Broadwell, P., Harren, M., and Sastry, N. (2003). Scrash:
A system for generating secure crash information. In
Proceedings of the 12th USENIX Security Symposium,
Washington, D.C., USA, August 4-8, 2003.
Castro, M., Costa, M., and Martin, J. (2008). Better bug
reporting with better privacy. In Proceedings of the
13th International Conference on Architectural Sup-
port for Programming Languages and Operating Sys-
tems, ASPLOS 2008, Seattle, WA, USA, March 1-5,
2008, pages 319–328.
Collberg, C., Thomborson, C., and Low, D. (1997). A tax-
onomy of obfuscating transformations. Technical Re-
port 148, Department of Computer Science, The Uni-
versity of Auckland, New Zealand.
Collberg, C. S. and Thomborson, C. D. (1999). Software
watermarking: Models and dynamic embeddings. In
POPL ’99, Proceedings of the 26th ACM SIGPLAN-
SIGACT Symposium on Principles of Programming
Languages, San Antonio, TX, USA, January 20-22,
1999, pages 311–324.
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B., Cox,
L. P., Jung, J., McDaniel, P., and Sheth, A. N. (2014).
Taintdroid: An information-flow tracking system for
realtime privacy monitoring on smartphones. ACM
Trans. Comput. Syst., 32(2):5:1–5:29.
Erkin, Z., Veugen, T., Toft, T., and Lagendijk, R. L.
(2012). Generating private recommendations effi-
ciently using homomorphic encryption and data pack-
ing. IEEE Trans. Information Forensics and Security,
7(3):1053–1066.
Gluch, D., Cornella-Dorda, S., Hudak, J. J., Lewis, G. A.,
Walker, J., Weinstock, C. B., and Zubrow, D. (2002).
Model-based verification: An engineering practice.
Technical Report CMU/SEI-2002-TR-021, Carnegie
Mellon University, PA.
Gousios, G. (2013). The GHTorrent dataset and tool suite.
In Proceedings of the 10th Working Conference on
Mining Software Repositories, MSR ’13, pages 233–
236, Piscataway, NJ, USA. IEEE Press.
Gousios, G. (2016). The issue 32 incident an update. Ac-
cessed May 3, 2016.
Grechanik, M., Csallner, C., Fu, C., and Xie, Q. (2010).
Is data privacy always good for software testing? In
IEEE 21st International Symposium on Software Reli-
ability Engineering, ISSRE 2010, San Jose, CA, USA,
1-4 November 2010, pages 368–377.
Lazzeretti, R. (2012). Privacy preserving processing of
biomedical signals with application to remote health-
care systems. PhD thesis, Ph. D. thesis, PhD school of
the University of Siena, Information Engineering and
Mathematical Science Department.
Leemans, M. and van der Aalst, W. M. P. (2015). Pro-
cess mining in software systems: Discovering real-life
business transactions and process models from dis-
tributed systems. In 18th ACM/IEEE International
Conference on Model Driven Engineering Languages
and Systems, MoDELS 2015, Ottawa, ON, Canada,
September 30 - October 2, 2015, pages 44–53.
Levenberg, J. (2016). Why Google stores billions of lines of
code in a single repository. Commun. ACM, 59(7):78–
87.
Lipmaa, H. and Toft, T. (2013). Secure equality and greater-
than tests with sublinear online complexity. In Au-
tomata, Languages, and Programming - 40th Inter-
national Colloquium, ICALP 2013, Riga, Latvia, July
8-12, 2013, Proceedings, Part II, pages 645–656.
Lucia, Lo, D., Jiang, L., and Budi, A. (2012). kbe-
anonymity: test data anonymization for evolving
programs. In IEEE/ACM International Conference
on Automated Software Engineering, ASE’12, Essen,
Germany, September 3-7, 2012, pages 262–265.
Nateghizad, M., Erkin, Z., and Lagendijk, R. L. (2016).
Efficient and secure equality tests. In IEEE Interna-
tional Workshop on Information Forensics and Secu-
rity, WIFS 2016, Abu Dhabi, United Arab Emirates,
December 4-7, 2016, pages 1–6.
Naumovich, G. and Memon, N. D. (2003). Preventing
piracy, reverse engineering, and tampering. IEEE
Computer, 36(7):64–71.
Paillier, P. (1999). Public-key cryptosystems based on com-
posite degree residuosity classes. In Advances in
Cryptology - EUROCRYPT ’99, International Confer-
ence on the Theory and Application of Cryptographic
Techniques, Prague, Czech Republic, May 2-6, 1999,
Proceeding, pages 223–238.
Pecchia, A. and Cinque, M. (2013). Log-Based Failure
Analysis of Complex Systems: Methodology and Rel-
evant Applications, pages 203–215. Springer Milan,
Milano.
Rubin, V. A., G
¨
unther, C. W., van der Aalst, W. M. P.,
Kindler, E., van Dongen, B. F., and Sch
¨
afer, W.
(2007). Process mining framework for software pro-
cesses. In Software Process Dynamics and Agility,
International Conference on Software Process, ICSP
2007, Minneapolis, MN, USA, May 19-20, 2007, Pro-
ceedings, pages 169–181.
van der Aalst, W. M. P. (2015). Big software on the run:
in vivo software analytics based on process mining
(keynote). In Proceedings of the 2015 International
Conference on Software and System Process, ICSSP
2015, Tallinn, Estonia, August 24 - 26, 2015, pages
1–5.
van der Aalst, W. M. P. (2016). Process Mining - Data
Science in Action, Second Edition. Springer.
van der Aalst, W. M. P., Weijters, T., and Maruster, L.
(2004). Workflow mining: Discovering process mod-
els from event logs. IEEE Trans. Knowl. Data Eng.,
16(9):1128–1142.
Zhu, D. Y., Jung, J., Song, D., Kohno, T., and Wetherall,
D. (2011). Tainteraser: protecting sensitive data leaks
using application-level taint tracking. Operating Sys-
tems Review, 45(1):142–154.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
274