Team Celtique

Members
Overall Objectives
Scientific Foundations
Software
New Results
Contracts and Grants with Industry
Dissemination
Bibliography

Bibliography

Major publications by the team in recent years

[1]
F. Besson, T. Jensen, D. Pichardie.
Proof-Carrying Code from Certified Abstract Interpretation to Fixpoint Compression, in: Special Issue on Applied Semantics of Theoretical Computer Science, 2006, vol. 364, no 3, p. 273–291.
[2]
F. Besson, T. Jensen, T. Turpin.
Computing stack maps with interfaces, in: Proc. of the 22nd European Conference on Object-Oriented Programming (ECOOP 2008), LNCS, Springer-Verlag, 2008, vol. 5142, p. 642-666.
[3]
B. Boyer, T. Genet, T. Jensen.
Certifying a Tree Automata Completion Checker, in: 4th International Joint Conference, IJCAR 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5195, p. 347–362.
[4]
D. Cachera, T. Jensen, D. Pichardie, V. Rusu.
Extracting a Data Flow Analyser in Constructive Logic, in: Theoretical Computer Science, 2005, vol. 342, no 1, p. 56–78.
[5]
F. Charreteur, B. Botella, A. Gotlieb.
Modelling dynamic memory management in Constraint-Based Testing, in: The Journal of Systems and Software, Nov. 2009, vol. 82, no 11, p. 1755–1766, Special Issue: TAIC-PART 2007 and MUTATION 2007.
[6]
G. Feuillade, T. Genet, V. Viet Triem Tong.
Reachability Analysis over Term Rewriting Systems, in: Journal of Automated Reasoning, 2004, vol. 33, no 3–4, p. 341–383.
[7]
A. Gotlieb, T. Denmat, B. Botella.
Goal-oriented test data generation for pointer programs, in: Information and Software Technology, Sep. 2007, vol. 49, no 9-10, p. 1030–1044.
[8]
A. Gotlieb.
EUCLIDE: A Constraint-Based Testing platform for critical C programs, in: 2th International Conference on Software Testing, Validation and Verification (ICST'09), Denver, CO, Apr. 2009.

Publications of the year

Doctoral Dissertations and Habilitation Theses

[9]
T. Genet.
Reachability Analysis of Rewriting for Software Verification, Université de Rennes 1, 2009, Habilitation à Diriger des Recherches.

Articles in International Peer-Reviewed Journal

[10]
F. Besson, T. Jensen, G. Dufay, D. Pichardie.
Verifying Resource Access Control on Mobile Interactive Devices, in: Journal of Computer Security, 2010, To appear.
[11]
S. Blazy, X. Leroy.
Mechanized semantics for the Clight subset of the C language, in: Journal of Automated Reasoning, 2009, vol. 43, no 3, p. 263-288.
[12]
T. Genet, V. Rusu.
Equational Tree Automata Completion, in: Journal of Symbolic Computation, 2010, To Appear.
[13]
A. Gotlieb.
TCAS software verification using Constraint Programming, in: The Knowledge Engineering Review, 2009, Under revision.

Articles in National Peer-Reviewed Journal

[14]
D. Cachera, D. Pichardie.
Programmation d'un interpréteur abstrait certifié en logique constructive, in: Technique et Science Informatiques (TSI), 2010, To appear.

International Peer-Reviewed Conference/Proceedings

[15]
F. Besson.
CPA beats oo-CFA, in: Proceedings of the 11th International Workshop on Formal Techniques for Java-like Programs, ACM, 2009, p. 1–6.
[16]
S. Blazy, B. Robillard, A. Appel.
Formal Verification of Coalescing Graph-Coloring Register Allocation, in: Proceedings of the 19th European Symposiumon Programming (ESOP 2010), Lecture Notes in Computer Science, Springer-Verlag, 2010, vol. 6012, 20 pages, to appear.
[17]
S. Blazy, B. Robillard.
Live-range Unsplitting for Faster Optimal Coalescing, in: Proceedings of the ACM SIGPLAN/SIGBED 2009 conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2009), ACM, 2009, p. 70–79
http://doi.acm.org/10.1145/1542452.1542462.
[18]
B. Boyer, T. Genet.
Verifying Temporal Regular properties of Abstractions of Term Rewriting Systems, in: Proc. of RULE'09, EPTCS, 2010, To Appear.
[19]
D. Cachera, D. Pichardie.
Comparing Techniques for Certified Static Analysis, in: Proc. of the 1st NASA Formal Methods Symposium (NFM'09), NASA Ames Research Center, 2009, p. 111-115.
[20]
F. Dabrowski, D. Pichardie.
A Certified Data Race Analysis for a Java-like Language, in: Proc. of 22nd International Conference on Theorem Proving in Higher Order Logics (TPHOLs'09), Lecture Notes in Computer Science, Springer-Verlag, 2009, vol. 5674, p. 212-227.
[21]
A. Gotlieb.
EUCLIDE: A Constraint-Based Testing platform for critical C programs, in: 2th International Conference on Software Testing, Validation and Verification (ICST'09), Denver, CO, Apr. 2009.
[22]
A. Gotlieb, M. Petit.
Towards a Theory for Testing Non-terminating Programs, in: 33nd Annual IEEE International Computer Software and Applications Conference (COMPSAC'09), Seattle, USA, Jul. 2009, 6 pages.
[23]
G. Guette, O. Heen.
A TPM-based Architecture for Improved Security and Anonymity in Vehicular Ad hoc Networks, in: In International Vehicular Networking Conference (IEEE VNC 2009), 2009.
[24]
O. Heen, G. Guette, T. Genet.
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks, in: WISTP 2009 3rd edition, LNCS, Springer, 2009, vol. 5746.
[25]
L. Hubert, D. Pichardie.
Soundly Handling Static Fields: Issues, Semantics and Analysis, in: Proc. of the 4th International Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE'09), Electronic Notes in Theoretical Computer Science, 2009, vol. 253, no 5, p. 15–30.
[26]
J. Midtgaard, T. Jensen.
Control-flow analysis of function calls and returns by abstract interpretation, in: Proceedings of the 14th ACM international conference on Functional programming, ACM, 2009, p. 287–298.

Scientific Books (or Scientific Book chapters)

[27]
F. Besson, D. Cachera, T. Jensen, D. Pichardie.
Certified Static Analysis by Abstract Interpretation, in: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, Lecture Notes in Computer Science, Springer-Verlag, 2009, vol. 5705, p. 223-257.

Internal Reports

[28]
D. Demange, T. Jensen, D. Pichardie.
A Provably Correct Stackless Intermediate Representation For Java Bytecode, INRIA, 2009, no RR-7021
http://hal.inria.fr/inria-00414099/en/, Research Report.
[29]
T. Turpin, F. Besson, T. Jensen.
Computing the Least Fix-point Semantics of Logic Programs Using BDDs, INRIA, 2009, no 7107, Research Report.

References in notes

[30]
The Coq Proof Assistant, 2009
http://coq.inria.fr/.
[31]
E. Albert, P. Arenas, S. Genaim, G. Puebla, D. Zanardini.
COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode, in: FMCO, 2007, p. 113-132.
[32]
E. Albert, G. Puebla, M. Hermenegildo.
Abstraction-Carrying Code, in: Proc. of 11th Int. Conf. on Logic for Programming Artificial Intelligence and Reasoning (LPAR'04), Springer LNAI vol. 3452, 2004, p. 380-397.
[33]
A. W. Appel.
Foundational Proof-Carrying Code, in: Logic in Computer Science, J. Halpern (editor), IEEE Press, June 2001, 247 p, Invited Talk.
[34]
A. W. Appel, Amy P. Felty.
A Semantic Model of Types and Machine Instructions for Proof-Carrying Code, in: Principles of Programming Languages, ACM, 2000.
[35]
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santos Santiago, M. Turuani, L. Viganò, L. Vigneron.
The AVISPA Tool for the automated validation of internet security protocols and applications, in: CAV'2005, LNCS, Springer, 2005, vol. 3576, p. 281-285.
[36]
D. Aspinall, L. Beringer, M. Hofmann, Hans-Wolfgang. Loidl, A. Momigliano.
A Program Logic for Resource Verification, in: In Proceedings of the 17th International Conference on Theorem Proving in Higher-Order Logics, (TPHOLs 2004), volume 3223 of LNCS, Springer, 2004, p. 34–49.
[37]
D. F. Bacon, P. F. Sweeney.
Fast Static Analysis of C++ Virtual Function Calls, in: OOPSLA'96, 1996, p. 324-341.
[38]
P. Baillot, P. Coppola, U. D. Lago.
Light Logics and Optimal Reduction: Completeness and Complexity, in: LICS, 2007, p. 421-430.
[39]
E. Balland, Y. Boichut, T. Genet, P.-E. Moreau.
Towards an Efficient Implementation of Tree Automata Completion, in: Algebraic Methodology and Software Technology, 12th International Conference, AMAST 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5140, p. 67-82.
[40]
G. Barthe, D. Pichardie, T. Rezk.
A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Proc. of 16th European Symposium on Programming (ESOP'07), Lecture Notes in Computer Science, Springer-Verlag, 2007, vol. 4421, p. 125-140.
[41]
F. Besson, T. P. Jensen.
Modular Class Analysis with DATALOG, in: SAS'2003, 2003, p. 19-36.
[42]
Y. Boichut, P.-C. Héam, O. Kouchnarenko.
Automatic Approximation for the Verification of Cryptographic Protocols, in: Proc. AVIS'2004, joint to ETAPS'04, Barcelona (Spain), 2004.
[43]
Y. Boichut, P.-C. Héam, O. Kouchnarenko.
Automatic Verification of Security Protocols Using Approximations, INRIA, 2005, no RR 5727, Research Report.
[44]
B. Boyer, T. Genet, T. Jensen.
Certifying a Tree Automata Completion Checker, in: 4th International Joint Conference, IJCAR 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5195, p. 347–362.
[45]
D. Cachera, T. Jensen, A. Jobin, P. Sotin.
Long-Run Cost Analysis by Approximation of Linear Operators over Dioids, in: Algebraic Methodology and Software Technology, 12th International Conference, AMAST 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5140, p. 122-138.
[46]
D. Cachera, T. Jensen, D. Pichardie, V. Rusu.
Extracting a Data Flow Analyser in Constructive Logic, in: Theoretical Computer Science, 2005, vol. 342, no 1, p. 56–78.
[47]
D. Cachera, T. Jensen, D. Pichardie, G. Schneider.
Certified Memory Usage Analysis, in: Proc. of 13th International Symposium on Formal Methods (FM'05), LNCS, Springer-Verlag, 2005.
[48]
P. Cousot, R. Cousot.
Abstract Interpretation: a Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints, in: Proc. of POPL'77, 1977, p. 238–252.
[49]
A. Ermedahl, C. Sandberg, J. Gustafsson, S. Bygde, B. Lisper.
Loop Bound Analysis based on a Combination of Program Slicing, Abstract Interpretation, and Invariant Analysis, in: Seventh International Workshop on Worst-Case Execution Time Analysis, (WCET'2007), July 2007
http://www.mrtc.mdh.se/index.php?choice=publications&id=1317.
[50]
M. Fähndrich, K. R. M. Leino.
Declaring and checking non-null types in an object-oriented language, in: OOPSLA, 2003, p. 302-312.
[51]
C. Flanagan.
Automatic software model checking via constraint logic., in: Sci. Comput. Program., 2004, vol. 50, no 1-3, p. 253-270.
[52]
T. Genet.
Decidable Approximations of Sets of Descendants and Sets of Normal forms, in: RTA'98, LNCS, Springer, 1998, vol. 1379, p. 151–165.
[53]
T. Genet, V. Viet Triem Tong.
Reachability Analysis of Term Rewriting Systems with Timbuk , in: LPAR'01, LNAI, Springer, 2001, vol. 2250, p. 691-702.
[54]
T. Genet, V. Viet Triem Tong.
Proving Negative Conjectures on Equational Theories using Induction and Abstract Interpretation, INRIA, 2002, no RR-4576, Technical report.
[55]
P. Godefroid.
Compositional dynamic test generation., in: POPL'07, 2007, p. 47-54.
[56]
D. Grove, C. Chambers.
A framework for call graph construction algorithms, in: Toplas, 2001, vol. 23, no 6, p. 685–746.
[57]
D. Grove, G. DeFouw, J. Dean, C. Chambers.
Call graph construction in object-oriented languages, in: ACM SIGPLAN Notices, 1997, vol. 32, no 10, p. 108–124.
[58]
M. Hofmann, S. Jost.
Static prediction of heap space usage for first-order functional programs, in: POPL, 2003, p. 185-197.
[59]
L. Hubert.
A Non-Null annotation inferencer for Java bytecode, in: Proc. of the Workshop on Program Analysis for Software Tools and Engineering (PASTE'08), ACM, 2008, To appear.
[60]
L. Hubert, T. Jensen, D. Pichardie.
Semantic foundations and inference of non-null annotations, in: Proc. of the 10th International Conference on Formal Methods for Open Object-based Distributed Systems (FMOODS'08), Lecture Notes in Computer Science, Springer-Verlag, 2008, vol. 5051, p. 132-149.
[61]
O. Lhoták, L. J. Hendren.
Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation, in: ACM Trans. Softw. Eng. Methodol., 2008, vol. 18, no 1.
[62]
V. B. Livshits, M. S. Lam.
Finding Security Errors in Java Programs with Static Analysis, in: Proc. of the 14th Usenix Security Symposium, 2005, p. 271–286.
[63]
J. Meseguer, M. Palomino, N. Martí-Oliet.
Equational abstractions, in: TCS, 2008, vol. 403, no 2-3, p. 239-264.
[64]
J. Meseguer, M. Palomino, N. Martí-Oliet.
Equational Abstractions, in: Proc. 19th CADE Conf., Miami Beach (Fl., USA), LNCS, Springer, 2003, vol. 2741, p. 2-16.
[65]
A. Milanova, A. Rountev, B. G. Ryder.
Parameterized object sensitivity for points-to analysis for Java, in: ACM Trans. Softw. Eng. Methodol., 2005, vol. 14, no 1, p. 1–41.
[66]
P.-E. Moreau, C. Ringeissen, M. Vittek.
A Pattern Matching Compiler for Multiple Target Languages, in: 12th Conference on Compiler Construction, Warsaw (Poland), G. Hedin (editor), LNCS, Springer, May 2003, vol. 2622, p. 61-76
http://www.loria.fr/~moreau/Papers/MoreauRV-CC2003.ps.gz.
[67]
M. Naik, A. Aiken.
Conditional must not aliasing for static race detection, in: POPL'07, ACM, 2007, p. 327-338.
[68]
M. Naik, A. Aiken, J. Whaley.
Effective static race detection for Java, in: PLDI'2006, ACM, 2006, p. 308-319.
[69]
G. Necula.
Proof-carrying code, in: Proceedings of POPL'97, ACM Press, 1997, p. 106–119.
[70]
G. C. Necula, R. R. Schneck.
A Sound Framework for Untrusted Verification-Condition Generators., in: Proc. of 18th IEEE Symp. on Logic In Computer Science (LICS 2003), 2003, p. 248-260.
[71]
F. Nielson, H. Nielson, C. Hankin.
Principles of Program Analysis, Springer, 1999.
[72]
H. R. Nielson, F. Nielson.
Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis, in: Proc. of the 24th ACM Symposium on Principles of Programming Language, ACM Press, 1997, p. 332-345.
[73]
F. Oehl, G. Cécé, O. Kouchnarenko, D. Sinclair.
Automatic Approximation for the Verification of Cryptographic Protocols, in: Proc. of FASE'03, LNCS, Springer, 2003, vol. 2629, p. 34-48.
[74]
F. Oehl, D. Sinclair.
Combining two approaches for the formal verification of cryptographic protocols, in: Proceedings of ICLP Workshop on Specification, Analysis and Validation for Emerging technologies in computational logic, 2001.
[75]
J. Palsberg, M. Schwartzbach.
Object-Oriented Type Inference, in: OOPSLA'91, 1991, p. 146-161.
[76]
J. Palsberg, M. Schwartzbach.
Object-Oriented Type Systems, John Wiley & Sons, 1994.
[77]
D. Pichardie.
Interprétation abstraite en logique intuitionniste : extraction d'analyseurs Java certiés, Université Rennes 1, Rennes, France, dec 2005, Ph. D. Thesis.
[78]
A. D. Pierro, H. Wiklicky.
Operator Algebras and the Operational Semantics of Probabilistic Languages, in: Electr. Notes Theor. Comput. Sci., 2006, vol. 161, p. 131-150.
[79]
A. Podelski.
Model Checking as Constraint Solving, in: SAS'00, 2000, p. 22-37.
[80]
E. Rose.
Lightweight Bytecode Verification, in: Journal of Automated Reasoning, 2003, vol. 31, no 3–4, p. 303–334.
[81]
A. Sabelfeld, A. C. Myers.
Language-based Information-Flow Security, in: IEEE Journal on Selected Areas in Communication, January 2003, vol. 21, no 1, p. 5–19.
[82]
P. Sotin, D. Cachera, T. Jensen.
Quantitative Static Analysis over semirings: analysing cache behaviour for Java Card, in: 4th International Workshop on Quantitative Aspects of Programming Languages (QAPL 2006), Electronic Notes in Theoretical Computer Science, Elsevier, 2006, vol. 164, p. 153-167.
[83]
T. Takai.
A Verification Technique Using Term Rewriting Systems and Abstract Interpretation, in: Proc. 15th RTA Conf., Aachen (Germany), LNCS, Springer, 2004, vol. 3091, p. 119-133.
[84]
F. Tip, J. Palsberg.
Scalable propagation-based call graph construction algorithms, in: OOPSLA, 2000, p. 281-293.
[85]
J. Whaley, M. S. Lam.
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams, in: PLDI '04, ACM, 2004, p. 131–144.
[86]
M. Wildmoser, A. Chaieb, T. Nipkow.
Bytecode Analysis for Proof Carrying Code, in: Bytecode Semantics, Verification, Analysis and Transformation, 2005.
[87]
M. Wildmoser, T. Nipkow, G. Klein, S. Nanz.
Prototyping Proof Carrying Code, in: Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd Int. Conf. on Theoretical Computer Science (TCS2004), J.-J. Levy, E. W. Mayr, J. C. Mitchell (editors), Kluwer Academic Publishers, August 2004, p. 333–347.

previous
next