F. Cohen, Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987.
DOI : 10.1016/0167-4048(87)90122-2

B. , L. Charlier, A. Mounji, and M. Swimmer, Dynamic detection and classification of computer viruses using general behaviour patterns, International Virus Bulletin Conference, pp.1-22, 1995.

R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, A fast automatonbased method for detecting anomalous program behaviors, IEEE Symposium on Security and Privacy, pp.144-155, 2001.

J. Morales, P. Clarke, Y. Deng, and G. Kibria, Characterization of virus replication, Journal in Computer Virology, vol.9, issue.1, pp.221-234, 2007.
DOI : 10.1007/s11416-007-0077-6

J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y. Lavoie et al., Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001.

J. Kinder, S. Katzenbeisser, C. Schallhart, and H. Veith, Detecting Malicious Code by Model Checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.174-187, 2005.
DOI : 10.1007/11506881_11

P. K. Singh and A. Lakhotia, Static verification of worm and virus behavior in binary executables using model checking, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., pp.298-300, 2003.
DOI : 10.1109/SMCSIA.2003.1232440

L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, A Layered Architecture for Detecting Malicious Behaviors, International symposium on Recent Advances in Intrusion Detection, pp.78-97, 2008.
DOI : 10.1007/978-3-540-87403-4_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.6745

U. Bayer, P. Milani-comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda, Scalable, Behavior-Based Malware Clustering, 16th Symposium on Network and Distributed System Security (NDSS), 2009.

G. Jacob, H. Debar, and E. Filiol, Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, ser. RAID '09, pp.81-100, 2009.
DOI : 10.1007/978-3-642-04342-0_5

B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth et al., Native Client, Communications of the ACM, vol.53, issue.1, pp.91-99, 2010.
DOI : 10.1145/1629175.1629203

M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, A semanticsbased approach to malware detection, Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.377-388, 2007.

J. Kinder, H. Veith, and F. Zuleger, An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries, Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation, pp.214-228, 2009.
DOI : 10.1007/978-3-540-93900-9_19

D. Brumley, C. Hartwig, M. G. Kang, Z. Liang, J. Newsome et al., BitScope: Automatically dissecting malicious binaries, School of Computer Science, 2007.

F. Kröger and S. Merz, Temporal Logic and State Systems, ser. Texts in Theoretical Computer Science. An EATCS Series, 2008.

G. J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, 2003.
DOI : 10.1109/32.588521

H. Garavel, F. Lang, R. Mateescu, and W. Serwe, CADP??2006: A Toolbox for the Construction and Analysis of Distributed Processes, Computer Aided Verification (CAV'2007), ser, pp.158-163, 2007.
DOI : 10.1007/978-3-540-73368-3_18

URL : https://hal.archives-ouvertes.fr/inria-00189021

F. Chen and G. Ro¸suro¸su, MOP: An Efficient and Generic Runtime Verification Framework, Object-Oriented Programming, Systems, Languages and ApplicationsObject-Oriented Programming, Systems, Languages and Applications, pp.569-588, 2007.

P. Beaucamps, I. Gnaedig, and J. Marion, Behavior Abstraction in Malware Analysis, 1st International Conference on Runtime Verification, pp.168-182, 2010.
DOI : 10.1007/978-3-642-16612-9_14

URL : https://hal.archives-ouvertes.fr/inria-00536500

H. Comon, M. Dauchet, R. Gilleron, C. Löding, F. Jacquemard et al., Available on, Tree automata techniques and applications, 2007.

M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005.
DOI : 10.1109/SP.2005.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399

E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer, Behaviorbased Spyware Detection, Proceedings of the 15th USENIX Security Symposium, 2006.

R. Gilleron and S. Tison, Regular Tree Languages and Rewrite Systems, Fundamenta Informaticae, vol.24, pp.157-176, 1995.
URL : https://hal.archives-ouvertes.fr/inria-00538882

H. Garavel, F. Lang, R. Mateescu, and W. Serwe, CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes, Lecture Notes in Computer Science, vol.56, issue.3, pp.372-387, 2011.
DOI : 10.1007/BFb0054166

URL : https://hal.archives-ouvertes.fr/inria-00583776

M. Mohri, Statistical natural language processing, Applied Combinatorics on Words, 2005.