Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987. ,
DOI : 10.1016/0167-4048(87)90122-2
Dynamic detection and classification of computer viruses using general behaviour patterns, International Virus Bulletin Conference, pp.1-22, 1995. ,
A fast automatonbased method for detecting anomalous program behaviors, IEEE Symposium on Security and Privacy, pp.144-155, 2001. ,
Characterization of virus replication, Journal in Computer Virology, vol.9, issue.1, pp.221-234, 2007. ,
DOI : 10.1007/s11416-007-0077-6
Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001. ,
Detecting Malicious Code by Model Checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.174-187, 2005. ,
DOI : 10.1007/11506881_11
Static verification of worm and virus behavior in binary executables using model checking, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., pp.298-300, 2003. ,
DOI : 10.1109/SMCSIA.2003.1232440
A Layered Architecture for Detecting Malicious Behaviors, International symposium on Recent Advances in Intrusion Detection, pp.78-97, 2008. ,
DOI : 10.1007/978-3-540-87403-4_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.6745
Scalable, Behavior-Based Malware Clustering, 16th Symposium on Network and Distributed System Security (NDSS), 2009. ,
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, ser. RAID '09, pp.81-100, 2009. ,
DOI : 10.1007/978-3-642-04342-0_5
Native Client, Communications of the ACM, vol.53, issue.1, pp.91-99, 2010. ,
DOI : 10.1145/1629175.1629203
A semanticsbased approach to malware detection, Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.377-388, 2007. ,
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries, Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation, pp.214-228, 2009. ,
DOI : 10.1007/978-3-540-93900-9_19
BitScope: Automatically dissecting malicious binaries, School of Computer Science, 2007. ,
Temporal Logic and State Systems, ser. Texts in Theoretical Computer Science. An EATCS Series, 2008. ,
The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, 2003. ,
DOI : 10.1109/32.588521
CADP??2006: A Toolbox for the Construction and Analysis of Distributed Processes, Computer Aided Verification (CAV'2007), ser, pp.158-163, 2007. ,
DOI : 10.1007/978-3-540-73368-3_18
URL : https://hal.archives-ouvertes.fr/inria-00189021
MOP: An Efficient and Generic Runtime Verification Framework, Object-Oriented Programming, Systems, Languages and ApplicationsObject-Oriented Programming, Systems, Languages and Applications, pp.569-588, 2007. ,
Behavior Abstraction in Malware Analysis, 1st International Conference on Runtime Verification, pp.168-182, 2010. ,
DOI : 10.1007/978-3-642-16612-9_14
URL : https://hal.archives-ouvertes.fr/inria-00536500
Available on, Tree automata techniques and applications, 2007. ,
Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005. ,
DOI : 10.1109/SP.2005.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399
Behaviorbased Spyware Detection, Proceedings of the 15th USENIX Security Symposium, 2006. ,
Regular Tree Languages and Rewrite Systems, Fundamenta Informaticae, vol.24, pp.157-176, 1995. ,
URL : https://hal.archives-ouvertes.fr/inria-00538882
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes, Lecture Notes in Computer Science, vol.56, issue.3, pp.372-387, 2011. ,
DOI : 10.1007/BFb0054166
URL : https://hal.archives-ouvertes.fr/inria-00583776
Statistical natural language processing, Applied Combinatorics on Words, 2005. ,