Software, Prototypes and Demonstrators
|Name||Description||Date||Distribution Mode / Licence||Authors and Contact|
GEPETO: a GEoPrivacy-Enhancing TOolkit
GEPETO is a flexible software that can be used to visualize, sanitize, perform inference attacks and measure the utility of a particular geolocated dataset. The main objective of GEPETO is to enable a data curator (e.g., a company, a governmental agency or a data protection authority) to design, tune, experiment and evaluate various sanitization algorithms and inference attacks as well as visualizing the following results and evaluating the resulting trade-off between privacy and utility.
Diffusion par GIT. License CeCILL-B
MARACAS: CBSE Middleware for adaptive fault tolerance
This middleware illustrates how fault tolerance mechanisms can be adapted and combined online. Different types of changes related to the evolution of the resource requirements, the applications, or the fault model during operation, could be at the origin of the dynamic reconfiguration of fault tolerance mechanisms. A set of mechanisms has been developed to show the capabilities of the CBSE approach based a reflective medium to perform agile dependable systems. It is meant to be a proof of concepts. The techniques behind the proposed approach are applicable to many application areas.
J. C. Fabre,
ARINC 653 Simulator
A simulator of the executive support ARINC 653 standard for IMA systems has been developed on Unix. It emulates time and space partitionning concepts and also inter-partitions communication mechanisms.
Licenses MIT et CeCILL-B
IronHIDE: un outil d’analyse des attaques par entrées-sorties
IronHIDE is an FPGA-based I/O controller dedicated to the analysis of vulnerabilities at the interface between the hardware and software components. This controller has the advantage of interfacing with the PCI-Express bus and can be used to generate valid and invalid requests on the bus to identify potential I/O attacks.
MINOTOR: Monitoring tool for timing and behavioral analysis
A model driven distributed monitoring system for timing and behavioral analysis. The tool is based on a formal framework that extends the semantics of Petri nets to be able to execute it online on partial executions and distributed observation environments.
SOUK: Social Observation of hUman Kinetics
SOUK integrates a set of algorithms enabling the processing of geo-locates data, the extraction of social contacts, as well ad the analysis and representation of the social interaction networks.
WASAPY: Web Applications Security Assessment in Python
The objective of this software is to identify in an automated way web applications vulnerabilities. This is accomplished by performing a combinational scan of the web site and actually exploiting vulnerabilities. Specially crafted requests derived from a grammar are submitted to the application, and the corresponding responses are analyzed using clustering techniques. This approach has two advantages. The first one is the ability of the software to continue its analysis after exploiting a vulnerability. In particular, pages accessible after exploiting the vulnerability can be processed automatically. The second advantage is its ability to identify vulnerabilities that are activated only after performing a particular action sequence on the site.
HAZOP-UML: Risk analysis for the identification and validation of safety requirements
HAZOP-UML is a tool for model-based safety analysis. This tool allows to model UML (Unified Modeling Language) sequence and use case diagrams, which are used to generate deviation tables applying the HAZOP technique (HAZard OPerability).
Q.A. Do Hoang,
STELAE: Systems TEst LAnguage Environment
STELAE is a model-driven environment for the development of tests of avionic systems. It includes customizable graphical and textual editors for abstract test models, checkers, and finally template-based transformations towards code executable on top of a real industrial test platform (the U-Test platform of Cassidian Test & Services). The core part of STELAE is a metamodel capturing a rich set of domain-specific concepts.
STANCE: Structural ANalysis of Counter Examples
STANCE aids in the debugging of Simulink models, when a lengthy counterexample is returned by the model checker. It performs a structural analysis of the model’s paths activated by the counterexample and extracts relevant information to explain the observed violation. STANCE may also be used to guide the model checker toward the search for different counterexamples, exhibiting new path activation patterns and thus new ways to violate the property.
T. Bochot (ONERA & Airbus), K. Cabrera,
TERMOS: TEst Requirement language for Mobile Setting
TERMOS is a formal language based on UML Sequence Diagrams used for the testing of mobile applications, integrated into UML support technology. The tool contains: (i) a UML profile for the editing of verification scenarios (positive and negative requirements, test purposes) with spatial and event views, (ii) an Eclipse plugin for the automated checking of traces. The checking of traces against scenarios combines graph matching and event order analysis. The graph matching part searches for occurrences of the target sequence of spatial configurations. The event order analysis relies on an automaton-based semantics of sequence diagrams.
MASS: Multi Agent Simulator Software
MASS is a simulator based on mobile agents in two or three dimensions. Agents are activated asynchronously with a scheduler, and each one executes a state machine. The software runs on a Windows platform. It has been parallelized to take advantage of multicore processors.