Publications

Doctoral Dissertation (Thèse de Doctorat)

  • Enforcing Security Policies with Monitors.
    R. Khoury
    Laval University, 2011 [pdf][bib]

Journal Papers (Article Académique)

 

  • Decentralized Enforcement of Artifact Lifecycles
    S.  Hallé, R. Khoury, Y.Falcone & T. Hokayem,
    Information  Systems 74: 117-135
    [pdf (local version)]
  • Equivalence-preserving corrective enforcement of security properties
    R. Khoury and N. Tawbi,
    International Journal of Information and Computer Security 7(2/3/4) (2015). [doi][pdf] [bib]
  • Corrective Enforcement: A new Paradigm of Security Policy enforcement by Monitors
    R. Khoury and N. Tawbi,
    ACM Transactions on Information and System Security 15(2)(2012). [doi][pdf](local extended version with proofs) [bib]
  • Which Security Policies are Enforceable by Runtime Monitors? A Survey
    R. Khoury and N. Tawbi,
    Computer Science Review, 6(1), pp.27-45 (2012).[doi][pdf][bib]
  • Diversity through N-Version Programming: Current State, Challenges and Recommendations
    R. Khoury, A. Hamou-Lhadj, M. Couture, & R. Charpentier, R.,
    International Journal of Information Technology and Computer Science (IJITCS) 4(2), pp.56-64 (2012). [pdf][bib]
  • Extending the Enforcement Power of Truncation Monitors Using Static Analysis
    H. Chabot, R. Khoury and N. Tawbi.
    Computers & Security 30(4), pp.194-207(2011). [pdf][bib]

Conferences and Workshops (Comptes-rendus de conférences arbitrés)

 

  • Writing Domain-Specific Languages for BeepBeep
    Sylvain Hallé, Raphaël Khoury,
    18th International Conference on Runtime Verification (RV2018), Limassol, Cyprus, nov. 2018.
    [pdf]
  • Real-Time Data Mining for Event Streams
    Massiva Roudjane, Djamal Rebaïne, Raphaël Khoury, Sylvain Hallé, Raphaël Khoury,
    22nd International IEEE EDOC Conference, Stockholm, Sweden, oct. 2018.
    [pdf]
  • Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications
    Raphaël Khoury, Sylvain Hallé:
    IEEE 19th International Conference on
    Information Reuse and Integration for Data Science
    [pdf]
  • Monitoring of Security Properties Using BeepBeep
    Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé:
    FPS 2017: 160-169
    [pdf]
  • Event Stream Processing with Multiple Threads
    S. Hallé,  R. Khoury & S. Gaboury,
    17th International Conference on Runtime Verification (RV 17), WA, USA, Sept.  2017.
  • A Few Things We Heard About RV Tools (Position Paper)
    Sylvain Hallé, Raphaël Khoury, Sébastien Gaboury:
    RV-CuBES 2017: 89-95
  • SealTest: a simple library for test sequence generation
    S. Hallé  &  R. Khoury
     26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 17), Santa Barbara, CA, USA,
    July 2017.
    [pdf]
  • Three views of Log Trace Triaging
    R. Khoury, S. Hallé & S.  Gaboury,
    9th International Symposium on Foundations & Practice of Security (FPS 2016), oct. 2016, Québec city, QC, Canada.
    [pdf]
  • A Glue Language for Event Stream Processing
    S. Hallé, S. Gaboury & R. Khoury,
    Real-time and Stream Analytics in Big Data workshop, Washington D.C., USA, dec. 2016.
    [pdf]
  • Execution Trace Analysis Using LTL-FO+
    Khoury, S. Hallé & O. Waldmann,
    7th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (IsoLa 16), Corfu, Greece, oct. 2016.
    [pdf]
  • Decentralized Enforcement of Artifact Lifecycles
    S.  Hallé, R. Khoury, Y.Falcone & T. Hokayem,
    12e Enterprise Computing Conference (IEEE EDOC16), Vienna, Autria, September 2016.
    Best paper Award bpa
    [pdf]
  • Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle
    Khoury, L. Shi, and A. Hamou-Lhadj,  Accepted for presentation at the 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME 2016), Raleigh, N. Carolina, USA.
    [pdf]
  • Runtime Enforcement With Partial Control
    R. Khoury and  S. Hallé
    8th International Symposium on Foundations and Practice of Security (FPS15), Clermont-Ferrand, oct. 2015, pp. 102-116.
    [doi] [pdf] [bib]
  • Runtime Monitoring of Stream Logic Formulae
     S. Hallé and R. Khoury
    8th International Symposium on Foundations and Practice of Security (FPS15), Clermont-Ferrand, oct. 2015, pp.251-258.
    [doi] [pdf] [bib]
  • Symbolic Analysis of Assembly Traces: Lessons Learned and Perspectives
    R. Khoury
    22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER15), Montreal, Qc, Canada, march 2015 [pdf][bib].
  • Software Behaviour Correlation in a Redundant and Diverse Environment Using the Concept of Trace Abstraction
    A. Hamou-Lhadj, S. Murtaza, W. Fadel, A. Mehrabian, M. Couture and R. Khoury
    2013 International Conference on Reliable And Convergent Systems  (ACM RACS 2013), Montreal (Canada), october 2013[pdf][bib]
  • Towards A Formal Framework for Evaluating the Effectiveness of Diversity when Applied to Security
    R. Khoury, A. Hamou-Lhadj & M. Couture,
    In proceedings of the IEEE Symposium: Computational Intelligence for Security and Defence Applications 2012 (CISDA 12), Ottawa, (Canada), July 2012. [pdf] [bib]
  • Optimized Inlining of Runtime Monitors.
    F. Lemay, R. Khoury and N. Tawbi,
    In proceedings of the 16th Nordic Conference on Secure IT Systems (NORDSEC11), Tallinn, (Estonia), October 2011, Springer’s Lecture Notes In Computer Science (LNCS) series. [doi] [pdf][bib]
  • Corrective Enforcement of Security Policies
    R. Khoury and N. Tawbi,
    In proceedings of The 7th International Workshop on Formal Aspects of Security & Trust (FAST2010) Pisa, (Italy), September 2010, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi][pdf][bib]
  • Using Equivalence Relations for Corrective Enforcement of Security Policies.
    R. Khoury and N. Tawbi,
    In proceedings of The 5th International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security” (MMM-ACNS-2010), in St-Petersburg, (Russia), September 2010, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi] [pdf][bib]
  • Generating In-Line Monitors For Rabin Automata
    H. Chabot, R. Khoury and N. Tawbi,
    In proceedings of The 14th Nordic Conference on Secure IT Systems (NORDSEC09) in Oslo, (Norway), October 2009, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi] [pdf] [bib]
  • Alternative Java Security Policy Model,
    S. Cloutier, C. Gustave, R. Khoury, D. Nassour, A. Robison, F. Samson & N. Tawbi
    In proceedings of The NOTERE 2004 conference, Saidia, (Morocco), June 2004 [pdf] [bib]

Tech Reports (Rapport Techniques)

  • Runtime Enforcement with Partial Control 
    R. Khoury and S. Hallé,
    [pdf]
  • An Alternating Automaton for First-Order
    Linear Temporal Logic: Extended version with
    proofs

    Raphaël Khoury, Sylvain Hallé and Yannick Lebrun
    [pdf]

Professeur à l'Université du Québec à Chicoutimi