P. Beaucamps, I. Gnaedig, and J. Marion, Behavior Abstraction in Malware Analysis, 1st International Conference on Runtime Verification, pp.168-182, 2010.
DOI : 10.1007/978-3-642-16612-9_14

URL : https://hal.archives-ouvertes.fr/inria-00536500

J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y. Lavoie et al., Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001.

F. Cohen, Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987.
DOI : 10.1016/0167-4048(87)90122-2

R. Gilleron and S. Tison, Regular Tree Languages and Rewrite Systems, Fundamenta Informaticae, vol.24, pp.157-176, 1995.
URL : https://hal.archives-ouvertes.fr/inria-00538882

J. Guttman, A. Herzog, J. Ramsdell, and C. Skorupta, Verifying information flow goals in Security-Enhanced Linux, Journal of Computer Security, vol.13, issue.1, pp.115-134, 2005.
DOI : 10.3233/JCS-2005-13105

G. Jacob, H. Debar, and E. Filiol, Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language, International Symposium on Recent Advances in Intrusion Detection, pp.81-100, 2009.
DOI : 10.1007/978-3-642-04342-0_5

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Detecting Malicious Code by Model Checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.174-187, 2005.
DOI : 10.1007/11506881_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7354

F. Kröger and S. Merz, Temporal Logic and State Systems. Texts in Theoretical Computer Science. An EATCS Series, 2008.

A. Baudouin-le-charlier, M. Mounji, and . Swimmer, Dynamic detection and classification of computer viruses using general behaviour patterns, Proceedings of the International Virus Bulletin Conference, pp.1-22, 1995.

L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, A Layered Architecture for Detecting Malicious Behaviors, International symposium on Recent Advances in Intrusion Detection, pp.78-97, 2008.
DOI : 10.1007/978-3-540-87403-4_5

J. Morales, P. Clarke, Y. Deng, and G. Kibria, Characterization of virus replication, Journal in Computer Virology, vol.9, issue.1, pp.221-234, 2007.
DOI : 10.1007/s11416-007-0077-6

R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.144-155, 2001.
DOI : 10.1109/SECPRI.2001.924295

K. Prabhat, A. Singh, and . Lakhotia, Static verification of worm and virus behavior in binary executables using model checking, Information Assurance Workshop, pp.298-300, 2003.

A. S. Tanenbaum, J. N. Herder, and H. Bos, Can We Make Operating Systems Reliable and Secure?, Computer, vol.39, issue.5, pp.44-51, 2006.
DOI : 10.1109/MC.2006.156

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.3028