A. Aiken, S. Bugrara, I. Dillig, T. Dillig, B. Hackett et al., An overview of the saturn project, Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering , PASTE '07, pp.43-48, 2007.
DOI : 10.1145/1251535.1251543

C. Bird, N. Nagappan, P. Devanbu, H. Gall, and B. Murphy, Does distributed development affect software quality? An empirical case study of Windows Vista, 2009 IEEE 31st International Conference on Software Engineering, pp.518-528, 2009.
DOI : 10.1109/ICSE.2009.5070550

J. Brunel, D. Doligez, R. Rydhof-hansen, J. Lawall, and G. Muller, A foundation for flow-based program matching using temporal logic and model checking, The 36th annual Faults in Linux 2.6, p.39, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01299040

A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler, An empirical study of operating systems errors, Proceedings of the 18th ACM Symposium on Operating System Principles, pp.73-88, 2001.

. Comedi, Comedi: Linux control and measurement device interface, 1999.

J. Corbet, The age of kernel code in various subsystems, 2010.

J. Corbet, How old is our kernel? (Feb. 2010). http://lwn.net/Articles

. Coverity, Static source code analysis, static analysis, software quality tools by Coverity Inc. http: //www, coverity.com, 2008.

A. Depoutovitch and M. Stumm, Otherworld ? giving applications a chance to survive OS kernel crashes, EuroSys. ACM, pp.181-194, 2010.

F. 2013, Fedora project, 2013.

N. Jorrit, H. Herder, B. Bos, P. Gras, A. S. Homburg et al., Fault isolation for device drivers, The 39th Annual International Conference on Dependable Systems and Networks (DSN, pp.33-42, 2009.

A. Israeli and D. G. Feitelson, The Linux kernel as a case study in software evolution, Journal of Systems and Software, vol.83, issue.3, pp.485-501, 2010.
DOI : 10.1016/j.jss.2009.09.042

Y. Jiang, B. Adams, and D. M. Germán, Will my patch make it? And how fast? Case study on the Linux kernel, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.101-110, 2013.
DOI : 10.1109/MSR.2013.6624016

L. Edward, P. Kaplan, and . Meier, Nonparametric estimation from incomplete observations, Journal of the American statistical association, vol.53, issue.282, pp.457-481, 1958.

G. Keller, T. Murray, S. Amani, L. O. Connor, Z. Chen et al., File systems deserve verification too!, 7th Workshop on Programming Languages and Operating Systems, p.7, 2013.

J. L. Lawall, J. Brunel, N. Palix, R. Rydhof-hansen, H. Stuart et al., WYSIWIB: exploiting fine-grained program structure in a scriptable API-usage protocol-finding process, Software: Practice and Experience, vol.25, issue.5, pp.67-92, 2013.
DOI : 10.1002/spe.2102

URL : https://hal.archives-ouvertes.fr/hal-00940320

Z. Li and Y. Zhou, PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code, Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp.306-315, 2005.

L. Lu, A. C. Arpaci-dusseau, R. H. Arpaci-dusseau, and S. Lu, A study of Linux file system evolution. ;login: The USENIX Magazine, pp.10-17, 2013.

S. Lu, S. Park, E. Seo, and Y. Zhou, Learning from mistakes: a comprehensive study on real world concurrency bug characteristics, Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp.329-339, 2008.

T. J. Mccabe, A Complexity Measure, IEEE Transactions on Software Engineering, vol.2, issue.4, pp.308-320, 1976.
DOI : 10.1109/TSE.1976.233837

E. Paul, J. Mckenney, and . Walpole, Introducing technology into the Linux kernel: a case study, ACM SIGOPS Operating Systems Review, vol.42, issue.5, pp.4-17, 2008.

C. John, S. G. Munson, and . Elbaum, Code churn: A measure for estimating the impact of code change, International Conference Software Maintenance (ICSM, pp.24-31, 1998.

S. Nadi, C. Dietrich, R. Tartler, R. C. Holt, and D. Lohmann, Linux variability anomalies: What causes them and how do they get fixed?, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.111-120, 2013.
DOI : 10.1109/MSR.2013.6624017

N. Nagappan and T. Ball, Use of relative code churn measures to predict system defect density, 27th International Conference on Software Engineering (ICSE). ACM, pp.284-292, 2005.

P. Oman and J. Hagemeister, Construction and testing of polynomials predicting software maintainability, Journal of Systems and Software, vol.24, issue.3, pp.251-266, 1994.
DOI : 10.1016/0164-1212(94)90067-1

Y. Padioleau, J. Lawall, R. R. Hansen, and G. Muller, Documenting and automating collateral evolutions in Linux device drivers, EuroSys, pp.247-260, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00123142

N. Palix, J. Lawall, and G. Muller, Tracking code patterns over multiple software versions with Herodotos, Proceedings of the Eighth International Conference on Aspect-Oriented Software Development, AOSD '10, pp.169-180, 2010.
DOI : 10.1145/1739230.1739250

URL : https://hal.archives-ouvertes.fr/hal-00941123

N. Palix, S. Saha, G. Thomas, C. Calvès, J. Lawall et al., Website of Faults in Linux: Ten years later, 2010.

N. Palix, S. Saha, G. Thomas, C. Calvès, L. Lawall et al., Faults in Linux: Ten Years Later, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00940355

N. Palix, G. Thomas, S. Saha, C. Calvès, J. Lawall et al., Faults in Linux: Ten years later, Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pp.305-318, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00940355

R. Team, The R project for statistical computing, 2014.

R. Team, Summarizing linear model fits, 2014.

E. S. Raymond, The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, 2001.

C. Rubio-gonzález, H. S. Gunawi, B. Liblit, H. Remzi, A. C. Arpaci-dusseau et al., Error propagation analysis for file systems, In PLDI. ACM, pp.270-280, 2009.

S. Saha, J. Lozi, G. Thomas, J. L. Lawall, and G. Muller, Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-12, 2013.
DOI : 10.1109/DSN.2013.6575307

URL : https://hal.archives-ouvertes.fr/hal-00918079

X. Song, H. Chen, and B. Zang, Why software hangs and what can be done with it, International Conference on Dependable Systems and Networks, pp.311-316, 2010.

B. Spencer, Local kernel exploit in /dev, 2009.

M. M. Swift, M. Annamalai, B. N. Bershad, and H. M. Levy, Recovering device drivers, ACM Transactions on Computer Systems, vol.24, issue.4, pp.333-360, 2006.
DOI : 10.1145/1189256.1189257

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.551

R. Tartler, J. Sincero, C. Dietrich, W. Schröder-preikschat, and D. Lohmann, Revealing and repairing configuration inconsistencies in large-scale system software, International Journal on Software Tools for Technology Transfer, vol.5, issue.2, pp.531-551, 2012.
DOI : 10.1007/s10009-012-0225-2

X. Wang, N. Zeldovich, M. F. Kaashoek, and A. Solar-lezama, Towards optimizationsafe systems: analyzing the impact of undefined behavior, Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13, pp.260-275, 2013.

D. Wheeler, Flawfinder home page Web page: http://www.dwheeler.com/flawfinder, 2006.

J. Yang, P. Twohey, D. Engler, and M. Musuvathi, Using model checking to find serious file system errors, ACM Transactions on Computer Systems, vol.24, issue.4, pp.393-423, 2006.
DOI : 10.1145/1189256.1189259