Skip to main content
Back to KTH start page

Publications by Cyrille Artho

Peer reviewed

Articles

[1]
C. Artho and P. C. Ölveczky, "Preface Formal Techniques for Safety-Critical Systems (FTSCS 2022)," Science of Computer Programming, vol. 237, 2024.
[2]
H. Wang et al., "Oracle-Supported Dynamic Exploit Generation for Smart Contracts," IEEE Transactions on Dependable and Secure Computing, 2020.
[3]
C. Artho and P. Ölveczky, "Formal Techniques for Safety-Critical Systems (FTSCS 2016)," Science of Computer Programming, vol. 175, pp. 35-36, 2019.
[4]
C. Artho et al., "Model-based testing of Apache ZooKeeper : Fundamental API usage and watchers," Software Testing Verification and Reliability, 2019.
[5]
C. Artho and P. Ölveczky, "Formal Techniques for Safety-Critical Systems (FTSCS 2015)," Science of Computer Programming, vol. 154, pp. 1-2, 2018.
[6]
P. de C. Gomes et al., "Specification and verification of synchronization with condition variables," Science of Computer Programming, vol. 163, pp. 174-189, 2018.
[7]
C. Artho and G. Rousset, "Model-based Testing of the Java network API," Electronic Proceedings in Theoretical Computer Science, no. 245, pp. 46-51, 2017.
[8]
N. Sebih et al., "Software Model Checking of UDP-based Distributed Applications," International Journal of Networking and Computing, vol. 5, no. 2, pp. 373-402, 2015.
[9]
C. Artho et al., "Using Checkpointing and Virtualization for Fault Injection," International Journal of Networking and Computing, vol. 5, no. 2, pp. 347-372, 2015.
[10]
L. Ma, C. Artho and H. Sato, "Managing Product Variants by Project Centralization," Lecture Notes on Software Engineering, vol. 2, no. 2, pp. 195-200, 2014.
[11]
K. Suzaki et al., "Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines," IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, vol. E96-A, no. 1, pp. 215-224, 2013.
[12]
L. Ma, C. Artho and H. Sato, "Improving Automatic Centralization by Version Separation," IPSJ Transactions on Programming, vol. 6, no. 4, pp. 65-77, 2013.
[13]
C. Artho, "Iterative Delta Debugging," International Journal on Software Tools for Technology Transfer, vol. 13, no. 3, pp. 223-246, 2011.
[14]
C. Artho et al., "Hiding Backtracking Operations in Software Model Checking from the Environment," Third DIKU-IST workshop, Roskilde, Denmark, 2007.
[15]
C. Artho et al., "Combining Test Case Generation with Run-time Verification," ASM issue of Theoretical Computer Science, vol. 336, no. 2/3, pp. 209-234, 2005.
[16]
C. Artho, K. Havelund and A. Biere, "High-Level Data Races," Software testing, verification & reliability, vol. 13, no. 4, pp. 220-227, 2003.

Conference papers

[17]
M. Aghvamipanah et al., "Activity Recognition Protection for IoT Trigger-Action Platforms," in Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 2024, pp. 600-616.
[18]
M. Eshghie, M. Jafari and C. Artho, "From Creation to Exploitation: The Oracle Lifecycle," in Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024, 2024, pp. 23-34.
[19]
H. Fu et al., "In industrial embedded software, are some compilation errors easier to localize and fix than others?," in Proceedings - 2024 IEEE Conference on Software Testing, Verification and Validation, ICST 2024, 2024, pp. 383-394.
[20]
C. Artho et al., "JPF: From 2003 to 2023," in Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings, 2024, pp. 3-22.
[21]
M. Eshghie et al., "Capturing Smart Contract Design with DCR Graphs," in Software Engineering and Formal Methods : 21st International Conference, SEFM 2023, Proceedings, 2023, pp. 106-125.
[22]
A. Maiga et al., "Does Rust SPARK Joy? Safe Bindings from Rust to SPARK, Applied to the BBQueue Library," in FTSCS 2023 - Proceedings of the 9th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems, Co-located: SPLASH 2023, 2023, pp. 37-47.
[23]
Y. Liu et al., "Finding permission bugs in smart contracts with role mining," in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022, pp. 716-727.
[24]
H. Fu et al., "Prevalence of continuous integration failures in industrial systems with hardware-in-the-loop testing," in 2022 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2022), 2022, pp. 61-66.
[25]
M. Eshghie, C. Artho and D. Gurov, "Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning," in Proceedings Of Evaluation And Assessment In Software Engineering (EASE 2021), 2021, pp. 305-312.
[26]
M. Birgersson, C. Artho and M. Balliu, "Security-Aware Multi-User Architecture for IoT," in 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, pp. 102-113.
[27]
C. Artho, A. Benali and R. Ramler, "Test Benchmarks : Which One Now and in Future?," in 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, pp. 328-336.
[28]
R. Wang et al., "Multi-objective Search for Model-based Testing," in Proceedings 2020 IEEE 20Th International Conference On Software Quality, Reliability, And Security (QRS 2020), 2020, pp. 130-141.
[29]
K. Nishino et al., "Toward an Encoding Approach to Interaction-based Test Suite Minimization," in Proceedings - 2020 IEEE 13th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2020, 2020, pp. 211-212.
[30]
C. Artho and W. Visser, "Java Pathfinder at SV-COMP 2019 (Competition Contribution)," in 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems conference series, TACAS 2019 held as part of the 22nd European Joint Conferences on Theory and Practice of Software, ETAPS 2019, 2019, pp. 224-228.
[31]
J. Yoneyama et al., "Model-based network fault injection for IoT protocols," in ENASE 2019 - Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019, pp. 201-209.
[32]
C. Artho, M. Pande and Q. Tang, "Visual Analytics for Concurrent Java Executions," in Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, 2019, pp. 1102-1105.
[33]
R. Wang et al., "Visualization and Abstractions for Execution Paths in Model-Based Software Testing," in Integrated Formal Methods - 15th International Conference, IFM 2019, Bergen, Norway, December 2-6, 2019, Proceedings, 2019, pp. 474-492.
[34]
T. Kitamura et al., "Optimal Test Suite Generation for Modified Condition Decision Coverage Using SAT Solving," in 37th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2018, 2018, pp. 123-138.
[35]
T. Kitamura et al., "Classification tree method with parameter shielding," in 36th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2017, 2017, pp. 230-241.
[36]
C. Artho et al., "Model-based API Testing of Apache ZooKeeper," in 2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2017, pp. 288-298.
[37]
C. Artho and P. Ölveczky, "Preface," in 5th International Workshop on Formal Techniques for Safety-Critical Systems, FTSCS 2016, 2017.
[38]
A. Kohan, M. Yamamoto and C. Artho, "Automated Dataset Construction from Web Resources with Tool Kayur," in Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016, 2016, pp. 98-104.
[39]
C. Artho and L. Ma, "Classification of Randomly Generated Test Cases," in Proc. 1st Int. Workshop on Validating Software Tests (VST 2016), 2016.
[40]
E.-H. Choi et al., "Distance-Integrated Combinatorial Testing," in 27th IEEE Int. Symposium on Software Reliability Engineering (ISSRE 2016), 2016, pp. 93-104.
[41]
A. Yamada et al., "Greedy combinatorial test case generation using unsatisfiable cores," in ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016, pp. 614-624.
[42]
L. Ma et al., "Guiding random test generation with program analysis," in Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 2016, pp. 15-16.
[43]
C. Artho, Q. Gros and G. Rousset, "Precondition Coverage in Software Testing," in Proc. 1st Int. Workshop on Validating Software Tests (VST 2016), 2016.
[44]
Y. Yamagata et al., "Runtime Monitoring for Concurrent Systems," in 16th International Conference on Runtime Verification, RV 2016, 2016, pp. 386-403.
[45]
E.-H. Choi et al., "Test Effectiveness Evaluation of Prioritized Combinatorial Testing : A Case Study," in 2016 IEEE Int. Conf. on Software Quality, Reliability and Security (QRS 2016), 2016, pp. 61-68.
[46]
S. Gadia, C. Artho and G. Bloom, "Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder," in Proc. 18th Int. Conf. on Formal Engineering Methods (ICFEM 2016), 2016, pp. 417-432.
[47]
F. Weitl et al., "Cardinality of UDP Transmission Outcomes," in Proc. Dependable Software Engineering : Theories, Tools, and Applications — First International Symposium, SETTA 2015, 2015, pp. 120-134.
[48]
T. Kitamura et al., "Combinatorial Testing using Tree-based Test Models with Propositional Logic Constraints," in 2015 IEEE Int. Conf. on Software Quality, Reliability and Security (QRS 2015), 2015, pp. 141-150.
[49]
C. Artho et al., "Domain-Specific Languages with Scala," in Proc. 17th Int. Conf. on Formal Engineering Methods (ICFEM 2015), 2015, pp. 1-16.
[50]
L. Ma et al., "GRT : An Automated Test Generator using Orchestrated Program Analysis," in Proc. 30th Int. Conf. on Automated Software Engineering (ASE 2015), 2015, pp. 842-847.
[51]
L. Ma et al., "GRT : Program-Analysis-Guided Random Testing," in Proc. 30th Int. Conf. on Automated Software Engineering (ASE 2015), 2015, pp. 212-223.
[52]
C. Artho et al., "Model-based Testing of Stateful APIs with Modbat," in Proc. 30th Int. Conf. on Automated Software Engineering (ASE 2015), 2015, pp. 858-863.
[53]
A. Yamada et al., "Optimization of Combinatorial Testing by Incremental SAT Solving," in 2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings, 2015, pp. 1-10.
[54]
E.-H. Choi et al., "Priority Integration for Weighted Combinatorial Testing," in Proc. 39th IEEE Annual Computer Software and Applications Conf., COMPSAC 2015, 2015, pp. 242-247.
[55]
E.-H. Choi et al., "Design of Prioritized N-Wise Testing," in Proc. 26th IFIP WG Int. Conf. on Testing Software and Systems (ICTSS 2014), 2014, pp. 186-191.
[56]
N. Sebih et al., "Software Model Checking of UDP-based Distributed Applications," in Proc. 2nd Int. Symposium on Computing and Networking, 2014, pp. 96-105.
[57]
C. Artho et al., "Using Checkpointing and Virtualization for Fault Injection," in Proc. 2nd Int. Symposium on Computing and Networking, 2014, pp. 144-150.
[58]
C. Artho et al., "With an Open Mind : How to Write Good Models," in Proc. 2nd Int. Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2013), 2014, pp. 3-18.
[59]
L. Ma, C. Artho and H. Sato, "Analyzing Distributed Java Applications by Automatic Centralization," in 2nd IEEE Int. Workshop on Tools in Process (TiP 2013), 2013, pp. 691-696.
[60]
C. Artho et al., "Modbat : A Model-based API Tester for Event-driven Systems," in Proc. 9th Haifa Verification Conference (HVC 2013), 2013, pp. 112-128.
[61]
A. Biere, M. Seidl and C. Artho, "Model-Based Testing for Verification Backends," in Proc. 7th Int. Conf. on Tests & Proofs (TAP 2013), 2013, pp. 39-55.
[62]
C. Artho et al., "Software Model Checking for Distributed Systems with Selector-Based, Non-Blocking Communication," in Proc. 28th Int. Conf. on Automated Software Engineering (ASE 2013), 2013, pp. 169-179.
[63]
J. Mund et al., "The Quest for Precision : A Layered Approach for Data Race Detection in Static Analysis," in Proc. 11th Int. Symposium on Automated Technology for Verification and Analysis (ATVA 2013), 2013, pp. 516-525.
[64]
K. Suzaki et al., "Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication," in Proc. European Workshop on System Security (EuroSec 2012), 2012.
[65]
C. Artho et al., "Modbat : A model-based API tester for event-driven systems," in Proc. Dependable Systems Workshop (DSW 2012), 2012.
[66]
C. Artho et al., "Why Do Software Packages Conflict?," in Proc. 9th Working Conf. on Mining Software Repositories (MSR 2012), 2012, pp. 141-150.
[67]
K. Suzaki et al., "Memory Deduplication as a Threat to the Guest OS," in Proc. European Workshop on System Security (EuroSec 2011), 2011.
[68]
K. Suzaki et al., "Software Side Channel Attack on Memory Deduplication," in Proc. ACM Symposium on Operating Systems Principles (SOSP 2011), Poster session, 2011.
[69]
C. Artho et al., "Sources of Inter-package Conflicts in Debian," in Proc. Workshop on Logics for Component Configuration (LoCoCo 2011), 2011.
[70]
I. Andjelkovic and C. Artho, "Trace Server : A Tool for Storing, Querying and Analyzing Execution Traces," in Proc. JPF Workshop 2011, 2011.
[71]
C. Artho et al., "Cache-based Model Checking of Networked Software," in Proc. Workshop on Dependability of Network Software Applications (DNSA 2010), 2010.
[72]
C. Artho et al., "Model Checking of Concurrent Algorithms : From Java to C," in Proc. Conf. on Distributed and Parallel Embedded Systems (DIPES 2010), 2010, pp. 90-101.
[73]
K. Suzaki et al., "Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine," in Proc. 5th USENIX Workshop on Hot Topics in Security (HotSec 2010), 2010.
[74]
C. Artho, "Run-time Verification of Networked Software," in Proc. 10th Int. Conf. on Runtime Verification (RV 2010), 2010, pp. 59-73.
[75]
C. Artho et al., "Cache-based Model Checking of Networked Applications : From Linear to Branching Time," in Proc. 24th Int. Conf. on Automated Software Engineering (ASE 2009), 2009, pp. 447-458.
[76]
C. Artho et al., "Extraction of properties in C implementations of security APIs for verification of Java applications," in Proc. 3rd Int. Workshop on Analysis of Security APIs, 2009.
[77]
W. Leungwattanakit et al., "Introduction of Virtualization Technology to Multi-Process Model Checking," in NASA Formal Methods Symposium 2009, 2009, pp. 106-110.
[78]
C. Artho, "Separation of Transitions, Actions, and Exceptions in Model-based Testing," in International Conference on Computer Aided Systems Theory EUROCAST 2009 : Computer Aided Systems Theory - EUROCAST 2009, 2009, pp. 279-286.
[79]
W. Leungwattanakit et al., "Verifying networked programs using a model checker extension," in 31st Int. Conf. on Software Engineering (ICSE 2009), Companion Volume, 2009, pp. 409-410.
[80]
C. Artho et al., "Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs," in Proc. 9th Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2008), 2008, pp. 807-813.
[81]
C. Artho et al., "Efficient Model Checking of Networked Applications," in Proc. TOOLS EUROPE 2008, 2008, pp. 22-40.
[82]
C. Artho, "Iterative Delta Debugging," in Proc. 4th Haifa Verification Conference (HVC 2008), 2008, pp. 99-113.
[83]
C. Artho et al., "Teaching Software Model Checking," in Proc. Workshop on Formal Methods in Computer Science Education (FORMED 2008), 2008, pp. 171-179.
[84]
C. Artho et al., "Tools and Techniques for Model Checking Networked Programs," in Proc. 9th Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2008), 2008, pp. 852-857.
[85]
C. Artho, Z. Chen and S. Honiden, "AOP-based automated unit test classification of large benchmarks," in Proc. 3rd Int. Workshop on Aspect-Oriented Software Development (AOAsia 2007), 2007, pp. 17-22.
[86]
C. Artho et al., "Architecture-aware Partial-order Reduction to Accelerate Model Checking of Networked Programs," in Third DIKU-IST workshop, Roskilde, Denmark, 2007.
[87]
C. Artho et al., "Efficient Model Checking of Applications with I/O," in Proc. 11th Int. Conf. on Computer Aided Systems Theory (Eurocast 2007), 2007.
[88]
C. Artho et al., "Efficient Model Checking of Applications with Input/Output," in EUROCAST 2007: Computer Aided Systems Theory – EUROCAST 2007, 2007, pp. 515-522.
[89]
C. Artho, E. Shibayama and S. Honiden, "Iterative Delta Debugging," in Proc. 19th IFIP Int. Conf. on Testing of Communicating Systems (TESTCOM 2007), 2007.
[90]
C. Artho, K. Havelund and S. Honiden, "Visualization of Concurrent Program Executions," in Proc. 2nd Int. Workshop on Software Architectures and Component Technologies (SACT 2007), 2007, pp. 541-546.
[91]
C. Artho and P.-L. Garoche, "Accurate Centralization for Applying Model Checking on Networked Applications," in Proc. 21st Int. Conf. on Automated Software Engineering (ASE 2006), 2006, pp. 177-188.
[92]
C. Artho and A. Biere, "Advanced Unit Testing—How to Scale Up a Unit Test Framework," in Proc. Workshop on Automation of Software Test (AST 2006), 2006, pp. 462-465.
[93]
C. Artho, A. Biere and S. Honiden, "Enforcer—Efficient Failure Injection," in Proc. 14th Int. Conf. on Formal Methods (FM 2006), 2006, pp. 412-427.
[94]
C. Artho, A. Biere and S. Honiden, "Exhaustive Testing of Exception Handlers with Enforcer," in Formal Methods for Components and Objects, 2006, pp. 26-46.
[95]
C. Artho, A. Biere and S. Honiden, "Testing I/O Failures with Enforcer," in Proc. 14th Int. Conf. on Formal Methods (FM 2006), 2006.
[96]
C. Artho and A. Biere, "Combined Static and Dynamic Analysis," in Proc. 1st Int. Workshop on Abstract Interpretation of Object-Oriented Languages (AIOOL 2005), 2005, pp. 3-14.
[97]
C. Artho and A. Biere, "Subroutine Inlining and Bytecode Abstraction to Simplify Static and Dynamic Analysis," in Proc. 1st Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE 2005), 2005, pp. 98-115.
[98]
C. Artho and K. Havelund, "Applying Jlint to Space Exploration Software," in Proc. 5th Int. Conf. on Verification, Model Checking and Abstract Interpretation (VMCAI 2004), 2004, pp. 297-308.
[99]
C. Artho et al., "JNuke : Efficient Dynamic Analysis for Java," in Proc. 16th Int. Conf. on Computer Aided Verification (CAV 2004), 2004, pp. 462-465.
[100]
C. Artho, A. Biere and K. Havelund, "Using block-local atomicity to detect stale-value concurrency errors," in Proc. 2nd Int. Symposium on Automated Technology for Verification and Analysis (ATVA 2004), 2004, pp. 150-164.
[101]
C. Artho et al., "Experiments with Test Case Generation and Runtime Analysis," in Proc. 10th Int. Workshop on Abstract State Machines (ASM 2003), 2003, pp. 87-107.
[102]
C. Artho, K. Havelund and A. Biere, "High-Level Data Races," in VVEIS 2003 : 1st Int. Workshop on Verification and Validation of Enterprise Information Systems, 2003, pp. 82-93.
[103]
A. Biere, C. Artho and V. Schuppan, "Liveness Checking as Safety Checking," in Proc. 7th Int. Workshop on Formal Methods for Industrial Critical Systems (FMICS’02), 2002.
[104]
C. Artho and A. Biere, "Applying Static Analysis to Large-Scale, Multithreaded Java Programs," in Proc. 13th ASWEC, 2001, pp. 68-75.

Non-peer reviewed

Articles

[105]
C. Artho and P. C. Olveczky, "Formal Techniques for Safety-Critical Systems (FTSCS 2018) Preface," Science of Computer Programming, vol. 208, 2021.
[106]
C. Artho and P. C. Olveczky, "Formal Techniques for Safety-Critical Systems (FTSCS 2014) Preface," Science of Computer Programming, vol. 133, pp. 89-90, 2017.

Conference papers

[107]
C. Artho and P. C. Ölveczky, "Preface," in Proceedings 44th International Conference on Application and Theory of Petri Nets and Concurrency, PETRI NETS 2023, 2023.
[108]
C. Artho and P. C. Ölveczky, "Welcome from the Chairs," in Proceedings of the 9th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems - FTSCS 2023, Co-located: SPLASH 2023, 2023.
[109]
C. Artho and P. Csaba Ölveczky, "Welcome from the Chairs," in FTSCS 2022 - Proceedings of the 8th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems, co-located with SPLASH 2022, 2022.
[110]
L. Ma et al., "GRT at the SBST 2015 Tool Competition," in SBST 2015 Tool Competition, 2015, pp. 48-51.

Chapters in books

[111]
C. Artho and P. C. Ölveczky, "Preface," in Communications in Computer and Information Science, : Springer Nature, 2019.

Theses

[112]
C. Artho, "Combining Static and Dynamic Analysis to Find Multi-threading Faults Beyond Data Races," Doctoral thesis , Zürich, Diss. ETH, 16020, 2005.

Reports

[113]
C. Artho, K. Havelund and S. Honiden, "Visualization of Concurrent Program Executions," Tokyo, Japan : National Institute of Informatics, 2007.
[114]
C. Artho and A. Biere, "Combined Static and Dynamic Analysis," Zürich, Switzerland : ETH Zürich, 2005.
Latest sync with DiVA:
2024-11-17 04:00:16