Skip to Main content Skip to Navigation

hal-00724508v1  Conference papers
Omar ChebaroMickaël DelahayeNikolai Kosmatov. Testing Inexecutable Conditions on Input Pointers in C Programs with SANTE
ICSSEA 2012 - 24th International Conference on Software & Systems Engineering and their Applications, Oct 2012, Paris, France. pp.1-7
tel-01751072v1  Theses
Philippe Beaucamps. Analyse de programmes malveillants par abstraction de comportements
Autre [cs.OH]. Institut National Polytechnique de Lorraine, 2011. Français. ⟨NNT : 2011INPL092N⟩
hal-03028476v1  Conference papers
Santiago BautistaThomas JensenBenoît Montagu. Numeric Domains Meet Algebraic Data Types
9th International Workshop on Numerical and Symbolic Abstract Domains (NSAD 2020), Nov 2020, Virtual, United States. pp.12-16, ⟨10.1145/3427762.3430178⟩
hal-01408266v1  Conference papers
Krishna NarasimhanChristoph ReichenbachJulia Lawall. Interactive Data Representation Migration: Exploiting Program Dependence to Aid Program Transformation
PEPM 2017 Workshop on Partial Evaluation and Program Manipulation, Jan 2017, Paris, France
hal-03032244v1  Journal articles
Jia-Ju BaiJulia LawallShi-Min Hu. Effective Detection of Sleep-in-Atomic-Context Bugs in the Linux Kernel
ACM Transactions on Computer Systems, Association for Computing Machinery, 2020, 36 (4), pp.10. ⟨10.1145/3381990⟩
inria-00544957v1  Conference papers
Dorina GhindiciGilles GrimaudIsabelle Simplot-Ryl. Embedding Verifiable Information Flow Analysis
Proc. 4th Annual Conference on Privacy, Security and Trust, 2006, Toronto, Canada. pp.343--352
hal-01110903v1  Conference papers
Mark HillsPaul KlintJurgen Vinju. Static, lightweight includes resolution for PHP
ASE 29 Proceedings of International Conference on Automated Software Engineering 2014, Sep 2014, Vasteras, Sweden. pp.503 - 514, ⟨10.1145/2642937.2643017⟩
inria-00332389v1  Conference papers
Jean-Yves MarionRomain Péchoux. Characterizations of Polynomial Complexity Classes with a Better Intensionality
Proceedings of the 10th international ACM SIGPLAN conference on Principles and Practice of Declarative Programming - PPDP 2008, Universidad Polytechnica, Jul 2008, Valencia, Spain. pp.79-88, ⟨10.1145/1389449.1389460⟩
hal-01829135v1  Conference papers
Sarra HabchiXavier BlancRomain Rouvoy. On Adopting Linters to Deal with Performance Concerns in Android Apps
ASE18 - Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering, Sep 2018, Montpellier, France. ⟨10.1145/3238147.3238197⟩
tel-00644079v1  Theses
Bas Basten. Ambiguity Detection for Programming Language Grammars
Computation and Language [cs.CL]. Universiteit van Amsterdam, 2011. English
hal-00484906v1  Journal articles
Hervé Grall. A Confinement Criterion for Securely Executing Mobile Code
Journal of Automata Languages and Combinatorics, Otto-von-Guericke-Universität Magdeburg, 2006, 1 (11), pp.59-106
tel-00133591v3  Theses
Pierre Genevès. Logics for XML
Networking and Internet Architecture [cs.NI]. Institut National Polytechnique de Grenoble - INPG, 2006. English
hal-00801571v1  Conference papers
Christophe AliasAlain DartePaul FeautrierLaure Gonnord. Rank: a tool to check program termination and computational complexity
Constraints in Software Testing Verification and Analysis, Mar 2013, Luxembourg
tel-02132759v1  Theses
Mourad Leslous. Highlight and execute suspicious paths in Android malware
Cryptography and Security [cs.CR]. Université Rennes 1, 2018. English. ⟨NNT : 2018REN1S090⟩
inria-00528632v1  Conference papers
Julien BertranePatrick CousotRadhia CousotJérôme FeretLaurent Mauborgne et al.  Static Analysis by Abstract Interpretation of Embedded Critical Software
the 3rd IEEE International workshop UML and Formal Methods, Nov 2010, Shangai, China