Members
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1M. Abadi, V. Cortier.
    Deciding knowledge in security protocols under equational theories, in: Theoretical Computer Science, November 2006, vol. 387, no 1-2, pp. 2-32.
  • 2A. Armando, W. Arsac, T. Avanesov, M. Barletta, A. Calvi, A. Cappai, R. Carbone, Y. Chevalier, L. Compagna, J. Cuéllar, G. Erzse, S. Frau, M. Minea, S. Mödersheim, D. von Oheimb, G. Pellegrino, S. E. Ponta, M. Rocchetto, M. Rusinowitch, M. T. Dashti, M. Turuani, L. Viganò.
    The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures, in: Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, Lecture Notes in Computer Science, Springer, 2012, vol. 7214, pp. 267–282.
  • 3Y. Boichut, R. Courbis, P.-C. Héam, O. Kouchnarenko.
    Finer is better: Abstraction Refinement for Rewriting Approximations, in: 19th International Conference on Rewriting Techniques and Applications - RTA'2008, Hagenberg, Austria, A. Voronkov (editor), Lecture Notes in Computer Science, Springer, 2008, vol. 5117, pp. 48-62.
  • 4R. Chadha, S. Ciobaca, S. Kremer.
    Automated Verification of Equivalence Properties of Cryptographic Protocols, in: Programming Languages and Systems - 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, H. Seidl (editor), Lecture Notes in Computer Science, Springer, 2012, vol. 7211, pp. 108–127.
  • 5V. Cortier, B. Smyth.
    Attacking and fixing Helios: An analysis of ballot secrecy, in: Journal of Computer Security, 2013, vol. 21, no 1, pp. 89–148.
  • 6F. Dadeau, P.-C. Héam, R. Kheddam.
    Mutation-Based Test Generation from Security Protocols in HLPSL, in: 4th International Conference on Software Testing Verification and Validation (ICST'2011), Berlin, Germany, M. Harman, B. Korel (editors), IEEE Computer Society Press, March 2011. [ DOI : 10.1109/ICST.2011.42 ]
    http://hal.inria.fr/inria-00559850/en
  • 7A. Giorgetti, J. Groslambert, J. Julliand, O. Kouchnarenko.
    Verification of Class Liveness Properties with Java Modelling Language, in: IET Software, 2008, vol. 2, no 6, pp. 500-514.
  • 8E. Nicolini, C. Ringeissen, M. Rusinowitch.
    Combinable Extensions of Abelian Groups, in: Proc. of 22nd International Conference on Automated Deduction, CADE-22, Montreal, Canada, R. Schmidt (editor), Lecture Notes in Artificial Intelligence, Springer, 2009, vol. 5663, pp. 51–66.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 13S. Anantharaman, C. Bouchard, P. Narendran, M. Rusinowitch.
    Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining, in: Logical Methods in Computer Science, 2014, vol. 10, no 1:5, pp. 1-26. [ DOI : 10.2168/LMCS-10(1:5)2014 ]
    https://hal.archives-ouvertes.fr/hal-00854841
  • 14M. Arapinis, S. Delaune, S. Kremer.
    Dynamic Tags for Security Protocols, in: Logical Methods in Computer Science (LMCS), June 2014, vol. 10, no 2, 50 p. [ DOI : 10.2168/LMCS-10(2:11)2014 ]
    https://hal.inria.fr/hal-01090766
  • 15M. Arnaud, V. Cortier, S. Delaune.
    Modeling and Verifying Ad Hoc Routing Protocols, in: Information and Computation, 2014, vol. 238, 38 p, forthcoming.
    https://hal.inria.fr/hal-00881009
  • 16W. Belkhir, Y. Chevalier, M. Rusinowitch.
    Parametrized automata simulation and application to service composition, in: Journal of Symbolic Computation, September 2014, 21 p.
    https://hal.inria.fr/hal-01089128
  • 17W. Belkhir, A. Giorgetti, M. Lenczner.
    A Symbolic Transformation Language and its Application to a Multiscale Method, in: Journal of Symbolic Computation, November 2014, vol. 65, pp. 49 - 78.
    https://hal.inria.fr/hal-00917323
  • 18J. Cantenot, F. Ambert, F. Bouquet.
    Test generation with SMT solvers in Model Based Testing, in: Journal of Software Testing, Verification, and Reliability, 2014, vol. 24, no 7, 33 p. [ DOI : 10.1002/stvr.1537 ]
    https://hal.inria.fr/hal-01093461
  • 19A. Cherif, A. Imine, M. Rusinowitch.
    Practical access control management for distributed collaborative editors, in: Pervasive and Mobile Computing, December 2014, pp. 62-86.
    https://hal.archives-ouvertes.fr/hal-01094068
  • 20V. Cortier, G. Steel.
    A Generic Security API for Symmetric Key Management on Cryptographic Devices, in: Information and Computation, 2014, vol. 238, 25 p.
    https://hal.inria.fr/hal-00881072
  • 21F. Dadeau, P.-C. Héam, R. Kheddam, G. Maatoug, M. Rusinowitch.
    Model-based mutation testing from security protocols in HLPSL, in: Journal of Software Testing, Verification, and Reliability, April 2014, 30 p. [ DOI : 10.1002/stvr.1531 ]
    https://hal.inria.fr/hal-01090881
  • 22Ö. Dagdelen, D. Galindo, P. Véron, S. M. El Yousfi Alaoui, P.-L. Cayrel.
    Extended security arguments for signature schemes, in: Designs, Codes and Cryptography, September 2014, 23 p. [ DOI : 10.1007/s10623-014-0009-7 ]
    https://hal.inria.fr/hal-01091185
  • 23A. Dreyfus, P.-C. Héam, O. Kouchnarenko, C. Masson.
    A random testing approach using pushdown automata, in: Journal of Software Testing, Verification, and Reliability, 2014, vol. 24, pp. 656 - 683. [ DOI : 10.1002/stvr.1526 ]
    https://hal.inria.fr/hal-01088712
  • 24D. Galindo.
    Compact hierarchical identity-based encryption based on a harder decisional problem, in: International Journal of Computer Mathematics, April 2014. [ DOI : 10.1080/00207160.2014.912278 ]
    https://hal.inria.fr/hal-01011299
  • 25D. Galindo, S. Vivek.
    Limits of a conjecture on a leakage-resilient cryptosystem, in: Information Processing Letters, April 2014, vol. 114, no 4, pp. 192-196. [ DOI : 10.1016/j.ipl.2013.11.014 ]
    https://hal.inria.fr/hal-00933429
  • 26S. Kremer, V. Cortier.
    Formal Models and Techniques for Analyzing Security Protocols: A Tutorial, in: Foundations and Trends in Programming Languages, September 2014, vol. 1, no 3, 117 p. [ DOI : 10.1561/2500000001 ]
    https://hal.inria.fr/hal-01090874
  • 27A. Randolph, H. Boucheneb, A. Imine, A. Quintero.
    On Synthesizing a Consistent Operational Transformation Approach, in: IEEE Transactions on Computers, February 2015, 1 p.
    https://hal.archives-ouvertes.fr/hal-01094030
  • 28E. Tushkanova, A. Giorgetti, C. Ringeissen, O. Kouchnarenko.
    A rule-based system for automatic decidability and combinability, in: Science of Computer Programming, March 2015, vol. 99, pp. 3-23. [ DOI : 10.1016/j.scico.2014.02.005 ]
    https://hal.inria.fr/hal-01102883
  • 29B. Yang, W. Belkhir, M. Lenczner.
    Computer-Aided Derivation of Multi-scale Models: A Rewriting Framework, in: International Journal for Multiscale Computational Engineering, January 2014, vol. 12, no 2, pp. 91–114.
    https://hal.inria.fr/hal-00916568

Articles in National Peer-Reviewed Journals

  • 30A. Randolph, A. Imine, H. Boucheneb, A. Quintero.
    Spécification et Analyse d’un Protocole de Contrôle d’Accès Optimiste pour Éditeurs Collaboratifs Répartis, in: ISI (Ingénierie des Systèmes d'information), January 2015, 1 p.
    https://hal.archives-ouvertes.fr/hal-01093982

Invited Conferences

  • 31V. Cortier.
    Electronic Voting: How Logic Can Help, in: 12th International Joint Conference on Automated Reasoning (IJCAR 2014), Vienne, Austria, July 2014.
    https://hal.inria.fr/hal-01080294
  • 32M. Rusinowitch.
    Automated Verification of Security Protocols and Services , in: Third International Seminar on Program Verification, Automated Debugging and Symbolic Computation, Vienna, Austria, Tudor Jebelean; Wei Li ; Dongming Wang, July 2014.
    https://hal.inria.fr/hal-01090000

International Conferences with Proceedings

  • 33W. Belkhir, G. Rossi, M. Rusinowitch.
    A Parametrized Propositional Dynamic Logic with Application to Service Synthesis, in: Advances in Modal Logic, Groningen, Netherlands, Advances in Modal Logic, August 2014, vol. 10, pp. 34-53.
    https://hal.inria.fr/hal-01087829
  • 34H. Bride, O. Kouchnarenko, F. Peureux.
    Verifying Modal Workflow Specifications Using Constraint Solving, in: IFM - The 11th International Conference on Integrated Formal Methods, Bertinoro, Italy, LNCS, September 2014, no 8739, pp. 171 - 186. [ DOI : 10.1007/978-3-319-10181-1_11 ]
    https://hal.inria.fr/hal-01091283
  • 35V. Cheval, V. Cortier.
    Timing attacks in security protocols: symbolic framework and proof techniques, in: 4th Conference on Principles of Security and Trust (POST 2015), Londres, United Kingdom, April 2015.
    https://hal.inria.fr/hal-01103618
  • 36P. Chocron, P. Fontaine, C. Ringeissen.
    A Gentle Non-Disjoint Combination of Satisfiability Procedures, in: Automated Reasoning - 7th International Joint Conference, IJCAR 2014, Held as Part of the Vienna Summer of Logic, Vienna, Austria, Lecture Notes in Computer Science, Springer, July 2014, vol. 8562, pp. 122-136. [ DOI : 10.1007/978-3-319-08587-6_9 ]
    https://hal.inria.fr/hal-01087162
  • 37P. Chocron, P. Fontaine, C. Ringeissen.
    Satisfiability Modulo Non-Disjoint Combinations of Theories Connected via Bridging Functions, in: Workshop on Automated Deduction: Decidability, Complexity, Tractability, ADDCT 2014. Held as Part of the Vienna Summer of Logic, affiliated with IJCAR 2014 and RTA 2014, Vienna, Austria, Silvio Ghilardi, Ulrike Sattler, Viorica Sofronie-Stokkermans, July 2014.
    https://hal.inria.fr/hal-01087218
  • 38R. Chrétien, V. Cortier, S. Delaune.
    Typing messages for free in security protocols: the case of equivalence properties, in: 25th International Conference on Concurrency Theory (CONCUR'14), Rome, Italy, September 2014.
    https://hal.inria.fr/hal-01080293
  • 39V. Cortier, F. Eigner, S. Kremer, M. Maffei, C. Wiedling.
    Type-Based Verification of Electronic Voting Protocols, in: 4th Conference on Principles of Security and Trust (POST), London, United Kingdom, Springer, 2015.
    https://hal.inria.fr/hal-01103545
  • 40V. Cortier, D. Galindo, S. Glondu, M. Izabachène.
    Election Verifiability for Helios under Weaker Trust Assumptions, in: Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), Wroclaw, Poland, September 2014.
    https://hal.inria.fr/hal-01080292
  • 41F. Dadeau, K. Cabrera Castillos, J. Julliand.
    Coverage Criteria for Model-Based Testing using Property Patterns, in: MBT 2014, 9th Workshop on Model-Based Testing, Satellite workshop of ETAPS 2014, Grenoble, France, A. K. Petrenko, B.-H. Schlingloff (editors), EPTCS, Electronic Proceedings in Theoretical Computer Science, April 2014, vol. 141, 15 p. [ DOI : 10.4204/EPTCS.141.3 ]
    https://hal.inria.fr/hal-01089687
  • 42S. Erbatur, D. Kapur, A. Marshall, C. Meadows, P. Narendran, C. Ringeissen.
    On Asymmetric Unification and the Combination Problem in Disjoint Theories, in: Foundations of Software Science and Computation Structures - 17th International Conference, FOSSACS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS, Grenoble, France, Lecture Notes in Computer Science, Springer, April 2014, no 8412, 15 p. [ DOI : 10.1007/978-3-642-54830-7_18 ]
    https://hal.inria.fr/hal-01087065
  • 44A. Hammad, F. Bouquet, J.-M. Gauthier, D. Gendreau.
    Modeling and simulation of modular complex system: Application to air-jet conveyor, in: Advanced Intelligent Mechatronics (AIM), Besançon, France, AIM 2014, IEEE/ASME Int. Conf. on Advanced Intelligent Mechatronics, IEEE, July 2014, 6 p. [ DOI : 10.1109/AIM.2014.6878244 ]
    https://hal.inria.fr/hal-01093474
  • 45S. Kremer, R. Künnemann.
    Automated Analysis of Security Protocols with Global State, in: 35th IEEE Symposium on Security and Privacy (S&P'14), San Jose, United States, I. C. Society (editor), 2014, pp. 163–178. [ DOI : 10.1109/SP.2014.18 ]
    https://hal.inria.fr/hal-01091241
  • 46A. Lanoix, O. Kouchnarenko.
    Component Substitution through Dynamic Reconfigurations, in: 11th International Workshop on Formal Engineering approaches to Software Components and Architectures, Satellite event of ETAPS, Grenoble, France, April 2014, 14 p.
    https://hal.archives-ouvertes.fr/hal-00935129
  • 48H. H. Nguyen, A. Imine, M. Rusinowitch.
    Enforcing Privacy in Decentralized Mobile Social Networks, in: ESSoS Doctoral Symposium 2014, Munich, Germany, February 2014.
    https://hal.inria.fr/hal-01092447
  • 49G. Petiot, N. Kosmatov, A. Giorgetti, J. Julliand.
    How Test Generation Helps Software Specification and Deductive Verification in Frama-C, in: Tests and Proofs, York, United Kingdom, M. Seidl, N. Tillmann (editors), Lecture Notes in Computer Science, Springer, July 2014, vol. 8570, pp. 204 - 211. [ DOI : 10.1007/978-3-319-09099-3_16 ]
    https://hal.inria.fr/hal-01108553
  • 50A. Vernotte, F. Dadeau, F. Lebeau, B. Legeard, F. Peureux, F. Piat.
    Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities, in: ICISS - 10th International Conference on Information Systems Security, Hyderabad, India, Springer, December 2014, vol. LNCS 8880.
    https://hal.inria.fr/hal-01089702

National Conferences with Proceedings

  • 51R. Genestier, A. Giorgetti, G. Petiot.
    Gagnez sur tous les tableaux, in: Vingt-sixièmes Journées Francophones des Langages Applicatifs (JFLA 2015), Le Val d'Ajol, France, D. Baelde, J. Alglave (editors), January 2015.
    https://hal.inria.fr/hal-01099135

Conferences without Proceedings

  • 52H. Comon-Lundh, V. Cortier, G. Scerri.
    A tool for automating the computationally complete symbolic attacker (Extended Abstract), in: Joint Workshop on Foundations of Computer Security and Formal and Computational Cryptography (FCS-FCC'14), Vienne, Austria, July 2014.
    https://hal.inria.fr/hal-01080296
  • 53G. Maatoug, F. Dadeau, M. Rusinowitch.
    Model-Based Vulnerability Testing of Payment Protocol Implementations, in: HotSpot'14 - 2nd Workshop on Hot Issues in Security Principles and Trust, affiliated with ETAPS 2014, Grenoble, France, April 2014.
    https://hal.inria.fr/hal-01089682
  • 54H. H. Nguyen, I. Abdessamad, M. Rusinowitch.
    Anonymizing Social Graphs via Uncertainty Semantics, in: ASIACCS 2015 - 10th ACM Symposium on Information, Computer and Communications Security, Singapour, April 2015.
    https://hal.inria.fr/hal-01108437

Scientific Books (or Scientific Book chapters)

  • 55F. Bouquet, F. Peureux, F. Ambert.
    Model-Based Testing for Functional and Security Test Generation, in: Foundations of Security Analysis and Design VII, A. Aldini, J. Lopez, F. Martinelli (editors), LNCS, Springer International Publishing, 2014, vol. 8604, 33 p. [ DOI : 10.1007/978-3-319-10082-1_1 ]
    https://hal.inria.fr/hal-01093442
  • 56J. A. Martin, F. Martinelli, I. Matteucci, E. Pimentel, M. Turuani.
    On the Synthesis of Secure Services Composition, in: Engineering Secure Future Internet Services and Systems, M. Heisel, W. Joosen, J. Lopez, F. Martinelli (editors), Lecture Notes in Computer Science, Springer, June 2014, vol. LNCS 8431, no 8431, 392 p.
    https://hal.inria.fr/hal-01094964

Books or Proceedings Editing

  • 57M. Abadi, S. Kremer (editors)
    Principles of Security and Trust, Lecture Notes in Computer Science, Springer, France, 2014, vol. 8414. [ DOI : 10.1007/978-3-642-54792-8 ]
    https://hal.inria.fr/hal-01090879

Internal Reports

  • 58M. Bride, P.-C. Héam, I. Jacques.
    Computing Semicommutation Closures: a Machine Learning Approach, FEMTO-ST, December 2014.
    https://hal.inria.fr/hal-01087740
  • 59P. Chocron, P. Fontaine, C. Ringeissen.
    A Gentle Non-Disjoint Combination of Satisfiability Procedures (Extended Version), April 2014, no RR-8529.
    https://hal.inria.fr/hal-00985135
  • 60R. Chrétien, V. Cortier, S. Delaune.
    Typing messages for free in security protocols: the case of equivalence properties, June 2014, no RR-8546, 46 p.
    https://hal.inria.fr/hal-01007580
  • 61V. Cortier, D. Galindo, S. Glondu, M. Izabachène.
    Election Verifiability for Helios under Weaker Trust Assumptions, June 2014, no RR-8555, 20 p.
    https://hal.inria.fr/hal-01011294
  • 62I. Enderlin, F. Bouquet, F. Dadeau, A. Giorgetti.
    Praspel: Contract-Driven Testing for PHP using Realistic Domains, September 2014, no RR-8592, 39 p.
    https://hal.inria.fr/hal-01061900
  • 63S. Erbatur, D. Kapur, A. Marshall, C. Meadows, P. Narendran, C. Ringeissen.
    Asymmetric Unification and the Combination Problem in Disjoint Theories, February 2014, no RR-8476.
    https://hal.inria.fr/hal-00947088
  • 64P.-C. Héam, V. Hugot, O. Kouchnarenko.
    The Emptiness Problem for Tree Automata with at Least One Disequality Constraint is NP-hard, FEMTO-ST, December 2014.
    https://hal.inria.fr/hal-01089711
  • 65P.-C. Héam, J.-L. Joly.
    Random Generation and Enumeration of Accessible Determinisitic Real-time Pushdown Automata, FEMTO-ST, September 2014.
    https://hal.inria.fr/hal-01087748
  • 66S. Kremer, R. Künnemann.
    Automated analysis of security protocols with global state, arXiv, March 2014, 56 p.
    https://hal.inria.fr/hal-00955869
  • 67G. Petiot, N. Kosmatov, A. Giorgetti, J. Julliand.
    StaDy: Deep Integration of Static and Dynamic Analysis in Frama-C, May 2014.
    https://hal.inria.fr/hal-00992159

Other Publications

  • 68P.-C. Héam, J.-L. Joly.
    On the Uniform Random Generation of Determinisitic Partially Ordered Automata using Monte Carlo Techniques, December 2014.
    https://hal.inria.fr/hal-01087751
  • 69O. Kouchnarenko, J.-F. Weber.
    Decentralised Evaluation of Temporal Patterns over Component-based Systems at Runtime, 2014, Long version of the paper accepted for FACS 2014 - The 11th International Symposium on Formal Aspects of Component Software.
    https://hal.archives-ouvertes.fr/hal-01044639
  • 70N. Zeilberger, A. Giorgetti.
    A correspondence between rooted planar maps and normal planar lambda terms, August 2014.
    https://hal.inria.fr/hal-01057269
References in notes
  • 71S. Kremer, V. Cortier (editors)
    Formal Models and Techniques for Analyzing Security Protocols, Cryptology and Information Security Series, IOS Press, 2011, vol. 5, 312 p.
    http://hal.inria.fr/inria-00636787/en
  • 72M. Arapinis, V. Cortier, S. Kremer, M. Ryan.
    Practical Everlasting Privacy, in: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, D. A. Basin, J. C. Mitchell (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7796, pp. 21–40.
  • 73G. Bana, H. Comon-Lundh.
    Towards Unconditional Soundness: Computationally Complete Symbolic Attacker, in: Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), Lecture Notes in Computer Science, Springer, 2012, vol. 7215, pp. 189-208.
  • 74F. Bellegarde, C. Darlot, J. Julliand, O. Kouchnarenko.
    Reformulation: a Way to Combine Dynamic Properties and Refinement, in: International Symposium Formal Methods Europe (FME 2001), LNCS, Springer-Verlag, 2001, vol. 2021.
  • 75E. Bernard, B. Legeard, X. Luck, F. Peureux.
    Generation of Test Sequences from Formal Specifications: GSM 11-11 Standard Case-Study, in: International Journal on Software Practice and Experience, 2004, vol. 34, no 10, pp. 915–948.
  • 76Y. Boichut, P.-C. Héam, O. Kouchnarenko.
    Vérifier automatiquement les protocoles de sécurité, in: Techniques de l'ingénieur, October 2007, pp. RE95-1–RE95-8.
  • 77F. Bouquet, B. Legeard.
    Reification of Executable Test Scripts in Formal Specification-Based Test Generation: The Java Card Transaction Mechanism Case Study, in: Formal Methods, FME 2003, Springer-Verlag, September 2003, vol. 2805, pp. 778–795.
  • 78F. Bouquet, B. Legeard, F. Peureux.
    CLPS-B - A Constraint Solver for B, in: International Conference on Tools and Algorithms for Construction and Analysis of Systems, TACAS2002, Grenoble, France, Lecture Notes in Computer Science, Springer, April 2002, vol. 2280, pp. 188–204.
  • 79V. Cortier, S. Delaune, P. Lafourcade.
    A Survey of Algebraic Properties Used in Cryptographic Protocols, in: Journal of Computer Security, 2006, vol. 14, no 1, pp. 1–43.
  • 80F. Dadeau, K. Cabrera Castillos, R. Tissot.
    Scenario-Based Testing using Symbolic Animation of B Models, in: Software Testing, Verification and Reliability, March 2012, vol. 6, no 22, pp. 407-434.
    http://hal.inria.fr/hal-00760020
  • 81J. Dick, A. Faivre.
    Automating the Generation and Sequencing of Test Cases from Model-Based Specifications, in: FME'93: Industrial-Strength Formal Methods, Lecture Notes in Computer Science, Springer-Verlag, April 1993, vol. 670, pp. 268–284.
  • 82M.-C. Gaudel, A. Denise, S.-D. Gouraud, R. Lassaigne, J. Oudinet, S. Peyronnet.
    Coverage-biased Random Exploration of Models, in: Electr. Notes Theor. Comput. Sci., 2008, vol. 220, no 1, pp. 3-14.
  • 83P.-C. Héam, C. Masson.
    A Random Testing Approach Using Pushdown Automata, in: Tests and Proofs, Zurich, Switzerland, Lecture Notes in Computer Science, Springer, 2011, vol. 6706.
    http://hal.inria.fr/hal-00641750/en
  • 84K. G. Larsen, B. Thomsen.
    A modal process logic, in: Proc. of the 3rd Annual Symp. on Logic in Computer Science (LICS'88), IEEE, July 1988, pp. 203–210.
  • 85B. Legeard, F. Bouquet, N. Pickaert.
    Industrialiser le test fonctionnel, Management des systèmes d'information, Dunod, 2009, 266 p.
    http://hal.inria.fr/inria-00430538/en/