CADP a protocol validation and verification toolbox JC Fernandez, H Garavel, A Kerbrat, L Mounier, R Mateescu, ... Computer Aided Verification: 8th International Conference, CAV'96 New …, 1996 | 619 | 1996 |
Toward large-scale vulnerability discovery using machine learning G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist, L Mounier Proceedings of the sixth ACM conference on data and application security and …, 2016 | 311 | 2016 |
What can you verify and enforce at runtime? Y Falcone, JC Fernandez, L Mounier International Journal on Software Tools for Technology Transfer 14, 349-382, 2012 | 209 | 2012 |
IF-2.0: A validation environment for component-based real-time systems M Bozga, S Graf, L Mounier Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002 | 204 | 2002 |
“On the fly” verification of behavioural equivalences and preorders JC Fernandez, L Mounier Computer Aided Verification: 3rd International Workshop, CAV'91 Aalborg …, 1992 | 203 | 1992 |
A toolbox for the verification of LOTOS programs JC Fernandez, H Garavel, L Mounier, A Rasse, C Rodriguez, J Sifakis Proceedings of the 14th international conference on Software engineering …, 1992 | 157 | 1992 |
Runtime enforcement monitors: composition, synthesis, and enforcement abilities Y Falcone, L Mounier, JC Fernandez, JL Richier Formal Methods in System Design 38, 223-262, 2011 | 152 | 2011 |
Runtime verification of safety-progress properties Y Falcone, JC Fernandez, L Mounier International Workshop on Runtime Verification, 40-59, 2009 | 128 | 2009 |
A model-based approach for robustness testing JC Fernandez, L Mounier, C Pachon Testing of Communicating Systems: 17th IFIP TC6/WG 6.1 International …, 2005 | 119 | 2005 |
IF: An intermediate representation and validation environment for timed asynchronous systems M Bozga, JC Fernandez, L Ghirvu, S Graf, JP Krimm, L Mounier International Symposium on Formal Methods, 307-327, 1999 | 117 | 1999 |
Statically detecting use after free on binary code J Feist, L Mounier, ML Potet Journal of Computer Virology and Hacking Techniques 10 (3), 211-217, 2014 | 112 | 2014 |
A taint based approach for smart fuzzing S Bekrar, C Bekrar, R Groz, L Mounier 2012 IEEE fifth international conference on software testing, verification …, 2012 | 112 | 2012 |
Finding software vulnerabilities by smart fuzzing S Bekrar, C Bekrar, R Groz, L Mounier 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 111 | 2011 |
IF: An intermediate representation for SDL and its applications M Bozga, JC Fernandez, L Ghirvu, S Graf, JP Krimm, L Mounier, J Sifakis SDL'99, 423-440, 1999 | 109 | 1999 |
Design, synthesis, and evaluation of a novel series of indole sulfonamide peroxisome proliferator activated receptor (PPAR) α/γ/δ triple activators: discovery of lanifibranor … B Boubia, O Poupardin, M Barth, J Binet, P Peralba, L Mounier, ... Journal of medicinal chemistry 61 (6), 2246-2265, 2018 | 106 | 2018 |
Compositional state space generation from Lotos programs JP Krimm, L Mounier International Workshop on Tools and Algorithms for the Construction and …, 1997 | 103 | 1997 |
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 102 | 2016 |
On-the-fly verification of finite transition systems JC Fernandez, L Mounier, C Jard, T Jéron Formal Methods in System Design 1, 251-273, 1992 | 98 | 1992 |
Verifying Bisimulations" On the Fly". JC Fernandez, L Mounier FORTE 90, 95-110, 1990 | 88 | 1990 |
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS G Chehaibar, H Garavel, L Mounier, N Tawbi, F Zulian Formal Description Techniques IX: Theory, application and tools, 435-450, 1996 | 86 | 1996 |