{"id":991,"date":"2021-06-15T11:50:05","date_gmt":"2021-06-15T09:50:05","guid":{"rendered":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/"},"modified":"2021-06-15T11:50:05","modified_gmt":"2021-06-15T09:50:05","slug":"phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/","title":{"rendered":"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p>Please click on\u00a0<a href=\"https:\/\/unilu.webex.com\/mw3300\/mywebex\/default.do?nomenu=true&#038;siteurl=unilu&#038;service=6&#038;rnd=0.49582220595766413&#038;main_url=https%3A%2F%2Funilu.webex.com%2Fec3300%2Feventcenter%2Fevent%2FeventAction.do%3FtheAction%3Ddetail%26%26%26EMK%3D4832534b000000050b9c72b29c4e5d5510024f6ab99825fdfea99d91b3075215a5f3e5eeb58390f8%26siteurl%3Dunilu%26confViewID%3D197172086788065694%26encryptTicket%3DSDJTSwAAAAUDhjYZ39ww7m6lsZzV0OiRvMBjvUtj9P5BJD8bA1GM3w2%26\" target=\"_self\" title=\"\" rel=\"noopener\">this link<\/a> and join the online PhD defense <\/p><p><strong>Please click on\u00a0<a href=\"https:\/\/unilu.webex.com\/mw3300\/mywebex\/default.do?nomenu=true&#038;siteurl=unilu&#038;service=6&#038;rnd=0.49582220595766413&#038;main_url=https%3A%2F%2Funilu.webex.com%2Fec3300%2Feventcenter%2Fevent%2FeventAction.do%3FtheAction%3Ddetail%26%26%26EMK%3D4832534b000000050b9c72b29c4e5d5510024f6ab99825fdfea99d91b3075215a5f3e5eeb58390f8%26siteurl%3Dunilu%26confViewID%3D197172086788065694%26encryptTicket%3DSDJTSwAAAAUDhjYZ39ww7m6lsZzV0OiRvMBjvUtj9P5BJD8bA1GM3w2%26\" target=\"_self\" title=\"\" rel=\"noopener\">this link<\/a> and join the online PhD defense <\/strong>(please note that the public part of the defense starts at 17:00).<\/p><p><strong>Members of the defense committee:<\/strong><\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">Prof. Dr Fabrizio Pastore, University of Luxembourg, Chairman<\/li><li class=\"ulux-list-item\">Prof. Dr Domenico Bianculli, University of Luxembourg, Deputy Chairman<\/li><li class=\"ulux-list-item\">Prof. Dr Lionel Briand, University of Luxembourg, Supervisor<\/li><li class=\"ulux-list-item\">Prof. Leonardo Mariani, Universit\u00e0 degli Studi di Milano-Bicocca, Member<\/li><li class=\"ulux-list-item\">Prof. Annibale Panichella, TU Delft University of Technology, Member<\/li><\/ul><p><\/p><p><strong>Abstract:<\/strong><\/p><p>Many software engineering activities process the events contained in log files. However, before performing any processing activity, it is necessary to correctly parse the entries in a log file to retrieve the actual events recorded in the log.<\/p><p>In the case of cyber-physical systems, execution logs are highly important because such systems integrate multiple third-party components where their source code is not always available. This limits the visibility of the system behavior to what is collected in the execution logs. <\/p><p>The increasing amount of logs produced by cyber-physical systems calls for 1) more advanced techniques for accurate log parsing, 2) scalable model inference that will enable efficient program comprehension and, 3) cost-effective software testing to ensure the quality of complex software systems.<\/p><p>The goal of this thesis is to investigate the usage of system execution logs to support different software engineering tasks in the context of cyber-physical systems where large amount of logs are being generated and require processing. Precisely, we propose a set of approaches to automate system behavior modeling from components logs and support regression testing, starting from an accurate and efficient log parsing.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Please click on\u00a0this link and join the online PhD defense (please note that the public part of the defense starts at 17:00).<\/p>\n","protected":false},"author":0,"featured_media":992,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2021-06-29 15:00:00","event_end_date":"2021-06-29 18:00:00","event_speaker_name":"Salma Messaoudi (SVV Research group)","event_speaker_link":"","event_is_online":false,"event_location":"","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[183],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing - SnT - Universit\u00e9 du Luxembourg I Uni.lu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing\" \/>\n<meta property=\"og:description\" content=\"Please click on\u00a0this link and join the online PhD defense (please note that the public part of the defense starts at 17:00).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"SnT FR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/\",\"name\":\"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing - SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/06\/phd_defense_leveraging_execution_logs_to_support_model_inference_and_software_testing.jpg\",\"datePublished\":\"2021-06-15T09:50:05+00:00\",\"dateModified\":\"2021-06-15T09:50:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/06\/phd_defense_leveraging_execution_logs_to_support_model_inference_and_software_testing.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/06\/phd_defense_leveraging_execution_logs_to_support_model_inference_and_software_testing.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interdisciplinary Centre for Security, Reliability and Trust (SnT)\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"name\":\"SnT\",\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\",\"name\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/school\/snt-lu\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing - SnT - Universit\u00e9 du Luxembourg I Uni.lu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing","og_description":"Please click on\u00a0this link and join the online PhD defense (please note that the public part of the defense starts at 17:00).","og_url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/","og_site_name":"SnT FR","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/","url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/","name":"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing - SnT - Universit\u00e9 du Luxembourg I Uni.lu","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/06\/phd_defense_leveraging_execution_logs_to_support_model_inference_and_software_testing.jpg","datePublished":"2021-06-15T09:50:05+00:00","dateModified":"2021-06-15T09:50:05+00:00","breadcrumb":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/06\/phd_defense_leveraging_execution_logs_to_support_model_inference_and_software_testing.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/06\/phd_defense_leveraging_execution_logs_to_support_model_inference_and_software_testing.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-leveraging-execution-logs-to-support-model-inference-and-software-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr"},{"@type":"ListItem","position":2,"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT)","item":"https:\/\/www.uni.lu\/snt-fr\/"},{"@type":"ListItem","position":3,"name":"Events","item":"https:\/\/www.uni.lu\/snt-fr\/events\/"},{"@type":"ListItem","position":4,"name":"PhD Defense: Leveraging Execution Logs to Support Model Inference and Software Testing"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/snt-fr\/#website","url":"https:\/\/www.uni.lu\/snt-fr\/","name":"SnT","description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"alternateName":"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/snt-fr\/#organization","name":"SnT - Universit\u00e9 du Luxembourg I Uni.lu","alternateName":"Interdisciplinary Centre for Security, Reliability and Trust","url":"https:\/\/www.uni.lu\/snt-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"SnT - Universit\u00e9 du Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/school\/snt-lu\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/991"}],"collection":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/comments?post=991"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/991\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media\/992"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media?parent=991"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-topic?post=991"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-type?post=991"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/organisation?post=991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}