Safety, security, and configurable software systems: a systematic mapping study

A Kenner, R May, J Krüger, G Saake… - Proceedings of the 25th …, 2021 - dl.acm.org
Safety and security are important properties of any software system, particularly in safety-
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …

A systematic mapping study of security concepts for configurable data storages

R May, C Biermann, J Krüger, G Saake… - Proceedings of the 26th …, 2022 - dl.acm.org
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …

A product-line-engineering framework for secure enterprise-resource-planning systems

R May, C Biermann, A Kenner, J Krüger… - Procedia Computer …, 2024 - Elsevier
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

Varylatex: Learning paper variants that meet constraints

M Acher, P Temple, JM Jézéquel, JA Galindo… - Proceedings of the 12th …, 2018 - dl.acm.org
How to submit a research paper, a technical report, a grant proposal, or a curriculum vitae
that respect imposed constraints such as formatting instructions and page limits? It is a …

Mining families of Android applications for extractive SPL adoption

L Li, J Martinez, T Ziadi, TF Bissyandé, J Klein… - Proceedings of the 20th …, 2016 - dl.acm.org
The myriads of smart phones around the globe gave rise to a vast proliferation of mobile
applications. These applications target an increasing number of user profiles and tasks. In …

A complexity tale: web configurators

G Perrouin, M Acher, JM Davril, A Legay… - Proceedings of the 1st …, 2016 - dl.acm.org
Online configurators are basically everywhere. From physical goods (cars, clothes) to
services (cloud solutions, insurances, etc.) such configurators have pervaded many areas of …

Mining software artefact variants for product line migration and analysis

J Martinez - 2016 - orbilu.uni.lu
Software Product Lines (SPLs) enable the derivation of a family of products based on
variability management techniques. Inspired by the manufacturing industry, SPLs use …

Modelling, Reverse Engineering, and Learning Software Variability

M Acher - 2021 - inria.hal.science
The society expects software to deliver the right functionality, in a short amount of time and
with fewer resources, in every possible circumstance whatever are the hardware, the …

[PDF][PDF] HAL Id: hal-01427165 https://hal. inria. fr/hal-01427165

G Perrouin, M Acher, JM Davril, A Legay, P Heymans - academia.edu
Online configurators are basically everywhere. From physical goods (cars, clothes) to
services (cloud solutions, insurances, etc.) such configurators have pervaded many areas of …