G. Anastasi, A. Bartoli, N. D. Francesco, and A. Santone, Efficient Verification of a Multicast Protocol for Mobile Computing, The Computer Journal, vol.44, issue.1, pp.21-30, 2001.
DOI : 10.1093/comjnl/44.1.21

N. Andronio, S. Zanero, and F. Maggi, HelDroid: Dissecting and Detecting Mobile Ransomware, Research in Attacks, Intrusions, and Defenses, pp.382-404, 2015.
DOI : 10.1007/978-3-319-26362-5_18

D. Arp, M. Spreitzenbarth, M. Huebner, H. Gascon, and K. Rieck, Drebin: Effective and Explainable Detection of Android Malware in Your Pocket, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23247

R. Barbuti, N. D. Francesco, A. Santone, and G. Vaglini, LORETO: a tool for reducing state explosion in verification of LOTOS programs, Software: Practice and Experience, vol.32, issue.12, pp.1123-1147, 1999.
DOI : 10.1002/(SICI)1097-024X(199910)29:12<1123::AID-SPE275>3.0.CO;2-6

P. Battista, F. Mercaldo, V. Nardone, A. Santone, and C. A. Visaggio, Identification of Android Malware Families with Model Checking, Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016.
DOI : 10.5220/0005809205420547

G. Canfora, D. Sorbo, A. Mercaldo, F. Visaggio, and C. , Obfuscation Techniques against Signature-Based Detection: A Case Study, 2015 Mobile Systems Technologies Workshop (MST), 2015.
DOI : 10.1109/MST.2015.8

M. Ceccarelli, L. Cerulo, G. D. Ruvo, V. Nardone, and A. Santone, Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking, 2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering, pp.26-32, 2015.
DOI : 10.1109/FormaliSE.2015.12

R. Cleaveland and S. Sims, The NCSU Concurrency Workbench, Lecture Notes in Computer Science, vol.1102, 1996.
DOI : 10.1007/3-540-61474-5_87

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.1554

D. Francesco, N. Lettieri, G. Santone, A. Vaglini, and G. , Heuristic search for equivalence checking, Software & Systems Modeling, 2014.
DOI : 10.1007/s10270-014-0416-2

G. Francesca, A. Santone, G. Vaglini, and M. L. Villani, Ant Colony Optimization for Deadlock Detection in Concurrent Systems, 2011 IEEE 35th Annual Computer Software and Applications Conference, pp.18-22, 2011.
DOI : 10.1109/COMPSAC.2011.22

N. D. Francesco, A. Santone, and G. Vaglini, State space reduction by non-standard semantics for deadlock analysis, Science of Computer Programming, vol.30, issue.3, pp.309-338, 1998.
DOI : 10.1016/S0167-6423(97)00017-8

G. Jacob, E. Filiol, and H. Debar, Formalization of Viruses and Malware Through Process Algebras, 2010 International Conference on Availability, Reliability and Security, 2010.
DOI : 10.1109/ARES.2010.59

URL : https://hal.archives-ouvertes.fr/hal-01355337

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Detecting Malicious Code by Model Checking, 2005.
DOI : 10.1007/11506881_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7354

F. Mercaldo, V. Nardone, A. Santone, and C. A. Visaggio, Download malware? No, thanks. How formal methods can block update attacks, Formal Methods in Software Engineering (FormaliSE), 2016.
DOI : 10.1145/2897667.2897673

R. Milner, Communication and concurrency. PHI Series in computer science, 1989.

F. Song and T. Touili, PoMMaDe: pushdown model-checking for malware detection, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, 2013.
DOI : 10.1145/2491411.2494599

F. Song and T. Touili, Model-Checking for Android Malware Detection, 2014.
DOI : 10.1007/978-3-319-12736-1_12

M. Spreitzenbarth, F. Echtler, T. Schreck, F. C. Freling, and J. Hoffmann, Mobilesandbox: Looking deeper into android applications, 28th International ACM Symposium on Applied Computing (SAC), 2013.

C. Stirling, An introduction to modal and temporal logics for CCS, Concurrency: Theory, Language, And Architecture. pp. 2?20, 1989.
DOI : 10.1007/3-540-53932-8_41

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.8415

T. Yang, Y. Yang, K. Qian, D. C. Lo, Y. Qian et al., Automated Detection and Analysis for Android Ransomware, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp.1338-1343, 2015.
DOI : 10.1109/HPCC-CSS-ICESS.2015.39