-
1
-
-
79960360109
-
Malware Analysis with Tree Automata Inference
-
Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. Springer, Heidelberg
-
Babić, D., Reynaud, D., Song, D.: Malware Analysis with Tree Automata Inference. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 116-131. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6806
, pp. 116-131
-
-
Babić, D.1
Reynaud, D.2
Song, D.3
-
2
-
-
78650082281
-
Behavior Abstraction in Malware Analysis
-
Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Roşu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. Springer, Heidelberg
-
Beaucamps, P., Gnaedig, I., Marion, J.-Y.: Behavior Abstraction in Malware Analysis. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Roşu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 168-182. Springer, Heidelberg(2010)
-
(2010)
LNCS
, vol.6418
, pp. 168-182
-
-
Beaucamps, P.1
Gnaedig, I.2
Marion, J.-Y.3
-
3
-
-
84865600110
-
Abstraction-Based Malware Analysis Using Rewriting and Model Checking
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
-
Beaucamps, P., Gnaedig, I., Marion, J.-Y.: Abstraction-Based Malware Analysis Using Rewriting and Model Checking. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 806-823. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 806-823
-
-
Beaucamps, P.1
Gnaedig, I.2
Marion, J.-Y.3
-
4
-
-
34247166239
-
Static detection of malicious code in executable programs
-
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui,M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. In: SREIS (2001)
-
(2001)
SREIS
-
-
Bergeron, J.1
Debbabi, M.2
Desharnais, J.3
Erhioui, M.4
Lavoie, Y.5
Tawbi, N.6
-
5
-
-
70349990723
-
Architecture of a Morphological Malware Detector
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: Architecture of a Morphological Malware Detector. Journal in Computer Virology 5, 263-270 (2009)
-
(2009)
Journal in Computer Virology
, vol.5
, pp. 263-270
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
6
-
-
84944409047
-
Reachability analysis of pushdown automata: Application to model-checking
-
Concur '97: Concurrency Theory
-
Bouajjani, A., Esparza, J., Maler, O.: Reachability Analysis of Pushdown Automata: Application to Model-Checking. In: Mazurkiewicz, A., Winkowski, J. (eds.) CONCUR 1997. LNCS, vol. 1243, pp. 135-150. Springer, Heidelberg (1997) (Pubitemid 127089315)
-
(1997)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1243
, pp. 135-150
-
-
Bouajjani, A.1
Esparza, J.2
Maler, O.3
-
8
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy (2005)
-
IEEE Symposium on Security and Privacy (2005)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
9
-
-
0142121527
-
Model checking LTL with regular valuations for pushdown systems
-
Esparza, J., Kucera, A., Schwoon, S.: Model checking LTL with regular valuations for pushdown systems. Inf. Comput. 186(2) (2003)
-
(2003)
Inf. Comput.
, vol.186
, Issue.2
-
-
Esparza, J.1
Kucera, A.2
Schwoon, S.3
-
10
-
-
84958757867
-
A BDD-Based Model Checker for Recursive Programs
-
Computer Aided Verification
-
Esparza, J., Schwoon, S.: A BDD-Based Model Checker for Recursive Programs. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 324-336. Springer, Heidelberg (2001) (Pubitemid 33312928)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2102
, pp. 324-336
-
-
Esparza, J.1
Schwoon, S.2
-
11
-
-
77953773956
-
Variable Automata over Infinite Alphabets
-
Dediu, A.-H., Fernau, H.,Martín-Vide, C. (eds.) LATA 2010. Springer, Heidelberg
-
Grumberg, O., Kupferman, O., Sheinvald, S.: Variable Automata over Infinite Alphabets. In: Dediu, A.-H., Fernau, H.,Martín-Vide, C. (eds.) LATA 2010. LNCS, vol. 6031, pp. 561-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6031
, pp. 561-572
-
-
Grumberg, O.1
Kupferman, O.2
Sheinvald, S.3
-
12
-
-
84937399243
-
Monodic Fragments of First-Order Temporal Logics: 2000-2001 A.D
-
Logic for Programming, Artificial Intelligence, and Reasoning
-
Hodkinson, I., Wolter, F., Zakharyaschev, M.: Monodic Fragments of First-Order Temporal Logics: 2000-2001 A.D. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, pp. 1-23. Springer, Heidelberg (2001) (Pubitemid 33373239)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2250
, pp. 1-23
-
-
Hodkinson, I.1
Wolter, F.2
Zakharyaschev, M.3
-
13
-
-
26444526878
-
Detecting malicious code by model checking
-
Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting Malicious Code by Model Checking. In: Julisch, K., Kruegel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005) (Pubitemid 41423155)
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
14
-
-
77955020949
-
An Automata-Theoretic Approach to Infinite-State Systems
-
Manna, Z., Peled, D.A. (eds.) Time for Verification. Springer, Heidelberg
-
Kupferman, O., Piterman, N., Vardi, M.Y.: An Automata-Theoretic Approach to Infinite-State Systems. In: Manna, Z., Peled, D.A. (eds.) Time for Verification. LNCS, vol. 6200, pp. 202-259. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6200
, pp. 202-259
-
-
Kupferman, O.1
Piterman, N.2
Vardi, M.Y.3
-
15
-
-
84859363174
-
Context-sensitive analysis of obfuscated x86 executables
-
Lakhotia, A., Boccardo, D.R., Singh, A., Manacero, A.: Context-sensitive analysis of obfuscated x86 executables. In: PEPM (2010)
-
(2010)
PEPM
-
-
Lakhotia, A.1
Boccardo, D.R.2
Singh, A.3
Manacero, A.4
-
16
-
-
33751120104
-
A method for detecting obfuscated calls in malicious binaries
-
Lakhotia, A., Kumar, E.U., Venable, M.: A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng. 31(11) (2005)
-
(2005)
IEEE Trans. Software Eng.
, vol.31
, Issue.11
-
-
Lakhotia, A.1
Kumar, E.U.2
Venable, M.3
-
17
-
-
84946414079
-
Static verification of worm and virus behavior in binary executables using model checking
-
Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: IAW (2003)
-
(2003)
IAW
-
-
Singh, P.K.1
Lakhotia, A.2
-
18
-
-
0022326404
-
The complementation problem for büchi automata with appplications to temporal logic
-
Sistla, A.P., Vardi, M.Y., Wolper, P.: The complementation problem for büchi automata with appplications to temporal logic. Theor. Comput. Sci. 49, 217-237 (1987)
-
(1987)
Theor. Comput. Sci.
, vol.49
, pp. 217-237
-
-
Sistla, A.P.1
Vardi, M.Y.2
Wolper, P.3
-
19
-
-
84865960635
-
Efficient Malware Detection Using Model-Checking
-
Giannakopoulou, D., Méry, D. (eds.) FM 2012. Springer, Heidelberg
-
Song, F., Touili, T.: Efficient Malware Detection Using Model-Checking. In: Giannakopoulou, D., Méry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 418-433. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7436
, pp. 418-433
-
-
Song, F.1
Touili, T.2
-
20
-
-
84859310292
-
Pushdown Model Checking for Malware Detection
-
Flanagan, C., König, B. (eds.) TACAS 2012. Springer, Heidelberg
-
Song, F., Touili, T.: Pushdown Model Checking for Malware Detection. In: Flanagan, C., König, B. (eds.) TACAS 2012. LNCS, vol. 7214, pp. 110-125. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7214
, pp. 110-125
-
-
Song, F.1
Touili, T.2
-
21
-
-
35048863841
-
First-Order LTL Model Checking Using MDGs
-
Wang, F., Tahar, S., Mohamed, O.A.: First-Order LTL Model Checking Using MDGs. In: Wang, F. (ed.) ATVA 2004. LNCS, vol. 3299, pp. 441-455. Springer, Heidelberg (2004) (Pubitemid 39752046)
-
(2004)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3299
, pp. 441-455
-
-
Wang, F.1
Tahar, S.2
Mohamed, O.A.3
-
22
-
-
84863919267
-
Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs
-
Computer Aided Verification
-
Xu, Y., Cerny, E., Song, X., Corella, F., Mohamed, O.A.: Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs. In: Vardi, M.Y. (ed.) CAV 1998. LNCS, vol. 1427, pp. 219-231. Springer, Heidelberg (1998) (Pubitemid 128092341)
-
(1998)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1427
, pp. 219-231
-
-
Xu, Y.1
Cerny, E.2
Song, X.3
Cotella, F.4
Ait, M.O.5
|