Selected Publications

Doctoral Dissertation (Thèse de Doctorat)

  • Enforcing Security Policies with Monitors.
    R. Khoury
    Laval University, 2011 [pdf][bib]

Journal Papers (Article Académique)

 

  • The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
    Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj,
    Journal of Systems Architecture, vol. 116, June 2021.
    [pdfdoi]
  • A survey of malware detection in Android apps Recommendations and perspectives for future research
    Asma Razgallah, Raphaël Khoury, Sylvain Hallé, Kobra Khanmohammadi,
    Computer Science Review, vol. 39, Feb, 2021.
    [pdf, doi]
  • Improving Hyperconnected Logistics With Blockchains and Smart Contracts
    Quentin Betti, Raphaël Khoury, Sylvain Hallé, Benoît Montreuil, IT Professional 21(4): 25-32 (2019).
  • Empirical Study of Android Repackaged Applications
    Kobra Khanmohammadi, Neda Ebrahimi, Abdelwahab Hamou-Lhadj & Raphaël Khoury,
    accepted for publication in Empirical Software Engineering.
  • Streamlining the Inclusion of Computer Experiments In a Research Paper
    Sylvain Hallé, Raphaël Khoury, Mewena Awesso,
    IEEE Computer 51(11): 78-89 (2018).
  • Decentralized Enforcement of Artifact Lifecycles
    S.  Hallé, R. Khoury, Y.Falcone & T. Hokayem,
    Information  Systems 74: 117-135
    [pdf (local version)]
  • Equivalence-preserving corrective enforcement of security properties
    R. Khoury and N. Tawbi,
    International Journal of Information and Computer Security 7(2/3/4) (2015). [doi][pdf] [bib]
  • Corrective Enforcement: A new Paradigm of Security Policy enforcement by Monitors
    R. Khoury and N. Tawbi,
    ACM Transactions on Information and System Security 15(2)(2012). [doi][pdf](local extended version with proofs) [bib]
  • Which Security Policies are Enforceable by Runtime Monitors? A Survey
    R. Khoury and N. Tawbi,
    Computer Science Review, 6(1), pp.27-45 (2012).[doi][pdf][bib]
  • Diversity through N-Version Programming: Current State, Challenges and Recommendations
    R. Khoury, A. Hamou-Lhadj, M. Couture, & R. Charpentier, R.,
    International Journal of Information Technology and Computer Science (IJITCS) 4(2), pp.56-64 (2012). [pdf][bib]
  • Extending the Enforcement Power of Truncation Monitors Using Static Analysis
    H. Chabot, R. Khoury and N. Tawbi.
    Computers & Security 30(4), pp.194-207(2011). [pdf][bib]

Conferences and Workshops (Comptes-rendus de conférences arbitrés)

 

  • Verification Under Access Restrictions
    Rania Taleb, Raphaël Khoury & Sylvain Hallé,
    9th Workshop on Formal Methods in Software Engineering, pp 21-41,  May 2021, held virtually,
    Winner of the Best paper award bpa 
    [pdf]
  • Test Sequence Generation with Cayley Graphs
    Sylvain Hallé & Raphaël Khoury,
    17th Workshop on Advances in Model Based Testing (A-MOST 2021), pp.182-191, April 2021.
  • An analysis of the use of CVEs by IoT malware
    Raphael Khoury, Benjamin VIgnau, Sylvain Hallé Abdelwahab Hamou-Lhadj and Asma Razgallah
    The 13th International Symposium on Foundations & Practice of Security (FPS 2020).
    [pdf]
  • TRIADE: A Three-Factor Trace Segmentation Method to Support Program Comprehension
    Raphael Khoury, Abdelwahab Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé and Fabio Petrillo,
    IEEE International Symposium on Software Reliability Engineering Workshops 2019, p.406-413, Berlin, Germany.
    [pdf]
  • On the Use of API Calls to Detect Repackaged Malware Apps: Challenges and Ideas
    Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj & Raphaël Khoury,
    IEEE International Symposium on Software Reliability Engineering Workshops 2019, p.116-117, Berlin, Germany.
  • 10 Years of IoT Malware: a Feature-Based Taxonomy
    Benjamin Vignau, Raphaël Khoury & Sylvain Hallé,
    IEEE International Conference on Software Security and Reliability, Sofia, Bulgaria.
    [pdf]
  • Writing Domain-Specific Languages for BeepBeep
    Sylvain Hallé, Raphaël Khoury,
    18th International Conference on Runtime Verification (RV2018), Limassol, Cyprus, nov. 2018.
    [pdf]
  • Real-Time Data Mining for Event Streams
    Massiva Roudjane, Djamal Rebaïne, Raphaël Khoury, Sylvain Hallé, Raphaël Khoury,
    22nd International IEEE EDOC Conference, Stockholm, Sweden, oct. 2018.
    [pdf]
  • Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL Specifications
    Raphaël Khoury, Sylvain Hallé:
    IEEE 19th International Conference on
    Information Reuse and Integration for Data Science
    [pdf]
  • Monitoring of Security Properties Using BeepBeep
    Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé:
    FPS 2017: 160-169
    [pdf]
  • Event Stream Processing with Multiple Threads
    S. Hallé,  R. Khoury & S. Gaboury,
    17th International Conference on Runtime Verification (RV 17), WA, USA, Sept.  2017.
  • A Few Things We Heard About RV Tools (Position Paper)
    Sylvain Hallé, Raphaël Khoury, Sébastien Gaboury:
    RV-CuBES 2017: 89-95
  • SealTest: a simple library for test sequence generation
    S. Hallé  &  R. Khoury
     26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 17), Santa Barbara, CA, USA,
    July 2017.
    [pdf]
  • Three views of Log Trace Triaging
    R. Khoury, S. Hallé & S.  Gaboury,
    9th International Symposium on Foundations & Practice of Security (FPS 2016), oct. 2016, Québec city, QC, Canada.
    [pdf]
  • A Glue Language for Event Stream Processing
    S. Hallé, S. Gaboury & R. Khoury,
    Real-time and Stream Analytics in Big Data workshop, Washington D.C., USA, dec. 2016.
    [pdf]
  • Execution Trace Analysis Using LTL-FO+
    Khoury, S. Hallé & O. Waldmann,
    7th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (IsoLa 16), Corfu, Greece, oct. 2016.
    [pdf]
  • Decentralized Enforcement of Artifact Lifecycles
    S.  Hallé, R. Khoury, Y.Falcone & T. Hokayem,
    12e Enterprise Computing Conference (IEEE EDOC16), Vienna, Autria, September 2016.
    Best paper Award bpa
    [pdf]
  • Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle
    Khoury, L. Shi, and A. Hamou-Lhadj,  Accepted for presentation at the 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME 2016), Raleigh, N. Carolina, USA.
    [pdf]
  • Runtime Enforcement With Partial Control
    R. Khoury and  S. Hallé
    8th International Symposium on Foundations and Practice of Security (FPS15), Clermont-Ferrand, oct. 2015, pp. 102-116.
    [doi] [pdf] [bib]
  • Runtime Monitoring of Stream Logic Formulae
     S. Hallé and R. Khoury
    8th International Symposium on Foundations and Practice of Security (FPS15), Clermont-Ferrand, oct. 2015, pp.251-258.
    [doi] [pdf] [bib]
  • Symbolic Analysis of Assembly Traces: Lessons Learned and Perspectives
    R. Khoury
    22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER15), Montreal, Qc, Canada, march 2015 [pdf][bib].
  • Software Behaviour Correlation in a Redundant and Diverse Environment Using the Concept of Trace Abstraction
    A. Hamou-Lhadj, S. Murtaza, W. Fadel, A. Mehrabian, M. Couture and R. Khoury
    2013 International Conference on Reliable And Convergent Systems  (ACM RACS 2013), Montreal (Canada), october 2013[pdf][bib]
  • Towards A Formal Framework for Evaluating the Effectiveness of Diversity when Applied to Security
    R. Khoury, A. Hamou-Lhadj & M. Couture,
    In proceedings of the IEEE Symposium: Computational Intelligence for Security and Defence Applications 2012 (CISDA 12), Ottawa, (Canada), July 2012. [pdf] [bib]
  • Optimized Inlining of Runtime Monitors.
    F. Lemay, R. Khoury and N. Tawbi,
    In proceedings of the 16th Nordic Conference on Secure IT Systems (NORDSEC11), Tallinn, (Estonia), October 2011, Springer’s Lecture Notes In Computer Science (LNCS) series. [doi] [pdf][bib]
  • Corrective Enforcement of Security Policies
    R. Khoury and N. Tawbi,
    In proceedings of The 7th International Workshop on Formal Aspects of Security & Trust (FAST2010) Pisa, (Italy), September 2010, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi][pdf][bib]
  • Using Equivalence Relations for Corrective Enforcement of Security Policies.
    R. Khoury and N. Tawbi,
    In proceedings of The 5th International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security” (MMM-ACNS-2010), in St-Petersburg, (Russia), September 2010, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi] [pdf][bib]
  • Generating In-Line Monitors For Rabin Automata
    H. Chabot, R. Khoury and N. Tawbi,
    In proceedings of The 14th Nordic Conference on Secure IT Systems (NORDSEC09) in Oslo, (Norway), October 2009, Springer’s Lecture Notes In Computer Science (LNCS) series.[doi] [pdf] [bib]
  • Alternative Java Security Policy Model,
    S. Cloutier, C. Gustave, R. Khoury, D. Nassour, A. Robison, F. Samson & N. Tawbi
    In proceedings of The NOTERE 2004 conference, Saidia, (Morocco), June 2004 [pdf] [bib]

Tech Reports (Rapport Techniques)

  • Runtime Enforcement with Partial Control 
    R. Khoury and S. Hallé,
    [pdf]
  • An Alternating Automaton for First-Order
    Linear Temporal Logic: Extended version with
    proofs

    Raphaël Khoury, Sylvain Hallé and Yannick Lebrun
    [pdf]

Professeur à l'Université du Québec à Chicoutimi