Members
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Articles in International Peer-Reviewed Journals

  • 1F. Biondi, T. Given-Wilson, A. Legay.
    Attainable Unconditional Security for Shared-Key Cryptosystems, in: Information Sciences, September 2016.
    https://hal.inria.fr/hal-01378640
  • 2N. Janati, G. Bouffard, J.-L. Lanet, S. Elhajji.
    Trust Can be Misplaced, in: Journal of Cryptographic Engineering, 2016. [ DOI : 10.1007/s13389-016-0142-5 ]
    https://hal.inria.fr/hal-01405463
  • 3C. Jegourel, A. Legay, S. Sedwards.
    Command-based importance sampling for statistical model checking, in: Theoretical Computer Science, 2016, vol. 649, pp. 1 - 24.
    https://hal.inria.fr/hal-01387299
  • 4J. H. Kim, A. Legay, L.-M. Traonouez, A. Boudjadar, U. Nyman, K. G. Larsen, I. Lee, J.-Y. Choi.
    Optimizing the Resource Requirements of Hierarchical Scheduling Systems, in: ACM SIGBED Review, June 2016, vol. 13, no 3, pp. 41 - 48. [ DOI : 10.1145/2983185.2983192 ]
    https://hal.inria.fr/hal-01406459
  • 5T. T. H. Le, R. Passerone, U. Fahrenberg, A. Legay.
    A Tag Contract Framework for Modeling Heterogeneous Systems, in: Science of Computer Programming, January 2016.
    https://hal.inria.fr/hal-01406446
  • 6T. T. H. Le, R. Passerone, U. Fahrenberg, A. Legay.
    Contract-Based Requirement Modularization via Synthesis of Correct Decompositions, in: Theory of Computing Systems, May 2016, vol. 15. [ DOI : 10.1145/2885752 ]
    https://hal.inria.fr/hal-01406481
  • 7A. Legay, L.-M. Traonouez.
    Statistical Model Checking with Change Detection, in: Foundations for Mastering Change, September 2016.
    https://hal.archives-ouvertes.fr/hal-01242138
  • 8F. Mozhdeh, J.-L. Lanet.
    Chronicle of a Java Card Death, in: Journal of Computer Virology and Hacking Techniques, 2016. [ DOI : 10.1007/s11416-016-0276-0 ]
    https://hal.inria.fr/hal-01385197
  • 9A. Nouri, M. Bozga, A. Molnos, A. Legay, S. Bensalem.
    ASTROLABE: A Rigorous Approach for System-Level Performance Modeling and Analysis, in: ACM Transactions on Embedded Computing Systems (TECS), May 2016. [ DOI : 10.1145/2885498 ]
    https://hal.inria.fr/hal-01406474

Invited Conferences

  • 10A. Legay, S. Sedwards, L.-M. Traonouez.
    Rare Events for Statistical Model Checking: An Overview, in: Reachability Problems, Aalborg, Denmark, September 2016, vol. 9899, pp. 23 - 35.
    https://hal.inria.fr/hal-01387406

International Conferences with Proceedings

  • 11A. Arnold, M. Baleani, A. Ferrari, M. Marazza, V. Senni, A. Legay, J. Quilbeuf, C. Etzien.
    An Application of SMC to continuous validation of heterogeneous systems, in: Simutools 2016 - Ninth EAI International Conference on Simulation Tools and Techniques, Prague, Czech Republic, August 2016.
    https://hal.inria.fr/hal-01390487
  • 12F. Biondi, A. Legay.
    Security and Privacy of Protocols and Software with Formal Methods, in: 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, Kommeno, Greece, October 2016.
    https://hal.inria.fr/hal-01378645
  • 13J. Burdges, F. Dold, C. Grothoff, M. Stanisci.
    Taler: Usable, privacy-preserving payments for the Web, in: HotPETS 2016 - Workshop on Hot Topics in Privacy Enhancing Technologies, Darmstadt , Germany, June 2016.
    https://hal.inria.fr/hal-01398201
  • 14E. Cavalcante, J. Quilbeuf, L.-M. Traonouez, F. Oquendo, T. Batista, A. Legay.
    Statistical Model Checking of Dynamic Software Architectures, in: ECSA 2016 - 10th European Conference on Software Architecture, Copenhague, Denmark, Proceedings of the 2016 European Conference of Software Architecture, November 2016.
    https://hal.inria.fr/hal-01390707
  • 15M. Chadli, J. H. Kim, A. Legay, L.-M. Traonouez, S. Naujokat, B. Steffen, K. G. Larsen.
    A Model-Based Framework for the Specification and Analysis of Hierarchical Scheduling Systems, in: FMICS-AVoCS, Pise, Italy, Critical Systems: Formal Methods and Automated Verification, Springer, September 2016, vol. 9933, pp. 133 - 141. [ DOI : 10.1007/978-3-319-45943-1_9 ]
    https://hal.archives-ouvertes.fr/hal-01241681
  • 16D. Couroussé, T. Barry, B. Robisson, P. Jaillon, O. Potin, J.-L. Lanet.
    Runtime Code Polymorphism as a Protection Against Side Channel Attacks, in: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Greece, Information Security Theory and Practice, September 2016, vol. 9895, pp. 136-152. [ DOI : 10.1007/978-3-319-45931-8_9 ]
    https://hal-emse.ccsd.cnrs.fr/emse-01372223
  • 17P. R. D'Argenio, A. Hartmanns, A. Legay, S. Sedwards.
    Statistical Approximation of Optimal Schedulers for Probabilistic Timed Automata, in: Integrated Formal Methods, Reykjavik, Iceland, June 2016, vol. 9681, pp. 99-114.
    https://hal.inria.fr/hal-01387362
  • 18X. Devroey, G. Perrouin, A. Legay, P.-Y. Schobbens, P. Heymans.
    Search-based Similarity-driven Behavioural SPL Testing, in: VaMoS '16 - Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, ACM, January 2016, pp. 89 - 96. [ DOI : 10.1145/2866614.2866627 ]
    https://hal.inria.fr/hal-01406585
  • 19X. Devroey, G. Perrouin, M. Papadakis, A. Legay, P.-Y. Schobbens, P. Heymans.
    Featured model-based mutation analysis, in: ICSE '16 - 38th International Conference on Software Engineering, Austin, United States, May 2016, pp. 655 - 666. [ DOI : 10.1145/2884781.2884821 ]
    https://hal.inria.fr/hal-01406512
  • 20O. Gadyatskaya, R. Rydhof Hansen, K. G. Larsen, A. Legay, M. C. Olesen, D. B. Poulsen.
    Modelling Attack-defense Trees Using Timed Automata, in: FORMATS 2016 -14th International Conference on Formal Modelling and Analysis of Timed Systems, Quebec City, Canada, August 2016, pp. 35 - 50. [ DOI : 10.1007/978-3-319-44878-7_3 ]
    https://hal.inria.fr/hal-01406706
  • 21Á. García-Recuero, J. Burdges, C. Grothoff.
    Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks, in: 11th International ESORICS Workshop in Data Privacy Management, DPM 2016, Heraklion, Crete, Greece, G. Livraga, V. Torra, A. Aldini, F. Martinelli, N. Suri (editors), Springer Lecture Notes in Computer Science (LNCS) series, Springer, September 2016, vol. 9963, pp. 78-93. [ DOI : 10.1007/978-3-319-47072-6_6 ]
    https://hal.inria.fr/hal-01355951
  • 22T. Given-Wilson, A. Legay.
    On the Expressiveness of Symmetric Communication, in: Theoretical Aspects of Computing – ICTAC 2016, Taipei, Taiwan, October 2016, vol. 9965, pp. 139-157. [ DOI : 10.1007/978-3-319-46750-4_9 ]
    https://hal.inria.fr/hal-01241839
  • 23A. Heuser, S. Picek, S. Guilley, N. Mentens.
    Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, in: RFIDSec 2016: 12th Workshop on RFID and IoT Security, Hong Kong, Hong Kong SAR China, November 2016.
    https://hal.inria.fr/hal-01402238
  • 24Y. Kawamoto, F. Biondi, A. Legay.
    Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, in: FM 2016 - 21st International Symposium on Formal Methods, Limassol, Cyprus, November 2016.
    https://hal.inria.fr/hal-01378675
  • 25J. H. Kim, A. Legay, L.-M. Traonouez, M. Acher, S. Kang.
    A Formal Modeling and Analysis Framework for Software Product Line of Preemptive Real-Time Systems, in: Symposium on Applied Computing, Pise, Italy, Proceedings of the 31st Annual ACM Symposium on Applied Computing, ACM, April 2016, pp. 1562 - 1565. [ DOI : 10.1145/2851613.2851977 ]
    https://hal.archives-ouvertes.fr/hal-01241673
  • 26K. G. Larsen, A. Legay.
    On the Power of Statistical Model Checking, in: 7th International Symposium, ISoLA 2016, Corfu, Greece, October 2016, pp. 843 - 862. [ DOI : 10.1007/978-3-319-47169-3_62 ]
    https://hal.inria.fr/hal-01406537
  • 27H. Le Bouder, T. Barry, D. Couroussé, J.-L. Lanet, R. Lashermes.
    A Template Attack Against VERIFY PIN Algorithms, in: SECRYPT 2016, Lsbonne, Portugal, July 2016, pp. 231 - 238. [ DOI : 10.5220/0005955102310238 ]
    https://hal.inria.fr/hal-01383143
  • 28H. Le Bouder, R. Lashermes, Y. Linge, G. Thomas, J.-Y. Zie.
    A Multi-Round Side Channel Attack on AES using Belief Propagation, in: FPS 2016, Québec, Canada, October 2016.
    https://hal.inria.fr/hal-01405793
  • 29A. Legay, S. Sedwards, L.-M. Traonouez.
    Plasma Lab: A Modular Statistical Model Checking Platform, in: ISoLA, Corfou, Greece, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, Springer, October 2016, vol. 9952, pp. 77 - 93. [ DOI : 10.1007/978-3-319-47166-2_6 ]
    https://hal.inria.fr/hal-01387435
  • 30R. Lounas, N. JAFRI, A. Legay, M. Mezghiche, J.-L. Lanet.
    A Formal Verification of Safe Update Point Detection in Dynamic Software Updating, in: International Conference on Risks and Security of Internet and Systems, Roscoff, France, LNCS, Telecom Bretagne, September 2016.
    https://hal.inria.fr/hal-01405467
  • 31R. Lounas, N. JAFRI, A. Legay, M. Mezghiche, J.-L. Lanet.
    A Formal Verification of Safe Update Point Detection in Dynamic Software Updating, in: The 11th International Conference on Risks and Security of Internet and Systems (CRiSIS 2016), Roscoff, France, September 2016.
    https://hal.inria.fr/hal-01400051
  • 32A. Mesbah, L. Regnaud, J.-L. Lanet, M. Mezghiche.
    The Hell Forgery, Polymorphic Codes Shoot Again, in: 15th Smart Card Research and Advanced Application Conference, Cannes, France, Aurélien Francillon, November 2016.
    https://hal.inria.fr/hal-01385202
  • 33F. Mozhdeh, J.-L. Lanet.
    Paper Tiger, an endless fight, in: SecITC 9th International Conference on Security for Information Technology and Communications, Bucarest, Romania, Innovative Security Solutions for Information Technology and Communications, June 2016, vol. LNCS, no 10006. [ DOI : 10.1007/978-3-319-47238-6 ]
    https://hal.inria.fr/hal-01385201
  • 34A. Mrabet, N. El-Mrabet, R. Lashermes, J.-B. Rigaud, B. Bouallegue, S. Mesnager, M. Machhout.
    High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication, in: CRiSIS 2016, Roscoff, France, September 2016.
    https://hal.inria.fr/hal-01383162
  • 35V. C. Ngo, A. Legay, V. Joloboff.
    PSCV: A Runtime Verification Tool for Probabilistic SystemC Models, in: CAV 2016 - 28th International Conference on Computer Aided Verification, Toronto, Canada, S. Chaudhuri, A. Farzan (editors), LNCS - Lecture Notes in Computer Science, Springer, July 2016, vol. 9779, pp. 84 - 91. [ DOI : 10.1007/978-3-319-41528-4_5 ]
    https://hal.inria.fr/hal-01406488
  • 36A. Nouri, M. Bozga, A. Legay, S. Bensalem.
    Performance Evaluation of Complex Systems Using the SBIP Framework, in: he International Conference on Verification and Evaluation of Computer and Communication Systems (VECoS), Tunis, Tunisia, October 2016.
    https://hal.inria.fr/hal-01406591
  • 37R. Olaechea, U. Fahrenberg, J. M. Atlee, A. Legay.
    Long-term average cost in featured transition systems, in: SPLC '16 - 20th International Systems and Software Product Line Conference, Beijing, China, ACM, September 2016, pp. 109 - 118. [ DOI : 10.1145/2934466.2934473 ]
    https://hal.inria.fr/hal-01406541
  • 38R. Olaechea, U. Fahrenberg, M. Joanne, A. Legay.
    Long-Term Average Cost in Featured Transition Systems, in: the 20th International Systems and Software Product Line Conference, Beijing, China, September 2016.
    https://hal.inria.fr/hal-01406606
  • 39F. Oquendo, J. Buisson, E. Leroux, G. Moguérou, J. Quilbeuf.
    The SoS Architect Studio: Toolchain for the Formal Architecture Description and Analysis of Software-intensive Systems-of-Systems with SosADL, in: Proceedings of the ECSA International Colloquium on Software-intensive Systems-of-Systems (SiSoS), Copenhagen, Denmark, November 2016.
    https://hal.archives-ouvertes.fr/hal-01443130
  • 40G. Perrouin, M. Amrani, M. Acher, B. Combemale, A. Legay, P.-Y. Schobbens.
    Featured model types: Towards Systematic Reuse in Modelling Language Engineering, in: MiSE '16 - 8th International Workshop on Modeling in Software Engineering, New york, United States, ACM, May 2016, pp. 1 - 7. [ DOI : 10.1145/2896982.2896987 ]
    https://hal.inria.fr/hal-01406507
  • 41J. Quilbeuf, E. Cavalcante, L.-M. Traonouez, F. Oquendo, T. Batista, A. Legay.
    A Logic for the Statistical Model Checking of Dynamic Software Architectures, in: ISoLA, Corfou, Greece, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, Springer, October 2016, vol. 9952, pp. 806 - 820. [ DOI : 10.1007/978-3-319-47166-2_56 ]
    https://hal.inria.fr/hal-01387429
  • 42M. H. Ter Beek, A. Legay, A. Lluch Lafuente, A. Vandin.
    Statistical Model Checking for Product Lines , in: 7th International Symposium, ISoLA 2016, Corfu, Greece, October 2016.
    https://hal.inria.fr/hal-01406531
  • 43N. H. Walfield, J. L. Griffin, C. Grothoff.
    A Quantitative Analysis of Cell Tower Trace Data for Understanding Human Mobility and Mobile Networks, in: 6th International Workshop on Mobile Entity Localization, Tracking and Analysis (MELT), San Francisco, United States, October 2016. [ DOI : 10.1145/1235 ]
    https://hal.inria.fr/hal-01378622

Conferences without Proceedings

  • 44M. Boizard, J.-L. Lanet.
    Internet des objets : la nouvelle fragilité ? : Atelier, in: Forum international de la cybersécurité, Lille, France, Région Nord-Pas de Calais, Euratechnologies, la Gendarmerie nationale, CEIS, January 2016.
    https://halshs.archives-ouvertes.fr/halshs-01259237
  • 45D. Couroussé, J.-L. Lanet, B. Robisson, T. Barry, P. Jaillon.
    COGITO: Génération de code au runtime pour la sécurité des systèmes embarqué, in: Ressi 2016, Toulouse, France, May 2016.
    https://hal.inria.fr/hal-01405776
  • 46J. Duchêne, C. Le Guernic, E. Alata, V. Nicomette, M. Kaâniche.
    Protocol reverse engineering: Challenges and obfuscation, in: The 11th International Conference on Risks and Security of Internet and Systems, Roscoff, France, September 2016.
    https://hal.inria.fr/hal-01388060
  • 47M. GRAA, F. Cuppens, N. Cuppens-Boulahia, J.-L. Lanet.
    Tracking explicit and control flows in Java and native Android apps code,, in: ICISSP 2016 : 2nd International Conference on Information Systems Security and Privacy,, Roma, Italy, February 2016.
    https://hal.inria.fr/hal-01385196
  • 48Á. García-Recuero.
    Discouraging Abusive Behavior in Privacy-Preserving Online Social Networking Applications, in: In 25th International World Wide Web Conference, Montréal, Canada, April 2016, vol. WWW Companion Volume.
    https://hal.inria.fr/hal-01272654
  • 49C. Jegourel, K. G. Larsen, A. Legay, M. Mikučionis, D. B. Poulsen, S. Sedwards.
    Importance Sampling for Stochastic Timed Automata, in: Dependable Software Engineering: Theories, Tools, and Applications, Beijing, China, November 2016.
    https://hal.inria.fr/hal-01387293
  • 50V. C. Ngo, A. Legay, J. Quilbeuf.
    Statistical Model Checking for SystemC Models, in: High Assurance Systems Engineering Symposium, Orlando, Florida, United States, January 2016.
    https://hal.inria.fr/hal-01238162
  • 51A. Palisse, A. Durand, J.-L. Lanet.
    Malware’O’Matic a platform to analyze Malware, in: French Japanese workshop on CyberSecurity, Rennes, France, Inria, September 2016.
    https://hal.inria.fr/hal-01405636
  • 52A. Palisse, J.-L. Lanet.
    Analyse et détection de logiciels malveillants, , in: Ressi 2016, Toulouse, France, May 2016.
    https://hal.inria.fr/hal-01405627
  • 53A. Palisse, H. Le Bouder, C. Le Guernic, A. Legay, J.-L. Lanet.
    Ransomware and the Legacy Crypto API, in: The 11th International Conference on Risks and Security of Internet and Systems, Roscoff, France, September 2016.
    https://hal.inria.fr/hal-01388056

Scientific Books (or Scientific Book chapters)

Books or Proceedings Editing

  • 55F. Oquendo, M. Ali Babar, K. Drira, A. Legay (editors)
    Proceedings of the European Colloquium on Software-intensive Systems-of-Systems (ECSoS 2016), ACM DL, Copenhagen, Denmark, December 2016.
    https://hal.archives-ouvertes.fr/hal-01445339
  • 56F. Oquendo, K. Drira, A. Legay, T. Batista (editors)
    Proceedings of the 1st ACM SAC Conference Track on Software-intensive Systems-of-Systems (SiSoS 2017): 32nd ACM SIGAPP Symposium On Applied Computing, ACM, Marrakesh, Morocco, April 2017.
    https://hal.archives-ouvertes.fr/hal-01445350

Scientific Popularization

Other Publications

  • 62F. Biondi, M. Chadli, T. Given-Wilson, A. Legay.
    Information Leakage as a Scheduling Resource, October 2016, working paper or preprint.
    https://hal.inria.fr/hal-01382052
  • 63F. Biondi, T. Given-Wilson, A. Legay.
    Attainable Unconditional Security for Shared-Key Cryptosystems, April 2016, working paper or preprint.
    https://hal.inria.fr/hal-01233185
  • 64Q. Cappart, C. Limbrée, P. Schaus, J. Quilbeuf, L.-M. Traonouez, A. Legay.
    Verification of interlocking systems using statistical model checking, November 2016, working paper or preprint.
    https://hal.inria.fr/hal-01398649
  • 65U. Fahrenberg, A. Legay.
    A Linear-Time–Branching-Time Spectrum of Behavioral Specification Theories, October 2016, We propose behavioral specification theories for most equivalences in the linear-time–branching-time spectrum.
    https://hal.inria.fr/hal-01406603
  • 66T. Given-Wilson, N. JAFRI, J.-L. Lanet, A. Legay.
    An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries, January 2017, working paper or preprint.
    https://hal.inria.fr/hal-01400283
  • 67A. Heuser, S. Picek, S. Guilley, N. Mentens.
    Side-channel Analysis of Lightweight Ciphers: Current Status and Future Directions, October 2016, Lightweight Cryptography Workshop 2016.
    https://hal.inria.fr/hal-01407264
  • 68Y. Kawamoto, F. Biondi, A. Legay.
    Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, September 2016, working paper or preprint.
    https://hal.inria.fr/hal-01241360
References in notes
  • 69M. Duranton, K. De Bosschere, C. Gamrat, J. Maebe, H. Munk, O. Zendra.
    HiPEAC (High Performance and Embedded Architecture and Compilation) Vision 2017, December 2016, pp. 1–137, working document, to be published early 2017.
    https://www.hipeac.net/v17
  • 70A. Legay, L.-M. Traonouez.
    Statistical Model Checking of Simulink Models with Plasma Lab, in: Fourth International Workshop on Formal Techniques for Safety-Critical Systems, Paris, France, November 2015.
    https://hal.archives-ouvertes.fr/hal-01241249
  • 71A. Savary, M. Frappier, M. Leuschel, J. Lanet.
    Model-Based Robustness Testing in Event-B Using Mutation, in: Software Engineering and Formal Methods - 13th International Conference, SEFM 2015, York, UK, September 7-11, 2015. Proceedings, R. Calinescu, B. Rumpe (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9276, pp. 132–147.
    http://dx.doi.org/10.1007/978-3-319-22969-0_10