Marc Ségura-Devillechaise

Learn More
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples of such concerns. While these concerns can partially be addressed during design and implementation of an application, they frequently become an issue at runtime, <i>e.g.</i>, to(More)
Given the high proportion of HTTP traffic in the Internet, Web caches are crucial to reduce user access time, network latency, and bandwidth consumption. Prefetching in a Web cache can further enhance these benefits. For the best performance, however, the prefetching policy must match user and Web application characteristics. Thus, new prefetching policies(More)
Recently, hackers has been developing fast propagating worms exploiting vulnerabilities that had just been disclosed by security experts. Those attacks particularly expose servers: this class of applications is constantly connected to the Internet and must meet uptime constraints. Hence they often run unprotected until the next scheduled update. In this(More)
— Networking software, in particular popular web caches as Squid, are highly optimized for execution speed and therefore dispense with several common software design principles, e.g., a modular architecture. However, this is an important impediment to their adaptation to new requirements, such as the extension of an existing web cache protocol or closing a(More)
Security, networking and prefetching are typical examples of concerns which crosscut system-level C applications. While a careful design can help to address these concerns, they frequently become an issue at runtime, especially if avoiding server downtime is important. Vulner-abilities caused by buffer overflows and double-free bugs are frequently(More)
Security, networking and prefetching are typical examples of concerns which crosscut system-level C applications. While a careful design can help to address these concerns, they frequently become an issue at runtime, especially if avoiding server downtime is important. Vulner-abilities caused by buffer overflows and double-free bugs are frequently(More)
W riting good software is often a challenge; writing adaptable software can be even more difficult. For example, open implementations must provide, at the time of application design, both a functional interface that exposes the services being offered and an adaptation interface that lets users customize their implementation. 1 However, because adaptable(More)