Bibliography
Major publications by the team in recent years
-
1J. Brunel, D. Doligez, R. R. Hansen, J. L. Lawall, G. Muller.
A foundation for flow-based program matching using temporal logic and model checking, in: POPL, Savannah, GA, USA, ACM, January 2009, pp. 114–126. -
2L. Burgy, L. Réveillère, J. L. Lawall, G. Muller.
Zebu: A Language-Based Approach for Network Protocol Message Processing, in: IEEE Trans. Software Eng., 2011, vol. 37, no 4, pp. 575-591. -
3P.-É. Dagand, A. Baumann, T. Roscoe.
Filet-o-Fish: practical and dependable domain-specific languages for OS development, in: Programming Languages and Operating Systems (PLOS), 2009, pp. 51–55. -
4A. Kennedy, N. Benton, J. B. Jensen, P.-É. Dagand.
Coq: The World's Best Macro Assembler?, in: PPDP, Madrid, Spain, ACM, 2013, pp. 13–24. -
5G. Muller, C. Consel, R. Marlet, L. P. Barreto, F. Mérillon, L. Réveillère.
Towards Robust OSes for Appliances: A New Approach Based on Domain-specific Languages, in: Proceedings of the 9th Workshop on ACM SIGOPS European Workshop: Beyond the PC: New Challenges for the Operating System, Kolding, Denmark, 2000, pp. 19–24. -
6G. Muller, J. L. Lawall, H. Duchesne.
A Framework for Simplifying the Development of Kernel Schedulers: Design and Performance Evaluation, in: HASE - High Assurance Systems Engineering Conference, Heidelberg, Germany, IEEE, October 2005, pp. 56–65. -
7F. Mérillon, L. Réveillère, C. Consel, R. Marlet, G. Muller.
Devil: An IDL for hardware programming, in: Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI), San Diego, California, USENIX Association, October 2000, pp. 17–30. -
8Y. Padioleau, J. L. Lawall, R. R. Hansen, G. Muller.
Documenting and Automating Collateral Evolutions in Linux Device Drivers, in: EuroSys, Glasgow, Scotland, March 2008, pp. 247–260. -
9N. Palix, G. Thomas, S. Saha, C. Calvès, J. L. Lawall, G. Muller.
Faults in Linux 2.6, in: ACM Transactions on Computer Systems, June 2014, vol. 32, no 2, pp. 4:1–4:40.
Articles in International Peer-Reviewed Journals
-
10P.-E. Dagand, N. Tabareau, É. Tanter.
Foundations of Dependent Interoperability, in: Journal of Functional Programming, March 2018, vol. 28. [ DOI : 10.1017/S0956796818000011 ]
https://hal.inria.fr/hal-01629909 -
11K. Narasimhan, C. Reichenbach, J. Lawall.
Cleaning up Copy-Paste Clones with Interactive Merging, in: Journal of Automated Software Engineering, August 2018, vol. 25, no 3, pp. 627-673. [ DOI : 10.1007/s10515-018-0238-5 ]
https://hal.inria.fr/hal-01853896
International Conferences with Proceedings
-
12J.-J. Bai, Y.-P. Wang, J. Lawall, S.-M. Hu.
DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules, in: 2018 USENIX Annual Technical Conference, Boston, MA, United States, July 2018.
https://hal.inria.fr/hal-01853268 -
13J. Bouron, S. Chevalley, B. Lepers, W. Zwaenepoel, R. Gouicem, J. Lawall, G. Muller, J. Sopena.
The Battle of the Schedulers: FreeBSD ULE vs. Linux CFS, in: 2018 USENIX Annual Technical Conference, Boston, MA, United States, July 2018.
https://hal.inria.fr/hal-01853267 -
14J. Lawall, G. Muller.
Coccinelle: 10 Years of Automated Evolution in the Linux Kernel, in: 2018 USENIX Annual Technical Conference, Boston, MA, United States, July 2018.
https://hal.inria.fr/hal-01853271 -
15D. Mercadier, P.-É. Dagand, L. Lacassagne, G. Muller.
Usuba, Optimizing & Trustworthy Bitslicing Compiler, in: WPMVP’18 - Workshop on Programming Models for SIMD/Vector Processing, Vienna, Austria, ACM Press, February 2018. [ DOI : 10.1145/3178433.3178437 ]
https://hal.archives-ouvertes.fr/hal-01657259
Other Publications
-
16M. Martone, L. Iapichino, N. Hammer, J. Lawall.
Automating Data Layout Conversion in a Large Cosmological Simulation Code, September 2018, CoSaS 2018 - International Symposium on Computational Science at Scale, Poster.
https://hal.inria.fr/hal-01890314
-
17T. Ball, E. Bounimova, B. Cook, V. Levin, J. Lichtenberg, C. McGarvey, B. Ondrusek, S. K. Rajamani, A. Ustuner.
Thorough Static Analysis of Device Drivers, in: EuroSys, 2006, pp. 73–85. -
18A. Baumann, P. Barham, P.-É. Dagand, T. Harris, R. Isaacs, S. Peter, T. Roscoe, A. Schüpbach, A. Singhania.
The multikernel: A new OS architecture for scalable multicore systems, in: SOSP, 2009, pp. 29–44. -
19T. F. Bissyandé, L. Réveillère, J. L. Lawall, Y.-D. Bromberg, G. Muller.
Implementing an embedded compiler using program transformation rules, in: Software: Practice and Experience, 2013. -
20T. F. Bissyandé, L. Réveillère, J. Lawall, Y.-D. Bromberg, G. Muller.
Implementing an Embedded Compiler using Program Transformation Rules, in: Software: Practice and Experience, February 2015, vol. 45, no 2, pp. 177-196.
https://hal.archives-ouvertes.fr/hal-00844536 -
21T. F. Bissyandé, L. Réveillère, J. Lawall, G. Muller.
Ahead of Time Static Analysis for Automatic Generation of Debugging Interfaces to the Linux Kernel, in: Automated Software Engineering, May 2014, pp. 1-39. [ DOI : 10.1007/s10515-014-0152-4 ]
https://hal.archives-ouvertes.fr/hal-00992283 -
22A. P. Black, S. Ducasse, O. Nierstrasz, D. Pollet.
Pharo by Example, Square Bracket Associates, 2010. -
23E. Brady, K. Hammond.
Resource-Safe Systems Programming with Embedded Domain Specific Languages, in: 14th International Symposium on Practical Aspects of Declarative Languages (PADL), LNCS, Springer, 2012, vol. 7149, pp. 242–257. -
24T. Braibant, D. Pous.
An Efficient Coq Tactic for Deciding Kleene Algebras, in: 1st International Conference on Interactive Theorem Proving (ITP), LNCS, Springer, 2010, vol. 6172, pp. 163–178. -
25C. Cadar, D. Dunbar, D. R. Engler.
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, in: OSDI, 2008, pp. 209–224. -
26V. Chipounov, G. Candea.
Reverse Engineering of Binary Device Drivers with RevNIC, in: EuroSys, 2010, pp. 167–180. -
27A. Chlipala.
The Bedrock Structured Programming System: Combining Generative Metaprogramming and Hoare Logic in an Extensible Program Verifier, in: ICFP, 2013, pp. 391–402. -
28L. A. Clarke.
A system to generate test data and symbolically execute programs, in: IEEE Transactions on Software Engineering, 1976, vol. 2, no 3, pp. 215–222. -
29E. Clarke, O. Grumberg, S. Jha, Y. Lu, H. Veith.
Counterexample-guided abstraction refinement for symbolic model checking, in: J. ACM, 2003, vol. 50, no 5, pp. 752–794. -
30P. Cousot, R. Cousot.
Abstract Interpretation: Past, Present and Future, in: CSL-LICS, 2014, pp. 2:1–2:10. -
31P.-É. Dagand.
Reusability and Dependent Types, University of Strathclyde, 2013. -
32I. Dillig, T. Dillig, A. Aiken.
Sound, complete and scalable path-sensitive analysis, in: PLDI, June 2008, pp. 270–280. -
33D. Dinu, Y. L. Corre, D. Khovratovich, L. Perrin, J. Großschädl, A. Biryukov.
Triathlon of Lightweight Block Ciphers for the Internet of Things, 2015, Cryptology ePrint Archive, Report 2015/209. -
34D. R. Engler, B. Chelf, A. Chou, S. Hallem.
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions, in: OSDI, 2000, pp. 1–16. -
35D. R. Engler, D. Y. Chen, A. Chou, B. Chelf.
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code, in: SOSP, 2001, pp. 57–72. -
36A. Goldberg, D. Robson.
Smalltalk-80: The Language and Its Implementation, Addison-Wesley, 1983. -
37L. Gu, A. Vaynberg, B. Ford, Z. Shao, D. Costanzo.
CertiKOS: A Certified Kernel for Secure Cloud Computing, in: Proceedings of the Second Asia-Pacific Workshop on Systems (APSys), 2011, pp. 3:1–3:5. -
38L. Guo, J. L. Lawall, G. Muller.
Oops! Where did that code snippet come from?, in: 11th Working Conference on Mining Software Repositories, MSR, Hyderabad, India, ACM, May 2014, pp. 52–61. -
39A. Israeli, D. G. Feitelson.
The Linux kernel as a case study in software evolution, in: Journal of Systems and Software, 2010, vol. 83, no 3, pp. 485–501. -
40A. Kadav, M. M. Swift.
Understanding modern device drivers, in: ASPLOS, 2012, pp. 87–98. -
41G. A. Kildall.
A Unified Approach to Global Program Optimization, in: POPL, 1973, pp. 194–206. -
42G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, S. Winwood.
seL4: formal verification of an OS kernel, in: SOSP, 2009, pp. 207–220. -
43J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, G. Muller.
WYSIWIB: Exploiting fine-grained program structure in a scriptable API-usage protocol-finding process, in: Software, Practice Experience, 2013, vol. 43, no 1, pp. 67–92. -
44J. L. Lawall, B. Laurie, R. R. Hansen, N. Palix, G. Muller.
Finding Error Handling Bugs in OpenSSL using Coccinelle, in: Proceeding of the 8th European Dependable Computing Conference (EDCC), Valencia, Spain, April 2010, pp. 191–196. -
45J. L. Lawall, D. Lo.
An automated approach for finding variable-constant pairing bugs, in: 25th IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, September 2010, pp. 103–112. -
46J. Lawall, D. Palinski, L. Gnirke, G. Muller.
Fast and Precise Retrieval of Forward and Back Porting Information for Linux Device Drivers, in: 2017 USENIX Annual Technical Conference, Santa Clara, CA, United States, July 2017, 12 p.
https://hal.inria.fr/hal-01556589 -
47C. Le Goues, W. Weimer.
Specification Mining with Few False Positives, in: TACAS, York, UK, Lecture Notes in Computer Science, March 2009, vol. 5505, pp. 292–306. -
48B. Lepers, W. Zwaenepoel, J.-P. Lozi, N. Palix, R. Gouicem, J. Sopena, J. Lawall, G. Muller.
Towards Proving Optimistic Multicore Schedulers, in: HotOS 2017 - 16th Workshop on Hot Topics in Operating Systems, Whistler, British Columbia, Canada, ACM SIGOPS, May 2017, 6 p. [ DOI : 10.1145/3102980.3102984 ]
https://hal.inria.fr/hal-01556597 -
49Z. Li, S. Lu, S. Myagmar, Y. Zhou.
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code, in: OSDI, 2004, pp. 289–302. -
50Z. Li, Y. Zhou.
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code, in: Proceedings of the 10th European Software Engineering Conference, 2005, pp. 306–315. -
51D. Lo, S. Khoo.
SMArTIC: towards building an accurate, robust and scalable specification miner, in: FSE, 2006, pp. 265–275. -
52J.-P. Lozi, F. David, G. Thomas, J. Lawall, G. Muller.
Fast and Portable Locking for Multicore Architectures, in: ACM Transactions on Computer Systems, January 2016. [ DOI : 10.1145/2845079 ]
https://hal.inria.fr/hal-01252167 -
53S. Lu, S. Park, Y. Zhou.
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing, in: IEEE Transactions on Software Engineering, 2012, vol. 38, no 4, pp. 844–860. -
54M. Mernik, J. Heering, A. M. Sloane.
When and How to Develop Domain-specific Languages, in: ACM Comput. Surv., December 2005, vol. 37, no 4, pp. 316–344.
http://dx.doi.org/10.1145/1118890.1118892 -
55G. Morrisett, G. Tan, J. Tassarotti, J.-B. Tristan, E. Gan.
RockSalt: better, faster, stronger SFI for the x86, in: PLDI, 2012, pp. 395-404. -
56M. Odersky, T. Rompf.
Unifying functional and object-oriented programming with Scala, in: Commun. ACM, 2014, vol. 57, no 4, pp. 76–86. -
57M. C. Olesen, R. R. Hansen, J. L. Lawall, N. Palix.
Coccinelle: Tool support for automated CERT C Secure Coding Standard certification, in: Science of Computer Programming, October 2014, vol. 91, no B, pp. 141–160.
https://hal.inria.fr/hal-01096185 -
58K. Pavneet Singh, F. Thung, D. Lo, J. Lawall.
An Empirical Study on the Adequacy of Testing in Open Source Projects, in: 21st Asia-Pacific Software Engineering Conference, Jeju, South Korea, December 2014.
https://hal.inria.fr/hal-01096132 -
59T. Reps, T. Ball, M. Das, J. Larus.
The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem, in: ESEC/FSE, 1997, pp. 432–449. -
60L. R. Rodriguez, J. Lawall.
Increasing Automation in the Backporting of Linux Drivers Using Coccinelle, in: 11th European Dependable Computing Conference - Dependability in Practice, Paris, France, 11th European Dependable Computing Conference - Dependability in Practice, November 2015.
https://hal.inria.fr/hal-01213912 -
61C. Rubio-González, H. S. Gunawi, B. Liblit, R. H. Arpaci-Dusseau, A. C. Arpaci-Dusseau.
Error propagation analysis for file systems, in: PLDI, Dublin, Ireland, ACM, June 2009, pp. 270–280. -
62L. Ryzhyk, P. Chubb, I. Kuz, E. Le Sueur, G. Heiser.
Automatic device driver synthesis with Termite, in: SOSP, 2009, pp. 73–86. -
63L. Ryzhyk, A. Walker, J. Keys, A. Legg, A. Raghunath, M. Stumm, M. Vij.
User-Guided Device Driver Synthesis, in: OSDI, 2014, pp. 661–676. -
64R. k. Saha, J. L. Lawall, S. Khurshid, D. E. Perry.
On the Effectiveness of Information Retrieval Based Bug Localization for C Programs, in: ICSME 2014 - 30th International Conference on Software Maintenance and Evolution, Victoria, Canada, IEEE, September 2014, pp. 161-170. [ DOI : 10.1109/ICSME.2014.38 ]
https://hal.inria.fr/hal-01086082 -
65R. Saha, J. L. Lawall, S. Khurshid, D. E. Perry.
On the Effectiveness of Information Retrieval based Bug Localization for C Programs, in: International Conference on Software Maintenance and Evolution (ICSME), Victoria, BC, Canada, September 2014. -
66S. Saha, J.-P. Lozi, G. Thomas, J. Lawall, G. Muller.
Hector: Detecting resource-release omission faults in error-handling code for systems software, in: DSN 2013 - 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, IEEE Computer Society, June 2013, pp. 1-12. [ DOI : 10.1109/DSN.2013.6575307 ]
https://hal.inria.fr/hal-00918079 -
67D. A. Schmidt.
Data Flow Analysis is Model Checking of Abstract Interpretations, in: POPL, 1998, pp. 38–48. -
68P. Senna Tschudin, J. Lawall, G. Muller.
3L: Learning Linux Logging, in: BElgian-NEtherlands software eVOLution seminar (BENEVOL 2015), Lille, France, December 2015.
https://hal.inria.fr/hal-01239980 -
69P. Senna Tschudin, L. Réveillère, L. Jiang, D. Lo, J. Lawall, G. Muller.
Understanding the genetic makeup of Linux device drivers, in: PLOS'13 - 7th Workshop on Programming Languages and Operating Systems, Nemacolin Woodlands Resort, Pennsylvania, United States, ACM, November 2013. [ DOI : 10.1145/2525528.2525536 ]
https://hal.inria.fr/hal-00927070 -
70M. Shapiro.
Purpose-built languages, in: Commun. ACM, 2009, vol. 52, no 4, pp. 36–41. -
71P. Singh Kochhar, D. Lo, J. Lawall, N. Nagappan.
Code Coverage and Postrelease Defects: A Large-Scale Study on Open Source Projects, in: IEEE Transactions on Reliability, December 2017, vol. 66, no 4, pp. 1213 - 1228. [ DOI : 10.1109/TR.2017.2727062 ]
https://hal.inria.fr/hal-01653728 -
72R. Tartler, D. Lohmann, J. Sincero, W. Schröder-Preikschat.
Feature consistency in compile-time-configurable system software: facing the Linux 10,000 feature problem, in: EuroSys, 2011, pp. 47–60. -
73F. Thung, D. X. B. Le, D. Lo, J. Lawall.
Recommending Code Changes for Automatic Backporting of Linux Device Drivers, in: 32nd IEEE International Conference on Software Maintenance and Evolution (ICSME), Raleigh, North Carolina, United States, IEEE, October 2016.
https://hal.inria.fr/hal-01355859 -
74F. Thung, D. Lo, J. L. Lawall.
Automated library recommendation, in: WCRE 2013 - 20th Working Conference on Reverse Engineering, Koblenz, Germany, R. Lämmel, R. Oliveto, R. Robbes (editors), IEEE, October 2013, pp. 182-191. [ DOI : 10.1109/WCRE.2013.6671293 ]
https://hal.inria.fr/hal-00918076 -
75F. Thung, S. Wang, D. Lo, J. Lawall.
Automatic recommendation of API methods from feature requests, in: ASE 2013 - 28th IEEE/ACM International Conference on Automated Software Engineering, Palo Alto, California, United States, E. Denney, T. Bultan, A. Zeller (editors), IEEE, November 2013.
https://hal.inria.fr/hal-00918828 -
76Y. Tian, D. Lo, J. Lawall.
Automated construction of a software-specific word similarity database, in: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE, Antwerp, Belgium, IEEE, February 2014, pp. 44-53.
https://hal.inria.fr/hal-01086077 -
77Y. Tian, D. Lo, J. Lawall.
SEWordSim: software-specific word similarity database, ACM, May 2014, pp. 568-571, ICSE Companion 2014 - Companion Proceedings of the 36th International Conference on Software Engineering, Poster. [ DOI : 10.1145/2591062.2591071 ]
https://hal.inria.fr/hal-01086079 -
78W. Wang, M. Godfrey.
A Study of Cloning in the Linux SCSI Drivers, in: Source Code Analysis and Manipulation (SCAM), IEEE, 2011. -
79S. Wang, D. Lo, J. Lawall.
Compositional Vector Space Models for Improved Bug Localization, in: 30th International Conference on Software Maintenance and Evolution, Victoria, Canada, IEEE, September 2014, pp. 171-180.
https://hal.inria.fr/hal-01086084 -
80J. Yang, C. Hawblitzel.
Safe to the Last Instruction: Automated Verification of a Type-safe Operating System, in: PLDI, 2010, pp. 99–110.