Skip to Main content Skip to Navigation

hal-03347233v1  Journal articles
Laneve CosimoClaudio Sacerdoti Coen. Analysis of Smart Contracts Balances
Blockchain: Research and Applications, Elsevier Ltd., 2021, 2 (3), pp.100020. ⟨10.1016/j.bcra.2021.100020⟩
hal-01312246v1  Conference papers
Antoine MinéDavid Delmas. Towards an industrial use of sound static analysis for the verification of concurrent embedded avionics software
ACM SIGBED International Conference on Embedded Software (EMSOFT), Oct 2015, Amsterdam, Netherlands. pp.65-74, ⟨10.1109/EMSOFT.2015.7318261⟩
inria-00638698v1  Conference papers
Damien HardyBenjamin LesageIsabelle Puaut. Scalable Fixed-Point Free Instruction Cache Analysis
The 32nd IEEE Real-Time Systems Symposium (RTSS 2011), Nov 2011, Vienne, Austria
tel-01963082v2  Theses
Huisong Li. Shape abstractions with support for sharing and disjunctions
Programming Languages [cs.PL]. Université Paris sciences et lettres, 2018. English. ⟨NNT : 2018PSLEE060⟩
hal-03032244v1  Journal articles
Jia-Ju BaiJulia LawallShi-Min Hu. Effective Detection of Sleep-in-Atomic-Context Bugs in the Linux Kernel
ACM Transactions on Computer Systems, Association for Computing Machinery, 2020, 36 (4), pp.10. ⟨10.1145/3381990⟩
hal-00136639v1  Journal articles
Antoine Miné. The Octagon Abstract Domain
Higher-Order and Symbolic Computation, Springer Verlag, 2006, 19, pp.31-100
tel-01351187v2  Theses
Mahsa Najafzadeh. The analysis and co-design of weakly-consistent applications
Databases [cs.DB]. Université Pierre et Marie Curie - Paris VI, 2016. English. ⟨NNT : 2016PA066205⟩
inria-00527910v1  Journal articles
Jérôme Feret. Abstract Interpretation of Mobile Systems
Journal of Logic and Algebraic Programming, Elsevier, 2004, special issue on the pi-calcucus, 63 (1), pp.59--130. ⟨10.1016/j.jlap.2004.01.005⟩
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
inria-00455341v1  Conference papers
Xavier AllamigeonStéphane GaubertEric Goubault. The tropical double description method
27th International Symposium on Theoretical Aspects of Computer Science - STACS 2010, Inria Nancy Grand Est & Loria, Mar 2010, Nancy, France. pp.47-58
hal-00484906v1  Journal articles
Hervé Grall. A Confinement Criterion for Securely Executing Mobile Code
Journal of Automata Languages and Combinatorics, Otto-von-Guericke-Universität Magdeburg, 2006, 1 (11), pp.59-106
hal-01413321v1  Journal articles
Jan Christian HueckelheimLaurent HascoëtJens-Dominik Müller. Algorithmic differentiation of code with multiple context-specific activities
ACM Transactions on Mathematical Software, Association for Computing Machinery, 2016
tel-00084287v1  Theses
David Monniaux. Analysis of probabilistic programs by abstract interpretation
Software Engineering [cs.SE]. Université Paris Dauphine - Paris IX, 2001. English
tel-00903447v1  Habilitation à diriger des recherches
Antoine Miné. Static analysis by abstract interpretation of concurrent programs
Performance [cs.PF]. Ecole Normale Supérieure de Paris - ENS Paris, 2013
hal-01417164v1  Reports
Dmitry BurlyaevPascal FradetAlain Girault. A static analysis for the minimization of voters in fault-tolerant circuits
[Research Report] RR-9004, Inria - Research Centre Grenoble – Rhône-Alpes. 2016, pp.1-27
tel-03127921v2  Theses
Marc Chevalier. Proving the security of software-intensive embedded systems by abstract interpretation.
Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2020. English. ⟨NNT : 2020UPSLE069⟩
hal-03028476v1  Conference papers
Santiago BautistaThomas JensenBenoît Montagu. Numeric Domains Meet Algebraic Data Types
NSAD 2020 - 9th International Workshop on Numerical and Symbolic Abstract Domains, Nov 2020, Virtual, United States. pp.12-16, ⟨10.1145/3427762.3430178⟩
hal-01385196v1  Conference papers
Mariem GraaFrédéric CuppensNora Cuppens-BoulahiaJean-Louis Lanet. Tracking explicit and control flows in Java and native Android apps code,
ICISSP 2016 : 2nd International Conference on Information Systems Security and Privacy,, Feb 2016, Roma, Italy. ⟨10.5220/0005686603070316⟩
cea-01836560v1  Conference papers
Sebastien BardinMickael DelahayeRobin DavidNikolai KosmatovMike Papadakis et al.  Sound and quasi-complete detection of infeasible test requirements
ICST 2015 - IEEE 8th International Conference on Software Testing, Verification and Validation, Apr 2015, Graz, Austria. pp.1-10, ⟨10.1109/ICST.2015.7102607⟩
hal-01898058v1  Conference papers
Ahmad Salim Al-SibahiAleksandar S. DimovskiThomas JensenAndrzej Wasowski. Verification of High-Level Transformations with Inductive Refinement Types
GPCE 2018 - 17th International Conference on Generative Programming: Concepts & Experience, Nov 2018, Boston, United States. pp.147-160, ⟨10.1145/3278122.3278125⟩
hal-01535862v1  Conference papers
Laurent GeorgetMathieu JaumeGuillaume PiolleFrédéric TronelValérie Viet Triem Tong. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux
5th International FME Workshop on Formal Methods in Software Engineering, May 2017, Buenos Aires, Argentina. pp.10-16, ⟨10.1109/FormaliSE.2017.1⟩
inria-00332389v1  Conference papers
Jean-yves MarionRomain Péchoux. Characterizations of Polynomial Complexity Classes with a Better Intensionality
Proceedings of the 10th international ACM SIGPLAN conference on Principles and Practice of Declarative Programming - PPDP 2008, Universidad Polytechnica, Jul 2008, Valencia, Spain. pp.79-88, ⟨10.1145/1389449.1389460⟩