Tayssir Touili

According to our database1, Tayssir Touili authored at least 70 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reachability Analysis of Self Modifying Code.
Int. J. Found. Comput. Sci., August, 2023

2022
LTL model checking of self modifying code.
Formal Methods Syst. Des., April, 2022

Extracting malicious behaviours.
Int. J. Inf. Comput. Secur., 2022

Register Automata for Malware Specification.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

SMODIC: A Model Checker for Self-modifying Code.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
MADLIRA: A Tool for Android Malware Detection.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
LTL model checking for communicating concurrent programs.
Innov. Syst. Softw. Eng., 2020

CTL Model Checking of Self Modifying Code.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

2019
BCARET Model Checking for Malware Detection.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31, 2019

STAMAD: a STAtic MAlware Detector.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Model Checking Concurrent Programs.
Proceedings of the Handbook of Model Checking., 2018

Model-Checking HyperLTL for Pushdown Systems.
Proceedings of the Model Checking Software - 25th International Symposium, 2018

Model Checking Dynamic Pushdown Networks with Locks and Priorities.
Proceedings of the Networked Systems - 6th International Conference, 2018

Branching Temporal Logic of Calls and Returns for Pushdown Systems.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

Precise Extraction of Malicious Behaviors.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Learning Malware Using Generalized Graph Kernels.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
CARET model checking for malware detection.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

CARET model checking for pushdown systems.
Proceedings of the Symposium on Applied Computing, 2017

Reachability Analysis of Dynamic Pushdown Networks with Priorities.
Proceedings of the Networked Systems - 5th International Conference, 2017

CARET Analysis of Multithreaded Programs.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017

Reachability Analysis of Pushdown Systems with an Upper Stack.
Proceedings of the Language and Automata Theory and Applications, 2017

Extracting Android Malicious Behaviors.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Malware Detection based on Graph Classification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Dealing with Priorities and Locks for Concurrent Programs.
Proceedings of the Automated Technology for Verification and Analysis, 2017

Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-Vous.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

Learning Android Malware.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Model-checking software library API usage rules.
Softw. Syst. Model., 2016

LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks.
CoRR, 2016

Automatic extraction of malicious behaviors.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Model checking dynamic pushdown networks.
Formal Aspects Comput., 2015

2014
Efficient CTL model-checking for pushdown systems.
Theor. Comput. Sci., 2014

Pushdown model checking for malware detection.
Int. J. Softw. Tools Technol. Transf., 2014

Model-Checking for Android Malware Detection.
Proceedings of the Programming Languages and Systems - 12th Asian Symposium, 2014

2013
Process Rewrite Systems for Software Model Checking.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

LTL Model-Checking for Malware Detection.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

PoMMaDe: pushdown model-checking for malware detection.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Mining Malware Specifications through Static Reachability Analysis.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Widening techniques for regular tree model checking.
Int. J. Softw. Tools Technol. Transf., 2012

Computing transitive closures of hedge transformations.
Int. J. Crit. Comput. Based Syst., 2012

Preface.
Formal Methods Syst. Des., 2012

PuMoC: a CTL model-checker for sequential programs.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Efficient Malware Detection Using Model-Checking.
Proceedings of the FM 2012: Formal Methods, 2012

2011
A decision procedure for detecting atomicity violations for communicating processes with locks.
Int. J. Softw. Tools Technol. Transf., 2011

2010
Verifying parallel programs with dynamic communication structures.
Theor. Comput. Sci., 2010

2009
Bounded Communication Reachability Analysis of Process Rewrite Systems with Ordered Parallelism.
Proceedings of the Joint Proceedings of the 8th, 2009

Verifying Multithreaded Recursive Programs with Integer Variables.
Proceedings of the Joint Proceedings of the 8th, 2009

Constrained Reachability of Process Rewrite Systems.
Proceedings of the Theoretical Aspects of Computing, 2009

2008
Antichain-Based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata.
Proceedings of the Implementation and Applications of Automata, 2008

Interprocedural Analysis of Concurrent Programs Under a Context Bound.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

Analyzing Asynchronous Programs with Preemption.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008

On the Reachability Analysis of Acyclic Networks of Pushdown Systems.
Proceedings of the CONCUR 2008 - Concurrency Theory, 19th International Conference, 2008

2007
Permutation rewriting and algorithmic verification.
Inf. Comput., 2007

Abstract Error Projection.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Spade: Verification of Multithreaded Dynamic and Recursive Programs.
Proceedings of the Computer Aided Verification, 19th International Conference, 2007

Attenuation Regulation as a Term Rewriting System.
Proceedings of the Algebraic Biology, Second International Conference, 2007

2006
On Symbolic Verification of Weakly Extended PAD.
Proceedings of the 13th International Workshop on Expressiveness in Concurrency, 2006

Verifying Concurrent Message-Passing C Programs with Recursive Calls.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Regular Hedge Model Checking.
Proceedings of the Fourth IFIP International Conference on Theoretical Computer Science (TCS 2006), 2006

2005
Dealing with Communication for Dynamic Multithreaded Recursive Programs.
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005

On Computing Reachability Sets of Process Rewrite Systems.
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005

State/Event Software Verification for Branching-Time Specifications.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems.
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005

2004
Reachability Analysis of Synchronized PA Systems.
Proceedings of the 6th International Workshop on Verification of Infinite-State Systems, 2004

Verification by Network Decomposition.
Proceedings of the CONCUR 2004 - Concurrency Theory, 15th International Conference, London, UK, August 31, 2004

2003
Analyse symbolique de systèmes infinis basée sur les automates: Application à la vérification de systèmes paramétrés et dynamiques.
PhD thesis, 2003

A Generic Approach to the Static Analysis of Concurrent Programs with Procedures.
Int. J. Found. Comput. Sci., 2003

Reachability Analysis of Process Rewrite Systems.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003

2002
Extrapolating Tree Transformations.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Regular Model Checking using Widening Techniques.
Proceedings of the Verification of Parameterized Systems, 2001

2000
Regular Model Checking.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000


  Loading...