Circular Image

Jeremie Decouchant

57 records found

Search-Based Software Testing (SBST) tools can automatically generate tests to achieve high code coverage; however, a systematic understanding of why they fail in specific situations is necessary. This thesis addresses this gap by developing a comprehensive taxonomy of coverage f ...
The Border Gateway Protocol (BGP) is the Internet's de facto inter-domain routing protocol. Due to its critical role in backbone infrastructure, denial of service attacks on BGP routers have the potential to compromise global connectivity.

BGP is not a standalone protoco ...
Modern software development has to conform to high standards. Developers rely on Continuous Integration and Continuous Delivery (CI/CD) to automate the software lifecycle. However, many developers are falling short in reaping all its benefits. Developers are often misguided due t ...

Start-up and Shut-down Capabilities in an Energy System Optimization Model with Flexible Temporal Resolution

Effect of Introducing Start-Up and Shut-Down Capability Constraints to the Tulipa Energy Model

This paper extends the Tulipa energy system optimisation model by incorporating start-up and shut-down capability constraints formulated for Tulipa's fully flexible temporal resolution. The impact of adding these constraints for thermal generators is assessed using a greenfield c ...

EvoPriority

Evaluating Fitness Functions in Priority-Based Evolutionary Testing for the XRP Ledger Consensus Protocol

The XRP Ledger Consensus Protocol is a Byzantine fault-tolerant algorithm that enables the XRP Ledger to reach agreement on which transactions to apply, supporting millions of transactions daily. While the protocol is correct by design, its practical implementation is vulnerable ...

Effect of Minimum Up and Down Time Constraints with Fully Flexible Temporal Resolutions

Integrating Clustered Unit Commitment Constraints in the Tulipa Energy Model

In recent literature fully flexible temporal resolutions have been proposed as a new form of temporal clustering in generation expansion planning models, showing promising benefits in terms of the tradeoff between solution accuracy and computation time. However, unit commitment c ...
The XRP Ledger (XRPL) relies on a Byzantine fault-tolerant consensus algorithm to ensure global agreement on transactions across distributed nodes. Despite its critical financial role, the implementation remains under-tested. While prior work has shown the potential of evolutiona ...
The decentralized nature of blockchain systems makes them prone to concurrency bugs, which are difficult to detect. There exist testing techniques to find these bugs, such as systematic exploration of the solution space, but these techniques are difficult to scale. Evolutionary a ...
Fully flexible temporal resolutions have shown to be a useful tool for improving the tradeoff between the runtime and accuracy of generation expansion planning models. However, no research has been done into the effects of considering short-term operational dynamics of thermal ge ...
This research explores the integration of start-up and shut-down trajectory constraints into the Tulipa energy system optimisation model, which uses fully-flexible temporal resolution. These constraints aim to more realistically represent the behaviour of large thermal generators ...

Start-Up and Shut-Down Capabilities in Unit Commitment Model with Fully Flexible Temporal Resolution

Effects of Including Start-Up and Shut-Down Ramping Constraints in the Tulipa Energy Model

The transition of the energy grid into a system with higher shares of renewable energy production requires careful investment planning while considering operational characteristics of generators. Generation Expansion Planning (GEP) is used for finding optimal ...

Survival of the Fittest

Evaluating Fitness Functions for Concurrency Testing on the XRPL Consensus Protocol

Distributed systems, such as blockchains, can have bugs around edge-cases that are hard to detect or trigger. Previous publications have introduced guided-search testing approaches that are able to find edge cases more efficiently than through conducting a systematic and exhausti ...
Integrating single-cell multi-omic data is crucial for comprehensive biological discovery, yet it remains challenging due to the weak correlation between modalities, data heterogeneity, and stringent privacy regulations. Conventional integration methods that depend on shared feat ...
In this work, we propose a general solution to address the non-IID challenges that hinder many defense methods against backdoor attacks in federated learning. Backdoor attacks involve malicious clients attempting to poison the global model. While many defense methods effectively ...
This thesis paper addresses the vulnerability of Deep Neural Networks (DNNs) to adversarial attacks. We introduce Multi-Scale Inpainting Defense (MSID), a novel adversarial purification method leveraging a pre-trained diffusion denoising probabilistic model (DDPM) for targeted pe ...
Blockchain systems rely on consensus protocols to ensure agreement among nodes even in the presence of malicious or faulty nodes. A consensus protocol that provides safety and liveness guarantees under such conditions is known as a Byzantine fault‑tolerant (BFT) protocol. Various ...

Testing Byzantine Fault Tolerant Algorithms

Evaluating the correctness of Tendermint protocol using ByzzFuzz

The reliability of Byzantine Fault Tolerant (BFT) consensus protocols is critical for the robustness of modern distributed systems, i.e., in blockchain technologies. Testing of BFT protocols is crucial, as consequences of faults in their implementation can lead to malicious users ...
Byzantine Fault Tolerant (BFT) protocols are designed to achieve consensus even in the presence of Byzantine faults. Although BFT protocols provide strong theoretical guarantees, bugs in the implementation of the protocols can allow for malicious activity. While previous work, li ...
Although Byzantine Fault Tolerant (BFT) protocols such as HotStuff are nominally resistant to a number of faulty or unreliable participants, implementation or design errors can cause violations in their expected properties. Because of this, it is useful to have reliable automated ...
Byzantine fault-tolerant protocols have been around for decades, offering the guarantee of agreement on a correct value even in the presence of arbitrary failures. These protocols have become a critical part of achieving consensus in distributed systems and are widely used nowada ...