Publications

You can also find my publication list on Google Scholar.

2020

  • B. Hermann, S. Winter, and J. Siegmund, “Community Expectations for Research Artifacts and Evaluation Processes,” in The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (accepted), 2020.
    [Bibtex]
    @inproceedings{Hermann2020,
    author={B. {Hermann} and S. {Winter} and J. {Siegmund}},
    booktitle={{The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (accepted)}},
    title={{Community Expectations for Research Artifacts and Evaluation Processes}},
    year={2020}
    }
  • H. Saissi, S. Winter, O. Schwahn, K. Pattabiraman, and N. Suri, “TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis,” in The 50th IEEE/IFIP Int. Conference on Dependable Systems and Networks (DSN 2020) (accepted), 2020.
    [Bibtex]
    @inproceedings{Saissi2020,
    author={H. {Saissi} and S. {Winter} and O. {Schwahn} and K. {Pattabiraman} and N. {Suri}},
    booktitle={{The 50th IEEE/IFIP Int. Conference on Dependable Systems and Networks (DSN 2020) (accepted)}},
    title={{TraceSanitizer -- Eliminating the Effects of Non-determinism on Error Propagation Analysis}},
    year={2020},
    }
  • [DOI] R. Natella, S. Winter, D. Cotroneo, and N. Suri, “Analyzing the Effects of Bugs on Software Interfaces,” IEEE Transactions on Software Engineering, vol. 46, iss. 3, pp. 280-301, 2020.
    [Bibtex]
    @ARTICLE{Natella2020,
    author={R. {Natella} and S. {Winter} and D. {Cotroneo} and N. {Suri}},
    journal={{IEEE Transactions on Software Engineering}},
    title={{Analyzing the Effects of Bugs on Software Interfaces}},
    year={2020},
    volume={46},
    number={3},
    pages={280-301},
    keywords={Software;Unified modeling language;Computer bugs;Perturbation methods;Testing;Fault tolerance;Dependability;fault injection;software components;error propagation;error modeling;error handling},
    doi={10.1109/TSE.2018.2850755},
    ISSN={2326-3881},
    month={March},}

2019

  • S. Zhao, Y. Chen, S. Winter, and N. Suri, “Analyzing and improving customer-side cloud security certifiability,” in 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, pp. 300-307.
    [Bibtex]
    @INPROCEEDINGS{Zhao2019,
    author={S. {Zhao} and Y. {Chen} and S. {Winter} and N. {Suri}},
    booktitle={{2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)}},
    title={Analyzing and Improving Customer-Side Cloud Security Certifiability},
    year={2019},
    volume={},
    number={},
    pages={300-307},}
  • [DOI] Y. Chen, S. Winter, and N. Suri, “Inferring performance bug patterns from developer commits,” in 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), 2019, pp. 70-81.
    [Bibtex]
    @INPROCEEDINGS{Chen2019,
    author={Y. {Chen} and S. {Winter} and N. {Suri}},
    booktitle={{2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)}},
    title={Inferring Performance Bug Patterns from Developer Commits},
    year={2019},
    volume={},
    number={},
    pages={70-81},
    keywords={Java;program debugging;program diagnostics;public domain software;performance bug detection;bug types;program source code;Software Engineering, Performance, Testing},
    doi={10.1109/ISSRE.2019.00017},
    ISSN={1071-9458},
    month={Oct},}
  • [DOI] O. Schwahn, N. Coppik, S. Winter, and N. Suri, “Assessing the State and Improving the Art of Parallel Testing for C,” in Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, New York, NY, USA, 2019, p. 123–133.
    [Bibtex]
    @inproceedings{Schwahn2019,
    author = {Schwahn, Oliver and Coppik, Nicolas and Winter, Stefan and Suri, Neeraj},
    title = {{Assessing the State and Improving the Art of Parallel Testing for C}},
    booktitle={{Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis}},
    series = {ISSTA 2019},
    year = {2019},
    isbn = {978-1-4503-6224-5},
    location = {Beijing, China},
    pages = {123--133},
    numpages = {11},
    url = {http://doi.acm.org/10.1145/3293882.3330573},
    doi = {10.1145/3293882.3330573},
    acmid = {3330573},
    publisher = {ACM},
    address = {New York, NY, USA},
    keywords = {Parallel Test Execution, Software Repository Analysis, Static Analysis, Static Dependency Detection},
    }

2018

  • [DOI] O. Schwahn, N. Coppik, S. Winter, and N. Suri, “FastFI: Accelerating Software Fault Injections,” in 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, pp. 193-202.
    [Bibtex]
    @INPROCEEDINGS{Schwahn2018,
    author={O. {Schwahn} and N. {Coppik} and S. {Winter} and N. {Suri}},
    booktitle={{2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)}},
    title={{FastFI: Accelerating Software Fault Injections}},
    year={2018},
    volume={},
    number={},
    pages={193-202},
    keywords={parallel programming;program testing;software fault tolerance;source code (software);software systems;FASTFI;SFI test;source code mutations;software fault injection;parallel processors;automated source code analysis;software dependability testing;PARSEC benchmarks;Software;Tools;Runtime;Monitoring;Libraries;Benchmark testing;Virtual machining;Software fault injection, Parallelization, Software testing, Efficiency, Dependability assessment},
    doi={10.1109/PRDC.2018.00035},
    ISSN={2473-3105},
    month={Dec},}
  • [DOI] F. Tan, L. Liu, S. Winter, Q. Wang, N. Suri, L. Bu, Y. Peng, X. Liu, and X. Peng, “Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS,” Acm trans. cyber-phys. syst., vol. 3, iss. 1, p. 2:1–2:25, 2018.
    [Bibtex]
    @article{Tan2018,
    author = {Tan, Feng and Liu, Liansheng and Winter, Stefan and Wang, Qixin and Suri, Neeraj and Bu, Lei and Peng, Yu and Liu, Xue and Peng, Xiyuan},
    title = {{Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS}},
    journal = {ACM Trans. Cyber-Phys. Syst.},
    issue_date = {September 2018},
    volume = {3},
    number = {1},
    month = sep,
    year = {2018},
    issn = {2378-962X},
    pages = {2:1--2:25},
    articleno = {2},
    numpages = {25},
    url = {http://doi.acm.org/10.1145/3226029},
    doi = {10.1145/3226029},
    acmid = {3226029},
    publisher = {ACM},
    address = {New York, NY, USA},
    keywords = {Lyapunov stable, cyber-physical systems, hybrid automata, hybrid model, testing},
    }
  • [DOI] O. Schwahn, S. Winter, N. Coppik, and N. Suri, “How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code,” Ieee transactions on dependable and secure computing, vol. 15, iss. 6, pp. 945-958, 2018.
    [Bibtex]
    @ARTICLE{Schwahn2017,
    author={O. {Schwahn} and S. {Winter} and N. {Coppik} and N. {Suri}},
    journal={IEEE Transactions on Dependable and Secure Computing},
    title={{How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code}},
    year={2018},
    volume={15},
    number={6},
    pages={945-958},
    keywords={Linux;operating system kernels;program diagnostics;runtime data driven partitioning;Linux code;modern operating systems;microkernel OSs;address space separation;improved fault isolation;modern microkernels;monolithic OSs;code reuse;static code analyses;microkernelized systems;automated code partitioning;monolithic kernel code;Linux;Operating systems;Runtime;Performance evaluation;Dynamic programming;Operating systems;device driver isolation;software partitioning;dynamic program analysis},
    doi={10.1109/TDSC.2017.2745574},
    ISSN={1545-5971},
    month={Nov},}

2017

  • [DOI] T. Ishigooka, H. Saissi, T. Piper, S. Winter, and N. Suri, “Safety Verification Utilizing Model-based Development for Safety Critical Cyber-Physical Systems,” JIP, vol. 25, p. 797–810, 2017.
    [Bibtex]
    @article{Ishigooka2017,
    author = {Tasuku Ishigooka and Habib Saissi and Thorsten Piper and Stefan Winter and Neeraj Suri},
    title = {{Safety Verification Utilizing Model-based Development for Safety Critical Cyber-Physical Systems}},
    journal = {{JIP}},
    volume = {25},
    pages = {797--810},
    year = {2017},
    url = {https://doi.org/10.2197/ipsjjip.25.797},
    doi = {10.2197/ipsjjip.25.797},
    timestamp = {Wed, 30 May 2018 14:59:59 +0200},
    }
  • “\textscC’mon: Monitoring the Compliance of Cloud Services to Contracted Properties,” in Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2017.
    [Bibtex]
    @inproceedings{Alboghdady2017,
    title = {{\textsc{C'mon}: Monitoring the Compliance of Cloud Services to Contracted Properties}},
    authors = {Soha Albaghdady and Stefan Winter and Ahmed Taha and Heng Zhang and Neeraj Suri},
    booktitle={{Proc. of Intl. Conference on Availability, Reliability and Security (ARES)}},
    year = {2017}
    }
  • [DOI] A. Chan, S. Winter, H. Saissi, K. Pattabiraman, and N. Suri, “Ipa: error propagation analysis of multi-threaded programs using likely invariants,” in 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), 2017, pp. 184-195.
    [Bibtex]
    @INPROCEEDINGS{Chan2017,
    author={A. Chan and S. Winter and H. Saissi and K. Pattabiraman and N. Suri},
    booktitle={{2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)}},
    title={IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants},
    year={2017},
    pages={184-195},
    keywords={multi-threading;software fault tolerance;EPA;IPA;deterministic golden run;error propagation analysis;fault injection experiments;invariant propagation analysis;multithreaded programs;program failures;Computer bugs;Hardware;Multithreading;Robustness;Software;Testing;Tools;Concurrency;Error Propagation Analysis;Fault Injection;Multithreading},
    doi={10.1109/ICST.2017.24},
    month={March},
    }
  • T. Ishigooka, F. Narisawa, K. Sakurai, N. Suri, H. Saissi, T. Piper, and S. Winter, Method and system for testing control software of a controlled systemGoogle Patents, 2017.
    [Bibtex]
    @misc{ishigooka2017method,
    title={{Method and system for testing control software of a controlled system}},
    author={Ishigooka, Tasuku and Narisawa, Fumio and Sakurai, Kohei and Suri, Neeraj and Saissi, Habib and Piper, Thorsten and Winter, Stefan},
    year={2017},
    month=feb # "~21",
    publisher={Google Patents},
    note={US Patent 9,575,877}
    }

2016

  • [DOI] T. Ishigooka, H. Saissi, T. Piper, S. Winter, and N. Suri, “Practical Formal Verification for Model Based Development of Cyber-Physical Systems,” in 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES), 2016, pp. 1-8.
    [Bibtex]
    @INPROCEEDINGS{Ishigooka2016,
    author={T. Ishigooka and H. Saissi and T. Piper and S. Winter and N. Suri},
    author= {Tasuku Ishigooka and Habib Saissi and Thorsten Piper and Stefan Winter and Neeraj Suri},
    booktitle={{2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)}},
    title={{Practical Formal Verification for Model Based Development of Cyber-Physical Systems}},
    year={2016},
    volume={},
    number={},
    pages={1-8},
    doi={10.1109/CSE-EUC-DCABES.2016.154},
    ISSN={},
    month={Aug},}

2015

  • T. Piper, S. Winter, N. Suri, and T. E. Fuhrman, “On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms,” in Proceedings of the European Dependable Computing Conference (EDCC), 2015.
    [Bibtex]
    @INPROCEEDINGS{Piper2015a,
    author = {Piper, Thorsten and Winter, Stefan and Suri, Neeraj and Fuhrman, Thomas E.},
    title = {{On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms}},
    booktitle={{Proceedings of the European Dependable Computing Conference (EDCC)}},
    year = {2015}
    }
  • G. Pellegrino, D. Balzarotti, S. Winter, and N. Suri, “In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services,” in 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., 2015, p. 801–816.
    [Bibtex]
    @inproceedings {Pellegrino2015,
    author = {Giancarlo Pellegrino and Davide Balzarotti and Stefan Winter and Neeraj Suri},
    title = {{In the Compression Hornet{\textquoteright}s Nest: A Security Study of Data Compression in Network Services}},
    booktitle={{24th USENIX Security Symposium (USENIX Security 15)}},
    year = {2015},
    month = Aug,
    isbn = {978-1-931971-232},
    address = {Washington, D.C.},
    pages = {801--816},
    url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pellegrino},
    publisher = {USENIX Association},
    }
  • S. Winter, T. Piper, O. Schwahn, R. Natella, N. Suri, and D. Cotroneo, “Grinder: on reusability of fault injection tools,” in Proceedings of the 10th International Workshop on Automation of Software Test, Piscataway, NJ, USA, 2015, p. 75–79.
    [Bibtex]
    @inproceedings{Winter2015a,
    author = {Winter, Stefan and Piper, Thorsten and Schwahn, Oliver and Natella, Roberto and Suri, Neeraj and Cotroneo, Domenico},
    title = {GRINDER: On Reusability of Fault Injection Tools},
    booktitle={{Proceedings of the 10th International Workshop on Automation of Software Test}},
    series = {AST '15},
    year = {2015},
    location = {Florence, Italy},
    pages = {75--79},
    numpages = {5},
    url = {http://dl.acm.org/citation.cfm?id=2819261.2819285},
    acmid = {2819285},
    publisher = {IEEE Press},
    address = {Piscataway, NJ, USA},
    keywords = {fault injection, robustness testing, software reuse, test automation, test tools},
    }
  • [DOI] T. Piper, S. Winter, O. Schwahn, S. Bidarahalli, and N. Suri, “Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems,” in Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on, 2015, pp. 102-109.
    [Bibtex]
    @INPROCEEDINGS{Piper2015,
    author={Piper, T. and Winter, S. and Schwahn, O. and Bidarahalli, S. and Suri, N.},
    booktitle={{Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on}},
    title={{Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems}},
    year={2015},
    pages={102-109},
    keywords={ISO standards;automobiles;road safety;traffic engineering computing;AUTOSAR automotive software standard;ISO 26262 functional safety standard;critical task protection;low-overhead interference protection;mixed-criticality automotive systems;monitor-based timing protection;task timing errors;timing error propagation mitigation;transient timing error ride-through capability;worst-case execution time analysis;Automotive engineering;Interference;Monitoring;Power system stability;Safety;Timing;Transient analysis;AUTOSAR;freedom from interference;mixed-criticality;run-time monitoring;timing protection},
    doi={10.1109/ISORC.2015.13},
    ISSN={1555-0885},
    month={April},
    }
  • [DOI] S. Winter, O. Schwahn, R. Natella, N. Suri, and D. Cotroneo, “No PAIN, No Gain? The Utility of PArallel Fault INjections,” in Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on, 2015, pp. 494-505.
    [Bibtex]
    @INPROCEEDINGS{Winter2015,
    author={Winter, S. and Schwahn, O. and Natella, R. and Suri, N. and Cotroneo, D.},
    booktitle={{Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on}},
    title={{No PAIN, No Gain? The Utility of PArallel Fault INjections}},
    year={2015},
    volume={1},
    pages={494-505},
    keywords={parallel processing;software fault tolerance;PAIN;SFI;parallel fault injection;software fault injection;Detectors;Hardware;Kernel;Parallel processing;Testing;Throughput;Robustness Testing;Software Fault Injection;Test Automation;Test Parallelization},
    doi={10.1109/ICSE.2015.67},
    month={May},
    }
  • Software engineering & management 2015, multikonferenz der gi-fachbereiche softwaretechnik (SWT) und wirtschaftsinformatik (wi), FA wi-maw, 17. märz – 20. märz 2015, dresden, germany{GI}, 2015.
    [Bibtex]
    @proceedings{DBLP:conf/se/2015,
    editor = {Uwe A{\ss}mann and Birgit Demuth and Thorsten Spitta and Georg P{\"{u}}schel and Ronny Kaiser},
    title = {Software Engineering {\&} Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik {(SWT)} und Wirtschaftsinformatik (WI), {FA} WI-MAW, 17. M{\"{a}}rz - 20. M{\"{a}}rz 2015, Dresden, Germany},
    series = {{LNI}},
    volume = {239},
    publisher = {{GI}},
    year = {2015},
    isbn = {978-3-88579-633-6},
    timestamp = {Mon, 04 May 2015 20:05:39 +0200},
    biburl = {http://dblp.uni-trier.de/rec/bib/conf/se/2015},
    bibsource = {dblp computer science bibliography, http://dblp.org}
    }

2014

  • [DOI] T. Ishigooka, H. Saissi, T. Piper, S. Winter, and N. Suri, “Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study,” in Cyber-Physical Systems, Networks, and Applications (CPSNA), 2014 IEEE International Conference on, 2014, pp. 7-12.
    [Bibtex]
    @INPROCEEDINGS{Ishigooka2014,
    author={Ishigooka, T. and Saissi, H. and Piper, T. and Winter, S. and Suri, N.},
    booktitle={{Cyber-Physical Systems, Networks, and Applications (CPSNA), 2014 IEEE International Conference on}},
    title={{Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study}},
    year={2014},
    pages={7-12},
    keywords={brakes;formal verification;safety-critical software;CPS;analog domains;complex failure condition;complex interactions;discrete domains;formal verification approach;individual domain;integrated CPS;real-world brake control system;safety-critical critical cyber-physical systems;system level;Control systems;Mathematical model;Process control;Safety;Software packages;Timing;formal verification;safety critical cyber-physical systems;symbolic execution},
    doi={10.1109/CPSNA.2014.20},
    month={Aug},
    }
  • [DOI] A. Lanzaro, R. Natella, S. Winter, D. Cotroneo, and N. Suri, “An Empirical Study of Injected Versus Actual Interface Errors,” in Proceedings of the 2014 International Symposium on Software Testing and Analysis, New York, NY, USA, 2014, p. 397–408.
    [Bibtex]
    @inproceedings{Lanzaro2014,
    author = {Lanzaro, Anna and Natella, Roberto and Winter, Stefan and Cotroneo, Domenico and Suri, Neeraj},
    title = {{An Empirical Study of Injected Versus Actual Interface Errors}},
    booktitle={{Proceedings of the 2014 International Symposium on Software Testing and Analysis}},
    series = {ISSTA 2014},
    year = {2014},
    isbn = {978-1-4503-2645-2},
    location = {San Jose, CA, USA},
    pages = {397--408},
    numpages = {12},
    url = {http://doi.acm.org/10.1145/2610384.2610418},
    doi = {10.1145/2610384.2610418},
    acmid = {2610418},
    publisher = {ACM},
    address = {New York, NY, USA},
    keywords = {Experimental Dependability Assessment, FMECA, Off-The-Shelf Software, Software Components, Software Fault/Error Injection, Software Faults/Errors},
    }
  • [DOI] F. Tan, L. Liu, S. Winter, Q. Wang, N. Suri, L. Bu, Y. Peng, X. Liu, and X. Peng, “WiP abstract: A framework on profiling cross-domain noise propagation in control CPS,” in Cyber-Physical Systems (ICCPS), 2014 ACM/IEEE International Conference on, 2014, pp. 224-224.
    [Bibtex]
    @INPROCEEDINGS{Tan2014,
    author={Feng Tan and Liansheng Liu and Winter, S. and Qixin Wang and Suri, N. and Lei Bu and Yu Peng and Xue Liu and Xiyuan Peng},
    booktitle={{Cyber-Physical Systems (ICCPS), 2014 ACM/IEEE International Conference on}},
    title={{WiP abstract: A framework on profiling cross-domain noise propagation in control CPS}},
    year={2014},
    pages={224-224},
    keywords={computer architecture;noise;WiP abstract;control CPS architecture;control cyber-physical systems;cross-domain noise propagation;Aerospace electronics;Bayes methods;Computer science;Educational institutions;Lyapunov methods;Monte Carlo methods;Noise},
    doi={10.1109/ICCPS.2014.6843737},
    month={April},
    }

2013

  • [DOI] S. Winter, M. Tretter, B. Sattler, and N. Suri, “simFI: From single to simultaneous software fault injections,” in Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on, 2013, pp. 1-12.
    [Bibtex]
    @INPROCEEDINGS{Winter2013,
    author={Winter, S. and Tretter, M. and Sattler, B. and Suri, N.},
    booktitle={{Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on}},
    title={{simFI: From single to simultaneous software fault injections}},
    year={2013},
    pages={1-12},
    keywords={operating system kernels;program testing;software engineering;Windows CE kernel;characteristic simultaneous fault types;experimental technique;generic software composition model;independent fault analysis;multipoint faults;robustness vulnerabilities;simultaneous SWIFI framework;simultaneous fault models;single-fault assumption;software system robustness evaluation;software-implemented fault injection;Kernel;Robustness;Safety;Servers;Software systems;Spatial resolution;Software fault injections;fault models;robustness testing},
    doi={10.1109/DSN.2013.6575310},
    ISSN={1530-0889},
    month={June},
    }
  • [DOI] M. Botinčan and D. Babić, “Sigma*: Symbolic Learning of Input-output Specifications,” in Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, New York, NY, USA, 2013, p. 443–456.
    [Bibtex]
    @inproceedings{Botincan2013,
    author = {Botin\v{c}an, Matko and Babi\'{c}, Domagoj},
    title = {{Sigma*: Symbolic Learning of Input-output Specifications}},
    booktitle={{Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages}},
    series = {POPL '13},
    year = {2013},
    isbn = {978-1-4503-1832-7},
    location = {Rome, Italy},
    pages = {443--456},
    numpages = {14},
    url = {http://doi.acm.org/10.1145/2429069.2429123},
    doi = {10.1145/2429069.2429123},
    acmid = {2429123},
    publisher = {ACM},
    address = {New York, NY, USA},
    keywords = {behavioral properties, compiler optimization,, equivalence checking, inductive learning, parallelization, specification synthesis, stream programs},
    }

2012

  • [DOI] T. Piper, S. Winter, P. Manns, and N. Suri, “Instrumenting AUTOSAR for dependability assessment: A guidance framework,” in Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, 2012, pp. 1-12.
    [Bibtex]
    @INPROCEEDINGS{Piper2012,
    author={Piper, T. and Winter, S. and Manns, P. and Suri, N.},
    booktitle={{Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on}},
    title={{Instrumenting AUTOSAR for dependability assessment: A guidance framework}},
    year={2012},
    pages={1-12},
    keywords={automotive engineering;computational complexity;computerised instrumentation;object-oriented programming;quality assurance;safety-critical software;software fault tolerance;AUTOSAR standard;applicability identification;automated instrumentation support;automotive open system architecture;black-box access;component-based automotive software development;dependability assessment guidance framework;fault injection;flexible instrumentation support;grey-box access;high dependability requirements;interface wrapper application;quality assurance;safety-critical functions;software abstraction;software granularity;software-intensive systems;white-box access;Automotive engineering;Computer architecture;Data models;Instruments;Monitoring;Software;Standards;AUTOSAR;fault injection;instrumentation;interface wrappers;run-time monitoring},
    doi={10.1109/DSN.2012.6263913},
    ISSN={1530-0889},
    month={June},
    }
  • S. Winter, D. Germanus, H. Ghani, T. Piper, A. Khelil, and N. Suri, “Trustworthiness Evaluation of Critical Information Infrastructures,” in Critical Infrastructure Security: Assessment, Prevention, Detection, Response, F. Flammini, Ed., WIT Press, 2012.
    [Bibtex]
    @InCollection{Winter2012,
    author = {Stefan Winter and Daniel Germanus and Hamza Ghani and Thorsten Piper and Abdelmajid Khelil and Neeraj Suri},
    editor = {Francesco Flammini},
    booktitle={{Critical Infrastructure Security: Assessment, Prevention, Detection, Response}},
    title = {{Trustworthiness Evaluation of Critical Information Infrastructures}},
    publisher = {WIT Press},
    year = {2012},
    }

2011

  • [DOI] S. Winter, C. Sarbu, N. Suri, and B. Murphy, “The impact of fault models on software robustness evaluations,” in Software Engineering (ICSE), 2011 33rd International Conference on, 2011, pp. 51-60.
    [Bibtex]
    @INPROCEEDINGS{Winter2011,
    author={Winter, S. and Sarbu, C. and Suri, N. and Murphy, B.},
    booktitle={{Software Engineering (ICSE), 2011 33rd International Conference on}},
    title={{The impact of fault models on software robustness evaluations}},
    year={2011},
    pages={51-60},
    keywords={operating system kernels;program testing;software fault tolerance;software metrics;OS device driver;SWIFI;bit flips;data type dependent parameter corruption;embedded operating system kernel;fault model;parameter fuzzing;software robustness evaluation;software-implemented fault injection;Complexity theory;Context;Measurement;Robustness;Servers;Software;Transient analysis;fault injection;fault models;robustness testing},
    doi={10.1145/1985793.1985801},
    ISSN={0270-5257},
    month={May},
    }
  • A. Kaminski and S. Winter, “Paradigmenwechsel ohne Revolution: Ubiquitous Computing als Steigerungstechnologie,” Technikfolgenabschätzung: theorie und praxis, vol. 20, iss. 3, pp. 71-79, 2011.
    [Bibtex]
    @Article{Kaminski2011,
    author = {Kaminski, Andreas and Winter, Stefan},
    title = {{Paradigmenwechsel ohne Revolution: Ubiquitous Computing als Steigerungstechnologie}},
    journal = {Technikfolgenabsch\"atzung: Theorie und Praxis},
    year = {2011},
    volume = {20},
    number = {3},
    pages = {71-79},
    }

2009

  • C. Sarbu, S. Winter, N. Nagappan, and N. Suri, “OS Driver Test Effort Reduction via Operational Profiling,” in ISSRE 2009 Supplemental Proceedings, 2009.
    [Bibtex]
    @InProceedings{Sarbu2009,
    author = {Constantin Sarbu and Stefan Winter and Nachiappan Nagappan and Neeraj Suri},
    title = {{OS Driver Test Effort Reduction via Operational Profiling}},
    booktitle={{ISSRE 2009 Supplemental Proceedings}},
    year = {2009},
    note = {Fast Abstract},
    }
  • S. Winter, C. Sarbu, A. Johansson, and N. Suri, “Impact of error models on os robustness evaluations,” in ISSRE 2009 Supplemental Proceedings, 2009.
    [Bibtex]
    @InProceedings{Winter2009,
    author = {Stefan Winter and Constantin Sarbu and Andréas Johansson and Neeraj Suri},
    title = {Impact of Error Models on OS Robustness Evaluations},
    booktitle={{ISSRE 2009 Supplemental Proceedings}},
    year = {2009},
    note = {Fast Abstract},
    }
  • N. Coppik, O. Schwahn, S. Winter, and N. Suri, “TrEKer: Tracing Error Propagation in Operating System Kernels,” in IEEE/ACM international conference on automated software engineering, ASE 2017, .
    [Bibtex]
    @inproceedings{Coppik2017,
    author = {Coppik, Nicolas and Schwahn, Oliver and Winter, Stefan and Suri, Neeraj},
    title = {{TrEKer: Tracing Error Propagation in Operating System Kernels}},
    booktitle={{IEEE/ACM}} International Conference on Automated
    Software Engineering, {ASE} 2017}
  • A. Lanzaro, R. Natella, S. Winter, D. Cotroneo, and N. Suri, “Error models for the representative injection of software defects,” in arz 2015, dresden, germany, .
    [Bibtex]
    @inproceedings{Lanzaro2015,
    author = {Anna Lanzaro and Roberto Natella and Stefan Winter and Domenico Cotroneo and Neeraj Suri},
    title = {{Error models for the representative injection of software defects}},
    booktitle={{a}}rz 2015, Dresden, Germany}