Queen's University Logo

T. R. Dean

Selected Publications and Talks

Most recent papers are available in acrobat format (.pdf). All papers are copyright by their respective publishers (e.g. IEEE, ACM, Elsevier, Springer) - see the publishers' websites for copyright restrictions and definitive published versions. Some recent talks are available in acrobat format, and are copyright by the author of the talk (me or one of my graduate students, or one of my colleagues)

Refereed Conference Publications

Chapman C, Knight GS, Dean T. (2014). USBcat - Towards an Intrusion Surveillance Toolset. Electronic Proceedings in Theoretical Computer Science (EPTCS). International Information Security and Privacy Conference, Marrakech, Morocco, 2014-06-02 (31-44),

M. H. Alalfi, J. R. Cordy and T. R. Dean, “Analysis and Clustering of Model Clones: An Automotive Industrial Experience”,  IEEE Software Evolution Week (CSMR-WCRE 2014), Antwerp, Belgium, February 2014 pp. 375-378.

J. Chen, Thomas R. Dean and M. H. Alalfi “Clone Detection in Matlab Stateflow Models”, Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014), Antwerp, Belgium, February 2014, published in Electronic Communications of the EASST Vol. 63 (2014) , 13 pages.

F. de la Para and T. Dean, “Survey of Graph Rewriting Applied to Model Transformations”, 2nd International Conference on Model-Driven Engineering and Software Development, Lisbon, Portugal, January 2014, pp. 431-441.

A.A. Almonaies, M. H. Alalfi, J. R. Cordy, and T. R. Dean “A Framework for Migrating Web Applications to Web Services”, 13th International Conference on Web Engineering, Aalborg, Denmark, July 2013, Published as Lecture Notes in Computer Science 7977, Springer Verlag, pp. 384-399.

S. Karademir, T. Dean and S. Leblanc “Finding Javascript Malware in Acrobat Files Using Clone Detection”, CASCON '13 Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, Toronto, Canada, November 2013, pp. 70-80.

M.H. Alalfi, J.R. Cordy, T.R. Dean, M. Stephan and A. Stevenson “Near-miss Model Clone Detection for Simulink Models”, Proc. IWSC 2012, ICSE 6th International Workshop on Software Clones, Zürich, Switzerland, June 2012, pp. 78-79.

M. H. Alalfi and James R. Cordy and T. R. Dean “Recovering Role-Based Access Control Security Models From Dynamic Web Applications”, International Conference on Web Engineering, Lecture Notes in Computer Science, Vol 7387, Berlin, July 2012, pp 121–136

M.H. Alalfi, J.R. Cordy, T.R. Dean, M. Stephan and A. Stevenson “Models are Code Too: Near-Miss Clone Detection for Simulink Models”, Proc. ICSM 2012, IEEE 28th International Conference on Software Maintenance, Riva del Garda, Italy, September 2012, pp. 295-304.

M.H. Alalfi, J.R. Cordy and T.R. Dean “Automated Verification of Role-Based Access Control Security Models Recovered from Dynamic Web Applications”, Proc. WSE 2012, 14th IEEE International Symposium on Web Systems Evolution, Riva del Garda, Italy, September 2012, pp. 1-10.

W. Gama, M.H. Alalfi, J.R. Cordy and T.R. Dean “Normalizing Object-Oriented Class Styles in JavaScript”, Proc. WSE 2012, 14th IEEE International Symposium on Web Systems Evolution, Riva del Garda, Italy, September 2012, pp. 79-83.

J.S. Alexander, T.R. Dean and G.S Knight “Spy vs. Spy: Counter-intelligence Methods for Backtracking Malicious Intrusions”, 21st IBM Centres for Advanced Studies Conference, Toronto, November 2011, 1–14.

A. Almonaies, M. Alalfi, J.R. Cordy and T.R.Dean “Towards a Framework for Migrating Web Applications to Web Services”, 21st IBM Centres for Advanced Studies Conference, Toronto, November 2011, 229–241

N. Meng, D. Kelly and T.R. Dean “Towards Automated Accuracy Analysis Through Symbolic Analysis Using Computer Algebra Systems”, 21st IBM Centres for Advanced Studies Conference, Toronto, November 2011, 25–271.

B. K. Kam, and T.R. Dean “Linguistic Security Testing for Text Communication Protocols”, Proc Testing: Academic and Industrial Conference Practice and Research Techniques, Windsor, UK, September 2010 pp. 104-117

.M. Alalfi, J.R. Cordy and T.R. Dean, “Automating Coverage Metrics for Dynamic Web Applications”, Proc. CSMR 2010, 15th European Conference on Software Maintenance and Reengineering, Madrid, Spain, March 2010, 10 pp. 61-60.

A. Almonaies, J.R. Cordy, T.R. Dean, "Legacy System Evolution towards Service-Oriented Architecture", Proc. International Workshop on SOA Migration and Evolution (SOAME 2010), Madrid, Spain, pp. 53-62.

B. Kam, T. Dean, “Lessons Learned From a Literal Survey of Web Applications Testing”, Proc. 6th International Conference on Information Technology : New Generations, Las Vegas, USA, April 27-29, pp 125-130.

M. AboElFotoh, T.R. Dean, Ryan Mayor “An Empirical Evaluation of a Language-Based Security Testing Technique”, Proc. 19th IBM Centres for Advanced Studies Conference, Toronto, Canada, November 2009, pp 112-121.

M. Alalfi, J.R. Cordy and T.R.Dean, “WAFA: Fine-grained Dynamic Analysis of Web Applications”, Proc. WSE 2009, 11th International Symposium on Web Systems Evolution, Edmonton, Canada, September 2009, pp. 41-50.

M.H. Alalfi, J.R. Cordy, and T.R. Dean, “A Verification Framework for Access Control in Dynamic Web Applications”, Proc. C3S2E, Canadian Conference on Computer Science and Software Engineering, Montréal, May 2009, pp.109-113.

M. Alalfi, J.R. Cordy and T.R. Dean, “Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications”, Proc. WebTest 2009, 1st International Workshop on Web Testing, Denver, USA, April 2009, pp. 295-302.

M. Ceccato, T.R. Dean, P. Tonella, “Using Program Transformation to Add Structure to a Legacy Data Model”, Proc 8th IEEE International Working Conference on Source Code Analysis and Manipulation, Beijing, China, September 2008, pp 197-206.

J. Chu, T.R. Dean, “Automated Migration of List Based Web Pages to AJAX”, ”, Proc 8th IEEE International Working Conference on Source Code Analysis and Manipulation, Beijing, China, September 2008, pp 217-226

M. Ceccato, T.R. Dean, P. Tonella, D. Marchignoli, “Data Model Reverse Engineering in Migrating a Legacy System to Java”, Proc. WCRE 2008, 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 2008, pp. 177-186.

M. Alalfi, J.R. Cordy and T.R. Dean, "SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas", Proc. WCRE 2008, 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 2008, pp. 187-191.

A. Mao, J.R. Cordy, T.R. Dean, “Automated Conversion of Table-based Websites to Structured Stylesheets Using Table Recognition and Clone Detection”, Proc IBM Centers for Advanced Studies Conference 2007 (CASCON), Toronto, Canada, October 2007, to appear.

S. Zhang, T.R. Dean, G.S. Knight,  “Lightweight State Based Mutation Testing for Security”, Proc TAICPART-MUTATION 2007 , Windsor, UK, September 2007, pp 223-232.

M. Alalfi, J.R. Cordy, T.R. Dean, “A Survey of Analysis Models and Methods in Website Verification and Testing”, Proc 7th International Conference on Web Engineering (ICWE2007). Como, Italy July 2007,  pp. 306-311.

C. K. Roy, M.G. Uddin, B. Roy, T.R. Dean. “Evaluating Aspect Mining Techniques: A Case Study”, 15th IEEE International Conference on Program Comprehension (ICPC’07), Banff, Canada, June 2007, pp. 167-176.

Songtao Zhang , T.R. Dean and S. Knight, "A Lightweight Approach To State Based Security Testing",Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006, pp. 341-344.

Sylvain Marquis, T.R. Dean and S. Knight,
"Packet Decoding using Context Sensitive Parsing",
Proc. CASCON 06, 16th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2006, pp. 263-274.

L. Wang, J.R. Cordy and T.R. Dean,
"Enhancing Security Using Legality Assertions", Proc. WCRE 2005 - IEEE 12th International Working Conference on Reverse Engineering, Pittsburgh, November 2005, pp 35-44.

Sylvain Marquis, T.R. Dean and S. Knight,
"SCL: A Language for Security Testing of Network Applications",
Proc. CASCON 05, 15th IBM Centre for Advanced Studies Conference, Toronto, Canada, October 2005, pp. 155-164. (Presentation[pdf].)

S. Xu, and T.R. Dean,
"Modernizing JavaServer Pages by Transformation," 7th International Symposium on WebSite Evolution, Budapest, Hungary, September 2005, pp 111-118. (Presentation[pdf]).

S. Xu, and T.R.Dean,
"Transforming Embedded Java to Custom Tags," 5th International Workshop on Source Code Analysis and Manipulation, Budapest, Hungary, September 2005, pp. 173-172. (Presentation[pdf]).

Sontao Zhang, T.R. Dean and S. Knight,
"Applying Software Transformation Techniques to Security Testing", Pre-Proceedings of STEP 2005, Software Technology and Engineering in Practice, Toronto, Canada, October 2005, pp. 180-184. (Presentation[pdf].)

A. Ashaiwi and T.R. Dean,
"Study the Characteristics of OPNET Design Recovery Tools for Good Models Understanding and Faster Code Modification", OPNETWORK 2005, Washington, USA, August 2005, on CDROM

T.R. Dean and S. Knight,
"Applying Software Transformation Techniques to Security Testing", International Workshop on Software Evolution and Transformation, Delft, Netherlands, November 2004, pp 49-52

O.Tal, S. Knight, and T.R. Dean,
"Syntax-based Vulnerability Testing of Frame-based Network Protocols", Proc. 2nd Annual Conference on Privacy, Security and Trust, Fredericton, Canada, October 2004, pp 155-160.

Y. Turcotte, O. Tal, S. Knight, and T.R. Dean,
"Security Vulnerabilities Assessment of the X.509 Protocol by Syntax-Based Testing", Military Communications Conference 2004, Monterey CA, October 2004, Vol 3 pp. 1572- 1578.

J.R. Cordy, T.R. Dean and N. Synytskyy,
"Practical Language-Independent Detection of Near-Miss Clones", Proc. CASCON'04, 14th IBM Centre for Advanced Studies Conference, Toronto, October 2004, pp. 29-40 (Best paper award). (Presentation[pdf]).

Xinping Guo, J.R. Cordy, T.R. Dean,
"Unique Renaming in Java", 3rd International Workshop on Source Code Analysis and Manipulation, Amsterdam, Netherlands, September 2003, pp 151-160.

Mykyta Synytskyy, J.R. Cordy, T.R. Dean,
"Resolution of Static Clones in Dynamic Web Pages", 5th International Workshop on Web Site Evolution, Amsterdam, Netherlands, September 2003 pp. 49-56.

T.R. Dean, Yuling Chen,
"Design Recovery of A Two Level System", 11th International Workshop on Program Comprehension (IWPC 2003), Portland, Oregon, May 2003 pp. 23-32.

Dean Jin, J.R. Cordy, T.R. Dean,
"Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter", 7th European Conference on Software Maintenance and Reengineering, Benevento, Italy, March 2003, pp. 399-408.

T.R. Dean, J.R. Cordy, K.A. Schneider, A.J. Malton,
"Grammar Programming in TXL", 2nd International Conference on Source Code Analysis and Manipulation (SCAM 2002), Montreal, Canada, November 2002, pp 93 - 102. (Presentation[pdf]).

Dean Jin, J.R. Cordy, T.R. Dean,
"Where's the Schema? A Taxonomy of Patterns for Software Exchange", 10th International Workshop on Program Comprehension (IWPC 2002), Paris, France, June 2002, pp. 65-74.

J.R. Cordy, T.R. Dean, A.J. Malton, K.A. Schneider,
"Software Engineering by Source Transformation, Experience with TXL", Proceedings SCAM'01, - IEEE First International Workshop on Source Code Analysis and Manipulation, Florence, Italy, November 2001, pp 168-178.

T.R. Dean, J.R. Cordy, K.A. Schneider, A.J. Malton,
"Using Design Recovery Techniques to Transform Legacy Systems", ICSM 2001 - The International Conference on Software Maintenance, Florence, Italy, November 2001, pp 622 - 631. (Presentation(pdf])

T.R. Dean, A.J. Malton, R.C. Holt,
"Union Schemas as a Basis for a C++ Extractor", WCRE 2001 - 8th Working Conference on Reverse Engineering, Stuttgart, Germany, October 2001, pp. 59-67. (Presentation[pdf])

A.J. Malton, K.A. Schneider, J.R. Cordy, T.R. Dean, D. Cousineau, J. Reynolds,
"Processing Software Source Text in Automated Design Recovery and Transformation", IWPC 2001 - The International Workshop on Program Comprehension, Toronto, Canada, May 2001, pp 145-154.

J.R. Cordy, K.A. Schneider, T.R. Dean, A.J. Malton,
"HSML: Design Directed Source Code Hot Spots", IWPC 2001 - The International Workshop on Program Comprehension, Toronto, Canada, May 2001, pp 127-134.

Refereed Journal Publications

J. Chen, T. R. Dean, M. H. Alalfi, "Clone detection in MATLAB Stateflow model", Software Quality Journal, Springer, Early Online Access(Nov 2015), DOI 10.1007/s11219-015-9296-0.

Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ying Zou
Detecting Android Malware Using Clone Detection, Vol.30 No. 5, Aug, 2015, pp 942–956.

B. Kam and T.R. Dean
“Linguistic Security Testing for Text Communication Protocols”, Software Practice and Experience, 43(9), Sept. 201

P. Tonella, M. Ceccato, D. Marchignoli, C. Matteotti, T.R. Dean, “Migrazione di sistemi software legaci”, Mondo Digitale, 12 pp. (accepted)

M. Ceccato, T.R. Dean, P. Tonella, D. Marchignoli, “Migrating legacy data structures based on Variable overlay to Java”, Journal of Software Maintenance and Evolution: Research and Practice, pp 211-237.

M. Alalfi, J.R. Cordy and T.R. Dean, "Web Application Verification and Testing Analysis Models and Methods: State of the Art", Software Testing, Verification and Reliability, Vol. 19, No. 4, Dec 2009, pp 265-296.

M. Ceccato, T.R. Dean, P. Tonella, “Recovering Structured Data Types from a Legacy Data Model with Overlays”, Journal of Information and Software Technology, Vol. 51, No. 10,pp 1454-1468.

T. Cassidy, J.R. Cordy, T.R. Dean and J. Dingel,
"Source Transformation for Concurrency Analysis," Electronic Notes in Theoretical Computer Science, 141(4), December 2005, pp. 57-75.

T.R. Dean, J.R. Cordy, A.J. Malton and K.A. Schneider,
"Agile Parsing in TXL", Journal of Automated Software Engineering 10,4 (October 2003), pp. 311-336.

J.R. Cordy, T.R. Dean, A.J. Malton, K.A. Schneider,
"Source Transformation in Software Engineering using the TXL Transformation System", Information and Software Technology, Special Issue: Source Code Analysis and Manipulation, Elsevier, Amsterdam, 44(13), October 2002, pp. 827-837.

T.R. Dean, J.R. Cordy,
"A Syntactic Theory of Software Architecture", Special Issue on Software Architecture, IEEE Transactions on Software Engineering, Vol 21, No. 4, April 1995, pp 302-313.

Refereed Conference Posters

A. Almonaies, J.R. Cordy and T.R. Dean, "Legacy Systems Evolution towards Service-Oriented Architecture", 19th IBM Centres for Advanced Studies Conference, Toronto (November 2009)

M. Alalfi, J.R. Cordy and T.R. Dean, "A Verification Framework for Access Control in Dynamic Web Applications", 19th IBM Centres for Advanced Studies Conference, Toronto (November 2009).

Submitted

Kam, B., Dean, T., "Linguistic Security Testing for Text Communication Protocols", TAIC PART, Windsor, UK. Sep- tember 2010, submittted.

Kam, B., Dean, T., "Grammar Based Security Testing of Network Protocols", 10th IEEE Working Conference on Source Code Analysis and Manipulation, Romaina, Sept 2010, submitted.

Invited Papers

T. Dean and Mykyta Synytskyy,
"Agile Parsing and Web Applications", International Summer School in Generative and Transformational Techniques in Software Engineering, Pre-proceedings, Part II, Technology Presentations, Braga, Portugal, July 2005. pp. 29-38. (Presentation[pdf]).

Chapters in Books

T.R. Dean, J.R. Cordy,
"Software Characterization Using Connectivity", in Studies in Software Design, D.A. Lamb (ed.), Springer Verlag Lecture Notes in Computer Science 1078, Berlin, 1996, pp 33-48.

Other Talks

Copyright © Thomas R. Dean, 2008. Contact Information: