Skip to main content

Publications by Benoit Baudry

Refereegranskade

Artiklar

[1]
J. Cabrera-Arteaga et al., "Wasm-Mutate : Fast and effective binary diversification for WebAssembly," Computers & security (Print), vol. 139, pp. 103731-103731, 2024.
[2]
J. Cabrera Arteaga et al., "WebAssembly diversification for malware evasion," Computers & security (Print), vol. 131, 2023.
[3]
N. Harrand et al., "API beauty is in the eye of the clients : 2.2 million Maven dependencies reveal the spectrum of client-API usages," Journal of Systems and Software, vol. 184, pp. 111134, 2022.
[4]
C. Soto Valero et al., "Coverage-Based Debloating for Java Bytecode," ACM Transactions on Software Engineering and Methodology, 2022.
[5]
B. Baudry, T. Toady and M. Monperrus, "Long Live Software Easter Eggs!," Queue, vol. 20, no. 2, pp. 31-42, 2022.
[6]
S. Larsén et al., "Spork : Structured Merge for Java with Formatting Preservation," IEEE Transactions on Software Engineering, pp. 1-1, 2022.
[7]
C. Soto Valero, M. Monperrus and B. Baudry, "The Multibillion Dollar Software Supply Chain of Ethereum," Computer, vol. 55, no. 10, pp. 26-34, 2022.
[8]
L. Zhang et al., "A Chaos Engineering System for Live Analysis and Falsification of Exception-handling in the JVM," IEEE Transactions on Software Engineering, vol. 47, no. 11, pp. 2534-2548, 2021.
[9]
B. Baudry et al., "A Software-Repair Robot Based on Continual Learning," IEEE Software, vol. 38, no. 4, pp. 28-35, 2021.
[10]
C. Soto Valero et al., "A comprehensive study of bloated dependencies in the Maven ecosystem," Empirical Software Engineering, vol. 26, no. 3, 2021.
[11]
R. M. Tsoupidi, R. C. Lozano and B. Baudry, "Constraint-based Diversification of JOP Gadgets," The journal of artificial intelligence research, vol. 72, pp. 1471-1505, 2021.
[12]
[13]
L. Zhang et al., "Maximizing Error Injection Realism for Chaos Engineering with System Calls," IEEE Transactions on Dependable and Secure Computing, 2021.
[14]
J. Simonsson et al., "Observability and Chaos Engineering on System Calls for Containerized Applications in Docker," Future generations computer systems, vol. 122, pp. 117-129, 2021.
[15]
D. Tiwari et al., "Production Monitoring to Improve Test Suites," IEEE Transactions on Reliability, pp. 1-17, 2021.
[16]
B. Danglot et al., "An approach and benchmark to detect behavioral changes of commits in continuous integration," Empirical Software Engineering, vol. 25, no. 4, pp. 2379-2415, 2020.
[17]
P. Laperdrix et al., "Browser Fingerprinting : A Survey," ACM Transactions on the Web, vol. 14, no. 2, 2020.
[18]
N. Harrand et al., "Java decompiler diversity and its application to meta-decompilation," Journal of Systems and Software, vol. 168, 2020.
[19]
M. Boussaa et al., "Leveraging metamorphic testing to automatically detect inconsistencies in code generator families," Software testing, verification & reliability, vol. 30, no. 1, 2020.
[20]
O. L. Vera-Perez et al., "A comprehensive study of pseudo-tested methods," Empirical Software Engineering, vol. 24, no. 3, pp. 1195-1225, 2019.
[21]
N. Harrand et al., "A journey among Java neutral program variants," Genetic Programming and Evolvable Machines, vol. 20, no. 4, pp. 531-580, 2019.
[22]
B. Danglot et al., "A snowballing literature study on test amplification," Journal of Systems and Software, vol. 157, 2019.
[23]
B. Danglot et al., "Automatic test improvement with DSpot : a study with ten mature open-source projects," Empirical Software Engineering, vol. 24, no. 4, pp. 2603-2635, 2019.
[24]
M. Alferez et al., "Modeling variability in the video domain : language and experience report," Software quality journal, vol. 27, no. 1, pp. 307-347, 2019.
[25]
A. Halin et al., "Test them all, is it worth it? : Assessing configuration sampling on the JHipster Web development stack," Empirical Software Engineering, vol. 24, no. 2, pp. 674-717, 2019.
[26]
E. Bousse et al., "Omniscient debugging for executable DSLs," Journal of Systems and Software, vol. 137, pp. 261-288, 2018.
[27]
A. Blouin et al., "User interface design smell : Automatic detection and refactoring of Blob listeners," Information and Software Technology, vol. 102, pp. 49-64, 2018.

Konferensbidrag

[28]
D. Tiwari, M. Monperrus and B. Baudry, "RICK : Generating Mocks from Production Data," in 2023 IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION, ICST, 2023, pp. 464-466.
[29]
M. Balliu et al., "Software Bill of Materials in Java," in SCORED 2023 - Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023, pp. 75-76.
[30]
L. Zetterlund et al., "Harvesting Production GraphQL Queries to Detect Schema Faults," in 2022 IEEE Conference on Software Testing, Verification and Validation (ICST 2022), 2022, pp. 365-376.
[31]
J. Cabrera Arteaga et al., "Multi-variant Execution at the Edge," in MTD 2022 : Proceedings of the 9th ACM Workshop on Moving Target Defense, co-located with CCS 2022, 2022, pp. 11-22.
[32]
C. Soto Valero, T. Durieux and B. Baudry, "A Longitudinal Analysis of Bloated Java Dependencies," in Proceedings Of The 29Th Acm Joint Meeting On European Software Engineering Conference And Symposium On The Foundations Of Software Engineering (Esec/Fse '21), 2021, pp. 1021-1031.
[33]
J. Cabrera Arteaga et al., "CROW: Code Diversification for WebAssembly," in MADWeb, NDSS 2021, 2021.
[34]
T. Durieux, C. Soto Valero and B. Baudry, "DUETS : A Dataset of Reproducible Pairs of Java Library-Clients," in 2021 IEEE/Acm 18Th International Conference On Mining Software Repositories (MSR 2021), 2021, pp. 545-549.
[35]
N. Harrand et al., "The Behavioral Diversity of Java JSON Libraries," in 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), 2021.
[36]
R. M. Tsoupidi, M. Balliu and B. Baudry, "Vivienne : Relational Verification of Cryptographic Implementations in WebAssembly," in Proceedings - 2021 IEEE Secure Development Conference, SecDev 2021, 2021, pp. 94-102.
[37]
R. M. Tsoupidi, R. Castañeda Lozano and B. Baudry, "Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks," in Lect. Notes Comput. Sci., 2020, pp. 791-808.
[38]
E. Gustafsson, N. Campo Woytuk and B. Baudry, "Re|Traces of search : Exploring human-software entanglements through the search engine," in DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference, 2020, pp. 457-460.
[39]
J. Cabrera Arteaga et al., "Superoptimization of WebAssembly bytecode," in Conference Companion of the 4th International Conference on Art, Science, and Engineering of Programming, 2020.
[40]
A. Halin et al., "Test them all, is it worth it? : assessing configuration sampling on the JHipster web development stack," in Proceedings 24th ACM International Systems and Software Product Line Conference, 2020.
[41]
A. Gómez-Boix et al., "A collaborative strategy for mitigating tracking through browser fingerprinting," in Proceedings of the ACM Conference on Computer and Communications Security, 2019, pp. 67-78.
[42]
M. Rodriguez-Cancio, B. Combemale and B. Baudry, "Approximate Loop Unrolling," in CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, pp. 94-105.
[43]
P. Laperdrix et al., "Morellian analysis for browsers : Making web authentication stronger with canvas fingerprinting," in Detection of Intrusions and Malware, and Vulnerability Assessment : 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, 2019, pp. 43-66.
[44]
J. Cabrera Arteaga, M. Monperrus and B. Baudry, "Scalable comparison of JavaScript V8 bytecode traces," in Proceedings of the 11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, VMIL@SPLASH, 2019, pp. 22-31.
[45]
C. Soto Valero et al., "The Emergence of Software Diversity inMaven Central," in 16th International Conference on Mining Software Repositories, 2019, pp. 333-343.
[46]
A. Benelallam et al., "The maven dependency graph : A temporal graph-based representation of maven central," in IEEE International Working Conference on Mining Software Repositories, 2019, pp. 344-348.
[47]
N. Harrand et al., "The strengths and behavioral quirks of Java bytecode decompilers," in Proceedings - 19th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2019, 2019, pp. 92-102.
[48]
B. Baudry et al., "A spoonful of DevOps helps the GI go down," in Proceedings - International Conference on Software Engineering, 2018, pp. 35-36.
[49]
D. Thomas et al., "Code{strata} sonifying software complexity," in TEI 2018 - Proceedings of the 12th International Conference on Tangible, Embedded, and Embodied Interaction, 2018, pp. 617-621.
[50]
O. L. Vera-Pérez, M. Monperrus and B. Baudry, "Descartes : A pitest engine to detect pseudo-tested methods: Tool demonstration," in ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018, pp. 908-911.
[51]
C. Soto-Valero, J. Bourcier and B. Baudry, "Detection and Analysis of Behavioral T-patternsi n Debugging Activities," in Mining Software Repositories, 2018.
[52]
C. Soto-Valero, J. Bourcier and B. Baudry, "Detection and analysis of behavioral T-patterns in debugging activities," in MSR '18 Proceedings of the 15th International Conference on Mining Software Repositories, 2018, pp. 110-113.
[53]
B. Morin et al., "Engineering software diversity : A model-based approach to systematically diversify communications," in Proceedings - 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2018, 2018, pp. 155-165.
[54]
T. Durieux et al., "Exhaustive Exploration of the Failure-oblivious Computing Search Space," in 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2018, pp. 139-149.
[55]
A. Gomez-Boix, P. perdrix and B. Baudry, "Hiding in the Crowd : an Analysis of the Effectiveness of Browser ngerprinting at Large Scale," in WEB CONFERENCE 2018 : PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WW2018), 2018, pp. 309-318.
[56]
M. Rodriguez-Cancio, B. Baudry and J. White, "Images of Code: Lossy Compression for Native Instructions," in NIER track at ICSE, 2018.
[57]
J. A. Galindo et al., "MOTIV : Selección de pruebas para algoritmos de detección de movimiento en vídeos usando técnicas de líneas de productos software," in Actas de las 23rd Jornadas de Ingenieria del Software y Bases de Datos, JISBD 2018, 2018.
[58]
D. Mendez-Acuna et al., "Reverse engineering language product lines from existing DSL variants," in SPLC'18 : Proceedings Of The 22Nd International Systems And Software Product Line Conference, Vol 1, 2018, pp. 248-248.

Icke refereegranskade

Artiklar

[59]
B. Baudry and M. Monperrus, "Testing beyond coverage," Increment, vol. Feb, no. 16, 2021.

Övriga

[62]
B. Baudry and M. Monperrus, "Science-changing Code," Association for Computing Machinery (ACM), 2021.
[63]
B. Baudry and M. Monperrus, "Dynamic Analysis in the Browser," Association for Computing Machinery (ACM), 2019.
[66]
J. Cabrera Arteaga et al., "Multi-variant Execution at the Edge," (Manuscript).
Senaste synkning med DiVA:
2024-03-03 00:05:51