Doctoral Dissertation (Thèse de Doctorat)
Journal Papers (Article Académique)
- Are Backdoor Mandates Ethical?—A Position Paper
Raphaël Khoury, Sylvain Hallé
IEEE Technology and Society Magazine, 41(4), pp.63-70.
[pdf] - The Botnet Simulator: A Simulation Tool for Understanding the Interaction Between Botnets
Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj,
Elsevier Software Impacts, 10(100173), nov. 2021. - The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj,
Journal of Systems Architecture, vol. 116, June 2021.
[pdf, doi] - A survey of malware detection in Android apps Recommendations and perspectives for future research
Asma Razgallah, Raphaël Khoury, Sylvain Hallé, Kobra Khanmohammadi,
Computer Science Review, vol. 39, Feb, 2021.
[pdf, doi] - Improving Hyperconnected Logistics With Blockchains and Smart Contracts
Quentin Betti, Raphaël Khoury, Sylvain Hallé, Benoît Montreuil, IT Professional 21(4): 25-32 (2019). - Empirical Study of Android Repackaged Applications
Kobra Khanmohammadi, Neda Ebrahimi, Abdelwahab Hamou-Lhadj & Raphaël Khoury,
Empirical Software Engineering.
[doi] - Streamlining the Inclusion of Computer Experiments In a Research Paper
Sylvain Hallé, Raphaël Khoury, Mewena Awesso,
IEEE Computer 51(11): 78-89 (2018). - Decentralized Enforcement of Artifact Lifecycles
S. Hallé, R. Khoury, Y.Falcone & T. Hokayem,
Information Systems 74: 117-135
[pdf (local version)] - Equivalence-preserving corrective enforcement of security properties
R. Khoury and N. Tawbi,
International Journal of Information and Computer Security 7(2/3/4) (2015). [doi][pdf] [bib] - Corrective Enforcement: A new Paradigm of Security Policy enforcement by Monitors
R. Khoury and N. Tawbi,
ACM Transactions on Information and System Security 15(2)(2012). [doi][pdf](local extended version with proofs) [bib] - Which Security Policies are Enforceable by Runtime Monitors? A Survey
R. Khoury and N. Tawbi,
Computer Science Review, 6(1), pp.27-45 (2012).[doi][pdf][bib] - Diversity through N-Version Programming: Current State, Challenges and Recommendations
R. Khoury, A. Hamou-Lhadj, M. Couture, & R. Charpentier, R.,
International Journal of Information Technology and Computer Science (IJITCS) 4(2), pp.56-64 (2012). [pdf][bib] - Extending the Enforcement Power of Truncation Monitors Using Static Analysis
H. Chabot, R. Khoury and N. Tawbi.
Computers & Security 30(4), pp.194-207(2011). [pdf][bib]
Conferences and Workshops (Comptes-rendus de conférences arbitrés)
- Half-Day Vulnerabilities: A study of the First Days of CVE Entries
Kobra Khanmohammadi & Raphaël Khoury,
he Conference on Applied Machine Learning in Information Security (CAMLIS), Arlington, VA, USA. (2022).
[pdf] - Verification Under Access Restrictions
Rania Taleb, Raphaël Khoury & Sylvain Hallé,
9th Workshop on Formal Methods in Software Engineering, pp 21-41, May 2021, held virtually,
Winner of the Best paper award
[pdf] - Test Sequence Generation with Cayley Graphs
Sylvain Hallé & Raphaël Khoury,
17th Workshop on Advances in Model Based Testing (A-MOST 2021), pp.182-191, April 2021. - An analysis of the use of CVEs by IoT malware
Raphael Khoury, Benjamin VIgnau, Sylvain Hallé Abdelwahab Hamou-Lhadj and Asma Razgallah
The 13th International Symposium on Foundations & Practice of Security (FPS 2020).
[pdf] - TRIADE: A Three-Factor Trace Segmentation Method to Support Program Comprehension
Raphael Khoury, Abdelwahab Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé and Fabio Petrillo,
IEEE International Symposium on Software Reliability Engineering Workshops 2019, p.406-413, Berlin, Germany.
[pdf] - On the Use of API Calls to Detect Repackaged Malware Apps: Challenges and Ideas
Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj & Raphaël Khoury,
IEEE International Symposium on Software Reliability Engineering Workshops 2019, p.116-117, Berlin, Germany. - 10 Years of IoT Malware: a Feature-Based Taxonomy
Benjamin Vignau, Raphaël Khoury & Sylvain Hallé,
IEEE International Conference on Software Security and Reliability, Sofia, Bulgaria.
[pdf] - Writing Domain-Specific Languages for BeepBeep
Sylvain Hallé, Raphaël Khoury,
18th International Conference on Runtime Verification (RV2018), Limassol, Cyprus, nov. 2018.
[pdf] - Real-Time Data Mining for Event Streams
Massiva Roudjane, Djamal Rebaïne, Raphaël Khoury, Sylvain Hallé, Raphaël Khoury,
22nd International IEEE EDOC Conference, Stockholm, Sweden, oct. 2018.
[pdf] - Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications
Raphaël Khoury, Sylvain Hallé:
IEEE 19th International Conference on
Information Reuse and Integration for Data Science
[pdf] - Monitoring of Security Properties Using BeepBeep
Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé:
FPS 2017: 160-169
[pdf] - Event Stream Processing with Multiple Threads
S. Hallé, R. Khoury & S. Gaboury,
17th International Conference on Runtime Verification (RV 17), WA, USA, Sept. 2017. - A Few Things We Heard About RV Tools (Position Paper)
Sylvain Hallé, Raphaël Khoury, Sébastien Gaboury:
RV-CuBES 2017: 89-95 - SealTest: a simple library for test sequence generation
S. Hallé & R. Khoury
26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 17), Santa Barbara, CA, USA,
July 2017.
[pdf] - Three views of Log Trace Triaging
R. Khoury, S. Hallé & S. Gaboury,
9th International Symposium on Foundations & Practice of Security (FPS 2016), oct. 2016, Québec city, QC, Canada.
[pdf] - A Glue Language for Event Stream Processing
S. Hallé, S. Gaboury & R. Khoury,
Real-time and Stream Analytics in Big Data workshop, Washington D.C., USA, dec. 2016.
[pdf] - Execution Trace Analysis Using LTL-FO+
Khoury, S. Hallé & O. Waldmann,
7th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (IsoLa 16), Corfu, Greece, oct. 2016.
[pdf] - Decentralized Enforcement of Artifact Lifecycles
S. Hallé, R. Khoury, Y.Falcone & T. Hokayem,
12e Enterprise Computing Conference (IEEE EDOC16), Vienna, Autria, September 2016.
Best paper Award
[pdf] - Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle
Khoury, L. Shi, and A. Hamou-Lhadj, Accepted for presentation at the 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME 2016), Raleigh, N. Carolina, USA.
[pdf] - Runtime Enforcement With Partial Control
R. Khoury and S. Hallé
8th International Symposium on Foundations and Practice of Security (FPS15), Clermont-Ferrand, oct. 2015, pp. 102-116.
[doi] [pdf] [bib] - Runtime Monitoring of Stream Logic Formulae
S. Hallé and R. Khoury
8th International Symposium on Foundations and Practice of Security (FPS15), Clermont-Ferrand, oct. 2015, pp.251-258.
[doi] [pdf] [bib] - Symbolic Analysis of Assembly Traces: Lessons Learned and Perspectives
R. Khoury
22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER15), Montreal, Qc, Canada, march 2015 [pdf][bib]. - Software Behaviour Correlation in a Redundant and Diverse Environment Using the Concept of Trace Abstraction
A. Hamou-Lhadj, S. Murtaza, W. Fadel, A. Mehrabian, M. Couture and R. Khoury
2013 International Conference on Reliable And Convergent Systems (ACM RACS 2013), Montreal (Canada), october 2013[pdf][bib] - Towards A Formal Framework for Evaluating the Effectiveness of Diversity when Applied to Security
R. Khoury, A. Hamou-Lhadj & M. Couture,
In proceedings of the IEEE Symposium: Computational Intelligence for Security and Defence Applications 2012 (CISDA 12), Ottawa, (Canada), July 2012. [pdf] [bib] - Optimized Inlining of Runtime Monitors.
F. Lemay, R. Khoury and N. Tawbi,
In proceedings of the 16th Nordic Conference on Secure IT Systems (NORDSEC11), Tallinn, (Estonia), October 2011, Springer’s Lecture Notes In Computer Science (LNCS) series. [doi] [pdf][bib] - Corrective Enforcement of Security Policies
R. Khoury and N. Tawbi,
In proceedings of The 7th International Workshop on Formal Aspects of Security & Trust (FAST2010) Pisa, (Italy), September 2010, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi][pdf][bib] - Using Equivalence Relations for Corrective Enforcement of Security Policies.
R. Khoury and N. Tawbi,
In proceedings of The 5th International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security” (MMM-ACNS-2010), in St-Petersburg, (Russia), September 2010, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi] [pdf][bib] - Generating In-Line Monitors For Rabin Automata
H. Chabot, R. Khoury and N. Tawbi,
In proceedings of The 14th Nordic Conference on Secure IT Systems (NORDSEC09) in Oslo, (Norway), October 2009, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi] [pdf] [bib] - Alternative Java Security Policy Model,
S. Cloutier, C. Gustave, R. Khoury, D. Nassour, A. Robison, F. Samson & N. Tawbi
In proceedings of The NOTERE 2004 conference, Saidia, (Morocco), June 2004 [pdf] [bib]