Members
Overall Objectives
Research Program
Highlights of the Year
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 2A. Colombo, D. Fontanelli, A. Legay, L. Palopoli, S. Sedwards.
    Efficient customisable dynamic motion planning for assistive robots in complex human environments, in: Journal of ambient intelligence and smart environments, September 2015. [ DOI : 10.3233/AIS-150338 ]
    https://hal.inria.fr/hal-01239099
  • 3P. D'argenio, A. Legay, S. Sedwards, L.-M. Traonouez.
    Smart Sampling for Lightweight Verification of Markov Decision Processes, in: International Journal on Software Tools for Technology Transfer (STTT), August 2015, vol. 17, no 4, pp. 469-484. [ DOI : 10.1007/s10009-015-0383-0 ]
    https://hal.inria.fr/hal-01088633
  • 4A. David, K. G. Larsen, A. Legay, U. Nyman, L.-M. Traonouez, A. Wasowski.
    Real-Time Specifications, in: Software Tools for Technology Transfer (STTT), January 2015, vol. 17, no 1, 29 p. [ DOI : 10.1007/s10009-013-0286-x ]
    https://hal.archives-ouvertes.fr/hal-01087799

Articles in Non Peer-Reviewed Journals

  • 5A. Legay, J. Quilbeuf, F. Oquendo.
    Verifying Systems-of-Systems with Statistical Model Checking, in: ERCIM News, 2015, no 103.
    https://hal.inria.fr/hal-01242652
  • 6F. Oquendo, A. Legay, K. Drira.
    GT SoS: Research Network on Trustworthy Software-intensive Systems-of-Systems, in: ERCIM News, 2015, no 102.
    https://hal.inria.fr/hal-01242651
  • 7F. Oquendo, A. Legay.
    Formal Architecture Description of Trustworthy Systems-of-Systems with SosADL, in: ERCIM News, 2015, no 102.
    https://hal.inria.fr/hal-01242649

International Conferences with Proceedings

  • 8V. C. Ngo, J.-P. Talpin, T. Gautier, L. Besnard, P. Le Guernic.
    Modular translation validation of a full-sized synchronous compiler using off-the-shelf verification tools (abstract), in: International Workshop on Software and Compilers for Embedded Systems, St Goar, Germany, ACM, June 2015.
    https://hal.inria.fr/hal-01148919
  • 9V. C. Ngo, J.-P. Talpin, T. Gautier, P. Le Guernic.
    Translation Validation for Clock Transformations in a Synchronous Compiler, in: FASE - ETAPS 2015, London, United Kingdom, Springer, April 2015.
    https://hal.inria.fr/hal-01087795
  • 10V. C. Ngo, J.-P. Talpin, T. Gautier.
    Translation Validation for Synchronous Data-flow Specification in the SIGNAL Compiler, in: International Conference on Formal Techniques for Distributed Objects, Components and Systems, Grenoble, France, Formal Techniques for Distributed Objects, Components, and Systems, Springer, June 2015, vol. 9039, pp. 66-80. [ DOI : 10.1007/978-3-319-19195-9_5 ]
    https://hal.inria.fr/hal-01148901

Conferences without Proceedings

  • 11J. M. Atlee, S. Beidu, U. Fahrenberg, A. Legay.
    Merging Features in Featured Transition Systems, in: Proceedings of the 12th Workshop on Model-Driven Engineering, Verification and Validation co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, Ottawa, Canada, CEUR Workshop Proceedings, September 2015, vol. 1514, pp. 38-43.
    https://hal.inria.fr/hal-01237661
  • 12J. M. Atlee, U. Fahrenberg, A. Legay.
    Measuring Behaviour Interactions between Product-Line Features, in: 3rd IEEE/ACM FME Workshop on Formal Methods in Software Engineering, Firenze, Italy, May 2015.
    https://hal.inria.fr/hal-01237655
  • 13F. Biondi, T. Given-Wilson, A. Legay.
    Attainable Unconditional Security for Shared-Key Cryptosystems, in: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, August 2015.
    https://hal.inria.fr/hal-01192859
  • 14F. Biondi, A. Legay, J. Quilbeuf.
    Comparative Analysis of Leakage Tools on Scalable Case Studies, in: 22nd International SPIN Workshop on Model Checking of Software, Stellenbosch, South Africa, August 2015. [ DOI : 10.1007/978-3-319-23404-5_17 ]
    https://hal.inria.fr/hal-01241352
  • 15D. Cachera, U. Fahrenberg, A. Legay.
    An ω-Algebra for Real-Time Energy Problems, in: 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, Bengaluru, India, December 2015.
    https://hal.inria.fr/hal-01237667
  • 16X. Devroey, G. Perrouin, M. Cordy, P.-Y. Schobbens, P. Heymans, A. Legay.
    State machine flattening, a mapping study and tools assessment, in: 8th IEEE International Conference on Software Testing, Verification and Validation, Graz, Austria, April 2015. [ DOI : 10.1109/ICSTW.2015.7107408 ]
    https://hal.inria.fr/hal-01242787
  • 17Z. Esik, U. Fahrenberg, A. Legay.
    -Continuous Kleene ω-Algebras for Energy Problems, in: Proceedings Tenth International Workshop on Fixed Points in Computer Science, Berlin, Germany, EPTCS, September 2015, vol. 191, pp. 48-59.
    https://hal.inria.fr/hal-01237653
  • 18Z. Esik, U. Fahrenberg, A. Legay.
    -Continuous Kleene ω-Algebras, in: Developments in Language Theory - 19th International Conference, Liverpool, United Kingdom, Lecture Notes in Computer Science, July 2015, vol. 9168, pp. 240-251.
    https://hal.inria.fr/hal-01237648
  • 19U. Fahrenberg, A. Legay.
    Partial Higher-Dimensional Automata, in: 6th Conference on Algebra and Coalgebra in Computer Science, Nijmegen, Netherlands, LIPIcs, June 2015, vol. 35.
    https://hal.inria.fr/hal-01237643
  • 20T. Given-Wilson, A. Legay.
    On the Expressiveness of Joining, in: 8th Interaction and Concurrency Experience (ICE 2015), Grenoble, France, June 2015.
    https://hal.inria.fr/hal-01152456
  • 21C. Jegourel, A. Legay, S. Sedwards, L.-M. Traonouez.
    Distributed Verification of Rare Properties using Importance Splitting Observers, in: Proceedings of the 15th International Workshop on Automated Verification of Critical Systems (AVoCS 2015), Edinburgh, United Kingdom, September 2015, vol. 72.
    https://hal.inria.fr/hal-01238982
  • 22Y. Kawamoto, T. Given-Wilson.
    Quantitative Information Flow for Scheduler-Dependent Systems, in: The 13th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), London, United Kingdom, Electronic Proceedings in Theoretical Computer Science, April 2015, forthcoming.
    https://hal.inria.fr/hal-01114778
  • 23A. Legay, S. Sedwards, L.-M. Traonouez.
    Estimating Rewards & Rare Events in Nondeterministic Systems, in: Proceedings of the 15th International Workshop on Automated Verification of Critical Systems (AVoCS 2015), Edinburgh, United Kingdom, September 2015, vol. 72. [ DOI : 10.14279/tuj.eceasst.72.1023 ]
    https://hal.inria.fr/hal-01239051
  • 24A. Legay, L.-M. Traonouez.
    Statistical Model Checking of Simulink Models with Plasma Lab, in: Fourth International Workshop on Formal Techniques for Safety-Critical Systems, Paris, France, November 2015.
    https://hal.archives-ouvertes.fr/hal-01241249
  • 25V. C. Ngo, A. Legay, J. Quilbeuf.
    Statistical Model Checking for SystemC Models, in: High Assurance Systems Engineering Symposium, Orlando, Florida, United States, January 2016.
    https://hal.inria.fr/hal-01238162

Internal Reports

  • 26A. Arnold, B. Massimo, F. Alberto, M. Marco, V. Senni, A. Legay, J. Quilbeuf, E. Chistoph.
    Statistical Model Checking of Systems of Systems: An Industrial Approach, Inria, December 2015, no RR-8828.
    https://hal.inria.fr/hal-01242864
  • 27V. C. Ngo, A. Legay.
    Dependability Analysis of Control Systems using SystemC and Statistical Model Checking, Inria Rennes - Bretagne Atlantique ; Inria, July 2015, no RR-8762.
    https://hal.archives-ouvertes.fr/hal-01180996

Other Publications

  • 28F. Biondi, T. Given-Wilson, A. Legay.
    Attainable Unconditional Security for Shared-Key Cryptosystems, November 2015, working paper or preprint.
    https://hal.inria.fr/hal-01233185
  • 29F. Biondi, T. Given-Wilson, A. Legay.
    On the Attacker's Knowledge in Shared-Key Cryptosystems, December 2015, working paper or preprint. [ DOI : 10.1145/1235 ]
    https://hal.inria.fr/hal-01241374
  • 30F. Biondi, S. Josse, A. Legay, T. Sirvent.
    Effectiveness of Synthesis in Concolic Deobfuscation, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01241356
  • 31M. Chadli, J. H. Kim, A. Legay, L.-M. Traonouez, S. Naujokat, B. Steffen.
    A Model-Based Framework for the Specification and Analysis of Hierarchical Scheduling Systems, December 2015, working paper or preprint.
    https://hal.archives-ouvertes.fr/hal-01241681
  • 32T. Given-Wilson, A. Legay.
    On the Expressiveness of Coordination, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01241647
  • 33T. Given-Wilson, A. Legay.
    On the Expressiveness of Symmetry, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01241839
  • 34Y. Kawamoto, F. Biondi, A. Legay.
    Combining Static and Statistical Approaches to Quantitative Information Flow, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01241360
  • 35J. H. Kim, A. Legay, L.-M. Traonouez, M. Acher, S. Kang.
    A Formal Modeling and Analysis Framework for Software Product Line of Preemptive Real-Time Systems, October 2015, Publication acceptée en temps que poster/papier court à la conférence SAC 2016, section software engineering.
    https://hal.archives-ouvertes.fr/hal-01241673
  • 36A. Legay, L.-M. Traonouez.
    Statistical Model Checking with Change Detection, September 2015, working paper or preprint.
    https://hal.archives-ouvertes.fr/hal-01242138
References in notes
  • 37F. Biondi, A. Legay.
    Quantitative Anonymity Evaluation of Voting Protocols, in: 12th International Conference on Software Engineering and Formal Methods, Grenoble, France, September 2014.
    https://hal.inria.fr/hal-01088188
  • 38F. Biondi, A. Legay, P. Malacaria, A. Wasowski.
    Quantifying Information Leakage of Randomized Protocols, in: Theoretical Computer Science, 2014, pp. 68 - 87. [ DOI : 10.1007/978-3-642-35873-9_7 ]
    https://hal.inria.fr/hal-01088193
  • 39F. Biondi, A. Legay, B. F. Nielsen, P. Malacaria, A. Wasowski.
    Information Leakage of Non-Terminating Processes , in: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, Delhi, India, December 2014. [ DOI : 10.4230/LIPIcs.FSTTCS.2014.517 ]
    https://hal.inria.fr/hal-01086879
  • 40F. Biondi, A. Legay, L.-M. Traonouez, A. Wasowski.
    QUAIL: A Quantitative Security Analyzer for Imperative Code, in: Computer Aided Verification - 25th International Conference, Saint Petersburg, Russia, Lecture Notes in Computer Science, Springer, July 2013, vol. 8044, pp. 702 - 707. [ DOI : 10.1007/978-3-642-39799-8_49 ]
    https://hal.archives-ouvertes.fr/hal-01087804
  • 41F. Biondi, J. Quilbeuf, A. Legay.
    Information Leakage by Trace Analysis in QUAIL, November 2014, working paper or preprint.
    https://hal.inria.fr/hal-01088208
  • 42V. C. Ngo, A. Legay, J. Quilbeuf.
    Dynamic Verification of SystemC with Statistical Model Checking, Inria Rennes - Bretagne Atlantique, équipe ESTASYS ; Inria, October 2014, no RR-8644, 25 p.
    https://hal.inria.fr/hal-01089742