Software, Prototypes and Demonstrators

 

NameDescriptionDateDistribution Mode / LicenceAuthors and Contact

GEPETO: a GEoPrivacy-Enhancing TOolkit

GEPETO is a flexible software that can be used to visualize, sanitize, perform inference attacks and measure the utility of a particular geolocated dataset. The main objective of GEPETO is to enable a data curator (e.g., a company, a governmental agency or a data protection authority) to design, tune, experiment and evaluate various sanitization algorithms and inference attacks as well as visualizing the following results and evaluating the resulting trade-off between privacy and utility.

2014

Diffusion par GIT. License CeCILL-B

M.-O. Killijian,
M. Nunez del
Prado Cortez,
S. Gambs (Univ. Rennes)

MARACAS: CBSE Middleware for adaptive fault tolerance

This middleware illustrates how fault tolerance mechanisms can be adapted and combined online. Different types of changes related to the evolution of the resource requirements, the applications, or the fault model during operation, could be at the origin of the dynamic reconfiguration of fault tolerance mechanisms. A set of mechanisms has been developed to show the capabilities of the CBSE approach based a reflective medium to perform agile dependable systems. It is meant to be a proof of concepts. The techniques behind the proposed approach are applicable to many application areas.

2014

Diffusion restreinte

J. C. Fabre,
M. Roy,
M. Stoicescu

ARINC 653 Simulator

A simulator of the executive support ARINC 653 standard for IMA systems has been developed on Unix. It emulates time and space partitionning concepts and also inter-partitions communication mechanisms.

 

Licenses MIT et  CeCILL-B
Diffusion par GIT
https://github.com/makrin/ARINC653-simulator

M. Cronel,
J. C. Fabre,
G. Bustamente,
R. Palustran,
M. Roy

IronHIDE: un outil d’analyse des attaques par entrées-sorties

IronHIDE is an FPGA-based I/O controller dedicated to the analysis of vulnerabilities at the interface between the hardware and software components. This controller has the advantage of interfacing with the PCI-Express bus and can be used  to generate valid and invalid requests on the bus to identify potential I/O attacks.

2013

Diffusion restreinte

E. Alata,
Y. Deswarte,
F. Lone Sang,
V. Nicomette

MINOTOR: Monitoring tool for timing and behavioral analysis

A model driven distributed monitoring system for timing and behavioral analysis. The tool is based on a formal framework that extends the semantics of Petri nets to be able to execute it online on partial executions and distributed observation environments.

  

O. Baldellon,
J. C. Fabre,
M. Roy

SOUK: Social Observation of hUman Kinetics

SOUK integrates a set of algorithms enabling the processing of geo-locates data, the extraction of social contacts, as well ad the analysis and representation of the social interaction networks.

2013

Diffusion restreinte

G. Tredan,
M.Roy,
C. Zanon

WASAPY: Web Applications Security Assessment in Python

The objective of this software is to identify in an automated way web applications vulnerabilities. This is accomplished by performing a combinational scan of the web site and actually exploiting vulnerabilities. Specially crafted requests derived from a grammar are submitted to the application, and the corresponding responses are analyzed using clustering techniques. This approach has two advantages. The first one is the ability of the software to continue its analysis after exploiting a vulnerability. In particular, pages accessible after exploiting the vulnerability can be processed automatically. The second advantage is its ability to identify vulnerabilities that are activated only after performing a particular action sequence on the site.

2012

Diffusion restreint

E. Alata,
R. Akrout,
Y. Bachy,
A. Dessiatnikoff,
M. Kaâniche,
V. Nicomette

HAZOP-UML: Risk analysis for the identification and validation of safety requirements

HAZOP-UML is a tool for model-based safety analysis. This tool allows to model UML (Unified Modeling Language) sequence and use case diagrams, which are used to generate deviation tables applying the HAZOP technique (HAZard OPerability).

2011

Diffusion restreinte

Q.A. Do Hoang,
D. Martin-Guillerez,
J. Guiochet,
D.Powell

STELAE: Systems TEst LAnguage Environment

STELAE is a model-driven environment for the development of tests of avionic systems. It includes customizable graphical and textual editors for abstract test models, checkers, and finally template-based transformations towards code executable on top of a real industrial test platform (the U-Test platform of Cassidian Test & Services). The core part of STELAE is a metamodel capturing a rich set of domain-specific concepts.

2010

Diffusion restreinte

R. Guduvan,
H. Waeselynck,
V Wiels (ONERA),
G. Durrieu (ONERA), Y. Fusero (Cassidian),
M. Schieber (Cassidian)

STANCE: Structural ANalysis of Counter Examples

STANCE aids in the debugging of Simulink models, when a lengthy counterexample is returned by the model checker. It performs a structural analysis of the model’s paths activated by the counterexample and extracts relevant information to explain the observed violation. STANCE may also be used to guide the model checker toward the search for different counterexamples, exhibiting new path activation patterns and thus new ways to violate the property.

2009

Diffusion restreinte

T. Bochot (ONERA & Airbus), K. Cabrera,
P. Virelizier (Airbus), H. Waeselynck,
V. Wiels (ONERA)

TERMOS: TEst Requirement language for Mobile Setting

TERMOS is a formal language based on UML Sequence Diagrams used for the testing of mobile applications, integrated into UML support technology. The tool contains: (i) a UML profile for the editing of verification scenarios (positive and negative requirements, test purposes) with spatial and event views, (ii) an Eclipse plugin for the automated checking of traces. The checking of traces against scenarios combines graph matching and event order analysis. The graph matching part searches for occurrences of the target sequence of spatial configurations. The event order analysis relies on an automaton-based semantics of sequence diagrams.

2009

Diffusion restreinte

P. André,
Z. Micskei (BUTE),
M.D. Nguyen,
N. Rivière,
H. Waeselynck

MASS: Multi Agent Simulator Software

MASS is a simulator based on mobile agents in two or three dimensions. Agents are activated asynchronously with a scheduler, and each one executes a state machine. The software runs on a Windows platform. It has been parallelized to take advantage of multicore processors.

2007

Diffusion restreinte

J.H. Collet