Members
Overall Objectives
Research Program
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
F. Besson, N. Bielova, T. Jensen.
Hybrid Information Flow Monitoring Against Web Tracking, in: CSF - 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, United States, 2013. [ DOI : 10.1109/CSF.2013.23 ]
http://hal.inria.fr/hal-00924138
[2]
F. Besson, T. Jensen, D. Pichardie.
Proof-Carrying Code from Certified Abstract Interpretation to Fixpoint Compression, in: Theoretical Computer Science, 2006, vol. 364, no 3, pp. 273–291.
[3]
F. Besson, T. Jensen, T. Turpin.
Computing stack maps with interfaces, in: Proc. of the 22nd European Conference on Object-Oriented Programming (ECOOP 2008), LNCS, Springer-Verlag, 2008, vol. 5142, pp. 642-666.
[4]
M. Bodin, A. Charguéraud, D. Filaretti, P. Gardner, S. Maffeis, D. Naudziuniene, A. Schmitt, G. Smith.
A Trusted Mechanised JavaScript Specification, in: POPL 2014 - 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, United States, November 2013.
http://hal.inria.fr/hal-00910135
[5]
B. Boyer, T. Genet, T. Jensen.
Certifying a Tree Automata Completion Checker, in: 4th International Joint Conference, IJCAR 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5195, pp. 347–362.
[6]
D. Cachera, T. Jensen, A. Jobin, P. Sotin.
Long-Run Cost Analysis by Approximation of Linear Operators over Dioids, in: Mathematical Structures in Computer Science, 2010, vol. 20, no 4, pp. 589-624.
[7]
D. Cachera, T. Jensen, D. Pichardie, V. Rusu.
Extracting a Data Flow Analyser in Constructive Logic, in: Theoretical Computer Science, 2005, vol. 342, no 1, pp. 56–78.
[8]
D. Demange, V. Laporte, L. Zhao, D. Pichardie, S. Jagannathan, J. Vitek.
Plan B: A Buffered Memory Model for Java, in: Proc. of the 40th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2013, Rome, Italy, ACM, 2013.
http://hal.inria.fr/hal-00924716
[9]
T. Genet, V. Rusu.
Equational Approximations for Tree Automata Completion, in: Journal of Symbolic Computation, 2010, vol. 45(5):574-597, May 2010, no 5, pp. 574-597.
[10]
A. Gotlieb, T. Denmat, B. Botella.
Goal-oriented test data generation for pointer programs, in: Information and Software Technology, Sep. 2007, vol. 49, no 9-10, pp. 1030–1044.
[11]
L. Hubert, T. Jensen, V. Monfort, D. Pichardie.
Enforcing Secure Object Initialization in Java, in: 15th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, Springer, 2010, vol. 6345, pp. 101-115.
Publications of the year

Doctoral Dissertations and Habilitation Theses

[12]
A. Maroneze.
Verified compilation and worst-case execution time, Université de Rennes 1, June 2014.
https://hal.archives-ouvertes.fr/tel-01064869
[13]
V. Murat.
Tree automata extensions for verification of infinite states systems, Université Rennes 1, June 2014.
https://tel.archives-ouvertes.fr/tel-01065696

Articles in International Peer-Reviewed Journals

[14]
G. Barthe, D. Demange, D. Pichardie.
Formal Verification of an SSA-based Middle-end for CompCert, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2014, 35 p.
https://hal.inria.fr/hal-01097677
[15]
D. Cachera, T. Jensen, A. Jobin, F. Kirchner.
Inference of polynomial invariants for imperative programs: a farewell to Gröbner bases, in: Science of Computer Programming, 2014, vol. 93, 21 p. [ DOI : 10.1016/j.scico.2014.02.028 ]
https://hal.inria.fr/hal-00932351
[16]
S. Jagannathan, V. Laporte, G. Petri, D. Pichardie, J. Vitek.
Atomicity Refinement for Verified Compilation, in: ACM Transactions on Programming Languages and Systems (TOPLAS), January 2014, 30 p.
https://hal.inria.fr/hal-01102435

International Conferences with Proceedings

[17]
A. Azevedo De Amorim, N. Collins, A. DeHon, D. Demange, C. Hritcu, D. Pichardie, B. C. Pierce, R. Pollack, A. Tolmach.
A Verified Information-Flow Architecture, in: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), San Diego, CA, United States, 2014. [ DOI : 10.1145/2535838.2535839 ]
https://hal.inria.fr/hal-00918847
[18]
G. Barthe, G. Betarte, J. D. Campo, C. Luna, D. Pichardie.
System-level Non-interference for Constant-time Cryptography, in: ACM SIGSAC Conference on Computer and Communications Security, CCS'14, Scottsdale, United States, ACM, November 2014, pp. 1267 - 1279. [ DOI : 10.1145/2660267.2660283 ]
https://hal.inria.fr/hal-01101950
[19]
F. Besson, N. Bielova, T. Jensen.
Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach, in: NordSec - Nordic Conference on Secure IT Systems, Tromsø, Norway, October 2014. [ DOI : 10.1007/978-3-319-11599-3_11 ]
https://hal.inria.fr/hal-01081037
[20]
F. Besson, S. Blazy, P. Wilke.
A Precise and Abstract Memory Model for C Using Symbolic Values, in: APLAS 2014 - 12th Asian Symposium on Programming Languages and Systems, Singapore, Singapore, LNCS, Springer, 2014, vol. 8858, pp. 449 - 468. [ DOI : 10.1007/978-3-319-12736-1_24 ]
https://hal.inria.fr/hal-01093312
[21]
F. Besson, T. Jensen, P. Vittet.
SawjaCard: A Static Analysis Tool for Certifying Java Card Applications, in: SAS - 21st International Static Analysis Symposium, Munich, Germany, Springer, 2014, vol. 8858, pp. 51 - 67. [ DOI : 10.1007/978-3-319-10936-7_4 ]
https://hal.inria.fr/hal-01093327
[22]
S. Blazy, V. Laporte, D. Pichardie.
Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code, in: ITP - The 5th International Conference on Interactive Theorem Proving, Vienna, Austria, LNCS : Interactive Theorem Proving, Springer, 2014, vol. 8558, pp. 128 - 143. [ DOI : 10.1007/978-3-319-08970-6_9 ]
https://hal.inria.fr/hal-01102445
[23]
S. Blazy, A. Maroneze, D. Pichardie.
Verified Validation of Program Slicing, in: CPP : Conference on Certified Programs and Proofs, Mumbai, India, 2015, pp. 109-117. [ DOI : 10.1145/2676724.2693169 ]
https://hal.inria.fr/hal-01110821
[24]
S. Blazy, S. Riaud.
Measuring the Robustness of Source Program Obfuscation - Studying the Impact of Compiler Optimizations on the Obfuscation of C Programs, in: Fourth ACM Conference on Data and Application Security and Privacy - SIGSAC ACM CODASPY, San Antonio, United States, March 2014.
https://hal.inria.fr/hal-00927427
[25]
M. Bodin, A. Charguéraud, D. Filaretti, P. Gardner, S. Maffeis, D. Naudziuniene, A. Schmitt, G. Smith.
A Trusted Mechanised JavaScript Specification, in: POPL - 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, United States, January 2014.
https://hal.inria.fr/hal-00910135
[26]
M. Bodin, A. Schmitt.
Certified Abstract Interpretation with Pretty-Big-Step Semantics, in: CPP - Certified Programs and Proofs, Mumbai, India, Proceedings of the 2015 Conference on Certified Programs and Proofs, January 2015. [ DOI : 10.1145/2676724.2693174 ]
https://hal.inria.fr/hal-01111588
[27]
D. Demange, D. Pichardie, L. Stefanesco.
Verifying Fast and Sparse SSA-based Optimizations in Coq , in: CC - 24th International Conference on Compiler Construction, London, United Kingdom, 2015.
https://hal.inria.fr/hal-01110779
[28]
T. Genet.
Towards Static Analysis of Functional Programs Using Tree Automata Completion, in: Workshop on Rewriting Logic and its Applications, Grenoble, France, 10th International Workshop on Rewriting Logic and its Applications, Springer, April 2014, vol. 8663, pp. 147 - 161. [ DOI : 10.1007/978-3-319-12904-4_8 ]
https://hal.archives-ouvertes.fr/hal-01089993
[29]
J.-H. Jourdan, V. Laporte, S. Blazy, X. Leroy, D. Pichardie.
A formally-verified C static analyzer, in: POPL : 42nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Mumbai, India, ACM, January 2015, pp. 247-259. [ DOI : 10.1145/2676726.2676966 ]
https://hal.inria.fr/hal-01078386
[30]
B. Kordy, M. Pouly, P. Schweitzer.
A Probabilistic Framework for Security Scenarios with Dependent Actions, in: IFM - Integrated Formal Methods - 11th International Conference, Bertinoro, Italy, E. Albert, E. Sekerinski (editors), Springer, September 2014, vol. Lecture Notes in Computer Science, no 8739, pp. 256 - 271. [ DOI : 10.1007/978-3-319-10181-1_16 ]
https://hal.archives-ouvertes.fr/hal-01093276
[31]
A. Oliveira Maroneze, S. Blazy, D. Pichardie, I. Puaut.
A Formally Verified WCET Estimation Tool, in: 14th International Workshop on Worst-Case Execution Time Analysis, Madrid, Spain, July 2014. [ DOI : 10.4230/OASIcs.WCET.2014.11 ]
https://hal.inria.fr/hal-01087194
[32]
D. Pous, A. Schmitt.
De la KAM avec un Processus d'Ordre Supérieur, in: JFLA - 25ème Journées Francophones des Langages Applicatifs, Fréjus, France, January 2014, pp. 1-12.
https://hal.archives-ouvertes.fr/hal-00966097

National Conferences with Proceedings

[33]
M. Bodin, T. Jensen, A. Schmitt.
Pretty-big-step-semantics-based Certified Abstract Interpretation, in: JFLA - 25ème Journées Francophones des Langages Applicatifs, Fréjus, France, January 2014.
https://hal.inria.fr/hal-00927400
[34]
M. Escarrá, M. Petar, A. Schmitt.
HOCore in Coq, in: JFLA - Vingt-sixièmes Journées Francophones des Langages Applicatifs, Le Val d'Ajol, France, D. Baelde, J. Alglave (editors), January 2015.
https://hal.inria.fr/hal-01099130

Scientific Books (or Scientific Book chapters)

[35]
X. Leroy, A. W. Appel, S. Blazy, G. Stewart.
The CompCert memory model, in: Program Logics for Certified Compilers, A. W. Appel (editor), Cambridge University Press, April 2014, pp. 237-271.
https://hal.inria.fr/hal-00905435

Internal Reports

[36]
F. Besson, N. Bielova, T. Jensen.
Enforcing Browser Anonymity with Quantitative Information Flow, 2014, no RR-8532.
https://hal.inria.fr/hal-00984654
[37]
T. Genet.
A Note on the Precision of the Tree Automata Completion, IRISA, December 2014, 13 p.
https://hal.inria.fr/hal-01091393

Other Publications

[38]
B. Bonnefoy-Claudet.
Security analysis of Android applications, IRISA-Inria, Campus de Beaulieu, 35042 Rennes cedex, 2014, 35 p.
http://dumas.ccsd.cnrs.fr/dumas-01088788
References in notes
[39]
The Coq Proof Assistant, 2009.
http://coq.inria.fr/
[40]
E. Albert, P. Arenas, S. Genaim, G. Puebla, D. Zanardini.
COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode, in: FMCO, 2007, pp. 113-132.
[41]
E. Albert, G. Puebla, M. Hermenegildo.
Abstraction-Carrying Code, in: Proc. of 11th Int. Conf. on Logic for Programming Artificial Intelligence and Reasoning (LPAR'04), Springer LNAI vol. 3452, 2004, pp. 380-397.
[42]
Andrew W. Appel.
Foundational Proof-Carrying Code, in: Logic in Computer Science, J. Halpern (editor), IEEE Press, June 2001, 247 p, Invited Talk.
[43]
Andrew W. Appel, Amy P. Felty.
A Semantic Model of Types and Machine Instructions for Proof-Carrying Code, in: Principles of Programming Languages, ACM, 2000.
[44]
D. Aspinall, L. Beringer, M. Hofmann, Hans-Wolfgang. Loidl, A. Momigliano.
A Program Logic for Resource Verification, in: In Proceedings of the 17th International Conference on Theorem Proving in Higher-Order Logics, (TPHOLs 2004), volume 3223 of LNCS, Springer, 2004, pp. 34–49.
[45]
D. F. Bacon, P. F. Sweeney.
Fast Static Analysis of C++ Virtual Function Calls, in: OOPSLA'96, 1996, pp. 324-341.
[46]
P. Baillot, P. Coppola, U. D. Lago.
Light Logics and Optimal Reduction: Completeness and Complexity, in: LICS, 2007, pp. 421-430.
[47]
E. Balland, Y. Boichut, T. Genet, P.-E. Moreau.
Towards an Efficient Implementation of Tree Automata Completion, in: Algebraic Methodology and Software Technology, 12th International Conference, AMAST 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5140, pp. 67-82.
[48]
G. Barthe, D. Pichardie, T. Rezk.
A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Proc. of 16th European Symposium on Programming (ESOP'07), Lecture Notes in Computer Science, Springer-Verlag, 2007, vol. 4421, pp. 125-140.
[49]
F. Besson, T. Jensen.
Modular Class Analysis with DATALOG, in: SAS'2003, 2003, pp. 19-36.
[50]
F. Besson, T. Jensen, G. Dufay, D. Pichardie.
Verifying Resource Access Control on Mobile Interactive Devices, in: Journal of Computer Security, 2010, vol. 18, no 6, pp. 971-998.
[51]
D. Cachera, T. Jensen, A. Jobin, P. Sotin.
Long-Run Cost Analysis by Approximation of Linear Operators over Dioids, in: Algebraic Methodology and Software Technology, 12th International Conference, AMAST 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5140, pp. 122-138.
[52]
D. Cachera, T. Jensen, D. Pichardie, V. Rusu.
Extracting a Data Flow Analyser in Constructive Logic, in: Theoretical Computer Science, 2005, vol. 342, no 1, pp. 56–78.
[53]
D. Cachera, T. Jensen, D. Pichardie, G. Schneider.
Certified Memory Usage Analysis, in: Proc. of 13th International Symposium on Formal Methods (FM'05), LNCS, Springer-Verlag, 2005.
[54]
P. Cousot, R. Cousot.
Abstract Interpretation: a Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints, in: Proc. of POPL'77, 1977, pp. 238–252.
[55]
A. Ermedahl, C. Sandberg, J. Gustafsson, S. Bygde, B. Lisper.
Loop Bound Analysis based on a Combination of Program Slicing, Abstract Interpretation, and Invariant Analysis, in: Seventh International Workshop on Worst-Case Execution Time Analysis, (WCET'2007), July 2007.
http://www.mrtc.mdh.se/index.php?choice=publications&id=1317
[56]
G. Feuillade, T. Genet, V. Viet Triem Tong.
Reachability Analysis over Term Rewriting Systems, in: Journal of Automated Reasoning, 2004, vol. 33, no 3–4, pp. 341–383.
[57]
M. Fähndrich, K. R. M. Leino.
Declaring and checking non-null types in an object-oriented language, in: OOPSLA, 2003, pp. 302-312.
[58]
T. Genet.
Decidable Approximations of Sets of Descendants and Sets of Normal forms, in: RTA'98, LNCS, Springer, 1998, vol. 1379, pp. 151–165.
[59]
T. Genet, V. Viet Triem Tong.
Reachability Analysis of Term Rewriting Systems with Timbuk, in: LPAR'01, LNAI, Springer, 2001, vol. 2250, pp. 691-702.
[60]
D. Grove, C. Chambers.
A framework for call graph construction algorithms, in: Toplas, 2001, vol. 23, no 6, pp. 685–746.
[61]
D. Grove, G. DeFouw, J. Dean, C. Chambers.
Call graph construction in object-oriented languages, in: ACM SIGPLAN Notices, 1997, vol. 32, no 10, pp. 108–124.
[62]
M. Hofmann, S. Jost.
Static prediction of heap space usage for first-order functional programs, in: POPL, 2003, pp. 185-197.
[63]
L. Hubert.
A Non-Null annotation inferencer for Java bytecode, in: Proc. of the Workshop on Program Analysis for Software Tools and Engineering (PASTE'08), ACM, 2008.
[64]
L. Hubert, T. Jensen, D. Pichardie.
Semantic foundations and inference of non-null annotations, in: Proc. of the 10th International Conference on Formal Methods for Open Object-based Distributed Systems (FMOODS'08), Lecture Notes in Computer Science, Springer-Verlag, 2008, vol. 5051, pp. 132-149.
[65]
O. Lhoták, L. J. Hendren.
Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation, in: ACM Trans. Softw. Eng. Methodol., 2008, vol. 18, no 1.
[66]
V. B. Livshits, M. S. Lam.
Finding Security Errors in Java Programs with Static Analysis, in: Proc. of the 14th Usenix Security Symposium, 2005, pp. 271–286.
[67]
A. Milanova, A. Rountev, B. G. Ryder.
Parameterized object sensitivity for points-to analysis for Java, in: ACM Trans. Softw. Eng. Methodol., 2005, vol. 14, no 1, pp. 1–41.
[68]
M. Naik, A. Aiken.
Conditional must not aliasing for static race detection, in: POPL'07, ACM, 2007, pp. 327-338.
[69]
M. Naik, A. Aiken, J. Whaley.
Effective static race detection for Java, in: PLDI'2006, ACM, 2006, pp. 308-319.
[70]
G. C. Necula.
Proof-carrying code, in: Proceedings of POPL'97, ACM Press, 1997, pp. 106–119.
[71]
G. C. Necula, R. R. Schneck.
A Sound Framework for Untrusted Verification-Condition Generators, in: Proc. of 18th IEEE Symp. on Logic In Computer Science (LICS 2003), 2003, pp. 248-260.
[72]
F. Nielson, H. Nielson, C. Hankin.
Principles of Program Analysis, Springer, 1999.
[73]
J. Palsberg, M. Schwartzbach.
Object-Oriented Type Inference, in: OOPSLA'91, 1991, pp. 146-161.
[74]
J. Palsberg, M. Schwartzbach.
Object-Oriented Type Systems, John Wiley & Sons, 1994.
[75]
D. Pichardie.
Interprétation abstraite en logique intuitionniste : extraction d'analyseurs Java certiés, Université Rennes 1, Rennes, France, dec 2005.
[76]
A. D. Pierro, H. Wiklicky.
Operator Algebras and the Operational Semantics of Probabilistic Languages, in: Electr. Notes Theor. Comput. Sci., 2006, vol. 161, pp. 131-150.
[77]
E. Rose.
Lightweight Bytecode Verification, in: Journal of Automated Reasoning, 2003, vol. 31, no 3–4, pp. 303–334.
[78]
A. Sabelfeld, A. C. Myers.
Language-based Information-Flow Security, in: IEEE Journal on Selected Areas in Communication, January 2003, vol. 21, no 1, pp. 5–19.
[79]
P. Sotin, D. Cachera, T. Jensen.
Quantitative Static Analysis over semirings: analysing cache behaviour for Java Card, in: 4th International Workshop on Quantitative Aspects of Programming Languages (QAPL 2006), Electronic Notes in Theoretical Computer Science, Elsevier, 2006, vol. 164, pp. 153-167.
[80]
F. Tip, J. Palsberg.
Scalable propagation-based call graph construction algorithms, in: OOPSLA, 2000, pp. 281-293.
[81]
J. Whaley, M. S. Lam.
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams, in: PLDI '04, ACM, 2004, pp. 131–144.
[82]
M. Wildmoser, A. Chaieb, T. Nipkow.
Bytecode Analysis for Proof Carrying Code, in: Bytecode Semantics, Verification, Analysis and Transformation, 2005.
[83]
M. Wildmoser, T. Nipkow, G. Klein, S. Nanz.
Prototyping Proof Carrying Code, in: Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd Int. Conf. on Theoretical Computer Science (TCS2004), J.-J. Levy, E. W. Mayr, J. C. Mitchell (editors), Kluwer Academic Publishers, August 2004, pp. 333–347.