Characterization of the impact of faulty drivers on the robustness of the Linux kernel, International Conference on Dependable Systems and Networks, 2004, pp.867-876 ,
DOI : 10.1109/DSN.2004.1311957
Cover feature - Uncovering hidden contracts: the .net example, Computer, vol.36, issue.11, pp.48-55, 2003. ,
DOI : 10.1109/MC.2003.1244535
Thorough static analysis of device drivers, EuroSys'06, pp.73-85 ,
Verifying the Safety of User Pointer Dereferences, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.325-338, 2008. ,
DOI : 10.1109/SP.2008.15
An empirical study of operating systems errors, SOSP' 01, pp.73-88 ,
Injecting faults into the kernel, 2004. ,
Assessment and Improvement of Hang Detection in the Linux Operating System, 2009 28th IEEE International Symposium on Reliable Distributed Systems, pp.288-294 ,
DOI : 10.1109/SRDS.2009.26
Sherlog: Error diagnosis by connecting clues from run-time logs, ASPLOS'10, pp.143-154 ,
Bugs as deviant behavior: a general approach to inferring errors in systems code, SOSP'01, pp.57-72 ,
The Daikon system for dynamic detection of likely invariants, Science of Computer Programming, vol.69, issue.1-3, pp.35-45, 2007. ,
DOI : 10.1016/j.scico.2007.01.015
HEALERS: a toolkit for enhancing the robustness and security of existing applications, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.317-322 ,
DOI : 10.1109/DSN.2003.1209942
Windows XP kernel crash analysis, LISA'06, pp.49-159 ,
Dynamic contract layers, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.2169-2175, 2010. ,
DOI : 10.1145/1774088.1774546
Logic in Computer Science: Modelling and reasoning about systems, 2000. ,
DOI : 10.1017/CBO9780511810275
Testing closed-source binary device drivers with DDT, USENIX Annual Technical Conference, 2010. ,
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.43-52 ,
DOI : 10.1109/DSN.2009.5270354
URL : https://hal.archives-ouvertes.fr/hal-00941142
Specification mining with few false positives, TACAS'09, pp.292-306 ,
PR-miner: automatically extracting implicit programming rules and detecting violations in large software code, ESEC/FSE-13, pp.306-315, 2005. ,
Efficient Testing of Recovery Code Using Fault Injection, ACM Transactions on Computer Systems, vol.29, issue.4, 2011. ,
DOI : 10.1145/2063509.2063511
Object-Oriented Software Construction, 1988. ,
Using Design by Contract in C. OnLamp.com, O'Reilly, 2004. ,
Reboot Linux faster using kexec, 2004. ,
Documenting and automating collateral evolutions in Linux device drivers, EuroSys'08, pp.247-260 ,
URL : https://hal.archives-ouvertes.fr/inria-00123142
Faults in Linux: Ten years later, ASPLOS'11, pp.305-318 ,
URL : https://hal.archives-ouvertes.fr/hal-00940355
Integrated Static Analysis for Linux Device Driver Verification, IFM'07, pp.518-537 ,
DOI : 10.1007/978-3-540-73210-5_27
Path-Sensitive Inference of Function Precedence Protocols, 29th International Conference on Software Engineering (ICSE'07), pp.240-250 ,
DOI : 10.1109/ICSE.2007.63
Linux Device Drivers, page 109. O'Reilly Media, 2001. ,
Dingo, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.275-288 ,
DOI : 10.1145/1519065.1519095
Software fault isolation with API integrity and multi-principal modules, SOSP'11 ,
Improving software diagnosability via log enhancement, ASPLOS'11, pp.3-14 ,