Bibliography
Major publications by the team in recent years
-
1G. Bonfante, M. Kaczmarek, J.-Y. Marion.
Architecture of a morphological malware detector, in: Journal in Computer Virology, 2009, vol. 5, no 3, p. 263-270. [ DOI : 10.1007/s11416-008-0102-4 ]
http://hal. inria. fr/ inria-00330022/ en/ -
2G. Bonfante, J.-Y. Marion, J.-Y. Moyen.
Quasi-interpretations a way to control resources, in: Theoretical Computer Science, May 2011, vol. 412, no 25, p. 2776-2796. [ DOI : 10.1016/j.tcs.2011.02.007 ]
http://hal. inria. fr/ hal-00591862/ en -
3J. Calvet, J. M. Fernandez, J.-Y. Marion.
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet, in: Annual Computer Security Applications Conference, Austin, Texas États-Unis, 12 2010.
http://hal. inria. fr/ inria-00536706/ en/ -
4H. Férée, E. Hainry, M. Hoyrup, R. Péchoux.
Interpretation of stream programs: characterizing type 2 polynomial time complexity, in: 21st International Symposium on Algorithms and Computation - ISAAC 2010, Corée, République De Jeju Island, Springer, Dec 2010.
http://hal. inria. fr/ inria-00518381 -
5P. Gacs, M. Hoyrup, C. Rojas.
Randomness on Computable Probability Spaces - A Dynamical Point of View, in: Proceedings of the 26th Annual Symposium on the Theoretical Aspects of Computer Science STACS 2009, Freiburg Allemagne, S. Albers, J.-Y. Marion (editors), IBFI Schloss Dagstuhl, February 2009, p. 469-480.
http://hal. inria. fr/ inria-00360519/ en/ -
6I. Gnaedig, H. Kirchner.
Proving Weak Properties of Rewriting, in: Theoretical Computer Science, 2011, vol. 412, p. 4405-4438. [ DOI : 10.1016/j.tcs.2011.04.028 ]
http://hal. inria. fr/ inria-00592271/ en -
7E. Hainry.
Reachability in linear dynamical systems, in: Computability in Europe Logic and Theory of Algorithms Lecture Notes in Computer Sciences, Grèce Athènes, A. Beckmann, C. Dimitracopoulos, B. Löwe (editors), Springer, 2008, vol. 5028, p. 241-250.
http://hal. inria. fr/ inria-00202674/ en/ -
8M. Hoyrup.
The dimension of ergodic random sequences, in: STACS, Paris, France, July 2011.
http://hal. inria. fr/ inria-00606457/ en -
9J.-Y. Marion.
A type system for complexity flow analysis, in: Twenty-Sixth Annual IEEE Symposium on Logic in Computer Science - LICS 2011, Toronto, Canada, ACM, June 2011, p. 1–10.
http://hal. inria. fr/ hal-00591853/ en -
10J.-Y. Marion, R. Péchoux.
Sup-interpretations, a semantic method for static analysis of program resources, in: ACM Trans. Comput. Logic, 2009, vol. 10, no 4, p. 1–31.
http://doi. acm. org/ 10. 1145/ 1555746. 1555751
Doctoral Dissertations and Habilitation Theses
-
11P. Beaucamps.
Analyse de Programmes Malveillants par Abstraction de Comportements, Institut National Polytechnique de Lorraine - INPL, November 2011.
http://hal. inria. fr/ tel-00646395/ en -
12G. Bonfante.
Complexité implicite des calculs : interprétation de programmes, Institut National Polytechnique de Lorraine - INPL, December 2011, Habilitation à Diriger des Recherches.
http://hal. inria. fr/ tel-00656766/ en
Articles in International Peer-Reviewed Journal
-
13L. Bienvenu, A. Day, M. Hoyrup, I. Mezhirov, A. Shen.
A constructive version of Birkhoff's ergodic theorem for Martin-Löf random points, in: Information and Computation, October 2011, p. 1–16. [ DOI : 10.1016/j.ic.2011.10.006 ]
http://hal. inria. fr/ hal-00643629/ en -
14L. Bienvenu, P. Gacs, M. Hoyrup, C. Rojas, A. Shen.
Algorithmic tests and randomness with respect to a class of measures, in: Proceedings of the Steklov Institute of Mathematics, November 2011, vol. 274, no 1, p. 34-89. [ DOI : 10.1134/S0081543811060058 ]
http://hal. inria. fr/ hal-00644785/ en -
15G. Bonfante, J.-Y. Marion, J.-Y. Moyen.
Quasi-interpretations a way to control resources, in: Theoretical Computer Science, May 2011, vol. 412, no 25, p. 2776-2796. [ DOI : 10.1016/j.tcs.2011.02.007 ]
http://hal. inria. fr/ hal-00591862/ en -
16M. Gaboardi, J.-Y. Marion, S. Ronchi Della Rocca.
An Implicit Characterization of PSPACE, in: ACM Transactions on Computational Logic, May 2011, p. 1–39.
http://hal. inria. fr/ hal-00591868/ en -
17P. Gacs, M. Hoyrup, C. Rojas.
Randomness on Computable Probability Spaces-A Dynamical Point of View, in: Theory of Computing Systems, 2011, vol. 48, no 3, p. 465–485. [ DOI : 10.1007/s00224-010-9263-x ]
http://hal. inria. fr/ inria-00531640/ en -
18S. Galatolo, M. Hoyrup, C. Rojas.
Dynamics and abstract computability: computing invariant measures, in: Discrete and Continuous Dynamical Systems: Series A, January 2011, vol. 29, no 1, p. 193-212. [ DOI : 10.3934/dcds.2011.29.193 ]
http://hal. inria. fr/ inria-00517367/ en -
19S. Galatolo, M. Hoyrup, C. Rojas.
Statistical properties of dynamical systems - simulation and abstract computation., in: Chaos, Solitons and Fractals, January 2012, vol. 45, no 1, p. 1-14. [ DOI : 10.1016/j.chaos.2011.09.011 ]
http://hal. inria. fr/ hal-00644790/ en -
20I. Gnaedig, H. Kirchner.
Proving Weak Properties of Rewriting, in: Theoretical Computer Science, 2011, vol. 412, p. 4405-4438. [ DOI : 10.1016/j.tcs.2011.04.028 ]
http://hal. inria. fr/ inria-00592271/ en
International Conferences with Proceedings
-
21G. Bonfante.
Course of value distinguishes the intentionality of programming languages, in: 2nd International Symposium on Information and Communication Technology - SoICT 2011, Hanoi, Viet Nam, October 2011.
http://hal. inria. fr/ hal-00642731/ en -
22G. Bonfante, B. Guillaume, M. Morey, G. Perrier.
Enrichissement de structures en dépendances par réécriture de graphes, in: Traitement Automatique des Langues Naturelles (TALN), Montpellier, France, 2011.
http://hal. inria. fr/ inria-00579251/ en -
23G. Bonfante, B. Guillaume, M. Morey, G. Perrier.
Modular Graph Rewriting to Compute Semantics, in: 9th International Conference on Computational Semantics - IWCS 2011, Oxford, United Kingdom, J. Bos, S. Pulman (editors), January 2011, p. 65–74.
http://hal. inria. fr/ inria-00579244/ en -
24M. Hoyrup.
Randomness and the ergodic decomposition, in: Computability in Europe, Sofia, Bulgaria, Lecture Notes in Computer Science, June 2011, vol. 6735, p. 122-131.
http://hal. inria. fr/ inria-00586736/ en -
25M. Hoyrup.
The dimension of ergodic random sequences, in: STACS, Paris, France, July 2011.
http://hal. inria. fr/ inria-00606457/ en -
26M. Hoyrup, C. Rojas, K. Weihrauch.
Computability of the Radon-Nikodym derivative, in: Computability in Europe, Sofia, Bulgaria, B. Löwe, D. Normann, I. Soskov, A. Soskova (editors), LNCS, Springer-Verlag, June 2011, vol. 6735, p. 132-141.
http://hal. inria. fr/ inria-00586740/ en -
27J.-Y. Marion.
A type system for complexity flow analysis, in: Twenty-Sixth Annual IEEE Symposium on Logic in Computer Science - LICS 2011, Toronto, Canada, ACM, June 2011, p. 1–10.
http://hal. inria. fr/ hal-00591853/ en
Internal Reports
-
28P. Beaucamps, I. Gnaedig, J.-Y. Marion.
Behavior Analysis of Malware by Rewriting-based Abstraction - Extended Version, Institut National Polytechnique de Lorraine, May 2011.
http://hal. inria. fr/ inria-00594396/ en
Scientific Popularization
-
29J.-Y. Marion.
Informatique et société : Un laboratoire de haute sécurité en informatique : entretien avec Jean-Yves Marion, in: La Recherche. Les Cahiers de l'Inria, January 2011, no 448 janvier 2011.
http://hal. inria. fr/ inria-00591075/ en
Other Publications
-
30O. Bournez, W. Gomaa, E. Hainry.
Algebraic Characterizations of Complexity-Theoretic Classes of Real Functions, 2011, Accepted for publication in International Journal of Unconventional Computing.
http://hal. inria. fr/ hal-00644361/ en -
31O. Bournez, D. Graça, E. Hainry.
Computation with perturbed dynamical systems, 2011, Soumis.
http://hal. inria. fr/ hal-00643634/ en
-
32L. Adleman.
An Abstract Theory of Computer Viruses, in: Advances in Cryptology — CRYPTO'88, Lecture Notes in Computer Science, 1988, vol. 403. -
33E. Asarin, O. Maler, A. Pnueli.
Reachability analysis of dynamical systems having piecewise-constant derivatives, in: Theoretical Computer Science, February 1995, vol. 138, no 1, p. 35–65. -
34F. Baader, T. Nipkow.
Term rewriting and all that, Cambridge University Press, New York, NY, USA, 1998. -
35P. Beaucamps, I. Gnaedig, J.-Y. Marion.
Behavior Abstraction in Malware Analysis, in: 1st International Conference on Runtime Verification, St. Julians, Malte, O. S. Grigore Rosu (editor), Lecture Notes in Computer Science, Springer-Verlag, August 2010, vol. 6418, p. 168-182.
http://hal. inria. fr/ inria-00536500/ en/ -
36P. Bell, J.-C. Delvenne, R. Jungers, V. D. Blondel.
The Continuous Skolem-Pisot Problem: On the Complexity of Reachability for Linear Ordinary Differential Equations, 2008.
http://arxiv. org/ abs/ 0809. 2189 -
37L. Blum, M. Shub, S. Smale.
On a theory of computation and complexity over the real numbers; NP completeness, recursive functions and universal machines, in: Bulletin of the American Mathematical Society, July 1989, vol. 21, no 1, p. 1–46. -
38G. Bonfante, M. Kaczmarek, J.-Y. Marion.
On abstract computer virology: from a recursion-theoretic perspective, in: Journal in Computer Virology, 2006, vol. 1, no 3-4. -
39M.G.J. van den. Brand, A. van. Deursen, J. Heering, H.A. de Jong, M. de Jonge, T. Kuipers, P. Klint, L. Moonen, P. Olivier, J. Scheerder, J. Vinju, E. Visser, J. Visser.
The ASF+SDF Meta-Environment: a Component-Based Language Development Environment, in: Compiler Construction (CC '01), R. Wilhelm (editor), Lecture Notes in Computer Science, Springer, 2001, vol. 2027, p. 365–370. -
40M. S. Branicky.
Universal computation and other capabilities of hybrid and continuous dynamical systems, in: Theoretical Computer Science, 6 February 1995, vol. 138, no 1, p. 67–100. -
41M. Braverman, M. Yampolsky.
Constructing non-computable Julia sets, in: STOC, D. S. Johnson, U. Feige (editors), ACM, 2007, p. 709-716. -
42M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, C. Talcott.
The Maude 2.0 System, in: Proceedings of the 14th International Conference on Rewriting Techniques and Applications, R. Nieuwenhuis (editor), Lecture Notes in Computer Science, Springer, June 2003, vol. 2706, p. 76-87. -
43F. Cohen.
Computer Viruses, University of Southern California, January 1986. -
44H. Comon.
Inductionless Induction, in: Handbook of Automated Reasoning, A. Robinson, A. Voronkov (editors), Elsevier Science, 2001, vol. I, chap. 14, p. 913-962. -
45N. Dershowitz, D. Plaisted.
Rewriting, in: Handbook of Automated Reasoning, A. Robinson, A. Voronkov (editors), Elsevier Science, 2001, vol. I, chap. 9, p. 535-610. -
46A. Edalat, P. Sünderhauf.
A domain-theoretic approach to computability on the real line, in: Theoretical Computer Science, 1999, vol. 210, no 1, p. 73–98. -
47E. Filiol.
Les virus informatiques: théorie, pratique et applications, Springer-Verlag France, 2004, Translation. -
48E. Filiol.
Computer Viruses: from Theory to Applications, Springer-Verlag, 2005. -
49E. Filiol.
Malware Pattern Scanning Schemes Secure Against Black-box Analysis, in: Journal in Computer Virology, 2006, vol. 2, no 1, p. 35-50. -
50E. Filiol.
Techniques virales avancées, Springer, 2007. -
51E. Filiol, G. Jacob, M. Le Liard.
Evaluation methodology and theoretical model for antiviral behavioural detection strategies, in: Journal in Computer Virology, 2007, vol. 3, no 1, p. 23-37. -
52O. Fissore, I. Gnaedig, H. Kirchner.
Termination of rewriting with local strategies, in: Selected papers of the 4th International Workshop on Strategies in Automated Deduction, M. P. Bonacina, B. Gramlich (editors), Electronic Notes in Theoretical Computer Science, Elsevier Science Publishers, 2001, vol. 58. -
53O. Fissore, I. Gnaedig, H. Kirchner.
CARIBOO : An induction based proof tool for termination with strategies, in: Proceedings of the Fourth International Conference on Principles and Practice of Declarative Programming, Pittsburgh (USA), ACM Press, October 2002, p. 62–73. -
54O. Fissore, I. Gnaedig, H. Kirchner.
Outermost ground termination, in: Proceedings of the Fourth International Workshop on Rewriting Logic and Its Applications, Pisa, Italy, Electronic Notes in Theoretical Computer Science, Elsevier Science Publishers, September 2002, vol. 71. -
55O. Fissore, I. Gnaedig, H. Kirchner.
A proof of weak termination providing the right way to terminate, in: First International Colloquium on Theoretical Aspect of Computing, Guiyang, China, Lecture Notes in Computer Science, Springer, September 2004, vol. 3407, p. 356-371. -
56I. Gnaedig.
Induction for Positive Almost Sure Termination, in: Proceedings of the Ninth ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming, Wroclaw, Poland, ACM Press, July 2007, p. 167–177. -
57I. Gnaedig, H. Kirchner.
Computing Constructor Forms with Non Terminating Rewrite Programs, in: Proceedings of the Eighth ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming, Venice, Italy, ACM Press, July 2006, p. 121–132. -
58I. Gnaedig, H. Kirchner.
Termination of Rewriting under Strategies, in: ACM Transactions on Computational Logic, 2009, vol. 10, no 2, p. 1-52.
http://hal. inria. fr/ inria-00182432/ en/ -
59I. Gnaedig, H. Kirchner.
Narrowing, Abstraction and Constraints for Proving Properties of Reduction Relations, in: Rewriting, Computation and Proof - Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of His 60th Birthday, Paris, France, H. Comon, C. Kirchner, H. Kirchner (editors), Lecture Notes in Computer Science, Springer, 2007, vol. 4600, p. 44-67.
http://hal. inria. fr/ inria-00182434/ en/ -
60E. Hainry.
Computing omega-limit Sets in Linear Dynamical Systems, in: Unconventional Computation, Autriche Vienne, C. S. Calude, J. F. Costa, R. Freund, M. Oswald, G. Rozenberg (editors), Springer, 2008, vol. 5204, p. 83–95.
http://hal. inria. fr/ inria-00250111/ en/ -
61E. Hainry.
Reachability in linear dynamical systems, in: Computability in Europe Logic and Theory of Algorithms, Grèce Athènes, A. Beckmann, C. Dimitracopoulos, B. Löwe (editors), Springer, 2008, vol. 5028, p. 241-250.
http://hal. inria. fr/ inria-00202674/ en/ -
62S. Kleene.
Introduction to Metamathematics, Van Nostrand, 1952. -
63K.-I. Ko.
Complexity Theory of Real Functions, Birkhäuser, 1991. -
64M. Ludwig.
The Giant Black Book of Computer Viruses, American Eagle Publications, 1998. -
65J.-Y. Marion.
Complexité implicite des calculs, de la théorie à la pratique, Université Nancy 2, 2000, Habilitation à diriger les recherches. -
66J.-Y. Marion, J.-Y. Moyen.
Efficient first order functional program interpreter with time bound certifications, in: Logic for Programming and Automated Reasoning, 7th International Conference, LPAR 2000, Reunion Island, France, M. Parigot, A. Voronkov (editors), Lecture Notes in Computer Science, Springer, Nov 2000, vol. 1955, p. 25–42. -
67J.-Y. Marion, R. Péchoux.
Resource Analysis by Sup-interpretation, in: FLOPS, Lecture Notes in Computer Science, Springer, 2006, vol. 3945, p. 163–176. -
68C. Moore.
Recursion Theory on the Reals and Continuous-Time Computation, in: Theor. Comput. Sci., 1996, vol. 162, no 1, p. 23-44. -
69P.-E. Moreau, C. Ringeissen, M. Vittek.
A Pattern Matching Compiler for Multiple Target Languages, in: 12th Conference on Compiler Construction, Warsaw (Poland), G. Hedin (editor), LNCS, Springer-Verlag, May 2003, vol. 2622, p. 61–76.
http://www. loria. fr/ ~moreau/ Papers/ MoreauRV-CC2003. ps. gz -
70B. Morin, L. Mé.
Intrusion detection and virology: an analysis of differences, similarities and complementariness, in: Journal in Computer Virology, 2007, vol. 3, no 1, p. 33-49. -
71P. Orponen.
A Survey of Continuous-Time Computation Theory, in: Advances in Algorithms, Languages, and Complexity, D.-Z. Du, K.-I. Ko (editors), Kluwer Academic Publishers, 1997, p. 209-224.
http://citeseerx. ist. psu. edu/ viewdoc/ summary?doi=10. 1. 1. 53. 1991 -
72C. E. Shannon.
Mathematical Theory of the Differential Analyser, in: Journal of Mathematics and Physics MIT, 1941, vol. 20, p. 337-354. -
73P. Szor.
The Art of Computer Virus Research and Defense, Addison-Wesley Professional, 2005. -
74 Terese.
Term Rewriting Systems, Cambridge Tracts in Theoretical Computer Science, Cambridge University Press, 2003, no 55. -
75K. Thompson.
Reflections on Trusting Trust, in: Communication of the ACM, august 1984, vol. 27, p. 761–763, Also appears in ACM Turing Award Lectures: The First Twenty Years 1965-1985. -
76M. Webster, G. Malcolm.
Detection of metamorphic computer viruses using algebraic specification, in: Journal in Computer Virology, 2006, vol. 2, no 3, p. 149-161. -
77M. Webster, G. Malcolm.
Detection of metamorphic and virtualization-based malware using algebraic specification, in: Journal in Computer Virology, 2009, vol. 5, no 3, p. 221-245. -
78K. Weihrauch.
Computable Analysis, Springer, 2000. -
79J. von Neumann.
Theory of Self-Reproducing Automata, University of Illinois Press, Urbana, Illinois, 1966, edited and completed by A.W.Burks.