Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1J. Brunel, D. Doligez, R. R. Hansen, J. L. Lawall, G. Muller.
    A foundation for flow-based program matching using temporal logic and model checking, in: POPL, Savannah, GA, USA, ACM, January 2009, pp. 114–126.
  • 2L. Burgy, L. Réveillère, J. L. Lawall, G. Muller.
    Zebu: A Language-Based Approach for Network Protocol Message Processing, in: IEEE Trans. Software Eng., 2011, vol. 37, no 4, pp. 575-591.
  • 3P.-É. Dagand, A. Baumann, T. Roscoe.
    Filet-o-Fish: practical and dependable domain-specific languages for OS development, in: Programming Languages and Operating Systems (PLOS), 2009, pp. 51–55.
  • 4A. Kennedy, N. Benton, J. B. Jensen, P.-É. Dagand.
    Coq: The World's Best Macro Assembler?, in: PPDP, Madrid, Spain, ACM, 2013, pp. 13–24.
  • 5G. Muller, C. Consel, R. Marlet, L. P. Barreto, F. Mérillon, L. Réveillère.
    Towards Robust OSes for Appliances: A New Approach Based on Domain-specific Languages, in: Proceedings of the 9th Workshop on ACM SIGOPS European Workshop: Beyond the PC: New Challenges for the Operating System, Kolding, Denmark, 2000, pp. 19–24.
  • 6G. Muller, J. L. Lawall, H. Duchesne.
    A Framework for Simplifying the Development of Kernel Schedulers: Design and Performance Evaluation, in: HASE - High Assurance Systems Engineering Conference, Heidelberg, Germany, IEEE, October 2005, pp. 56–65.
  • 7F. Mérillon, L. Réveillère, C. Consel, R. Marlet, G. Muller.
    Devil: An IDL for hardware programming, in: Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI), San Diego, California, USENIX Association, October 2000, pp. 17–30.
  • 8Y. Padioleau, J. L. Lawall, R. R. Hansen, G. Muller.
    Documenting and Automating Collateral Evolutions in Linux Device Drivers, in: EuroSys, Glasgow, Scotland, March 2008, pp. 247–260.
  • 9N. Palix, G. Thomas, S. Saha, C. Calvès, J. L. Lawall, G. Muller.
    Faults in Linux 2.6, in: ACM Transactions on Computer Systems, June 2014, vol. 32, no 2, pp. 4:1–4:40.
Publications of the year

Articles in International Peer-Reviewed Journals

  • 10P.-E. Dagand, N. Tabareau, É. Tanter.
    Foundations of Dependent Interoperability, in: Journal of Functional Programming, March 2018, vol. 28. [ DOI : 10.1017/S0956796818000011 ]
    https://hal.inria.fr/hal-01629909
  • 11K. Narasimhan, C. Reichenbach, J. Lawall.
    Cleaning up Copy-Paste Clones with Interactive Merging, in: Journal of Automated Software Engineering, August 2018, vol. 25, no 3, pp. 627-673. [ DOI : 10.1007/s10515-018-0238-5 ]
    https://hal.inria.fr/hal-01853896

International Conferences with Proceedings

  • 12J.-J. Bai, Y.-P. Wang, J. Lawall, S.-M. Hu.
    DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules, in: 2018 USENIX Annual Technical Conference, Boston, MA, United States, July 2018.
    https://hal.inria.fr/hal-01853268
  • 13J. Bouron, S. Chevalley, B. Lepers, W. Zwaenepoel, R. Gouicem, J. Lawall, G. Muller, J. Sopena.
    The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS, in: 2018 USENIX Annual Technical Conference, Boston, MA, United States, July 2018.
    https://hal.inria.fr/hal-01853267
  • 14J. Lawall, G. Muller.
    Coccinelle: 10 Years of Automated Evolution in the Linux Kernel, in: 2018 USENIX Annual Technical Conference, Boston, MA, United States, July 2018.
    https://hal.inria.fr/hal-01853271
  • 15D. Mercadier, P.-É. Dagand, L. Lacassagne, G. Muller.
    Usuba, Optimizing & Trustworthy Bitslicing Compiler, in: WPMVP’18 - Workshop on Programming Models for SIMD/Vector Processing, Vienna, Austria, ACM Press, February 2018. [ DOI : 10.1145/3178433.3178437 ]
    https://hal.archives-ouvertes.fr/hal-01657259

Other Publications

  • 16M. Martone, L. Iapichino, N. Hammer, J. Lawall.
    Automating Data Layout Conversion in a Large Cosmological Simulation Code, September 2018, CoSaS 2018 - International Symposium on Computational Science at Scale, Poster.
    https://hal.inria.fr/hal-01890314
References in notes
  • 17T. Ball, E. Bounimova, B. Cook, V. Levin, J. Lichtenberg, C. McGarvey, B. Ondrusek, S. K. Rajamani, A. Ustuner.
    Thorough Static Analysis of Device Drivers, in: EuroSys, 2006, pp. 73–85.
  • 18A. Baumann, P. Barham, P.-É. Dagand, T. Harris, R. Isaacs, S. Peter, T. Roscoe, A. Schüpbach, A. Singhania.
    The multikernel: A new OS architecture for scalable multicore systems, in: SOSP, 2009, pp. 29–44.
  • 19T. F. Bissyandé, L. Réveillère, J. L. Lawall, Y.-D. Bromberg, G. Muller.
    Implementing an embedded compiler using program transformation rules, in: Software: Practice and Experience, 2013.
  • 20T. F. Bissyandé, L. Réveillère, J. Lawall, Y.-D. Bromberg, G. Muller.
    Implementing an Embedded Compiler using Program Transformation Rules, in: Software: Practice and Experience, February 2015, vol. 45, no 2, pp. 177-196.
    https://hal.archives-ouvertes.fr/hal-00844536
  • 21T. F. Bissyandé, L. Réveillère, J. Lawall, G. Muller.
    Ahead of Time Static Analysis for Automatic Generation of Debugging Interfaces to the Linux Kernel, in: Automated Software Engineering, May 2014, pp. 1-39. [ DOI : 10.1007/s10515-014-0152-4 ]
    https://hal.archives-ouvertes.fr/hal-00992283
  • 22A. P. Black, S. Ducasse, O. Nierstrasz, D. Pollet.
    Pharo by Example, Square Bracket Associates, 2010.
  • 23E. Brady, K. Hammond.
    Resource-Safe Systems Programming with Embedded Domain Specific Languages, in: 14th International Symposium on Practical Aspects of Declarative Languages (PADL), LNCS, Springer, 2012, vol. 7149, pp. 242–257.
  • 24T. Braibant, D. Pous.
    An Efficient Coq Tactic for Deciding Kleene Algebras, in: 1st International Conference on Interactive Theorem Proving (ITP), LNCS, Springer, 2010, vol. 6172, pp. 163–178.
  • 25C. Cadar, D. Dunbar, D. R. Engler.
    KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, in: OSDI, 2008, pp. 209–224.
  • 26V. Chipounov, G. Candea.
    Reverse Engineering of Binary Device Drivers with RevNIC, in: EuroSys, 2010, pp. 167–180.
  • 27A. Chlipala.
    The Bedrock Structured Programming System: Combining Generative Metaprogramming and Hoare Logic in an Extensible Program Verifier, in: ICFP, 2013, pp. 391–402.
  • 28L. A. Clarke.
    A system to generate test data and symbolically execute programs, in: IEEE Transactions on Software Engineering, 1976, vol. 2, no 3, pp. 215–222.
  • 29E. Clarke, O. Grumberg, S. Jha, Y. Lu, H. Veith.
    Counterexample-guided abstraction refinement for symbolic model checking, in: J. ACM, 2003, vol. 50, no 5, pp. 752–794.
  • 30P. Cousot, R. Cousot.
    Abstract Interpretation: Past, Present and Future, in: CSL-LICS, 2014, pp. 2:1–2:10.
  • 31P.-É. Dagand.
    Reusability and Dependent Types, University of Strathclyde, 2013.
  • 32I. Dillig, T. Dillig, A. Aiken.
    Sound, complete and scalable path-sensitive analysis, in: PLDI, June 2008, pp. 270–280.
  • 33D. Dinu, Y. L. Corre, D. Khovratovich, L. Perrin, J. Großschädl, A. Biryukov.
    Triathlon of Lightweight Block Ciphers for the Internet of Things, 2015, Cryptology ePrint Archive, Report 2015/209.
  • 34D. R. Engler, B. Chelf, A. Chou, S. Hallem.
    Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions, in: OSDI, 2000, pp. 1–16.
  • 35D. R. Engler, D. Y. Chen, A. Chou, B. Chelf.
    Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code, in: SOSP, 2001, pp. 57–72.
  • 36A. Goldberg, D. Robson.
    Smalltalk-80: The Language and Its Implementation, Addison-Wesley, 1983.
  • 37L. Gu, A. Vaynberg, B. Ford, Z. Shao, D. Costanzo.
    CertiKOS: A Certified Kernel for Secure Cloud Computing, in: Proceedings of the Second Asia-Pacific Workshop on Systems (APSys), 2011, pp. 3:1–3:5.
  • 38L. Guo, J. L. Lawall, G. Muller.
    Oops! Where did that code snippet come from?, in: 11th Working Conference on Mining Software Repositories, MSR, Hyderabad, India, ACM, May 2014, pp. 52–61.
  • 39A. Israeli, D. G. Feitelson.
    The Linux kernel as a case study in software evolution, in: Journal of Systems and Software, 2010, vol. 83, no 3, pp. 485–501.
  • 40A. Kadav, M. M. Swift.
    Understanding modern device drivers, in: ASPLOS, 2012, pp. 87–98.
  • 41G. A. Kildall.
    A Unified Approach to Global Program Optimization, in: POPL, 1973, pp. 194–206.
  • 42G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, S. Winwood.
    seL4: formal verification of an OS kernel, in: SOSP, 2009, pp. 207–220.
  • 43J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, G. Muller.
    WYSIWIB: Exploiting fine-grained program structure in a scriptable API-usage protocol-finding process, in: Software, Practice Experience, 2013, vol. 43, no 1, pp. 67–92.
  • 44J. L. Lawall, B. Laurie, R. R. Hansen, N. Palix, G. Muller.
    Finding Error Handling Bugs in OpenSSL using Coccinelle, in: Proceeding of the 8th European Dependable Computing Conference (EDCC), Valencia, Spain, April 2010, pp. 191–196.
  • 45J. L. Lawall, D. Lo.
    An automated approach for finding variable-constant pairing bugs, in: 25th IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, September 2010, pp. 103–112.
  • 46J. Lawall, D. Palinski, L. Gnirke, G. Muller.
    Fast and Precise Retrieval of Forward and Back Porting Information for Linux Device Drivers, in: 2017 USENIX Annual Technical Conference, Santa Clara, CA, United States, July 2017, 12 p.
    https://hal.inria.fr/hal-01556589
  • 47C. Le Goues, W. Weimer.
    Specification Mining with Few False Positives, in: TACAS, York, UK, Lecture Notes in Computer Science, March 2009, vol. 5505, pp. 292–306.
  • 48B. Lepers, W. Zwaenepoel, J.-P. Lozi, N. Palix, R. Gouicem, J. Sopena, J. Lawall, G. Muller.
    Towards Proving Optimistic Multicore Schedulers, in: HotOS 2017 - 16th Workshop on Hot Topics in Operating Systems, Whistler, British Columbia, Canada, ACM SIGOPS, May 2017, 6 p. [ DOI : 10.1145/3102980.3102984 ]
    https://hal.inria.fr/hal-01556597
  • 49Z. Li, S. Lu, S. Myagmar, Y. Zhou.
    CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code, in: OSDI, 2004, pp. 289–302.
  • 50Z. Li, Y. Zhou.
    PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code, in: Proceedings of the 10th European Software Engineering Conference, 2005, pp. 306–315.
  • 51D. Lo, S. Khoo.
    SMArTIC: towards building an accurate, robust and scalable specification miner, in: FSE, 2006, pp. 265–275.
  • 52J.-P. Lozi, F. David, G. Thomas, J. Lawall, G. Muller.
    Fast and Portable Locking for Multicore Architectures, in: ACM Transactions on Computer Systems, January 2016. [ DOI : 10.1145/2845079 ]
    https://hal.inria.fr/hal-01252167
  • 53S. Lu, S. Park, Y. Zhou.
    Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing, in: IEEE Transactions on Software Engineering, 2012, vol. 38, no 4, pp. 844–860.
  • 54M. Mernik, J. Heering, A. M. Sloane.
    When and How to Develop Domain-specific Languages, in: ACM Comput. Surv., December 2005, vol. 37, no 4, pp. 316–344.
    http://dx.doi.org/10.1145/1118890.1118892
  • 55G. Morrisett, G. Tan, J. Tassarotti, J.-B. Tristan, E. Gan.
    RockSalt: better, faster, stronger SFI for the x86, in: PLDI, 2012, pp. 395-404.
  • 56M. Odersky, T. Rompf.
    Unifying functional and object-oriented programming with Scala, in: Commun. ACM, 2014, vol. 57, no 4, pp. 76–86.
  • 57M. C. Olesen, R. R. Hansen, J. L. Lawall, N. Palix.
    Coccinelle: Tool support for automated CERT C Secure Coding Standard certification, in: Science of Computer Programming, October 2014, vol. 91, no B, pp. 141–160.
    https://hal.inria.fr/hal-01096185
  • 58K. Pavneet Singh, F. Thung, D. Lo, J. Lawall.
    An Empirical Study on the Adequacy of Testing in Open Source Projects, in: 21st Asia-Pacific Software Engineering Conference, Jeju, South Korea, December 2014.
    https://hal.inria.fr/hal-01096132
  • 59T. Reps, T. Ball, M. Das, J. Larus.
    The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem, in: ESEC/FSE, 1997, pp. 432–449.
  • 60L. R. Rodriguez, J. Lawall.
    Increasing Automation in the Backporting of Linux Drivers Using Coccinelle, in: 11th European Dependable Computing Conference - Dependability in Practice, Paris, France, 11th European Dependable Computing Conference - Dependability in Practice, November 2015.
    https://hal.inria.fr/hal-01213912
  • 61C. Rubio-González, H. S. Gunawi, B. Liblit, R. H. Arpaci-Dusseau, A. C. Arpaci-Dusseau.
    Error propagation analysis for file systems, in: PLDI, Dublin, Ireland, ACM, June 2009, pp. 270–280.
  • 62L. Ryzhyk, P. Chubb, I. Kuz, E. Le Sueur, G. Heiser.
    Automatic device driver synthesis with Termite, in: SOSP, 2009, pp. 73–86.
  • 63L. Ryzhyk, A. Walker, J. Keys, A. Legg, A. Raghunath, M. Stumm, M. Vij.
    User-Guided Device Driver Synthesis, in: OSDI, 2014, pp. 661–676.
  • 64R. k. Saha, J. L. Lawall, S. Khurshid, D. E. Perry.
    On the Effectiveness of Information Retrieval Based Bug Localization for C Programs, in: ICSME 2014 - 30th International Conference on Software Maintenance and Evolution, Victoria, Canada, IEEE, September 2014, pp. 161-170. [ DOI : 10.1109/ICSME.2014.38 ]
    https://hal.inria.fr/hal-01086082
  • 65R. Saha, J. L. Lawall, S. Khurshid, D. E. Perry.
    On the Effectiveness of Information Retrieval based Bug Localization for C Programs, in: International Conference on Software Maintenance and Evolution (ICSME), Victoria, BC, Canada, September 2014.
  • 66S. Saha, J.-P. Lozi, G. Thomas, J. Lawall, G. Muller.
    Hector: Detecting resource-release omission faults in error-handling code for systems software, in: DSN 2013 - 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, IEEE Computer Society, June 2013, pp. 1-12. [ DOI : 10.1109/DSN.2013.6575307 ]
    https://hal.inria.fr/hal-00918079
  • 67D. A. Schmidt.
    Data Flow Analysis is Model Checking of Abstract Interpretations, in: POPL, 1998, pp. 38–48.
  • 68P. Senna Tschudin, J. Lawall, G. Muller.
    3L: Learning Linux Logging, in: BElgian-NEtherlands software eVOLution seminar (BENEVOL 2015), Lille, France, December 2015.
    https://hal.inria.fr/hal-01239980
  • 69P. Senna Tschudin, L. Réveillère, L. Jiang, D. Lo, J. Lawall, G. Muller.
    Understanding the genetic makeup of Linux device drivers, in: PLOS'13 - 7th Workshop on Programming Languages and Operating Systems, Nemacolin Woodlands Resort, Pennsylvania, United States, ACM, November 2013. [ DOI : 10.1145/2525528.2525536 ]
    https://hal.inria.fr/hal-00927070
  • 70M. Shapiro.
    Purpose-built languages, in: Commun. ACM, 2009, vol. 52, no 4, pp. 36–41.
  • 71P. Singh Kochhar, D. Lo, J. Lawall, N. Nagappan.
    Code Coverage and Postrelease Defects: A Large-Scale Study on Open Source Projects, in: IEEE Transactions on Reliability, December 2017, vol. 66, no 4, pp. 1213 - 1228. [ DOI : 10.1109/TR.2017.2727062 ]
    https://hal.inria.fr/hal-01653728
  • 72R. Tartler, D. Lohmann, J. Sincero, W. Schröder-Preikschat.
    Feature consistency in compile-time-configurable system software: facing the Linux 10,000 feature problem, in: EuroSys, 2011, pp. 47–60.
  • 73F. Thung, D. X. B. Le, D. Lo, J. Lawall.
    Recommending Code Changes for Automatic Backporting of Linux Device Drivers, in: 32nd IEEE International Conference on Software Maintenance and Evolution (ICSME), Raleigh, North Carolina, United States, IEEE, October 2016.
    https://hal.inria.fr/hal-01355859
  • 74F. Thung, D. Lo, J. L. Lawall.
    Automated library recommendation, in: WCRE 2013 - 20th Working Conference on Reverse Engineering, Koblenz, Germany, R. Lämmel, R. Oliveto, R. Robbes (editors), IEEE, October 2013, pp. 182-191. [ DOI : 10.1109/WCRE.2013.6671293 ]
    https://hal.inria.fr/hal-00918076
  • 75F. Thung, S. Wang, D. Lo, J. Lawall.
    Automatic recommendation of API methods from feature requests, in: ASE 2013 - 28th IEEE/ACM International Conference on Automated Software Engineering, Palo Alto, California, United States, E. Denney, T. Bultan, A. Zeller (editors), IEEE, November 2013.
    https://hal.inria.fr/hal-00918828
  • 76Y. Tian, D. Lo, J. Lawall.
    Automated construction of a software-specific word similarity database, in: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE, Antwerp, Belgium, IEEE, February 2014, pp. 44-53.
    https://hal.inria.fr/hal-01086077
  • 77Y. Tian, D. Lo, J. Lawall.
    SEWordSim: software-specific word similarity database, ACM, May 2014, pp. 568-571, ICSE Companion 2014 - Companion Proceedings of the 36th International Conference on Software Engineering, Poster. [ DOI : 10.1145/2591062.2591071 ]
    https://hal.inria.fr/hal-01086079
  • 78W. Wang, M. Godfrey.
    A Study of Cloning in the Linux SCSI Drivers, in: Source Code Analysis and Manipulation (SCAM), IEEE, 2011.
  • 79S. Wang, D. Lo, J. Lawall.
    Compositional Vector Space Models for Improved Bug Localization, in: 30th International Conference on Software Maintenance and Evolution, Victoria, Canada, IEEE, September 2014, pp. 171-180.
    https://hal.inria.fr/hal-01086084
  • 80J. Yang, C. Hawblitzel.
    Safe to the Last Instruction: Automated Verification of a Type-safe Operating System, in: PLDI, 2010, pp. 99–110.