Bibliography
Major publications by the team in recent years
-
1J. Brunel, D. Doligez, R. R. Hansen, J. L. Lawall, G. Muller.
A foundation for flow-based program matching using temporal logic and model checking, in: POPL, Savannah, GA, USA, ACM, January 2009, pp. 114–126. -
2L. Burgy, L. Réveillère, J. L. Lawall, G. Muller.
Zebu: A Language-Based Approach for Network Protocol Message Processing, in: IEEE Trans. Software Eng., 2011, vol. 37, no 4, pp. 575-591. -
3P.-É. Dagand, A. Baumann, T. Roscoe.
Filet-o-Fish: practical and dependable domain-specific languages for OS development, in: Programming Languages and Operating Systems (PLOS), 2009, pp. 51–55. -
4A. Kennedy, N. Benton, J. B. Jensen, P.-É. Dagand.
Coq: The World's Best Macro Assembler?, in: PPDP, Madrid, Spain, ACM, 2013, pp. 13–24. -
5G. Muller, C. Consel, R. Marlet, L. P. Barreto, F. Mérillon, L. Réveillère.
Towards Robust OSes for Appliances: A New Approach Based on Domain-specific Languages, in: Proceedings of the 9th Workshop on ACM SIGOPS European Workshop: Beyond the PC: New Challenges for the Operating System, Kolding, Denmark, 2000, pp. 19–24. -
6G. Muller, J. L. Lawall, H. Duchesne.
A Framework for Simplifying the Development of Kernel Schedulers: Design and Performance Evaluation, in: HASE - High Assurance Systems Engineering Conference, Heidelberg, Germany, IEEE, October 2005, pp. 56–65. -
7F. Mérillon, L. Réveillère, C. Consel, R. Marlet, G. Muller.
Devil: An IDL for hardware programming, in: Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI), San Diego, California, USENIX Association, October 2000, pp. 17–30. -
8Y. Padioleau, J. L. Lawall, R. R. Hansen, G. Muller.
Documenting and Automating Collateral Evolutions in Linux Device Drivers, in: EuroSys, Glasgow, Scotland, March 2008, pp. 247–260. -
9N. Palix, G. Thomas, S. Saha, C. Calvès, J. L. Lawall, G. Muller.
Faults in Linux 2.6, in: ACM Transactions on Computer Systems, June 2014, vol. 32, no 2, pp. 4:1–4:40.
Articles in International Peer-Reviewed Journals
-
10J.-P. Lozi, F. David, G. Thomas, J. Lawall, G. Muller.
Fast and Portable Locking for Multicore Architectures, in: ACM Transactions on Computer Systems, January 2016. [ DOI : 10.1145/2845079 ]
https://hal.inria.fr/hal-01252167 -
11W. Maldonado, P. MARLIER, P. Felber, J. Lawall, G. Muller, E. Rivière.
Supporting Time-Based QoS Requirements in Software Transactional Memory, in: ACM Transactions on Parallel Computing, July 2015, vol. 2, no 2, 27 p. [ DOI : 10.1145/2779621 ]
https://hal.inria.fr/hal-01240225
International Conferences with Proceedings
-
12K. Attouchi, G. Thomas, G. Muller, J. L. Lawall, A. Bottaro.
Preventing Memory and Information LeakageIncinerator – Eliminating Stale References in Dynamic OSGi Applications, in: Dependable Systems and Networks, Rio de Janeiro, Brazil, 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE, September 2015.
https://hal.inria.fr/hal-01198922 -
13G. Lena Cota, S. Ben Mokhtar, J. Lawall, G. Muller, G. Gianini, E. Damiani, L. Brunie.
A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems, in: SRDS 2015 - 34th International Symposium on Reliable Distributed Systems, Montreal, Canada, 34th International Symposium on Reliable Distributed Systems, September 2015.
https://hal.inria.fr/hal-01250717 -
14N. Palix, J.-R. Falleri, J. Lawall.
Improving pattern tracking with a language-aware tree differencing algorithm, in: SANER 2015 - 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, Montreal, Canada, SANER 2015 - 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, March 2015, pp. 43-52. [ DOI : 10.1109/SANER.2015.7081814 ]
https://hal.inria.fr/hal-01213907 -
15L. R. Rodriguez, J. Lawall.
Increasing Automation in the Backporting of Linux Drivers Using Coccinelle, in: 11th European Dependable Computing Conference - Dependability in Practice, Paris, France, 11th European Dependable Computing Conference - Dependability in Practice, November 2015.
https://hal.inria.fr/hal-01213912 -
16R. k. Saha, J. Lawall, S. Khurshid, D. E. Perry.
Are These Bugs Really "Normal"?, in: MSR 2015 - The 12th Working Conference on Mining Software Repositories, Florence, Italy, MSR 2015 - The 12th Working Conference on Mining Software Repositories, May 2015.
https://hal.inria.fr/hal-01240036
Conferences without Proceedings
-
17A. Blot, P.-É. Dagand, J. Lawall.
From Sets to Bits in Coq, in: FLOPS 2016, Kochi, Japan, March 2016.
https://hal.archives-ouvertes.fr/hal-01251943 -
18P. Senna Tschudin, J. Lawall, G. Muller.
3L: Learning Linux Logging, in: BElgian-NEtherlands software eVOLution seminar (BENEVOL 2015), Lille, France, December 2015.
https://hal.inria.fr/hal-01239980
-
19T. Ball, E. Bounimova, B. Cook, V. Levin, J. Lichtenberg, C. McGarvey, B. Ondrusek, S. K. Rajamani, A. Ustuner.
Thorough Static Analysis of Device Drivers, in: EuroSys, 2006, pp. 73–85. -
20J. Bangert, N. Zeldovich.
Nail: A Practical Tool for Parsing and Generating Data Formats, in: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2014, pp. 615–628. -
21A. Baumann, P. Barham, P.-É. Dagand, T. Harris, R. Isaacs, S. Peter, T. Roscoe, A. Schüpbach, A. Singhania.
The multikernel: A new OS architecture for scalable multicore systems, in: SOSP, 2009, pp. 29–44. -
22T. F. Bissyandé, L. Réveillère, J. L. Lawall, Y.-D. Bromberg, G. Muller.
Implementing an embedded compiler using program transformation rules, in: Software: Practice and Experience, 2013. -
23T. F. Bissyandé, L. Réveillère, J. L. Lawall, G. Muller.
Diagnosys: automatic generation of a debugging interface to the Linux kernel, in: IEEE/ACM International Conference on Automated Software Engineering (ASE), 2012, pp. 60–69. -
24A. P. Black, S. Ducasse, O. Nierstrasz, D. Pollet.
Pharo by Example, Square Bracket Associates, 2010. -
25E. Brady, K. Hammond.
Resource-Safe Systems Programming with Embedded Domain Specific Languages, in: 14th International Symposium on Practical Aspects of Declarative Languages (PADL), LNCS, Springer, 2012, vol. 7149, pp. 242–257. -
26T. Braibant, D. Pous.
An Efficient Coq Tactic for Deciding Kleene Algebras, in: 1st International Conference on Interactive Theorem Proving (ITP), LNCS, Springer, 2010, vol. 6172, pp. 163–178. -
27C. Cadar, D. Dunbar, D. R. Engler.
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, in: OSDI, 2008, pp. 209–224. -
28V. Chipounov, G. Candea.
Reverse Engineering of Binary Device Drivers with RevNIC, in: EuroSys, 2010, pp. 167–180. -
29A. Chlipala.
The Bedrock Structured Programming System: Combining Generative Metaprogramming and Hoare Logic in an Extensible Program Verifier, in: ICFP, 2013, pp. 391–402. -
30L. A. Clarke.
A system to generate test data and symbolically execute programs, in: IEEE Transactions on Software Engineering, 1976, vol. 2, no 3, pp. 215–222. -
31E. Clarke, O. Grumberg, S. Jha, Y. Lu, H. Veith.
Counterexample-guided abstraction refinement for symbolic model checking, in: J. ACM, 2003, vol. 50, no 5, pp. 752–794. -
32P. Cousot, R. Cousot.
Abstract Interpretation: Past, Present and Future, in: CSL-LICS, 2014, pp. 2:1–2:10. -
33I. Dillig, T. Dillig, A. Aiken.
Sound, complete and scalable path-sensitive analysis, in: PLDI, June 2008, pp. 270–280. -
34D. R. Engler, B. Chelf, A. Chou, S. Hallem.
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions, in: OSDI, 2000, pp. 1–16. -
35D. R. Engler, D. Y. Chen, A. Chou, B. Chelf.
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code, in: SOSP, 2001, pp. 57–72. -
36A. Goldberg, D. Robson.
Smalltalk-80: The Language and Its Implementation, Addison-Wesley, 1983. -
37L. Gu, A. Vaynberg, B. Ford, Z. Shao, D. Costanzo.
CertiKOS: A Certified Kernel for Secure Cloud Computing, in: Proceedings of the Second Asia-Pacific Workshop on Systems (APSys), 2011, pp. 3:1–3:5. -
38L. Guo, J. L. Lawall, G. Muller.
Oops! Where did that code snippet come from?, in: 11th Working Conference on Mining Software Repositories, MSR, Hyderabad, India, ACM, May 2014, pp. 52–61. -
39A. Israeli, D. G. Feitelson.
The Linux kernel as a case study in software evolution, in: Journal of Systems and Software, 2010, vol. 83, no 3, pp. 485–501. -
40A. Kadav, M. M. Swift.
Understanding modern device drivers, in: ASPLOS, 2012, pp. 87–98. -
41A. Kennedy, N. Benton, J. B. Jensen, P.-É. Dagand.
Coq: The World's Best Macro Assembler?, in: PPDP, Madrid, Spain, ACM, 2013, pp. 13–24. -
42G. A. Kildall.
A Unified Approach to Global Program Optimization, in: POPL, 1973, pp. 194–206. -
43G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, S. Winwood.
seL4: formal verification of an OS kernel, in: SOSP, 2009, pp. 207–220. -
44P. S. Kochhar, F. Thung, D. Lo, J. L. Lawall.
An Empirical Study on the Adequacy of Testing in Open Source Projects, in: Asia-Pacific Software Engineering Conference (APSEC), Jeju, Korea, December 2014. -
45J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, G. Muller.
WYSIWIB: Exploiting fine-grained program structure in a scriptable API-usage protocol-finding process, in: Software, Practice Experience, 2013, vol. 43, no 1, pp. 67–92. -
46J. L. Lawall, B. Laurie, R. R. Hansen, N. Palix, G. Muller.
Finding Error Handling Bugs in OpenSSL using Coccinelle, in: Proceeding of the 8th European Dependable Computing Conference (EDCC), Valencia, Spain, April 2010, pp. 191–196. -
47J. L. Lawall, D. Lo.
An automated approach for finding variable-constant pairing bugs, in: 25th IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, September 2010, pp. 103–112. -
48C. Le Goues, W. Weimer.
Specification Mining with Few False Positives, in: TACAS, York, UK, Lecture Notes in Computer Science, March 2009, vol. 5505, pp. 292–306. -
49O. Levillain.
Parsifal: a Pragmatic Solution to the Binary Parsing Problem, in: LangSec Workshop at IEEE Security & Privacy, May 2014. -
50Z. Li, S. Lu, S. Myagmar, Y. Zhou.
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code, in: OSDI, 2004, pp. 289–302. -
51Z. Li, Y. Zhou.
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code, in: Proceedings of the 10th European Software Engineering Conference, 2005, pp. 306–315. -
52D. Lo, S. Khoo.
SMArTIC: towards building an accurate, robust and scalable specification miner, in: FSE, 2006, pp. 265–275. -
53J.-P. Lozi, F. David, G. Thomas, J. L. Lawall, G. Muller.
Remote Core Locking: migrating critical-section execution to improve the performance of multithreaded applications, in: USENIX Annual Technical Conference, Boston, MA, USA, June 2012, pp. 65–76. -
54S. Lu, S. Park, Y. Zhou.
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing, in: IEEE Transactions on Software Engineering, 2012, vol. 38, no 4, pp. 844–860. -
55S. McCanne, V. Jacobson.
The BSD Packet Filter: A New Architecture for User-level Packet Capture, in: USENIX Winter, 1993, pp. 259–269. -
56M. Mernik, J. Heering, A. M. Sloane.
When and How to Develop Domain-specific Languages, in: ACM Comput. Surv., December 2005, vol. 37, no 4, pp. 316–344.
http://dx.doi.org/10.1145/1118890.1118892 -
57G. Morrisett, G. Tan, J. Tassarotti, J.-B. Tristan, E. Gan.
RockSalt: better, faster, stronger SFI for the x86, in: PLDI, 2012, pp. 395-404. -
58M. Odersky, T. Rompf.
Unifying functional and object-oriented programming with Scala, in: Commun. ACM, 2014, vol. 57, no 4, pp. 76–86. -
59T. Reps, T. Ball, M. Das, J. Larus.
The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem, in: ESEC/FSE, 1997, pp. 432–449. -
60C. Rubio-González, H. S. Gunawi, B. Liblit, R. H. Arpaci-Dusseau, A. C. Arpaci-Dusseau.
Error propagation analysis for file systems, in: PLDI, Dublin, Ireland, ACM, June 2009, pp. 270–280. -
61L. Ryzhyk, P. Chubb, I. Kuz, E. Le Sueur, G. Heiser.
Automatic device driver synthesis with Termite, in: SOSP, 2009, pp. 73–86. -
62L. Ryzhyk, A. Walker, J. Keys, A. Legg, A. Raghunath, M. Stumm, M. Vij.
User-Guided Device Driver Synthesis, in: OSDI, 2014, pp. 661–676. -
63R. Saha, J. L. Lawall, S. Khurshid, D. E. Perry.
On the Effectiveness of Information Retrieval based Bug Localization for C Programs, in: International Conference on Software Maintenance and Evolution (ICSME), Victoria, BC, Canada, September 2014. -
64S. Saha, J.-P. Lozi, G. Thomas, J. L. Lawall, G. Muller.
Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software, in: 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2013, pp. 1–12. -
65D. A. Schmidt.
Data Flow Analysis is Model Checking of Abstract Interpretations, in: POPL, 1998, pp. 38–48. -
66P. Senna Tschudin, L. Réveillère, L. Jiang, D. Lo, J. L. Lawall, G. Muller.
Understanding the Genetic Makeup of Linux Device Drivers, in: PLOS, November 2013. -
67M. Shapiro.
Purpose-built languages, in: Commun. ACM, 2009, vol. 52, no 4, pp. 36–41. -
68R. Tartler, D. Lohmann, J. Sincero, W. Schröder-Preikschat.
Feature consistency in compile-time-configurable system software: facing the Linux 10,000 feature problem, in: EuroSys, 2011, pp. 47–60. -
69F. Thung, D. Lo, J. L. Lawall.
Automated library recommendation, in: 20th Working Conference on Reverse Engineering (WCRE), Koblenz, Germany, 2013, pp. 182–191. -
70F. Thung, S. Wang, D. Lo, J. L. Lawall.
Automatic Recommendation of API Methods from Feature Requests, in: 28th IEEE/ACM International Conference on Automated Software Engineering, Palo Alto, CA, USA, November 2013. -
71Y. Tian, J. L. Lawall, D. Lo.
Identifying Linux bug fixing patches, in: ICSE, Zurich, Switzerland, June 2012, pp. 386–396. -
72Y. Tian, D. Lo, J. L. Lawall.
Automated construction of a software-specific word similarity database, in: CSMR-WCRE, Antwerp, Belgium, IEEE, February 2014, pp. 44–53. -
73Y. Tian, D. Lo, J. L. Lawall.
SEWordSim: software-specific word similarity database, in: ICSE Companion, Hyderabad, India, ACM, May 2014, pp. 568–571. -
74J.-B. Tristan, X. Leroy.
Formal verification of translation validators: a case study on instruction scheduling optimizations, in: POPL, 2008, pp. 17–27. -
75W. Wang, M. Godfrey.
A Study of Cloning in the Linux SCSI Drivers, in: Source Code Analysis and Manipulation (SCAM), IEEE, 2011. -
76S. Wang, D. Lo, J. L. Lawall.
Compositional Vector Space Models for Improved Bug Localization, in: International Conference on Software Maintenance and Evolution (ICSME), Victoria, BC, Canada, September 2014. -
77H. S. Warren.
Hacker's Delight, Addison-Wesley Professional, 2012. -
78J. Yang, C. Hawblitzel.
Safe to the Last Instruction: Automated Verification of a Type-safe Operating System, in: PLDI, 2010, pp. 99–110.