CORDY, M., LAZREG, S., Legay, A., & Schobbens, P. Y. (2023). Towards Strengthening Formal Specifications with Mutation Model Checking. In S. Chandra (Ed.), ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Association for Computing Machinery, Inc. doi:10.1145/3611643.3613080
We propose mutation model checking as an approach to strengthen formal specifications used for mo...
Peer reviewed
Dimovski, A. S., LAZREG, S., CORDY, M., & Legay, A. (2023). Family-based model checking of fMultiLTL properties. In P. Arcaini (Ed.), 27th ACM International Systems and Software Product Line Conference, SPLC 2023 - Proceedings. Association for Computing Machinery. doi:10.1145/3579027.3608976
We introduce a new logic for expressing multi-properties of system families (Software Product Lin...
Peer reviewed
Akli, A., Haben, G., Habchi, S., Papadakis, M., & Le Traon, Y. (2023). FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. In FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning. doi:10.1109/AST58925.2023.00018
Flaky tests are tests that yield different outcomes when run on the same version of a program. Th...
Peer reviewed
Cuartas, J., Aranda, J., CORDY, M., Ortiz, J., Perrouin, G., & Schobbens, P.-Y. (2023). MUPPAAL: Reducing and Removing Equivalent and Duplicate Mutants in UPPAAL. In Proceedings - 2023 IEEE 16th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/ICSTW58534.2023.00021
Mutation Testing (MT) is a test quality assessment technique that creates mutants by injecting ar...
Peer reviewed
Brizzio, M. A., CORDY, M., PAPADAKIS, M., Sánchez, C. S., Aguirre, N., & DEGIOVANNI, R. G. (2023). Automated Repair of Unrealisable LTL Specifications Guided by Model Counting. Genetic and Evolutionary Computation Conference (GECCO), 1499–1507. doi:10.1145/3583131.3590454
Peer reviewed
Carvalho, L., DEGIOVANNI, R. G., Brizzio, M. A., CORDY, M., Aguirre, N., LE TRAON, Y., & PAPADAKIS, M. (2023). ACoRe: Automated Goal-Conflict Resolution. 26th International Conference on Fundamental Approaches to Software Engineering (FASE), 13991, 3–25. doi:10.1007/978-3-031-30826-0_1
Peer reviewed
Dong, Z., HU, Q., GUO, Y., CORDY, M., PAPADAKIS, M., Zhang, Z., LE TRAON, Y., & Zhao, J. (2023). MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 379–390. doi:10.1109/SANER56733.2023.00043
Peer reviewed
Dyrmishi, S., Ghamizi, S., & Cordy, M. (2023). How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks. In Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics.
Natural Language Processing (NLP) models based on Machine Learning (ML) are susceptible to advers...
Peer reviewed
Dyrmishi, S., Ghamizi, S., Simonetto, T. J. A., Le Traon, Y., & Cordy, M. (2023). On the empirical effectiveness of unrealistic adversarial hardening against realistic adversarial attacks. In Conference Proceedings 2023 IEEE Symposium on Security and Privacy (SP) (pp. 1384-1400). IEEE. doi:10.1109/SP46215.2023.00049
While the literature on security attacks and defense of Machine Learning (ML) systems mostly focu...
Peer reviewed
GARG, A., DEGIOVANNI, R. G., Molina, F., CORDY, M., Aguirre, N., PAPADAKIS, M., & Traon, Y. (2023). Enabling Efficient Assertion Inference. International Symposium on Software Reliability Engineering (ISSRE), 623–634. doi:10.1109/ISSRE59848.2023.00039
Peer reviewed
GHAMIZI, S., CORDY, M., PAPADAKIS, M., & LE TRAON, Y. (2023). On Evaluating Adversarial Robustness of Chest X-ray Classification. Proceedings of the Workshop on Artificial Intelligence Safety 2023, 3381.
Peer reviewed
GHAMIZI, S., Zhang, J., CORDY, M., PAPADAKIS, M., Sugiyama, M., & LE TRAON, Y. (2023). GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. Proceedings of the International Conference on Machine Learning (ICML), 202, 11255–11282.
Peer reviewed
HU, Q., GUO, Y., CORDY, M., PAPADAKIS, M., & Traon, Y. (2023). MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack. 38th IEEE/ACM International Conference on Automated Software Engineering (ASE), 1708–1712. doi:10.1109/ASE56229.2023.00042
Peer reviewed
HU, Q., GUO, Y., CORDY, M., Xie, X., MA, W., PAPADAKIS, M., & Traon, Y. (2023). Towards Understanding Model Quantization for Reliable Deep Neural Network Deployment. 2nd IEEE/ACM International Conference on AI Engineering - Software Engineering for AI, CAIN 2023, 56–67. doi:10.1109/CAIN58948.2023.00015
Peer reviewed
HU, Q., GUO, Y., Xie, X., CORDY, M., PAPADAKIS, M., Ma, L., & LE TRAON, Y. (2023). CodeS: Towards Code Model Generalization Under Distribution Shift. IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 1–6. doi:10.1109/ICSE-NIER58687.2023.00007
Peer reviewed
HU, Q., GUO, Y., Xie, X., CORDY, M., PAPADAKIS, M., Ma, L., & Traon, Y. (2023). Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation. 45th IEEE/ACM International Conference on Software Engineering (ICSE), 1776–1787. doi:10.1109/ICSE48619.2023.00152
Peer reviewed
Ojdanic, M., Khanfir, A., Garg, A., Degiovanni, R. G., Papadakis, M., & Le Traon, Y. (2023). On Comparing Mutation Testing Tools through Learning-based Mutant Selection. In On Comparing Mutation Testing Tools through Learning-based Mutant Selection (pp. 10). doi:10.1109/AST58925.2023.00008
Recently many mutation testing tools have been proposed that rely on bug-fix patterns and natural...
Peer reviewed
Khanfir, A., Jimenez, M., Papadakis, M., & Le Traon, Y. (2022). CODEBERT-NT: code naturalness via CodeBERT. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS'22). doi:10.1109/QRS57517.2022.00098
Much of recent software-engineering research has investigated the naturalness of code, the fact t...
Peer reviewed
Bernier, F., Jimenez, M., Cordy, M., & Le Traon, Y. (2022). Faster and Cheaper Energy Demand Forecasting at Scale. In Has it Trained Yet? Workshop at the Conference on Neural Information Processing Systems.
Energy demand forecasting is one of the most challenging tasks for grids operators. Many approac...
Peer reviewed
Habchi, S., Haben, G., Sohn, J., Franci, A., Papadakis, M., Cordy, M., & Le Traon, Y. (2022). What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. In What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. doi:10.1109/ICSME55016.2022.00039
Flaky tests are defined as tests that manifest non-deterministic behaviour by passing and failing...
Peer reviewed
Rana, L., Lazreg, S., Bohlachov, V., Hein, A., & Cordy, M. (October 2022). VARIABILITY-DRIVEN DESIGN CONFIGURATOR OF SPACE SYSTEMS TO SUPPORT DECISION-MAKERS [Paper presentation]. 10th INTERNATIONAL SYSTEMS & CONCURRENT ENGINEERING FOR SPACE APPLICATIONS CONFERENCE (SECESA 2022).
Souani, B., Khanfir, A., BARTEL, A., Allix, K., & Le Traon, Y. (2022). Android Malware Detection Using BERT. In Z. Jianying, Applied Cryptography and Network Security Workshops (pp. 575–591). Berlin, Germany: Springer. doi:10.1007/978-3-031-16815-4_31
In this paper, we propose two empirical studies to (1) detect Android malware and (2) classify An...
Peer reviewed
Ma, W., Zhao, M., Soremekun, E., Hu, Q., Zhang, J. M., Papadakis, M., Cordy, M., Xie, X., & Traon, Y. L. (2022). GraphCode2Vec: generic code embedding via lexical and program dependence analyses. In Proceedings of the 19th International Conference on Mining Software Repositories (pp. 524--536). doi:10.1145/3524842.3528456
Code embedding is a keystone in the application of machine learn- ing on several Software Enginee...
Peer reviewed
Habchi, S., Haben, G., Papadakis, M., Cordy, M., & Le Traon, Y. (2022). A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. In A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests. doi:10.1109/ICST53961.2022.00034
Test flakiness forms a major testing concern. Flaky tests manifest non-deterministic outcomes tha...
Peer reviewed
Lazreg, S., Bohlachov, V., Rana, L., Hein, A., & Cordy, M. (2022). Variability-Aware Design of Space Systems: Variability Modelling, Configuration Workflow and Research Directions. Proceedings of VAMOS 22. doi:10.1145/3510466.3510472
CORDY, M., RWEMALIKA, R., FRANCI, A., PAPADAKIS, M., & Harman, M. (2022). FlakiMe: Laboratory-Controlled Test Flakiness Impact Assessment. 44th IEEE/ACM 44th International Conference on Software Engineering, ICSE 2022, 982–994. doi:10.1145/3510003.3510194
Peer reviewed
FRANCI, A., CORDY, M., GUBRI, M., PAPADAKIS, M., & Traon, Y. (2022). Influence-driven data poisoning in graph-based semi-supervised classifiers. International Conference on AI Engineering: Software Engineering for AI, 77–87. doi:10.1145/3522664.3528606
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2022). Adversarial Robustness in Multi-Task Learning: Promises and Illusions. In Proceedings of the thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22). doi:10.1609/aaai.v36i1.19950
Vulnerability to adversarial attacks is a well-known weakness of Deep Neural networks. While most...
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2022). On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices. In The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI- 23) - SafeAI Workshop, Washington, D.C., Feb 13-14, 2023.
Peer reviewed
Gubri, M., Cordy, M., Papadakis, M., Le Traon, Y., & Sen, K. (2022). Efficient and Transferable Adversarial Examples from Bayesian Neural Networks. The 38th Conference on Uncertainty in Artificial Intelligence.
An established way to improve the transferability of black-box evasion attacks is to craft the ad...
Peer reviewed
Gubri, M., Cordy, M., Papadakis, M., Traon, Y. L., & Sen, K. (2022). LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity. In Computer Vision -- ECCV 2022 (pp. 603--618). Springer Nature Switzerland.
We propose transferability from Large Geometric Vicinity (LGV), a new technique to increase the t...
Peer reviewed
LAZREG, S., CORDY, M., & Legay, A. (2022). Verification of Variability-Intensive Stochastic Systems with Statistical Model Checking. In T. Margaria (Ed.), Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning - 11th International Symposium, ISoLA 2022, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-19759-8_27
We propose a simulation-based approach to verify Variability-Intensive Systems (VISs) with stocha...
Peer reviewed
Simonetto, T. J. A., Dyrmishi, S., Ghamizi, S., Cordy, M., & Le Traon, Y. (2022). A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22 (pp. 1313-1319). International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2022/183
The generation of feasible adversarial examples is necessary for properly assessing models that w...
Peer reviewed
Haben, G., Habchi, S., Papadakis, M., Cordy, M., & Le Traon, Y. (2021). A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests. In 18th International Conference on Mining Software Repositories. doi:10.1109/MSR52588.2021.00034
Abstract—Industrial reports indicate that flaky tests are one of the primary concerns of software...
Peer reviewed
Acher, M., Perrouin, G., & Cordy, M. (2021). BURST: a benchmarking platform for uniform random sampling techniques. In SPLC '21: 25th ACM International Systems and Software Product Line Conference, Leicester, United Kindom, September 6-11, 2021, Volume B (pp. 36--40). ACM. doi:10.1145/3461002.3473070
Peer reviewed
Bonnaventure, W., Khanfir, A., BARTEL, A., Papadakis, M., & Le Traon, Y. (2021). CONFUZZION: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. In IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2021.
Peer reviewed
Hu, Q., Guo, Y., Cordy, M., Xiaofei, X., Ma, W., Papadakis, M., & Le Traon, Y. (2021). Towards Exploring the Limitations of Active Learning: An Empirical Study. In The 36th IEEE/ACM International Conference on Automated Software Engineering. doi:10.1109/ASE51524.2021.9678672
Deep neural networks (DNNs) are being increasingly deployed as integral parts of software systems...
Peer reviewed
Mouline, L., Cordy, M., & Le Traon, Y. (2020). Load approximation for uncertain topologies in the low-voltage grid. In INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (pp. 1-6). doi:10.1109/SmartGridComm47815.2020.9302940
Smart grids allow operators to monitor the grid continuously, detect occurring incidents, and tri...
Peer reviewed
Basile, D., Ter Beek, M., Cordy, M., & Legay, A. (2020). Tackling the equivalent mutant problem in real-time systems: the 12 commandments of model-based mutation testing. In SOFTWARE PRODUCT LINE CONFERENCE. doi:10.1145/3382025.3414966
Peer reviewed
Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S. Ghamizi, R. Rwemalika, M. Cordy, L. Veiber, T. F. D. A. Bissyande, M. Papadakis, J. Klein, ... Y. Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, United States: Association for Computing Machinery. doi:10.1145/3394486.3412863
The rapid spread of the Coronavirus SARS-2 is a major challenge that led almost all governments w...
Peer reviewed
Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. In 42nd ACM/IEEE International Conference on Software Engineering (ICSE). doi:10.1145/3377811.3380338
Test-based automated program repair has been a prolific field of research in software engineering...
Peer reviewed
Cordy, M., Papadakis, M., & Legay, A. (2020). Statistical Model Checking for Variability-Intensive Systems. In FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, Dublin 22-25 April 2020.
Peer reviewed
Kolbe, N., Vandenbussche, P.-Y., Kubler, S., & Le Traon, Y. (2020). LOVBench: Ontology Ranking Benchmark. In Proceedings of The Web Conference 2020 (WWW '20). doi:10.1145/3366423.3380245
Peer reviewed
Antoniadis, N., Cordy, M., Sifaleras, A., & Le Traon, Y. (2020). Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. In Communications in Computer and Information Science (pp. 269-281). Springer, Cham. doi:10.1007/978-3-030-41913-4_22
Cable overloading is one of the most critical disturbances that may occur in smart grids, as it c...
Peer reviewed
Ghamizi, S., Cordy, M., Gubri, M., Papadakis, M., Boystov, A., Le Traon, Y., & Goujon, A. (2020). Search-based adversarial testing and improvement of constrained credit scoring systems. In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020.
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). Adversarial Embedding: A robust and elusive Steganography and Watermarking technique [Paper presentation]. IEEE Symposium on Security and Privacy.
We propose adversarial embedding, a new steganography and watermarking technique that embeds secr...
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). FeatureNET: Diversity-driven Generation of Deep Learning Models. In International Conference on Software Engineering (ICSE). doi:10.1145/3377812.3382153
Peer reviewed
Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2020). Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework. In ACM/IEEE International Conference on Automation of Software Test (AST) 2020. doi:10.1145/3387903.3389316
Program based test adequacy criteria (TAC), such as statement, branch coverage and mutation give ...
Peer reviewed
Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). An industrial study on the differences between pre-release and post-release bugs. In Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (pp. 11). IEEE. doi:10.1109/ICSME.2019.00019
Software bugs constitute a frequent and common issue of software development. To deal with this p...
Peer reviewed
Cordy, M., & Lazreg, S. (2019). Automated evaluation of embedded-system design alternatives. In Proceedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, Volume A, Paris, France, September 9-13, 2019 (pp. 52:1).
Peer reviewed
Patout, P.-A., & Cordy, M. (2019). Towards context-aware automated writing evaluation systems. In Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (pp. 17-20).
Peer reviewed
Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. In ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. doi:10.1145/3338906.3338935
Issue tracking systems are commonly used in modern software development for collecting feedback f...
Peer reviewed
Cordy, M., Legay, A., Lazreg, S., & Collet, P. (2019). Towards sampling and simulation-based analysis of featured weighted automata. In Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (pp. 61-64). doi:10.1109/FormaliSE.2019.00015
Peer reviewed
Lazreg, S., Cordy, M., Collet, P., Heymans, P., & Mosser, S. (2019). Multifaceted automated analyses for variability-intensive embedded systems. In Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (pp. 854-865).
Peer reviewed
Liu, K., Kim, D., Bissyande, T. F. D. A., Kim, T., Kim, K., Koyuncu, A., Kim, S., & Le Traon, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. In 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE.
To ensure code readability and facilitate software maintenance, program methods must be named pro...
Peer reviewed
Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE. doi:10.1109/ICST.2019.00020
Properly benchmarking Automated Program Repair (APR) systems should contribute to the development...
Peer reviewed
Amand, B., Cordy, M., Heymans, P., Acher, M., Temple, P., & Jézéquel, J.-M. (2019). Towards Learning-Aided Configuration in 3D Printing: Feasibility Study and Application to Defect Prediction. In Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, VAMOS 2019, Leuven, Belgium, February 06-08, 2019 (pp. 7:1-7:9). doi:10.1145/3302333.3302338
Peer reviewed
Polge, J., Robert, J., & Le Traon, Y. (2019). Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. In 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019.
Peer reviewed
Benedick, P.-L., Robert, J., & Le Traon, Y. (2019). TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society.
Peer reviewed
Cordy, M., Devroey, X., Legay, A., Perrouin, G., Classen, A., Heymans, P., Schobbens, P.-Y., & Raskin, J.-F. (2019). A Decade of Featured Transition Systems. In From Software Engineering to Formal Methods and Tools, and Back - Essays Dedicated to Stefania Gnesi on the Occasion of Her 65th Birthday (pp. 285-312). doi:10.1007/978-3-319-51963-0_35
Peer reviewed
Cordy, M., Muller, S., Papadakis, M., & Le Traon, Y. (2019). Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330580
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2019). Automated Search for Configurations of Deep Neural Network Architectures. In Automated Search for Configurations of Convolutional Neural Network Architectures. doi:10.1145/3336294.3336306
Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Alt...
Peer reviewed
Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). An Empirical Study on Vulnerability Prediction of Open-Source Software Releases. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Peer reviewed
Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities. In Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). doi:10.1145/3338906.3338941
Peer reviewed
Kolbe, N., Kubler, S., & Le Traon, Y. (2019). Popularity-driven Ontology Ranking using Qualitative Features. In The Semantic Web - ISWC 2019. doi:10.1007/978-3-030-30793-6_19
Efficient ontology reuse is a key factor in the Semantic Web to enable and enhance the interopera...
Peer reviewed
Leong, C., Abhayendra, S., Papadakis, M., Le Traon, Y., & Micco, J. (2019). Assessing Transition-based Test Selection Algorithms at Google. In International Conference on Software Engineering (ICSE). doi:10.1109/ICSE-SEIP.2019.00019
Peer reviewed
Padhye, R., Lemieux, C., Sen, K., Papadakis, M., & Le Traon, Y. (2019). Semantic Fuzzing with Zest. In ACM SIGSOFT International Symposium on Software Testing and Analysis. doi:10.1145/3293882.3330576
Peer reviewed
Padhye, R., Lemieux, C., Sen, K., PAPADAKIS, M., & LE TRAON, Y. (2019). Validity fuzzing and parametric generators for effective random testing. 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 266–267. doi:10.1109/ICSE-COMPANION.2019.00107
Peer reviewed
Plazar, Q., Acher, M., Perrouin, G., Devroey, X., & Cordy, M. (2019). Uniform Sampling of SAT Solutions for Configurable Systems: Are We There Yet? In 12th IEEE Conference on Software Testing, Validation and Verification, ICST 2019, Xi'an, China, April 22-27, 2019 (pp. 240-251). doi:10.1109/ICST.2019.00032
Peer reviewed
Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). On the Evolution of Keyword-Driven Test Suites. In 12th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2019.00040
Many companies rely on software testing to verify that their software products meet their require...
Peer reviewed
Schmitt, X., Kubler, S., Robert, J., Papadakis, M., & Le Traon, Y. (2019). A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. In International Conference on Social Networks Analysis, Management and Security. doi:10.1109/SNAMS.2019.8931850
Peer reviewed
Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2019). Mart: A Mutant Generation Tool for LLVM. In T. Titcheu Chekam, M. Papadakis, ... Y. Le Traon, Mart: A Mutant Generation Tool for LLVM. doi:10.1145/3338906.3341180
Program mutation makes small syntactic alterations to programs' code in order to artificially cre...
Peer reviewed
Rwemalika, R., Kintis, M., Papadakis, M., & Le Traon, Y. (11 December 2018). Can we automate away the main challenges of end-to-end testing? [Paper presentation]. The 17th Belgium-Netherlands Software Evolution Workshop, Delft, Netherlands.
Agile methodologies enable companies to drastically increase software release pace and reduce tim...
Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018). Are mutants really natural? A study on how “naturalness” helps mutant selection. Proceedings of 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18). doi:10.1145/3239235.3240500
Background: Code is repetitive and predictable in a way that is similar to the natural language....
Peer reviewed
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Naturalness-based Analysis. In 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018.
Natural language processing techniques, in particular n-gram models, have been applied successful...
Peer reviewed
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (September 2018). On the impact of tokenizer and parameters on N-gram based Code Analysis [Paper presentation]. 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain.
Recent research shows that language models, such as n-gram models, are useful at a wide variety o...
Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018). A Closer Look at Real-World Patches. In 34th IEEE International Conference on Software Maintenance and Evolution (ICSME). doi:10.1109/ICSME.2018.00037
Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, rese...
Peer reviewed
Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. In O-MI/O-DF vs. MQTT: a performance analysis.
Over the past decade, a flourishing number of concepts and architectural shifts appeared such as ...
Peer reviewed
Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. In International Conference on Software Engineering (ICSE 2018).
Code search is an unavoidable activity in software development. Various approaches and techniques...
Peer reviewed
Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. In 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Peer reviewed
Fouquet, F., Hartmann, T., Mosser, S., & Cordy, M. (2018). Enabling lock-free concurrent workers over temporal graphs composed of multiple time-series. In 33rd Annual ACM Symposium on Applied Computing (SAC'18). doi:10.1145/3167132.3167255
Time series are commonly used to store temporal data, e.g., sensor measurements. However, when it...
Peer reviewed
Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. In 21st International Conference on Extending Database Technology.
This paper presents a multiscale visibility graph representation for time series as well as featu...
Peer reviewed
Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. In IEEE International Working Conference on Source Code Analysis and Manipulation. doi:10.1109/SCAM.2018.00014
Peer reviewed
Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. In 13th International Workshop on Mutation Analysis (MUTATION'18).
Peer reviewed
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. In 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018.
Peer reviewed
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Frӓmling, K. (2017). Combined Use of Lifecycle Management and IoT in Smart Cities. In Combined Use of Lifecycle Management and IoT in Smart Cities.
Peer reviewed
Kolbe, N., Robert, J., Kubler, S., & Le Traon, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.1145/3144457.3144479
The Internet of Things (IoT) is promising to open up opportunities for businesses to offer new se...
Peer reviewed
Benelallam, A., Hartmann, T., Mouline, L., Fouquet, F., Bourcier, J., Barais, O., & Le Traon, Y. (2017). Raising Time Awareness in Model-Driven Engineering. In 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer. doi:10.1109/MODELS.2017.11
The conviction that big data analytics is a key for the success of modern businesses is growing d...
Peer reviewed
Kubler, S., Derigent, W., Voisin, A., Robert, J., & Le Traon, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. In Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices.
Abstract—Fuzzy AHP is today one of the most used Multiple Criteria Decision-Making (MCDM) techniq...
Peer reviewed
Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le Traon, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. In Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering.
Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of ...
Peer reviewed
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. In 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings.
A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability a...
Peer reviewed
Kolbe, N., Zaslavsky, A., Kubler, S., Robert, J., & Le Traon, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. In Modeling and Using Context.
Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Inter...
Peer reviewed
Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (July 2017). Impact of Tool Support in Patch Construction [Paper presentation]. 2017 International Symposium on Software Testing & Analysis (ISSTA). doi:10.1145/3092703.3092713
In this work, we investigate the practice of patch construction in the Linux kernel development, ...
Titcheu Chekam, T., Papadakis, M., Le Traon, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. In International Conference on Software Engineering (ICSE 2017). doi:10.1109/ICSE.2017.61
Many studies suggest using coverage concepts, such as branch coverage, as the starting point of t...
Peer reviewed
Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In MSR 2017.
Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovere...
Peer reviewed
Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (May 2017). The Multi-Generation Repackaging Hypothesis [Poster presentation]. The 39th International Conference on Software Engineering.
App repackaging is a common threat in the Android ecosystem. To face this threat, the literature ...
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
To devise efficient approaches and tools for detecting malicious packages in the Android ecosyste...
Peer reviewed
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (May 2017). Understanding Android App Piggybacking [Poster presentation]. The 39th International Conference on Software Engineering.
The Android packaging model offers adequate opportunities for attackers to inject malicious code ...
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. In The 32nd ACM Symposium on Applied Computing (SAC 2017). doi:10.1145/3019612.3019699
As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly het...
Peer reviewed
Mouline, L., Hartmann, T., Fouquet, F., Le Traon, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L. Mouline, T. Hartmann, F. Fouquet, Y. Le Traon, J. Bourcier, ... O. Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM. doi:10.1145/3079368.3079394
Smart systems are characterised by their ability to analyse measured data in live and to react to...
Peer reviewed
Laurent, T., Papadakis, M., Kintis, M., Henard, C., Le Traon, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. In 10th IEEE International Conference on Software Testing, Verification and Validation. doi:10.1109/ICST.2017.47
Peer reviewed
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. In 2016 Asia-Pacific Software Engineering Conference (APSEC).
Vulnerabilities are one of the main concerns faced by practitioners when working with security cr...
Peer reviewed
Kubler, S., Robert, J., Hefnawy, A., Cherifi, C., Bouras, A., & Främling, K. (2016). IoT-based Smart Parking System for Sporting Event Management. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 104-114). New York, United States: ACM New York. doi:10.1145/2994374.2994390
By connecting devices, people, vehicles and infrastructures everywhere in a city, governments and...
Peer reviewed
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016. doi:10.1109/SCAM.2016.15
To assist the vulnerability identification process, researchers proposed prediction models that h...
Peer reviewed
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. In The 15th International Symposium on Intelligent Data Analysis.
The abundance of time series data in various domains and their high dimensionality characteristic...
Peer reviewed
Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. In The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
As Android becomes a de-facto choice of development platform for mobile apps, developers extensiv...
Peer reviewed
Kolbe, N., Zaslavsky, A., Kubler, S., & Robert, J. (2016). Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste. In Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste (NEW2AN/ruSMART 2016, LNCS 9870 proceedings). Nungambakkam, India: Springer. doi:10.1007/978-3-319-46301-8_9
Abstract. Situation awareness is a key feature of pervasive computing and requires external knowl...
Peer reviewed
Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016. doi:10.1109/ETFA.2016.7733537
Unmanned Aerial Vehicles are currently investigated as an important sub-domain of robotics, a fas...
Peer reviewed
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Främling, K. (2016). Lifecycle Management in the Smart City Context: Smart Parking Use-Case. In 13th IFIP International Conference on Product Lifecycle Management, Columbia SC 10-13 July 2016 (Springer book Advanced ICT series). Springer.
Lifecycle management enables enterprises to manage their products, services and product-service b...
Peer reviewed
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. In The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Time series mining has become essential for extracting knowledge from the abundant data that flow...
Peer reviewed
Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. In 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Time series data are abundant in various domains and are often characterized as large in size and...
Peer reviewed
Kubler, S., Buda, A., Robert, J., & Främling, K. (2016). Building Lifecycle Management System for Enhanced Closed Loop Collaboration. In 13th IFIP International Conference on Product Lifecycle Management (PLM16) (Springer book Advanced ICT series). Springer.
In the past few years, the architecture, engineering and construction (AEC) industry has carried ...
Peer reviewed
Kubler, S., Robert, J., Le Traon, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. In Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, United States: ACM. doi:10.1145/2912160.2912167
During recent years, more and more Open Data becomes available and used as part of the Open Data ...
Peer reviewed
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2901739.2903508
We present a growing collection of Android Applications collected from several sources, including...
Peer reviewed
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. In 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126).
Micro-generations and future grid usages, such as charging of electric cars, raises major challen...
Peer reviewed
Li, L., Li, D., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. In The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Despite much effort in the community, the momentum of Android research has not yet produced compl...
Peer reviewed
Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. In The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Peer reviewed
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12). doi:10.1109/SANER.2016.52
The packaging model of Android apps requires the entire code necessary for the execution of an ap...
Peer reviewed
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5). doi:10.1109/SANER.2016.51
Parameter values are important elements for un- derstanding how Application Programming Interface...
Peer reviewed
Henard, C., Papadakis, M., Harman, M., Jia, Y., & Le Traon, Y. (2016). Comparing White-box and Black-box Test Prioritization. In 38th International Conference on Software Engineering (ICSE'16).
Although white-box regression test prioritization has been well-studied, the more recently introd...
Peer reviewed
Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer. doi:10.1007/978-3-319-40667-1_8
There is generally a lack of consensus in Antivirus (AV) engines' decisions on a given sample. Th...
Peer reviewed
Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. In The 20th International Systems and Software Product Line Conference (SPLC 2016).
The myriads of smart phones around the globe gave rise to a vast proliferation of mobile applicat...
Peer reviewed
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. In 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Peer reviewed
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. In Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings. doi:10.1007/978-3-319-35122-3_18
Peer reviewed
Meira, J. A., Almeira, E. C. D., Kim, D., Filho, E. R. L., & Le Traon, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. In International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016.
Peer reviewed
Muller, S., Harpes, C., Le Traon, Y., Gombault, S., Bonnin, J.-M., & Hoffmann, P. (2016). Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. In International Conference on Critical Information Infrastructures Security (pp. 163-175). Springer International Publishing. doi:10.1007/978-3-319-71368-7_14
Critical Infrastructures are known for their complexity and the strong interdependencies between ...
Peer reviewed
Octeau, D., Jha, S., Dering, M., McDaniel, P., BARTEL, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. In The 43rd Symposium on Principles of Programming Languages (POPL 2016).
Static analysis has been successfully used in many areas, from verifying mission-critical softwar...
Peer reviewed
Papadakis, M., Henard, C., Harman, M., Jia, & Le Traon, Y. (2016). Threats to the validity of mutation-based test assessment. In International Symposium on Software Testing and Analysis, ISSTA 2016. doi:10.1145/2931037.2931040
Peer reviewed
Robert, J., Kubler, S., & Le Traon, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. In International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria. doi:10.1109/FiCloud.2016.50
In traditional product companies, creating value meant identifying enduring customer needs and ma...
Peer reviewed
Robert, J., Kubler, S., Le Traon, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. In O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. doi:10.1109/IECON.2016.7793138
The Industrial Internet should provide means to create ad hoc and loosely coupled information flo...
Peer reviewed
Kubler, S., Holmström, J., Främling, K., & Turkama, P. (2015). Technological Theory of Cloud Manufacturing. In T. Borangiu (Ed.), Service Orientation in Holonic and Multi Agent Manufacturing and Robotics (Studies in Computational Intelligence). Springer.
Over the past decade, a flourishing number of concepts and architectural shifts appeared such as ...
Peer reviewed
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. In 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
The transition from today’s electricity grid to the so-called smart grid relies heavily on the us...
Peer reviewed
Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems. doi:10.1109/MODELS.2015.7338255
Model-Driven Security (MDS) for secure systems development still has limitations to be more appli...
Peer reviewed
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In Economics of Grids, Clouds, Systems, and Services. Springer.
A major part of the commercial Internet is moving towards a cloud paradigm. This phenomenon has a...
Peer reviewed
Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting.
The models@run.time paradigm promotes the use of models during the execution of cyber-physical sy...
Peer reviewed
Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T. Lethbridge, J. Cabot, ... A. Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting. doi:10.1109/MODELS.2015.7338239
Internet of Things applications analyze our past habits through sensor measures to anticipate fut...
Peer reviewed
Kubler, S., Yoo, M.-J., Cassagnes, C., Främling, K., Kiritsis, D., & Skilton, M. (2015). Opportunity to Leverage Information-as-an-Asset in the IoT -- The road ahead. In 3rd International Conference on Future Internet of Things and Cloud (pp. 64-71). IEEE Computer Society. doi:10.1109/FiCloud.2015.63
In traditional product companies, creating value meant identifying enduring customer needs and ma...
Peer reviewed
Madhikermi, M., Kubler, S., Buda, A., & Främling, K. (2015). Data Quality Assessment of Company's Maintenance Reporting: A Case Study. In Proceedings of 4th International Conference on Data Management Technologies and Applications (pp. 162-172). Colmar, France: SciTePress. doi:10.5220/0005518401620172
Businesses are increasingly using their enterprise data for strategic decision-making activities....
Peer reviewed
Buda, A., Kubler, S., Främling, K., Borgman, J., Madhikermi, M., & Mirzaeifar, S. (2015). Data supply chain in Industrial Internet. In 11th IEEE World Conference on Factory Communication Systems (pp. 1--7). Palma de Mallorca, Spain: IEEE. doi:10.1109/WFCS.2015.7160559
The Industrial Internet promises to radically change and improve many industry's daily business a...
Peer reviewed
Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. In International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
Peer reviewed
Henard, C., Papadakis, M., & Le Traon, Y. (2015). Flattening or not of the combinatorial interaction testing models. In Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE.
Peer reviewed
Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. In The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM. doi:10.1145/2695664.2695855
Given the trend towards mobile computing, the next generation of ubiquitous “smart” services will...
Peer reviewed
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (March 2015). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2015.
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing. doi:10.1007/978-3-319-15618-7_5
In this paper, we consider the relevance of timeline in the construction of datasets, to highligh...
Peer reviewed
Bardin, S., Delahaye, M., Kosmatov, N., David, R., Papadakis, M., Le Traon, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15). doi:10.1109/ICST.2015.7102607
Peer reviewed
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science, 8924, 213-221. doi:10.1007/978-3-319-17127-2_14
Policy-based systems rely on the separation of concerns, by implementing independently a software...
Peer reviewed
Henard, C., Papadakis, M., Harman, M., & Le Traon, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In 37th International Conference on Software Engineering (ICSE 2015).
Peer reviewed
Li, L., BARTEL, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Pla...
Peer reviewed
Martinez, J., Rossi, G., Ziadi, T., Bissyandé, T. F. D. A., Klein, J., & Traon, Y. L. (2015). Estimating and Predicting Average Likability on Computer-Generated Artwork Variants. In Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid Spain, July 11-15, 2015, Companion Material Proceedings (pp. 1431--1432). ACM. doi:10.1145/2739482.2764681
Peer reviewed
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. In 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015). doi:10.1109/ASE.2015.44
Peer reviewed
Martinez, J., Ziadi, T., Bissyandé, T. F., Klein, J., & Traon, Y. L. (2015). Bottom-up adoption of software product lines: a generic and extensible approach. In Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, TN, USA, July 20-24, 2015 (pp. 101--110). doi:10.1145/2791060.2791086
Peer reviewed
Papadakis, M., Yue, J., Harman, M., & Le Traon, Y. (2015). Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. In 37th International Conference on Software Engineering (ICSE 2015).
Peer reviewed
Ko, D., Ma, K., Park, S., Kim, S., Kim, D., & Le Traon, Y. (01 December 2014). API Document Quality for Resolving Deprecated APIs [Paper presentation]. The 21st Asia-Pacific Software Engineering Conference.
Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Today’s electricity grid must undergo substantial changes in order to keep pace with the rising d...
Peer reviewed
El Kateb, D., Fouquet, F., bourcier, J., & Le Traon, Y. (October 2014). Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning [Paper presentation]. The 14th International Conference on Quality Software.
Li, L., {"lastName":"BARTEL", F. A. A. U. O. L. U. E. I. C. F. S. R. A. T. S., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China.
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perfo...
Peer reviewed
Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. In 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling. doi:10.1145/2631675.2631683
Model-Driven Security (MDS) has emerged for more than a decade, as a specialization of Model-Driv...
Peer reviewed
Hartmann, T., Fouquet, F., Nain, G., Brice, M., Klein, J., & Le Traon, Y. (02 July 2014). Model-based time-distorted Contexts for efficient temporal Reasoning [Poster presentation]. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada.
Intelligent systems continuously analyze their context to autonomously take corrective actions. B...
Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/COMPSAC.2014.61
We consider in this paper the analysis of a large set of malware and benign applications from the...
Peer reviewed
Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., & Le Traon, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. In Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA.
Intelligent systems continuously analyze their context to autonomously take corrective actions. ...
Peer reviewed
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (June 2014). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps [Paper presentation]. ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014).
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, s...
Hartmann, T., Fouquet, F., Klein, J., Nain, G., & Le Traon, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. In Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14).
Smart grids leverage modern information and communication technology to offer new perspectives to...
Peer reviewed
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (12 March 2014). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps [Paper presentation]. Grande Region Security and Reliability Day 2014.
Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2557547.2557587
To address the issue of malware detection, researchers have recently started to investigate the c...
Peer reviewed
El Kateb, D., Fouquet, F., Nain, G., Meira, J. A., Ackerman, M., & Le Traon, Y. (March 2014). Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time [Paper presentation]. 29th Symposium On Applied Computing.
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (26 February 2014). Detecting privacy leaks in Android Apps [Paper presentation]. International Symposium on Engineering Secure Software and Systems - Doctoral Symposium.
The number of Android apps have grown explosively in recent years and the number of apps leaking ...
Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W. Joosen, F. Martinelli, ... T. Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014).
Model-Driven Security (MDS) has emerged as a promising sound methodology for supporting the devel...
Peer reviewed
Abgrall, E., Le Traon, Y., Gombault, S., & Monperrus, M. (2014). Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing. In 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (pp. 34-41). New York, Unknown/unspecified: Ieee. doi:10.1109/ICSTW.2014.63
One of the major threats against web applications is Cross-Site Scripting (XSS). The final target...
Peer reviewed
Bertolino, A., Le Traon, Y., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). Coverage-based Test Cases Selection for XACML Policies. IEEE International Conference on Software Testing Verification and Validation Workshops, 12-21. doi:10.1109/ICSTW.2014.49
XACML is the de facto standard for implementing access control policies. Testing the correctness ...
Peer reviewed
Devroey, X., Perrouin, G., Cordy, M., Papadakis, M., Legay, A., & Schobbens, P.-Y. (2014). A Variability Perspective of Mutation Analysis. In Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014).
Peer reviewed
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2014). Towards a Full Support of Obligations In XACML [Paper presentation]. 9th International Conference on Risks and Security of Internet and Systems.
Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). A Flexible MDE approach to Enforce Fine- grained Security Policies. In Proceedings of the International Symposium on Engineering Secure Software and Systems.
In this paper, we present a policy-based approach for au- tomating the integration of security me...
Peer reviewed
Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). Security@Runtime: A flexible MDE approach to enforce fine-grained security policies. Lecture Notes in Computer Science, 8364 LNCS, 19-34. doi:10.1007/978-3-319-04897-0-2
In this paper, we present a policy-based approach for automating the integration of security mech...
Peer reviewed
Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., Barais, O., & Le Traon, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J. Dingel, W. Schulte, I. Ramos, S. Abrahao, ... E. Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer. doi:10.1007/978-3-319-11653-2_16
Models@run.time provides semantically rich reflection layers enabling intelligent systems to reas...
Peer reviewed
Henard, C., Papadakis, M., & Le Traon, Y. (2014). MutaLog: a Tool for Mutating Logic Formulas. In Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICSTW.2014.54
Peer reviewed
Henard, C., Papadakis, M., & Le Traon, Y. (2014). Mutation-based Generation of Software Product Line Test Configurations. In Symposium on Search-Based Software Engineering (SSBSE 2014). Springer.
Peer reviewed
Lucas Filho, E. R., Cunha De Almeida, E., & Le Traon, Y. (2014). Intra-query Adaptivity for MapReduce Query Processing Systems. In IDEAS 2014 : 18th International Database Engineering Applications Symposium. doi:10.1145/2628194.2628202
Peer reviewed
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants [Poster presentation]. 3ème Conférence en IngénieriE du Logiciel.
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. In ECMFA 2014 European Conference on Modelling Foundations and Applications.
Peer reviewed
Martinez, J., Ziadi, T., Mazo, R., Klein, J., & Le Traon, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. In 2nd IEEE Working Conference on Software Visualization. doi:10.1109/VISSOFT.2014.18
Peer reviewed
Meira, J. A., Almeida, E., & Le Traon, Y. (2014). A state machine for database non-functional testing [Poster presentation]. 18th International Database Engineering & Applications Symposium.
Over the last decade, large amounts of concurrent transactions have been generated from different...
Papadakis, M., Henard, C., & Le Traon, Y. (2014). Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. In 7th International Conference on Software Testing, Verification and Validation (ICST 2014). doi:10.1109/ICST.2014.11
Peer reviewed
Papadakis, M., & Le Traon, Y. (2014). Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach. In ACM Symposium On Applied Computing (SAC'14). doi:10.1145/2554850.2554978
Peer reviewed
Rubab, I., Ali, S., Briand, L., & Le Traon, Y. (2014). Model-Based Testing of Obligations. In 14th Annual International Conference on Quality Software (QSIC) (pp. 1-10). Los Alamitos, Unknown/unspecified: Ieee Computer Soc. doi:10.1109/QSIC.2014.47
Obligations are mandatory actions that users must perform, addressing access control requirements...
Peer reviewed
Ziadi, T., Henard, C., Papadakis, M., Ziane, M., & Le Traon, Y. (2014). Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines. In 29th Symposium on Applied Computing (SAC 2014). doi:10.1145/2554850.2554874
Peer reviewed
Caire, P., Bikakis, A., & Le Traon, Y. (2013). Information Dependencies in MCS: Conviviality-Based Model and Metrics. In 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013).
Peer reviewed
Nguyen, P. H., Klein, J., Kramer, M., & Le Traon, Y. (2013). A Systematic Review of Model-Driven Security. In The 20th Asia-Pacific Software Engineering Conference Proceedings.
To face continuously growing security threats and requirements, sound methodologies for construct...
Peer reviewed
Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. In Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013). doi:10.1109/ISSRE.2013.6698918
Peer reviewed
Moawad, A., Bikakis, A., Caire, P., Nain, G., & Le Traon, Y. (2013). A Rule-based Contextual Reasoning Platform for Ambient Intelligence environments. In Theory, Practice, and Applications of Rules on the Web (pp. 158-172). springer.
The special characteristics and requirements of intelligent environments impose several challenge...
Peer reviewed
Moawad, A., Bikakis, A., Caire, P., Nain, G., & Le Traon, Y. (2013). R-CoRe: A Rule-based Contextual Reasoning Platform for AmI. In Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013).
In this paper we present R-CoRe; a rule-based contextual reasoning platform for Ambient Intellige...
Peer reviewed
Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445
Model-Driven Security is a specialization of Model-Driven Engineering (MDE) that focuses on makin...
Peer reviewed
Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? In EAI International Conference on e-Infrastructure and e-Services for Developing Countries.
In recent years many researchers in Africa and beyond have devoted considerable resources investi...
Peer reviewed
El Kateb, D., ElRakaiby, Y., Mouelhi, T., & Le Traon, Y. (2013). Access Control Enforcement Testing. Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 64-70. doi:10.1109/IWAST.2013.6595793
A policy-based access control architecture comprises Policy Enforcement Points (PEPs), which are ...
Peer reviewed
Elrakaiby, Y., & Le Traon, Y. (2013). A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. In 2013 International Conference on Availability, Reliability and Security. doi:10.1109/ARES.2013.49
Security of Java-based applications is crucial to many businesses today. In this paper, we propos...
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE. doi:10.1109/ICSTW.2013.30
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Multi-objective test generation for software product lines. In 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM. doi:10.1145/2491627.2491635
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). PLEDGE: a product line editor and test generation tool. In 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM. doi:10.1145/2499777.2499778
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Towards automated testing and fixing of re-engineered feature models. In Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA, Unknown/unspecified: IEEE Press.
Peer reviewed
Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., & Le Traon, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis.
Many threats present in smartphones are the result of interactions between application components...
Peer reviewed
Papadakis, M., Delamaro, E. M., & Le Traon, Y. (2013). Proteum/FL: A tool for localizing faults using mutation analysis. In International Working Conference on Source Code Analysis and Manipulation (pp. 94-99). doi:10.1109/SCAM.2013.6648189
Peer reviewed
Papadakis, M., & Le Traon, Y. (2013). Mutation Testing Strategies using Mutant Classification. Abstract book of 28th Symposium On Applied Computing. doi:10.1145/2480362.2480592
Peer reviewed
Hwang, J., Xie, T., El Kateb, D., Mouelhi, T., & Le Traon, Y. (September 2012). Selection of Regression System Tests for Security Policy Evolution [Paper presentation]. 27th IEEE/ACM International Conference Automated Software Engineering 2012.
Bikakis, A., Efthymiou, V., Caire, P., & Le Traon, Y. (2012). Introducing Conviviality as a property of Multi-Context Systems. In The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12.
Peer reviewed
Moawad, A., Efthymiou, V., Caire, P., Nain, G., & Le Traon, Y. (August 2012). Introducing Conviviality as a New Paradigm for Interactions among IT Objects. Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments, 907, 3-8.
The Internet of Things allows people and objects to seamlessly interact, crossing the bridge betw...
Peer reviewed
Perrouin, G., Morin, B., Chauvel, F., Fleurey, F., Klein, J., Le Traon, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. In New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press.
Modern software systems need to be continuously available under varying conditions. Their ability...
Peer reviewed
El Kateb, D., Elrakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Access Control Enforcement Testing. In 8th International Workshop on Automation of Software Test (AST), 2013 (pp. 64-70).
A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which ar...
Peer reviewed
El Kateb, D., Mouelhi, T., Le Traon, Y., Hwang, J., & Xie, T. (2012). Refactoring access control policies for performance improvement. In Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (pp. 323--334). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2188286.2188346
Peer reviewed
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. In IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4). doi:10.1145/2351676.2351722
In the permission-based security model (used e.g. in An- droid and Blackberry), applications ca...
Peer reviewed
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. In ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). doi:10.1145/2259051.2259056
This paper introduces Dexpler, a software package which converts Dalvik bytecode to Jimple. Dexpl...
Peer reviewed
El Rakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Testing Obligation Policy Enforcement using Mutation Analysis. Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012), 100-110.
The support of obligations with access control policies allows the expression of more sophisticat...
Peer reviewed
Elkateb, D., Mouelhi, T., Le Traon, Y., Hwang, J., & Xie, T. (2012). Refactoring Access Control Policies for Performance Improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012), 100-110.
In order to facilitate managing authorization, access control architectures are designed to separ...
Peer reviewed
Elrakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Testing obligation policy enforcement using mutation analysis. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, 673-680. doi:10.1109/ICST.2012.157
The support of obligations with access control policies allows the expression of more sophisticat...
Peer reviewed
Meira, J. A., Almeida, E. C., Le Traon, Y., & Sunye, G. (2012). Peer-to-Peer Load Testing. In Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (pp. 642-647). IEEE. doi:10.1109/ICST.2012.153
Nowadays the large-scale systems are common-place in any kind of applications. The popularity of ...
Peer reviewed
Papadakis, M., & Le Traon, Y. (2012). Using Mutants to Locate "Unknown" Faults. In ICST 2012. doi:10.1109/ICST.2012.159
Peer reviewed
Xu, D., Thomas, L., Kent, M., Mouelhi, T., & Le Traon, Y. (2012). A Model-Based Approach to Automated Testing of Access Control Policies. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 100-110. doi:10.1145/2295136.2295173
Access control policies in software systems can be implemented incorrectly for various reasons. T...
Peer reviewed
Bartel, A., Baudry, B., Munoz, F., Klein, J., Mouelhi, T., & Le Traon, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24
Dynamically Adaptive Systems modify their behavior and structure in response to changes in their ...
Peer reviewed
Perrouin, G., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation. doi:10.1109/ICST.2010.43
Peer reviewed