Tayssir Touili

Orcid: 0000-0002-1134-2220

According to our database1, Tayssir Touili authored at least 74 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Reachability Analysis of Upper-Stack Manipulating Binary Code.
Proceedings of the Software Engineering and Formal Methods - 23rd International Conference, 2025

Analyzing a Concurrent Self-Modifying Program: Application to Malware Detection.
Proceedings of the 11th International Conference on Information Systems Security and Privacy, 2025

LTL Model Checking of Concurrent Self Modifying Code.
Proceedings of the Engineering of Complex Computer Systems - 29th International Conference, 2025

2024
Reachability Analysis of Concurrent Self-modifying Code.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

2022
Extracting malicious behaviours.
Int. J. Inf. Comput. Secur., 2022

Register Automata for Malware Specification.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

SMODIC: A Model Checker for Self-modifying Code.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
MADLIRA: A Tool for Android Malware Detection.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
CTL Model Checking of Self Modifying Code.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

2019
BCARET Model Checking for Malware Detection.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31, 2019

LTL Model Checking of Self Modifying Code.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

STAMAD: a STAtic MAlware Detector.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Model Checking Concurrent Programs.
Proceedings of the Handbook of Model Checking., 2018

LTL Model-Checking for Communicating Concurrent Programs.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2018

Model-Checking HyperLTL for Pushdown Systems.
Proceedings of the Model Checking Software - 25th International Symposium, 2018

Model Checking Dynamic Pushdown Networks with Locks and Priorities.
Proceedings of the Networked Systems - 6th International Conference, 2018

Branching Temporal Logic of Calls and Returns for Pushdown Systems.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

Precise Extraction of Malicious Behaviors.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Learning Malware Using Generalized Graph Kernels.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
CARET model checking for malware detection.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

CARET model checking for pushdown systems.
Proceedings of the Symposium on Applied Computing, 2017

Reachability Analysis of Dynamic Pushdown Networks with Priorities.
Proceedings of the Networked Systems - 5th International Conference, 2017

CARET Analysis of Multithreaded Programs.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017

Reachability Analysis of Pushdown Systems with an Upper Stack.
Proceedings of the Language and Automata Theory and Applications, 2017

Extracting Android Malicious Behaviors.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Malware Detection based on Graph Classification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Reachability Analysis of Self Modifying Code.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

Dealing with Priorities and Locks for Concurrent Programs.
Proceedings of the Automated Technology for Verification and Analysis, 2017

Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-Vous.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

Learning Android Malware.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks.
CoRR, 2016

Automatic extraction of malicious behaviors.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2014
Model-Checking for Android Malware Detection.
Proceedings of the Programming Languages and Systems - 12th Asian Symposium, 2014

2013
Process Rewrite Systems for Software Model Checking.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

LTL Model-Checking for Malware Detection.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

PoMMaDe: pushdown model-checking for malware detection.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Model-Checking Software Library API Usage Rules.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Mining Malware Specifications through Static Reachability Analysis.
Proceedings of the Computer Security - ESORICS 2013, 2013

Model Checking Dynamic Pushdown Networks.
Proceedings of the Programming Languages and Systems - 11th Asian Symposium, 2013

2012
Widening techniques for regular tree model checking.
Int. J. Softw. Tools Technol. Transf., 2012

Computing transitive closures of hedge transformations.
Int. J. Crit. Comput. Based Syst., 2012

Preface.
Formal Methods Syst. Des., 2012

Pushdown Model Checking for Malware Detection.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

PuMoC: a CTL model-checker for sequential programs.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Efficient Malware Detection Using Model-Checking.
Proceedings of the FM 2012: Formal Methods, 2012

2011
Efficient CTL Model-Checking for Pushdown Systems.
Proceedings of the CONCUR 2011 - Concurrency Theory - 22nd International Conference, 2011

2009
Bounded Communication Reachability Analysis of Process Rewrite Systems with Ordered Parallelism.
Proceedings of the Joint Proceedings of the 8th, 2009

Verifying Multithreaded Recursive Programs with Integer Variables.
Proceedings of the Joint Proceedings of the 8th, 2009

Verifying Parallel Programs with Dynamic Communication Structures.
Proceedings of the Implementation and Application of Automata, 2009

A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks.
Proceedings of the Model Checking Software, 2009

Constrained Reachability of Process Rewrite Systems.
Proceedings of the Theoretical Aspects of Computing, 2009

2008
Antichain-Based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata.
Proceedings of the Implementation and Applications of Automata, 2008

Interprocedural Analysis of Concurrent Programs Under a Context Bound.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

Analyzing Asynchronous Programs with Preemption.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008

On the Reachability Analysis of Acyclic Networks of Pushdown Systems.
Proceedings of the CONCUR 2008 - Concurrency Theory, 19th International Conference, 2008

2007
Abstract Error Projection.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Spade: Verification of Multithreaded Dynamic and Recursive Programs.
Proceedings of the Computer Aided Verification, 19th International Conference, 2007

Attenuation Regulation as a Term Rewriting System.
Proceedings of the Algebraic Biology, Second International Conference, 2007

2006
On Symbolic Verification of Weakly Extended PAD.
Proceedings of the 13th International Workshop on Expressiveness in Concurrency, 2006

Verifying Concurrent Message-Passing C Programs with Recursive Calls.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Regular Hedge Model Checking.
Proceedings of the Fourth IFIP International Conference on Theoretical Computer Science (TCS 2006), 2006

2005
Dealing with Communication for Dynamic Multithreaded Recursive Programs.
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005

On Computing Reachability Sets of Process Rewrite Systems.
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005

State/Event Software Verification for Branching-Time Specifications.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems.
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005

2004
Reachability Analysis of Synchronized PA Systems.
Proceedings of the 6th International Workshop on Verification of Infinite-State Systems, 2004

Verification by Network Decomposition.
Proceedings of the CONCUR 2004 - Concurrency Theory, 15th International Conference, London, UK, August 31, 2004

2003
Analyse symbolique de systèmes infinis basée sur les automates: Application à la vérification de systèmes paramétrés et dynamiques.
PhD thesis, 2003

A generic approach to the static analysis of concurrent programs with procedures.
Proceedings of the Conference Record of POPL 2003: The 30th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2003

Reachability Analysis of Process Rewrite Systems.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003

2002
Extrapolating Tree Transformations.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Regular Model Checking using Widening Techniques.
Proceedings of the Verification of Parameterized Systems, 2001

Permutation Rewriting and Algorithmic Verification.
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001

2000
Regular Model Checking.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000


  Loading...