-Context Systems; ;
in IfCoLog Journal of Logics and Their Applications (2014), 1(1),
Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning; ; ;
Scientific Conference (2014, October)
Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time; ; ; ; ;
Scientific Conference (2014, March)
A Flexible MDE approach to Enforce Fine- grained Security Policies; ;
in Proceedings of the International Symposium on Engineering Secure Software and Systems (2014)
Security@Runtime: A flexible MDE approach to enforce fine-grained security policies; ;
in Lecture Notes in Computer Science (2014), 8364 LNCS
Generating Realistic Smart Grid Communication Topologies Based on Real-Data; ; ; ; ; ;
in 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm) (2014, November)
Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning; ; ; ;
in Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) (2014, April)
Model-based time-distorted Contexts for efficient temporal Reasoning; ; ; ; ;
Poster (2014, July 02)
A Native Versioning Concept to Support Historized Models at Runtime; ; ; ; ; ;
in Dingel, Juergen; Schulte, Wolfram; Ramos, Isidro; Abrahao, Silvia; Insfran, Emilio (Eds.) Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (2014)
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach; ; ; ; ;
in Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (2014, July)
Mutation-based Generation of Software Product Line Test Configurations; ;
in Symposium on Search-Based Software Engineering (SSBSE 2014) (2014)
MutaLog: a Tool for Mutating Logic Formulas; ;
in Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014) (2014)
Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines; ; ; ; ;
in IEEE Transactions on Software Engineering (2014), 40(7), 650-670
API Document Quality for Resolving Deprecated APIs; ; ; ; ;
Scientific Conference (2014, December 01)
Automatically Exploiting Potential Component Leaks in Android Applications; ; ;
in The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China. (2014, September)
Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps; ; ;
Scientific Conference (2014, March 12)
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis; ; ; ; ; ; ; ;
Report (2014)
Intra-query Adaptivity for MapReduce Query Processing Systems; ;
in IDEAS 2014 : 18th International Database Engineering Applications Symposium (2014)
Identifying and Visualising Commonality and Variability in Model Variants; ; ;
in ECMFA 2014 European Conference on Modelling Foundations and Applications (2014)
Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines; ; ; ;
in 2nd IEEE Working Conference on Software Visualization (2014)
Model-Driven Security with A System of Aspect-Oriented Security Design Patterns; ;
in 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (2014, July 22)
Modeling, composing, and testing of security concerns in a Model-Driven Security approach; ;
in Joosen, Wouter; Martinelli, Fabio; Heyman, Thomas (Eds.) Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014) (2014, February 26)
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management; ; ; ;
in Transactions on Aspect-Oriented Software Development (2014), 11
The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs; ; ; ; ;
in Bissyandé, Tegawendé F.; van Stam, Gertjan (Eds.) e-Infrastructure and e-Services for Developing Countries (2014)
Mitigating the Effects of Equivalent Mutants with Mutant Classification Strategies; ;
in Science of Computer Programming (2014), 95
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing; ;
in 7th International Conference on Software Testing, Verification and Validation (ICST 2014) (2014)
Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach;
in ACM Symposium On Applied Computing (SAC'14) (2014)
Model-Based Testing of Obligations; ; ;
in 14th Annual International Conference on Quality Software (QSIC) (2014)
Model-based testing of global properties on large-scale distributed systems; ; ; ;
in Information and Software Technology (2014), 56(7), 749-762
Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines; ; ; ;
in 29th Symposium on Applied Computing (SAC 2014) (2014)
2013
Sustainable ICT4D in Africa: Where Do We Go From Here?; ; ; ; ;
in EAI International Conference on e-Infrastructure and e-Services for Developing Countries (2013)
Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub; ; ; ; ;
in Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013) (2013, November)
Information Dependencies in MCS: Conviviality-Based Model and Metrics; ;
in 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013) (2013, December 01)
Access Control Enforcement Testing; ; ;
in Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST) (2013)
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications;
in 2013 International Conference on Availability, Reliability and Security (2013)
Under Pressure Benchmark for DDBMS Availability; ; ; ; ;
in Journal of Information and Data Management (2013)
Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing; ; ; ;
in 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013 (2013)
Multi-objective test generation for software product lines; ; ; ;
in 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013 (2013)
Towards automated testing and fixing of re-engineered feature models; ; ; ;
in Proceedings of the 2013 International Conference on Software Engineering (2013)
PLEDGE: a product line editor and test generation tool; ; ; ;
in 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26 (2013)
Stress Testing of Transactional Database Systems; ; ; ;
in Journal of Information and Data Management (2013)
A Rule-based Contextual Reasoning Platform for Ambient Intelligence environments; ; ; ;
in Theory, Practice, and Applications of Rules on the Web (2013, July 01)
R-CoRe: A Rule-based Contextual Reasoning Platform for AmI; ; ; ;
in Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013) (2013, July)
Usage and testability of AOP: An empirical study of AspectJ; ; ;
in Information and Software Technology (2013), 55(2), 252-266
A Systematic Review of Model-Driven Security; ; ;
in The 20th Asia-Pacific Software Engineering Conference Proceedings (2013, December)
Model-Driven Adaptive Delegation; ; ; ;
in Masuhara, Hidehiko; Chiba, Sigeru; Ubayashi, Naoyasu (Eds.) Proceedings of the 12th annual international conference companion on Aspect-oriented software development (2013, March)
Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis; ; ; ; ; ;
in Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis (2013)
Proteum/FL: A tool for localizing faults using mutation analysis.; ;
in International Working Conference on Source Code Analysis and Manipulation (2013)
Mutation Testing Strategies using Mutant Classification;
in Abstract book of 28th Symposium On Applied Computing (2013)
2012
Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation; ; ; ;
Report (2012)
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments; ; ; ;
E-print/Working paper (2012)
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android; ; ;
in IEEE/ACM International Conference on Automated Software Engineering (2012)
Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot; ; ;
in ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (2012)
Introducing Conviviality as a property of Multi-Context Systems; ; ;
in The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12 (2012, August 27)
Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués; ; ; ; ;
in TSI. Technique et science informatiques (2012), 31(6), 797--825
Access Control Enforcement Testing; ; ;
in 8th International Workshop on Automation of Software Test (AST), 2013 (2012, May)
Refactoring access control policies for performance improvement; ; ; ;
in Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (2012, April)
Testing Obligation Policy Enforcement using Mutation Analysis; ;
in Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012) (2012)
Refactoring Access Control Policies for Performance Improvement; ; ; ;
in Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012) (2012)
Testing obligation policy enforcement using mutation analysis; ;
in Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012 (2012)
Selection of Regression System Tests for Security Policy Evolution; ; ; ;
Scientific Conference (2012, September)
Peer-to-Peer Load Testing; ; ;
in Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (2012)
Introducing Conviviality as a New Paradigm for Interactions among IT Objects; ; ; ;
in Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments (2012, August), 907
Towards Flexible Evolution of Dynamically Adaptive Systems; ; ; ; ; ; ;
in New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (2012, June)
Pairwise testing for software product lines: Comparison of two approaches; ; ; ; ;
in Software Quality Journal (2012), 20(3), 605-643
A Model-Based Approach to Automated Testing of Access Control Policies; ; ; ;
in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (2012)
2011
Model Driven Mutation Applied to Adaptative Systems Testing; ; ; ; ;
in Mutation 2011 (@ICST) (2011)
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android; ; ;
in Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (2011)
2010
Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines; ; ; ;
in International Conference on Software Test and Validation (2010)














