Efficient Verification of a Multicast Protocol for Mobile Computing, The Computer Journal, vol.44, issue.1, pp.21-30, 2001. ,
DOI : 10.1093/comjnl/44.1.21
HelDroid: Dissecting and Detecting Mobile Ransomware, Research in Attacks, Intrusions, and Defenses, pp.382-404, 2015. ,
DOI : 10.1007/978-3-319-26362-5_18
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23247
LORETO: a tool for reducing state explosion in verification of LOTOS programs, Software: Practice and Experience, vol.32, issue.12, pp.1123-1147, 1999. ,
DOI : 10.1002/(SICI)1097-024X(199910)29:12<1123::AID-SPE275>3.0.CO;2-6
Identification of Android Malware Families with Model Checking, Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016. ,
DOI : 10.5220/0005809205420547
Obfuscation Techniques against Signature-Based Detection: A Case Study, 2015 Mobile Systems Technologies Workshop (MST), 2015. ,
DOI : 10.1109/MST.2015.8
Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking, 2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering, pp.26-32, 2015. ,
DOI : 10.1109/FormaliSE.2015.12
The NCSU Concurrency Workbench, Lecture Notes in Computer Science, vol.1102, 1996. ,
DOI : 10.1007/3-540-61474-5_87
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.1554
Heuristic search for equivalence checking, Software & Systems Modeling, 2014. ,
DOI : 10.1007/s10270-014-0416-2
Ant Colony Optimization for Deadlock Detection in Concurrent Systems, 2011 IEEE 35th Annual Computer Software and Applications Conference, pp.18-22, 2011. ,
DOI : 10.1109/COMPSAC.2011.22
State space reduction by non-standard semantics for deadlock analysis, Science of Computer Programming, vol.30, issue.3, pp.309-338, 1998. ,
DOI : 10.1016/S0167-6423(97)00017-8
Formalization of Viruses and Malware Through Process Algebras, 2010 International Conference on Availability, Reliability and Security, 2010. ,
DOI : 10.1109/ARES.2010.59
URL : https://hal.archives-ouvertes.fr/hal-01355337
Detecting Malicious Code by Model Checking, 2005. ,
DOI : 10.1007/11506881_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7354
Download malware? No, thanks. How formal methods can block update attacks, Formal Methods in Software Engineering (FormaliSE), 2016. ,
DOI : 10.1145/2897667.2897673
Communication and concurrency. PHI Series in computer science, 1989. ,
PoMMaDe: pushdown model-checking for malware detection, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, 2013. ,
DOI : 10.1145/2491411.2494599
Model-Checking for Android Malware Detection, 2014. ,
DOI : 10.1007/978-3-319-12736-1_12
Mobilesandbox: Looking deeper into android applications, 28th International ACM Symposium on Applied Computing (SAC), 2013. ,
An introduction to modal and temporal logics for CCS, Concurrency: Theory, Language, And Architecture. pp. 2?20, 1989. ,
DOI : 10.1007/3-540-53932-8_41
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.8415
Automated Detection and Analysis for Android Ransomware, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp.1338-1343, 2015. ,
DOI : 10.1109/HPCC-CSS-ICESS.2015.39