Behavior Abstraction in Malware Analysis, 1st International Conference on Runtime Verification, pp.168-182, 2010. ,
DOI : 10.1007/978-3-642-16612-9_14
URL : https://hal.archives-ouvertes.fr/inria-00536500
Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001. ,
Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987. ,
DOI : 10.1016/0167-4048(87)90122-2
Regular Tree Languages and Rewrite Systems, Fundamenta Informaticae, vol.24, pp.157-176, 1995. ,
URL : https://hal.archives-ouvertes.fr/inria-00538882
Verifying information flow goals in Security-Enhanced Linux, Journal of Computer Security, vol.13, issue.1, pp.115-134, 2005. ,
DOI : 10.3233/JCS-2005-13105
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language, International Symposium on Recent Advances in Intrusion Detection, pp.81-100, 2009. ,
DOI : 10.1007/978-3-642-04342-0_5
Detecting Malicious Code by Model Checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.174-187, 2005. ,
DOI : 10.1007/11506881_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7354
Temporal Logic and State Systems. Texts in Theoretical Computer Science. An EATCS Series, 2008. ,
Dynamic detection and classification of computer viruses using general behaviour patterns, Proceedings of the International Virus Bulletin Conference, pp.1-22, 1995. ,
A Layered Architecture for Detecting Malicious Behaviors, International symposium on Recent Advances in Intrusion Detection, pp.78-97, 2008. ,
DOI : 10.1007/978-3-540-87403-4_5
Characterization of virus replication, Journal in Computer Virology, vol.9, issue.1, pp.221-234, 2007. ,
DOI : 10.1007/s11416-007-0077-6
A fast automaton-based method for detecting anomalous program behaviors, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.144-155, 2001. ,
DOI : 10.1109/SECPRI.2001.924295
Static verification of worm and virus behavior in binary executables using model checking, Information Assurance Workshop, pp.298-300, 2003. ,
Can We Make Operating Systems Reliable and Secure?, Computer, vol.39, issue.5, pp.44-51, 2006. ,
DOI : 10.1109/MC.2006.156
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.3028