default search action
François Gauthier 0001
Person information
- affiliation: Oracle Labs, Brisbane, QLD, Australia
- affiliation (former): Polytechnique Montréal, QC, Canada
Other persons with the same name
- François Gauthier 0002 — Norwegian University of Science and Technology, Trondheim, Norway
- François Gauthier 0003 — Université du Québec à Trois-Rivières, QC, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Kostyantyn Vorobyov, François Gauthier, Padmanabhan Krishnan:
Synthesis of Allowlists for Runtime Protection against SQLi. NIER@ICSE 2024: 16-20 - 2023
- [j2]Cristina Cifuentes, François Gauthier, Behnaz Hassanshahi, Padmanabhan Krishnan, Davin McCall:
The role of program analysis in security vulnerability detection: Then and now. Comput. Secur. 135: 103463 (2023) - [c22]Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier, Antonio Bianchi, Mathias Payer:
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities. ESEC/SIGSOFT FSE 2023: 1586-1597 - 2022
- [c21]Kostyantyn Vorobyov, François Gauthier, Sora Bae, Padmanabhan Krishnan, Rebecca O'Donoghue:
Synthesis of Java Deserialisation Filters from Examples. COMPSAC 2022: 736-745 - [c20]François Gauthier, Behnaz Hassanshahi, Benjamin Selwyn-Smith, Trong Nhan Mai, Max Schlüter, Micah Williams:
Experience: Model-Based, Feedback-Driven, Greybox Web Fuzzing with BackREST. ECOOP 2022: 29:1-29:30 - [c19]François Gauthier, Sora Bae:
Runtime Prevention of Deserialization Attacks. ICSE (NIER) 2022: 71-75 - [i5]François Gauthier, Sora Bae:
Runtime Prevention of Deserialization Attacks. CoRR abs/2204.09388 (2022) - 2021
- [i4]Nicholas Allen, François Gauthier, Alexander Jordan:
IFDS Taint Analysis with Access Paths. CoRR abs/2103.16240 (2021) - [i3]François Gauthier, Behnaz Hassanshahi, Benjamin Selwyn-Smith, Trong Nhan Mai, Max Schlüter, Micah Williams:
BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications. CoRR abs/2108.08455 (2021) - 2020
- [c18]François Gauthier, Alexander Jordan, Padmanabhan Krishnan, Behnaz Hassanshahi, Jörn Guy Süß, Sora Bae, Hyunjun Lee:
Trade-offs in managing risk and technical debt in industrial research labs: an experience report. TechDebt@ICSE 2020: 98-102
2010 – 2019
- 2019
- [c17]Alexander Jordan, François Gauthier, Behnaz Hassanshahi, David Zhao:
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation. PLAS@CCS 2019: 19-30 - [c16]Benjamin Barslev Nielsen, Behnaz Hassanshahi, François Gauthier:
Nodest: feedback-driven static analysis of Node.js applications. ESEC/SIGSOFT FSE 2019: 455-465 - 2018
- [j1]Roberto Amadini, Graeme Gange, François Gauthier, Alexander Jordan, Peter Schachte, Harald Søndergaard, Peter J. Stuckey, Chenyi Zhang:
Reference Abstract Domains and Applications to String Analysis. Fundam. Informaticae 158(4): 297-326 (2018) - [c15]Jens Dietrich, François Gauthier, Padmanabhan Krishnan:
Driver Generation for Java EE Web Applications. ASWEC 2018: 121-125 - [c14]François Gauthier, Behnaz Hassanshahi, Alexander Jordan:
AFFOGATO: runtime detection of injection attacks for Node.js. ISSTA/ECOOP Workshops 2018: 94-99 - [c13]François Gauthier, Nathan Keynes, Nicholas Allen, Diane Corney, Padmanabhan Krishnan:
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions. SecDev 2018: 134 - [i2]Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, François Gauthier, Vincent Gramoli, Ralph Holz, Bernhard Scholz:
Vandal: A Scalable Security Analysis Framework for Smart Contracts. CoRR abs/1809.03981 (2018) - [i1]Alexander Jordan, François Gauthier, Behnaz Hassanshahi, David Zhao:
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation. CoRR abs/1810.12490 (2018) - 2017
- [c12]Roberto Amadini, Alexander Jordan, Graeme Gange, François Gauthier, Peter Schachte, Harald Søndergaard, Peter J. Stuckey, Chenyi Zhang:
Combining String Abstract Domains for JavaScript Analysis: An Evaluation. TACAS (1) 2017: 41-57 - 2016
- [c11]Antonín Steinhauser, François Gauthier:
JSPChecker: Static Detection of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications. PLAS@CCS 2016: 57-68 - 2015
- [c10]Zhuobing Han, Mathieu Mérineau, François Gauthier, Ettore Merlo, Xiaohong Li, Eleni Stroulia:
Evolutionary analysis of access control models: a formal concept analysis method. CASCON 2015: 261-264 - 2014
- [c9]François Gauthier, Ettore Merlo, Eleni Stroulia, David Turner:
Supporting Maintenance and Evolution of Access Control Models in Web Applications. ICSME 2014: 506-510 - 2013
- [c8]François Gauthier, Thierry Lavoie, Ettore Merlo:
Uncovering access control weaknesses and flaws with security-discordant software clones. ACSAC 2013: 209-218 - [c7]François Gauthier, Ettore Merlo:
Semantic smells and errors in access control models: a case study in PHP. ICSE 2013: 1169-1172 - 2012
- [c6]François Gauthier, Ettore Merlo:
Investigation of Access Control Models with Formal Concept Analysis: A Case Study. CSMR 2012: 397-402 - [c5]François Gauthier, Ettore Merlo:
Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications. SCAM 2012: 44-53 - [c4]Dominic Letarte, François Gauthier, Ettore Merlo, Nattavut Sutyanyong, Calisto Zuzarte:
Targeted genetic test SQL generation for the DB2 database. DBTest 2012: 5 - [c3]François Gauthier, Ettore Merlo:
Fast Detection of Access Control Vulnerabilities in PHP Applications. WCRE 2012: 247-256 - 2011
- [c2]Dominic Letarte, François Gauthier, Ettore Merlo:
Security Model Evolution of PHP Web Applications. ICST 2011: 289-298 - [c1]François Gauthier, Dominic Letarte, Thierry Lavoie, Ettore Merlo:
Extraction and comprehension of moodle's access control model: A case study. PST 2011: 44-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint