![]() ![]() | ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. International Conference on Software Engineering 2024. ![]() |
![]() ![]() | Lothritz, C., Ezzini, S., Purschke, C., Bissyande, T. F. D. A., Klein, J., Olariu, I., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Comparing Pre-Training Schemes for Luxembourgish BERT Models. In Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023). ![]() |
![]() ![]() | SUN, T., ALLIX, K., KIM, K., Zhou, X., KIM, D., Lo, D., Bissyande, T. F., & KLEIN, J. (01 September 2023). DexBERT: Effective, Task-Agnostic and Fine-Grained Representation Learning of Android Bytecode. IEEE Transactions on Software Engineering, 49 (10), 4691 - 4706. doi:10.1109/TSE.2023.3310874 ![]() |
![]() ![]() | Chen, Q., Zhou, T., Liu, K., Li, L., Ge, C., Liu, Z., KLEIN, J., & BISSYANDE, T. F. D. A. (September 2023). Tips: towards automating patch suggestion for vulnerable smart contracts. Automated Software Engineering, 30 (2). doi:10.1007/s10515-023-00392-y ![]() |
![]() ![]() | Krishnan, P., Cifuentes, C., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (September 2023). Why Is Static Application Security Testing Hard to Learn? IEEE Security and Privacy, 21 (5), 68 - 72. doi:10.1109/MSEC.2023.3287206 ![]() |
![]() ![]() | Kim, K., Ghatpande, S., Kim, D., Zhou, X., Liu, K., BISSYANDE, T. F. D. A., KLEIN, J., & LE TRAON, Y. (26 August 2023). Big Code Search: A Bibliography. ACM Computing Surveys, 56 (1), 1-49. doi:10.1145/3604905 ![]() |
![]() ![]() | KABORE, A. K., Barr, E. T., KLEIN, J., & Bissyandé, T. F. (2023). CodeGrid: A Grid Representation of Code. In R. Just (Ed.), ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, Inc. doi:10.1145/3597926.3598141 ![]() |
![]() ![]() | Kober, M., Samhi, J., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023. ![]() |
![]() ![]() | LOTHRITZ, C., LEBICHOT, B., ALLIX, K., EZZINI, S., BISSYANDE, T. F. D. A., KLEIN, J., Boytsov, A., Lefebvre, C., & Goujon, A. (2023). Evaluating the Impact of Text De-Identification on Downstream NLP Tasks. In Proceedings of the 24th Nordic Conference on Computational Linguistics (NoDaLiDa). Tartu, Estonia: University of Tartu Library. ![]() |
![]() ![]() | SONG, Y., EZZINI, S., KLEIN, J., BISSYANDE, T. F. D. A., Lefebvre, C., & Goujon, A. (2023). Letz Translate: Low-Resource Machine Translation for Luxembourgish. In Proceedings - 2023 5th International Conference on Natural Language Processing, ICNLP 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICNLP58431.2023.00036 ![]() |
![]() ![]() | Samhi, J., Kober, K., Kabore, A. K., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering. ![]() |
![]() ![]() | Liu, K., Zhang, J., Li, L., Koyuncu, A., Kim, D., Ge, C., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2023). Reliable Fix Patterns Inferred from Static Checkers for Automated Program Repair. ACM Transactions on Software Engineering and Methodology, 1-38. ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2023). Guided Retraining to Enhance the Detection of Difficult Android Malware. In 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023). doi:10.1145/3597926.3598123 ![]() |
![]() ![]() | OLARIU, I., LOTHRITZ, C., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Evaluating Data Augmentation Techniques for the Training of Luxembourgish Language Models. In Conference on Natural Language Processing. KONVENS. ![]() |
![]() ![]() | OLARIU, I., LOTHRITZ, C., KLEIN, J., BISSYANDE, T. F. D. A., GUO, S., & HADDADAN, S. (2023). Evaluating Parameter-Efficient Finetuning Approaches for Pre-trained Models on the Financial Domain. In Empirical Methods in Natural Language Processing. Association for Computational Linguistics. ![]() |
![]() ![]() | Yan, D., Liu, K., Niu, Y., Li, L., Liu, Z., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (December 2022). Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Information and Software Technology, 152, 1-12. doi:10.1016/j.infsof.2022.107043 ![]() |
![]() ![]() | Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158 ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (December 2022). Assessing the opportunity of combining state-of-the-art Android malware detectors. Empirical Software Engineering, 28. doi:10.1007/s10664-022-10249-9 ![]() |
![]() ![]() | Nirumand, A., Zamani, B., Tork-Ladani, B., Klein, J., & Bissyande, T. F. D. A. (2022). A model-based framework for inter-app Vulnerability analysis of Android applications. Software: Practice and Experience, 1-42. doi:10.1002/spe.3171 ![]() |
![]() ![]() | Adjibi, B. V., Mbodji, F. N., Allix, K., Klein, J., & Bissyande, T. F. D. A. (2022). The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM), 153-163. doi:10.1109/SCAM55253.2022.00023 ![]() |
![]() ![]() | Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). Towards Refined Classifications Driven by SHAP Explanations. In A. Holzinger, P. Kieseberg, A. M. Tjoa, ... E. Weippl (Eds.), Machine Learning and Knowledge Extraction (pp. 68-81). Springer. ![]() |
![]() ![]() | Sawadogo, D. A., Bissyande, T. F. D. A., Moha, N., Allix, K., Klein, J., Li, L., & Le Traon, Y. (August 2022). SSPCATCHER: Learning to catch security patches. Empirical Software Engineering, 27. doi:10.1007/s10664-022-10168-9 ![]() |
![]() ![]() | Kim, K., Ghatpande, S., Liu, K., Koyuncu, A., Kim, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (July 2022). DigBug—Pre/post-processing operator selection for accurate bug localization. Journal of Systems and Software, 189. doi:10.1016/j.jss.2022.111300 ![]() |
![]() ![]() | Lothritz, C., Lebichot, B., Allix, K., Veiber, L., Bissyande, T. F. D. A., Klein, J., Boytsov, A., Goujon, A., & Lefebvre, C. (2022). LuxemBERT: Simple and Practical Data Augmentation in Language Model Pre-Training for Luxembourgish. In Proceedings of the Language Resources and Evaluation Conference, 2022 (pp. 5080-5089). ![]() |
![]() ![]() | Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020 ![]() |
![]() ![]() | Samhi, J., Li, L., Bissyande, T. F. D. A., & Klein, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135 ![]() |
![]() ![]() | Samhi, J., Gao, J., Daoudi, N., Graux, P., Hoyez, H., Sun, X., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766 ![]() |
![]() ![]() | Khanfir, A., Koyuncu, A., Papadakis, M., Cordy, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2022). iBiR: Bug Report driven Fault Injection. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3542946 ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (May 2022). A Deep Dive inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Transactions on Privacy and Security, 25 (2). doi:10.1145/3503463 ![]() |
![]() ![]() | Arslan, Y., Lebichot, B., Allix, K., Veiber, L., Lefebvre, C., Boytsov, A., Goujon, A., Bissyande, T. F. D. A., & Klein, J. (2022). On the Suitability of SHAP Explanations for Refining Classifications. In In Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART 2022). ![]() |
![]() ![]() | Tian, H., Liu, K., Li, Y., Kabore, A. K., Koyuncu, A., Habib, A., Li, L., Wen, J., Klein, J., & Bissyande, T. F. D. A. (2022). The Best of Both Worlds: Combining Learned Embeddings with Engineered Features for Accurate Prediction of Correct Patches. ACM Transactions on Software Engineering and Methodology. ![]() |
![]() ![]() | Tian, H., Li, Y., Pian, W., Kabore, A. K., Liu, K., Habib, A., Klein, J., & Bissyande, T. F. D. A. (2022). Predicting Patch Correctness Based on the Similarity of Failing Test Cases. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3511096 ![]() |
![]() ![]() | Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. ![]() |
![]() ![]() | Arslan, Y., Allix, K., Lefebvre, C., Boytsov, A., Bissyande, T. F. D. A., & Klein, J. (2022). Exploiting Prototypical Explanations for Undersampling Imbalanced Datasets. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 1449-1454). doi:10.1109/ICMLA55696.2022.00228 ![]() |
![]() ![]() | Tian, H., Tang, X., Habib, A., Wang, S., Liu, K., Xia, X., Klein, J., & Bissyande, T. F. D. A. (2022). Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. In Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. ![]() |
![]() ![]() | Kong, P., Li, L., Gao, J., Riom, T., Zhao, Y., Bissyande, T. F. D. A., & Klein, J. (2021). ANCHOR: locating android framework-specific crashing faults. Automated Software Engineering. doi:10.1007/s10515-021-00290-1 ![]() |
![]() ![]() | Zhou, T., Liu, K., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). IEEE. doi:10.1109/ICSME52107.2021.00009 ![]() |
![]() ![]() | Zhang, J., Liu, K., Kim, D., Li, L., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). Revisiting Test Cases to Boost Generate-and-Validate Program Repair. In IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 1-12). doi:10.1109/ICSME52107.2021.00010 ![]() |
![]() ![]() | Zhao, Y., Li, L., Wang, H., Cai, H., Bissyande, T. F. D. A., Klein, J., & Grundy, J. (July 2021). On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-38. doi:10.1145/3446905 ![]() |
![]() ![]() | Sun, X., Li, L., Bissyande, T. F. D. A., Klein, J., Octeau, D., & Grundy, J. C. (July 2021). Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Transactions on Software Engineering and Methodology, 30 (3), 1-36. doi:10.1145/3440033 ![]() |
![]() ![]() | Lothritz, C., Allix, K., Lebichot, B., Veiber, L., Bissyande, T. F. D. A., & Klein, J. (2021). Comparing MultiLingual and Multiple MonoLingual Models for Intent Classification and Slot Filling. In 26th International Conference on Applications of Natural Language to Information Systems (pp. 367-375). Springer. doi:10.1007/978-3-030-80599-9_32 ![]() |
![]() ![]() | Klein, J. (2021). A Journey Through Android App Analysis: Solutions and Open Challenges. In International Symposium on Advanced Security on Software and Systems (pp. 1-6). ACM. doi:10.1145/3457340.3458298 |
Samhi, J., Bissyande, T. F. D. A., & Klein, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115. |
![]() ![]() | Samhi, J., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126 ![]() |
![]() ![]() | Arslan, Y., Allix, K., Veiber, L., Lothritz, C., Bissyande, T. F. D. A., Klein, J., & Goujon, A. (2021). A Comparison of Pre-Trained Language Models for Multi-Class Text Classification in the Financial Domain. In Companion Proceedings of the Web Conference 2021 (WWW '21 Companion), April 19--23, 2021, Ljubljana, Slovenia (pp. 260–268). New York, United States: Association for Computing Machinery. doi:10.1145/3442442.3451375 ![]() |
![]() ![]() | Riom, T., Sawadogo, D. D. A., Allix, K., Bissyande, T. F. D. A., Moha, N., & Klein, J. (29 March 2021). Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09944-w ![]() |
![]() ![]() | Daoudi, N., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). Lessons Learnt on Reproducibility in Machine Learning Based Android Malware Detection. Empirical Software Engineering, 26. doi:10.1007/s10664-021-09955-7 ![]() |
![]() ![]() | Kui, L., Li, L., Koyuncu, A., Dongsun, K., Liu, Z., Klein, J., & Bissyande, T. F. D. A. (2021). A critical review on the evaluation of automated program repair systems. Journal of Systems and Software. doi:10.1016/j.jss.2020.110817 ![]() |
![]() ![]() | Yang, D., Liu, K., Kim, D., Koyuncu, A., Kim, K., Tian, H., Lei, Y., Mao, X., Klein, J., & Bissyande, T. F. D. A. (2021). Where were the repair ingredients for Defects4j bugs? Empirical Software Engineering, 26 (6), 1--33. doi:10.1007/s10664-021-10003-7 ![]() |
![]() ![]() | Keller, P., Kabore, A. K., Plein, L., Klein, J., Le Traon, Y., & Bissyande, T. F. D. A. (2021). What You See is What it Means! Semantic Representation Learning of Code based on Visualization. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3485135 ![]() |
![]() ![]() | Samhi, J., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x ![]() |
![]() ![]() | Daoudi, N., Samhi, J., Kabore, A. K., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 ![]() |
![]() ![]() | Lothritz, C., Allix, K., Veiber, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Pretrained Transformer-based Models on the Task of Fine-Grained Named Entity Recognition. In Proceedings of the 28th International Conference on Computational Linguistics (pp. 3750–3760). ![]() |
![]() ![]() | Gao, J., li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2020). Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation. ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3368089.3409745 ![]() |
![]() ![]() | Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. Ghamizi, R. Rwemalika, M. Cordy, L. Veiber, T. F. D. A. Bissyande, M. Papadakis, J. Klein, ... Y. Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863 ![]() |
![]() ![]() | Veiber, L., Allix, K., Arslan, Y., Bissyande, T. F. D. A., & Klein, J. (2020). Challenges Towards Production-Ready Explainable Machine Learning. In L. Veiber, K. Allix, Y. Arslan, T. F. D. A. Bissyande, ... J. Klein, Proceedings of the 2020 USENIX Conference on Operational Machine Learning (OpML 20). USENIX Association. ![]() |
![]() ![]() | Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338 ![]() |
![]() ![]() | Liu, T., Wang, H., Li, L., Luo, X., Dong, F., Guo, Y., Wang, L., Bissyande, T. F. D. A., & Klein, J. (2020). MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. In Proceedings of The Web Conference 2020 (pp. 1715–1726). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3366423.3380242 ![]() |
![]() ![]() | Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2020). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering. doi:10.1007/s10664-019-09780-z ![]() |
![]() ![]() | li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (11 January 2020). CDA: Characterising Deprecated Android APIs. Empirical Software Engineering, 24 (118), 1-41. doi:10.1007/s10664-019-09764-z ![]() |
![]() ![]() | Gao, J., li, L., Bissyande, T. F. D. A., & Klein, J. (2020). Understanding the Evolution of Android App Vulnerabilities. IEEE Transactions on Reliability. doi:10.1109/TR.2019.2956690 ![]() |
![]() ![]() | Tian, H., Liu, K., Kabore, A. K., Koyuncu, A., Li, L., Klein, J., & Bissyande, T. F. D. A. (2020). Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In H. Tian, 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia. doi:10.1145/3324884.3416532 ![]() |
![]() ![]() | Oumaziz, M., Falleri, J.-R., Blanc, X., Bissyande, T. F. D. A., & Klein, J. (2019). Handling duplicates in Dockerfiles families: Learning from experts. In 35th IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 524-535). IEEE. ![]() |
![]() ![]() | Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (August 2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175. doi:10.1016/j.jss.2019.04.065 ![]() |
![]() ![]() | Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935 ![]() |
![]() ![]() | Kong, P., li, L., Gao, J., Bissyande, T. F. D. A., & Klein, J. (15 July 2019). Mining Android Crash Fixes in the Absence of Issue- and Change-Tracking Systems [Paper presentation]. The 28th International Symposium on Software Testing and Analysis, Beijing, China. doi:10.1145/3293882.3330572 |
![]() ![]() | Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (March 2019). On Identifying and Explaining Similarities in Android Apps. Journal of Computer Science and Technology, 34 (2), 437-455. doi:10.1007/s11390-019-1918-8 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering. doi:10.1109/TSE.2019.2901679 ![]() |
![]() ![]() | Gao, J., Li, L., Kong, P., Bissyande, T. F. D. A., & Klein, J. (2019). Should You Consider Adware as Malware in Your Study? In 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering. ![]() |
Bartel, A., Klein, J., & Le Traon, Y. (2019). Désérialisation Java : Une brève introduction au ROP de haut niveau. Multi-System & Internet Security Cookbook, 101. |
![]() ![]() | Bartel, A., Klein, J., & Le Traon, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2019.2894356 ![]() |
![]() ![]() | Gao, J., Li, Bissyande, T. F. D. A., & Klein, J. (2019). On the Evolution of Mobile App Complexity. Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems. ![]() |
![]() ![]() | Gao, J., Kong, P., Li, L., Bissyande, T. F. D. A., & Klein, J. (2019). Negative Results on Mining Crypto-API Usage Rules in Android Apps. Proceedings of the 16th International Conference on Mining Software Repositories. doi:10.1109/MSR.2019.00065 ![]() |
![]() ![]() | Dong, F., Wang, H., Li, L., Guo, Y., Bissyande, T. F. D. A., Liu, T., Xu, G., & Klein, J. (2018). FraudDroid: Automated Ad Fraud Detection for Android Apps. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (pp. 257-268). doi:10.1145/3236024.3236045 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., & Klein, J. (2018). MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (pp. 212-223). ![]() |
![]() ![]() | Kong, P., Li, L., Gao, J., Liu, K., Bissyande, T. F. D. A., & Klein, J. (2018). Automated Testing of Android Apps: A Systematic Literature Review. IEEE Transactions on Reliability, 1-22. doi:10.1109/TR.2018.2865733 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Wang, H., & Klein, J. (2018). CiD: Automating the Detection of API-related Compatibility Issues in Android Apps. In International Symposium on Software Testing and Analysis (ISSTA) (pp. 153-163). ACM. doi:10.1145/3213846.3213857 ![]() |
![]() ![]() | Bartel, A., Klein, J., & Le Traon, Y. (2018). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. (TR-SNT-2018-3). Université du Luxembourg. |
![]() ![]() | Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018). ![]() |
![]() ![]() | Li, L., Gao, J., Bissyande, T. F. D. A., Ma, L., Xia, X., & Klein, J. (2018). Characterising Deprecated Android APIs. In 15th International Conference on Mining Software Repositories (MSR 2018) (pp. 254-264). ACM. ![]() |
![]() ![]() | Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS. ![]() |
![]() ![]() | Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology. ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology. doi:10.1016/j.infsof.2018.07.005 ![]() |
![]() ![]() | Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (January 2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39. doi:10.1007/s10664-017-9544-y ![]() |
Bartel, A., Klein, J., & Le Traon, Y. (2018). Fini le Bac à Sable. Avec le CVE-2017-3272, devenez un grand! Multi-System & Internet Security Cookbook, 97. |
Bartel, A., Klein, J., & Le Traon, Y. (2018). Désérialisation Java : Une brève introduction. Multi-System & Internet Security Cookbook, 100. |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology. doi:10.1007/s11390-017-1786-z ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Schummer, P., Muller, B., & Solvi, A.-M. (2017). Towards a Plug-and-Play and Holistic Data Mining Framework for Understanding and Facilitating Operations in Smart Buildings. (TR-SNT-2017-5). SnT. |
![]() ![]() | Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713 |
![]() ![]() | Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017. ![]() |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017). doi:10.1007/s11390-017-1786-z ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering. |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering. |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.230 ![]() |
![]() ![]() | Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology. doi:10.1016/j.infsof.2017.04.007 ![]() |
![]() ![]() | Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology. doi:10.1016/j.infsof.2017.04.001 ![]() |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2017.2656460 ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis. ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12). ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. In The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6). doi:10.1145/2970276.2970277 ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (September 2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26 (9&10), 1361–1377. doi:10.1142/S0218194016400088 ![]() |
![]() ![]() | Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. In 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society. doi:10.1109/QRS.2016.34 ![]() |
![]() ![]() | Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016). ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. In The 2016 International Symposium on Software Testing and Analysis. doi:10.1145/2931037.2931044 ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016). ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT. |
![]() ![]() | Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT. |
![]() ![]() | Li, L., Li, D., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016). ![]() |
![]() ![]() | Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. In 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126). ![]() |
![]() ![]() | Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016). ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51 ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18 ![]() |
![]() ![]() | Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016). ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings. ![]() |
![]() ![]() | Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. In The 43rd Symposium on Principles of Programming Languages (POPL 2016). ![]() |
![]() ![]() | Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8 ![]() |
![]() ![]() | Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. In 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm). ![]() |
![]() ![]() | Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems. doi:10.1109/MODELS.2015.7338255 ![]() |
![]() ![]() | Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting. doi:10.1109/MODELS.2015.7338239 ![]() |
![]() ![]() | Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting. ![]() |
![]() ![]() | Nguyen, P. H., Kramer, M., Klein, J., & Le Traon, Y. (September 2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information and Software Technology, 68 (December 2015), 62-81. doi:10.1016/j.infsof.2015.08.006 ![]() |
![]() ![]() | Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. In The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015). doi:10.1109/QRS.2015.36 ![]() |
![]() ![]() | Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg. |
![]() ![]() | Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015). ![]() |
![]() ![]() | Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. In The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM. doi:10.1145/2695664.2695855 ![]() |
![]() ![]() | Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015. |
![]() ![]() | Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Bourcier, J. (2015). Polymer: A Model-Driven Approach for Simpler, Safer, and Evolutive Multi-Objective Optimization Development. In S. Hammoudi, L. F. Pires, P. Desfray, ... J. Filipe (Eds.), MODELSWARD 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development (pp. 286-293). Portugal: SCITEPRESS. doi:10.5220/0005243202860293 ![]() |
![]() ![]() | Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015). ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44 ![]() |
![]() ![]() | Li, L., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. arXiv preprint arXiv:1511.06554. doi:10.1109/SANER.2016.52 ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Bissyandé, T. F., Klein, J., & Traon, Y. L. (2015). Bottom-up adoption of software product lines: a generic and extensible approach. In Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, TN, USA, July 20-24, 2015 (pp. 101--110). doi:10.1145/2791060.2791086 ![]() |
![]() ![]() | Martinez, J., Rossi, G., Ziadi, T., Bissyandé, T. F. D. A., Klein, J., & Traon, Y. L. (2015). Estimating and Predicting Average Likability on Computer-Generated Artwork Variants. In Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid Spain, July 11-15, 2015, Companion Material Proceedings (pp. 1431--1432). ACM. doi:10.1145/2739482.2764681 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29. doi:10.1007/s10664-014-9352-6 ![]() |
![]() ![]() | Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). ![]() |
![]() ![]() | Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China. ![]() |
![]() ![]() | Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. In 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling. doi:10.1145/2631675.2631683 ![]() |
![]() ![]() | Hartmann, T., Fouquet, F., Nain, G., Brice, M., Klein, J., & Le Traon, Y. (02 July 2014). Model-based time-distorted Contexts for efficient temporal Reasoning [Poster presentation]. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada. |
![]() ![]() | Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., & Le Traon, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. In Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA. ![]() |
![]() ![]() | Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61 ![]() |
![]() ![]() | Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. (TR-SnT-2014-13). Luxembourg, Luxembourg: SnT. |
![]() ![]() | Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014). |
![]() ![]() | Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (June 2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering, 40 (6), 617-632. doi:10.1109/TSE.2014.2322867 ![]() |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT. |
![]() ![]() | Li, L., Bartel, A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2014). I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. (TR-SNT-2014-9, Technical Report). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg. |
![]() ![]() | Hartmann, T., Fouquet, F., Klein, J., Nain, G., & Le Traon, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. In Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14). ![]() |
![]() ![]() | Li, L., Bartel, A., Klein, J., & Le Traon, Y. (12 March 2014). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2014. |
![]() ![]() | Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587 ![]() |
![]() ![]() | Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W. Joosen, F. Martinelli, ... T. Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014). ![]() |
![]() ![]() | Li, L., Bartel, A., Klein, J., & Le Traon, Y. (26 February 2014). Detecting privacy leaks in Android Apps [Paper presentation]. International Symposium on Engineering Secure Software and Systems - Doctoral Symposium. |
![]() ![]() | Lucio, L., Zhang, Q., Nguyen, P. H., Amrani, M., Klein, J., Vangheluwe, H., & Le Traon, Y. (2014). Advances in Model-Driven Security. In A. Memon (Ed.), Advances in Computers. Elsevier. doi:10.1016/B978-0-12-800162-2.00003-8 ![]() |
![]() ![]() | Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., Barais, O., & Le Traon, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J. Dingel, W. Schulte, I. Ramos, S. Abrahao, ... E. Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer. doi:10.1007/978-3-319-11653-2_16 ![]() |
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants [Poster presentation]. 3ème Conférence en IngénieriE du Logiciel. |
![]() ![]() | Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144. ![]() |
![]() ![]() | Olivares Mendez, M. A., Bissyandé, T., Somasundar, K., Klein, J., Voos, H., & Le Traon, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F. Bissyandé & G. van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing. doi:10.1007/978-3-319-08368-1_24 ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Mazo, R., Klein, J., & Le Traon, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. In 2nd IEEE Working Conference on Software Visualization. doi:10.1109/VISSOFT.2014.18 ![]() |
![]() ![]() | Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. In ECMFA 2014 European Conference on Modelling Foundations and Applications. ![]() |
![]() ![]() | Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40 (7), 650-670. doi:10.1109/TSE.2014.2327020 ![]() |
![]() ![]() | Nguyen, P. H., Klein, J., Kramer, M., & Le Traon, Y. (2013). A Systematic Review of Model-Driven Security. In The 20th Asia-Pacific Software Engineering Conference Proceedings. ![]() |
![]() ![]() | Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918 ![]() |
![]() ![]() | Kramer, M. E., Klein, J., Steel, J. R. H., Morin, B., Kienzle, J., Barais, O., & Jézéquel, J.-M. (2013). Achieving Practical Genericity in Model Weaving through Extensibility. In K. Duddy & G. Kappel (Eds.), Theory and Practice of Model Transformations (pp. 108-124). Springer Berlin Heidelberg. doi:10.1007/978-3-642-38883-5_12 ![]() |
![]() ![]() | Fritz, C., Arzt, S., Rasthofer, S., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (2013). Highly precise taint analysis for Android applications. |
![]() ![]() | Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445 ![]() |
![]() ![]() | Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries. ![]() |
![]() ![]() | Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., & Le Traon, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. ![]() |
![]() ![]() | Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). PLEDGE: a product line editor and test generation tool. In 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM. doi:10.1145/2499777.2499778 ![]() |
![]() ![]() | Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Towards automated testing and fixing of re-engineered feature models. In Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA, Unknown/unspecified: IEEE Press. ![]() |
![]() ![]() | Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Multi-objective test generation for software product lines. In 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM. doi:10.1145/2491627.2491635 ![]() |
![]() ![]() | Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE. doi:10.1109/ICSTW.2013.30 ![]() |
![]() ![]() | Perrouin, G., Morin, B., Chauvel, F., Fleurey, F., Klein, J., Le Traon, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. In New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press. ![]() |
![]() ![]() | Mens, T., & Klein, J. (2012). Evolving Software - Introduction to the Special Theme. ERCIM News, 88, 8-9. |
![]() ![]() | Klein, J., Kramer, M. E., Steel, J. R. H., Morin, B., Kienzle, J., Barais, O., & Jézéquel, J.-M. (2012). On the Formalisation of GeKo: a Generic Aspect Models Weaver. In On the Formalisation of GeKo: a Generic Aspect Models Weaver (Tech Report) (pp. 1-15). SnT Technical Report. |
![]() ![]() | Perrouin, G., Oster, S., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2012). Pairwise testing for software product lines: Comparison of two approaches. Software Quality Journal, 20 (3), 605-643. doi:10.1007/s11219-011-9160-9 ![]() |
![]() ![]() | Kramer, M. E., Klein, J., & Steel, J. R. H. (2012). Building specifications as a domain-specific aspect language. DSAL'12 - Proceedings of the 7th Workshop on Domain-Specific Aspect Languages, 29-31. doi:10.1145/2162037.2162047 ![]() |
Mussbacher, G., Al Abed, W., Alam, O., Ali, S., Beugnard, A., Bonnet, V., Bræk, R., Capozucca, A., Cheng, B., Fatima, U., France, R., Georg, G., Guelfi, N., Istoan, P., Jézéquel, J.-M., Kienzle, J., Klein, J., Lézoray, J.-B., Malakuti, S., ... Troup, L. (2012). Comparing Six Modeling Approaches. In J. Kienzle (Ed.), Models in Software Engineering (pp. 217-243). Springer Berlin. doi:10.1007/978-3-642-29645-1_22 ![]() |
![]() ![]() | Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2012). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines. Technical Report. |
![]() ![]() | Bartel, A., Klein, J., Monperrus, M., Allix, K., & Le Traon, Y. (2012). In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/25161. |
![]() ![]() | Bartel, A., Klein, J., Monperrus, M., Allix, K., & Le Traon, Y. (2012). Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation. Luxembourg, Unknown/unspecified: uni.lu. |
![]() ![]() | Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. In ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). doi:10.1145/2259051.2259056 ![]() |
![]() ![]() | Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4). doi:10.1145/2351676.2351722 ![]() |
![]() ![]() | Alferez, M., Amalio, N., Ciraci, S., Fleurey, F., Kienzle, J., Klein, J., Kramer, M., Mosser, S., Mussbacher, G., Roubtsova, E., & Zhang, G. (2011). Aspect-Oriented Model Development at Different Levels of Abstraction. In Modelling Foundations and Applications - 7th European Conference, ECMFA 2011 (pp. 6698–361). Springer. ![]() |
![]() ![]() | Istoan, P., Biri, N., & Klein, J. (2011). Issues in model-driven behavioural product derivation. In Fifth International Workshop on Variability Modelling of Software-intensive Systems (Vamos 2011). ACM. doi:10.1145/1944892.1944900 ![]() |
![]() ![]() | Istoan, P., Klein, J., Perrouin, G., & Jezequel, J.-M. (2011). A Metamodel-based Classification of Variability Modeling Approaches. In VARY, International Workshop affiliated with ACM/IEEE 14th International Conference on Driven Engineering Languages and Systems (pp. 2011–144–23). IT University of Copenhagen. ![]() |
![]() ![]() | Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2011). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android (Tech Report) (pp. 1-11). Tech Report. |
![]() ![]() | Bartel, A., Baudry, B., Munoz, F., Klein, J., Mouelhi, T., & Le Traon, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24 ![]() |
![]() ![]() | Perrouin, G., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation. doi:10.1109/ICST.2010.43 ![]() |
![]() ![]() | Morin, B., Klein, J., Kienzle, J., & Jézéquel, J.-M. (2010). Flexible model element introduction policies for aspect-oriented modeling. Abstract book of 13th IEEE/ACM International Conference on Model Driven Engineering Languages and Systems, MODELS 2010, LNCS, 6395 LNCS (PART 2), 63-77. doi:10.1007/978-3-642-16129-2_6 ![]() |
![]() ![]() | Joerg, K., Wisam, A. A., Fleurey, F., Jézéquel, J.-M., & Klein, J. (2010). Aspect-Oriented Design with Reusable Aspect Models. Transactions on Aspect-Oriented Software Development, 1-1. doi:10.1145/1509239.1509252 ![]() |
![]() ![]() | Klein, J., Kienzle, J., Morin, B., & Jézéquel, J.-M. (2009). Aspect model unweaving. Abstract book of 12th IEEE/ACM International Conference on Model Driven Engineering Languages and Systems, MODELS 2009, 5795 LNCS, 514-530. doi:10.1007/978-3-642-04425-0_39 ![]() |
![]() ![]() | Kienzle, J., Al Abed, W., & Klein, J. (2009). Aspect-Oriented Multi-View Modeling. Abstract book of 8th International Conference on Aspect Oriented Software Development (AOSD.09). ![]() |
![]() ![]() | Morin, B., Klein, J., Barais, O., & Jezequel, J.-M. (2008). A Generic Weaver for supporting Product Lines. Early Aspects Workshop at E. ![]() |
![]() ![]() | Perrouin, G., Klein, J., Guelfi, N., & Jezequel, J. M. (2008). Reconciling Automation and Flexibility in Product Derivation. Abstract book of 12th International Software Product Line Conference (SPLC2008). doi:10.1109/SPLC.2008.38 ![]() |
![]() ![]() | Barais, O., Klein, J., Baudry, B., Jackson, A., & Clarke, S. (2008). Composing Multi-View Aspect Models. Abstract book of 7th IEEE International Conference on Composition Based Software Systems. doi:10.1109/ICCBSS.2008.12 ![]() |
![]() ![]() | Klein, J., & Kienzle, J. (2007). Reusable Aspect Models. Abstract book of 11th Workshop on Aspect Oriented Modeling, AOM at Models’07. ![]() |