Hoppa till huvudinnehållet
Till KTH:s startsida Till KTH:s startsida

Publikationer av Benoit Baudry

Refereegranskade

Artiklar

[1]
J. Cabrera-Arteaga et al., "Wasm-Mutate : Fast and effective binary diversification for WebAssembly," Computers & security (Print), vol. 139, s. 103731-103731, 2024.
[2]
M. Balliu et al., "Challenges of Producing Software Bill of Materials for Java," IEEE Security and Privacy, vol. 21, no. 6, s. 12-23, 2023.
[3]
J. Cabrera Arteaga et al., "WebAssembly diversification for malware evasion," Computers & security (Print), vol. 131, 2023.
[4]
N. Harrand et al., "API beauty is in the eye of the clients : 2.2 million Maven dependencies reveal the spectrum of client-API usages," Journal of Systems and Software, vol. 184, s. 111134, 2022.
[5]
C. Soto Valero et al., "Coverage-Based Debloating for Java Bytecode," ACM Transactions on Software Engineering and Methodology, 2022.
[6]
B. Baudry, T. Toady och M. Monperrus, "Long Live Software Easter Eggs!," Queue, vol. 20, no. 2, s. 31-42, 2022.
[7]
S. Larsén et al., "Spork : Structured Merge for Java with Formatting Preservation," IEEE Transactions on Software Engineering, s. 1-1, 2022.
[8]
C. Soto Valero, M. Monperrus och B. Baudry, "The Multibillion Dollar Software Supply Chain of Ethereum," Computer, vol. 55, no. 10, s. 26-34, 2022.
[9]
L. Zhang et al., "A Chaos Engineering System for Live Analysis and Falsification of Exception-handling in the JVM," IEEE Transactions on Software Engineering, vol. 47, no. 11, s. 2534-2548, 2021.
[10]
B. Baudry et al., "A Software-Repair Robot Based on Continual Learning," IEEE Software, vol. 38, no. 4, s. 28-35, 2021.
[11]
C. Soto Valero et al., "A comprehensive study of bloated dependencies in the Maven ecosystem," Empirical Software Engineering, vol. 26, no. 3, 2021.
[12]
R. M. Tsoupidi, R. C. Lozano och B. Baudry, "Constraint-based Diversification of JOP Gadgets," The journal of artificial intelligence research, vol. 72, s. 1471-1505, 2021.
[13]
[14]
L. Zhang et al., "Maximizing Error Injection Realism for Chaos Engineering with System Calls," IEEE Transactions on Dependable and Secure Computing, 2021.
[15]
J. Simonsson et al., "Observability and Chaos Engineering on System Calls for Containerized Applications in Docker," Future generations computer systems, vol. 122, s. 117-129, 2021.
[16]
D. Tiwari et al., "Production Monitoring to Improve Test Suites," IEEE Transactions on Reliability, s. 1-17, 2021.
[17]
B. Danglot et al., "An approach and benchmark to detect behavioral changes of commits in continuous integration," Empirical Software Engineering, vol. 25, no. 4, s. 2379-2415, 2020.
[18]
P. Laperdrix et al., "Browser Fingerprinting : A Survey," ACM Transactions on the Web, vol. 14, no. 2, 2020.
[19]
N. Harrand et al., "Java decompiler diversity and its application to meta-decompilation," Journal of Systems and Software, vol. 168, 2020.
[20]
M. Boussaa et al., "Leveraging metamorphic testing to automatically detect inconsistencies in code generator families," Software testing, verification & reliability, vol. 30, no. 1, 2020.
[21]
O. L. Vera-Perez et al., "A comprehensive study of pseudo-tested methods," Empirical Software Engineering, vol. 24, no. 3, s. 1195-1225, 2019.
[22]
N. Harrand et al., "A journey among Java neutral program variants," Genetic Programming and Evolvable Machines, vol. 20, no. 4, s. 531-580, 2019.
[23]
B. Danglot et al., "A snowballing literature study on test amplification," Journal of Systems and Software, vol. 157, 2019.
[24]
B. Danglot et al., "Automatic test improvement with DSpot : a study with ten mature open-source projects," Empirical Software Engineering, vol. 24, no. 4, s. 2603-2635, 2019.
[25]
M. Alferez et al., "Modeling variability in the video domain : language and experience report," Software quality journal, vol. 27, no. 1, s. 307-347, 2019.
[26]
A. Halin et al., "Test them all, is it worth it? : Assessing configuration sampling on the JHipster Web development stack," Empirical Software Engineering, vol. 24, no. 2, s. 674-717, 2019.
[27]
E. Bousse et al., "Omniscient debugging for executable DSLs," Journal of Systems and Software, vol. 137, s. 261-288, 2018.
[28]
A. Blouin et al., "User interface design smell : Automatic detection and refactoring of Blob listeners," Information and Software Technology, vol. 102, s. 49-64, 2018.

Konferensbidrag

[29]
D. Tiwari, M. Monperrus och B. Baudry, "RICK : Generating Mocks from Production Data," i 2023 IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION, ICST, 2023, s. 464-466.
[30]
M. Balliu et al., "Software Bill of Materials in Java," i SCORED 2023 - Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023, s. 75-76.
[31]
L. Zetterlund et al., "Harvesting Production GraphQL Queries to Detect Schema Faults," i 2022 IEEE Conference on Software Testing, Verification and Validation (ICST 2022), 2022, s. 365-376.
[32]
J. Cabrera Arteaga et al., "Multi-variant Execution at the Edge," i MTD 2022 : Proceedings of the 9th ACM Workshop on Moving Target Defense, co-located with CCS 2022, 2022, s. 11-22.
[33]
C. Soto Valero, T. Durieux och B. Baudry, "A Longitudinal Analysis of Bloated Java Dependencies," i Proceedings Of The 29Th Acm Joint Meeting On European Software Engineering Conference And Symposium On The Foundations Of Software Engineering (Esec/Fse '21), 2021, s. 1021-1031.
[34]
J. Cabrera Arteaga et al., "CROW: Code Diversification for WebAssembly," i MADWeb, NDSS 2021, 2021.
[35]
T. Durieux, C. Soto Valero och B. Baudry, "DUETS : A Dataset of Reproducible Pairs of Java Library-Clients," i 2021 IEEE/Acm 18Th International Conference On Mining Software Repositories (MSR 2021), 2021, s. 545-549.
[36]
N. Harrand et al., "The Behavioral Diversity of Java JSON Libraries," i 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), 2021.
[37]
R. M. Tsoupidi, M. Balliu och B. Baudry, "Vivienne : Relational Verification of Cryptographic Implementations in WebAssembly," i Proceedings - 2021 IEEE Secure Development Conference, SecDev 2021, 2021, s. 94-102.
[38]
R. M. Tsoupidi, R. Castañeda Lozano och B. Baudry, "Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks," i Lect. Notes Comput. Sci., 2020, s. 791-808.
[39]
E. Gustafsson, N. Campo Woytuk och B. Baudry, "Re|Traces of search : Exploring human-software entanglements through the search engine," i DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference, 2020, s. 457-460.
[40]
J. Cabrera Arteaga et al., "Superoptimization of WebAssembly bytecode," i Conference Companion of the 4th International Conference on Art, Science, and Engineering of Programming, 2020.
[41]
A. Halin et al., "Test them all, is it worth it? : assessing configuration sampling on the JHipster web development stack," i Proceedings 24th ACM International Systems and Software Product Line Conference, 2020.
[42]
A. Gómez-Boix et al., "A collaborative strategy for mitigating tracking through browser fingerprinting," i Proceedings of the ACM Conference on Computer and Communications Security, 2019, s. 67-78.
[43]
M. Rodriguez-Cancio, B. Combemale och B. Baudry, "Approximate Loop Unrolling," i CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, s. 94-105.
[44]
P. Laperdrix et al., "Morellian analysis for browsers : Making web authentication stronger with canvas fingerprinting," i Detection of Intrusions and Malware, and Vulnerability Assessment : 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, 2019, s. 43-66.
[45]
J. Cabrera Arteaga, M. Monperrus och B. Baudry, "Scalable comparison of JavaScript V8 bytecode traces," i Proceedings of the 11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, VMIL@SPLASH, 2019, s. 22-31.
[46]
C. Soto Valero et al., "The Emergence of Software Diversity inMaven Central," i 16th International Conference on Mining Software Repositories, 2019, s. 333-343.
[47]
A. Benelallam et al., "The maven dependency graph : A temporal graph-based representation of maven central," i IEEE International Working Conference on Mining Software Repositories, 2019, s. 344-348.
[48]
N. Harrand et al., "The strengths and behavioral quirks of Java bytecode decompilers," i Proceedings - 19th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2019, 2019, s. 92-102.
[49]
B. Baudry et al., "A spoonful of DevOps helps the GI go down," i Proceedings - International Conference on Software Engineering, 2018, s. 35-36.
[50]
D. Thomas et al., "Code{strata} sonifying software complexity," i TEI 2018 - Proceedings of the 12th International Conference on Tangible, Embedded, and Embodied Interaction, 2018, s. 617-621.
[51]
O. L. Vera-Pérez, M. Monperrus och B. Baudry, "Descartes : A pitest engine to detect pseudo-tested methods: Tool demonstration," i ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018, s. 908-911.
[52]
C. Soto-Valero, J. Bourcier och B. Baudry, "Detection and Analysis of Behavioral T-patternsi n Debugging Activities," i Mining Software Repositories, 2018.
[53]
C. Soto-Valero, J. Bourcier och B. Baudry, "Detection and analysis of behavioral T-patterns in debugging activities," i MSR '18 Proceedings of the 15th International Conference on Mining Software Repositories, 2018, s. 110-113.
[54]
B. Morin et al., "Engineering software diversity : A model-based approach to systematically diversify communications," i Proceedings - 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2018, 2018, s. 155-165.
[55]
T. Durieux et al., "Exhaustive Exploration of the Failure-oblivious Computing Search Space," i 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2018, s. 139-149.
[56]
A. Gomez-Boix, P. perdrix och B. Baudry, "Hiding in the Crowd : an Analysis of the Effectiveness of Browser ngerprinting at Large Scale," i WEB CONFERENCE 2018 : PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WW2018), 2018, s. 309-318.
[57]
M. Rodriguez-Cancio, B. Baudry och J. White, "Images of Code: Lossy Compression for Native Instructions," i NIER track at ICSE, 2018.
[58]
J. A. Galindo et al., "MOTIV : Selección de pruebas para algoritmos de detección de movimiento en vídeos usando técnicas de líneas de productos software," i Actas de las 23rd Jornadas de Ingenieria del Software y Bases de Datos, JISBD 2018, 2018.
[59]
D. Mendez-Acuna et al., "Reverse engineering language product lines from existing DSL variants," i SPLC'18 : Proceedings Of The 22Nd International Systems And Software Product Line Conference, Vol 1, 2018, s. 248-248.

Icke refereegranskade

Artiklar

[60]
B. Baudry och M. Monperrus, "Testing beyond coverage," Increment, vol. Feb, no. 16, 2021.

Övriga

[63]
B. Baudry och M. Monperrus, "Science-changing Code," Association for Computing Machinery (ACM), 2021.
[64]
B. Baudry och M. Monperrus, "Dynamic Analysis in the Browser," Association for Computing Machinery (ACM), 2019.
[67]
J. Cabrera Arteaga et al., "Multi-variant Execution at the Edge," (Manuskript).
Senaste synkning med DiVA:
2024-04-21 00:05:42