Tayssir Touili

According to our database1, Tayssir Touili authored at least 72 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Model Checking Concurrent Programs.
Proceedings of the Handbook of Model Checking., 2018

Branching Temporal Logic of Calls and Returns for Pushdown Systems.
CoRR, 2018

LTL Model-Checking for Communicating Concurrent Programs.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2018

Model-Checking HyperLTL for Pushdown Systems.
Proceedings of the Model Checking Software - 25th International Symposium, 2018

Branching Temporal Logic of Calls and Returns for Pushdown Systems.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

Precise Extraction of Malicious Behaviors.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Learning Malware Using Generalized Graph Kernels.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
CARET analysis of multithreaded programs.
CoRR, 2017

CARET model checking for malware detection.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

CARET model checking for pushdown systems.
Proceedings of the Symposium on Applied Computing, 2017

Reachability Analysis of Dynamic Pushdown Networks with Priorities.
Proceedings of the Networked Systems - 5th International Conference, 2017

CARET Analysis of Multithreaded Programs.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2017

Reachability Analysis of Pushdown Systems with an Upper Stack.
Proceedings of the Language and Automata Theory and Applications, 2017

Extracting Android Malicious Behaviors.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Malware Detection based on Graph Classification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Reachability Analysis of Self Modifying Code.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

Dealing with Priorities and Locks for Concurrent Programs.
Proceedings of the Automated Technology for Verification and Analysis, 2017

Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-Vous.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

Learning Android Malware.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Model-checking software library API usage rules.
Software and System Modeling, 2016

LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks.
CoRR, 2016

Automatic extraction of malicious behaviors.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Model checking dynamic pushdown networks.
Formal Asp. Comput., 2015

2014
Efficient CTL model-checking for pushdown systems.
Theor. Comput. Sci., 2014

Pushdown model checking for malware detection.
STTT, 2014

Model-Checking for Android Malware Detection.
Proceedings of the Programming Languages and Systems - 12th Asian Symposium, 2014

2013
Mining Malware Specifications through Static Reachability Analysis.
CoRR, 2013

Process Rewrite Systems for Software Model Checking.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

LTL Model-Checking for Malware Detection.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

PoMMaDe: pushdown model-checking for malware detection.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Model-Checking Software Library API Usage Rules.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Mining Malware Specifications through Static Reachability Analysis.
Proceedings of the Computer Security - ESORICS 2013, 2013

Model Checking Dynamic Pushdown Networks.
Proceedings of the Programming Languages and Systems - 11th Asian Symposium, 2013

2012
Widening techniques for regular tree model checking.
STTT, 2012

Computing transitive closures of hedge transformations.
IJCCBS, 2012

Preface.
Formal Methods in System Design, 2012

Pushdown Model Checking for Malware Detection.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

PuMoC: a CTL model-checker for sequential programs.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Efficient Malware Detection Using Model-Checking.
Proceedings of the FM 2012: Formal Methods, 2012

2011
A decision procedure for detecting atomicity violations for communicating processes with locks.
STTT, 2011

Efficient CTL Model-Checking for Pushdown Systems.
Proceedings of the CONCUR 2011 - Concurrency Theory - 22nd International Conference, 2011

2010
Verifying parallel programs with dynamic communication structures.
Theor. Comput. Sci., 2010

2009
Bounded Communication Reachability Analysis of Process Rewrite Systems with Ordered Parallelism.
Electr. Notes Theor. Comput. Sci., 2009

Verifying Multithreaded Recursive Programs with Integer Variables.
Electr. Notes Theor. Comput. Sci., 2009

Verifying Parallel Programs with Dynamic Communication Structures.
Proceedings of the Implementation and Application of Automata, 2009

A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks.
Proceedings of the Model Checking Software, 2009

Constrained Reachability of Process Rewrite Systems.
Proceedings of the Theoretical Aspects of Computing, 2009

2008
Antichain-Based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata.
Proceedings of the Implementation and Applications of Automata, 2008

Interprocedural Analysis of Concurrent Programs Under a Context Bound.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

Analyzing Asynchronous Programs with Preemption.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008

On the Reachability Analysis of Acyclic Networks of Pushdown Systems.
Proceedings of the CONCUR 2008 - Concurrency Theory, 19th International Conference, 2008

2007
Permutation rewriting and algorithmic verification.
Inf. Comput., 2007

On Symbolic Verification of Weakly Extended PAD.
Electr. Notes Theor. Comput. Sci., 2007

Abstract Error Projection.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Spade: Verification of Multithreaded Dynamic and Recursive Programs.
Proceedings of the Computer Aided Verification, 19th International Conference, 2007

Attenuation Regulation as a Term Rewriting System.
Proceedings of the Algebraic Biology, Second International Conference, 2007

2006
Verifying Concurrent Message-Passing C Programs with Recursive Calls.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Regular Hedge Model Checking.
Proceedings of the Fourth IFIP International Conference on Theoretical Computer Science (TCS 2006), 2006

2005
Reachability Analysis of Synchronized PA Systems.
Electr. Notes Theor. Comput. Sci., 2005

Dealing with Communication for Dynamic Multithreaded Recursive Programs.
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005

On Computing Reachability Sets of Process Rewrite Systems.
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005

State/Event Software Verification for Branching-Time Specifications.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems.
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005

2004
Verification by Network Decomposition.
Proceedings of the CONCUR 2004 - Concurrency Theory, 15th International Conference, London, UK, August 31, 2004

2003
Analyse symbolique de systèmes infinis basée sur les automates: Application à la vérification de systèmes paramétrés et dynamiques.
PhD thesis, 2003

A Generic Approach to the Static Analysis of Concurrent Programs with Procedures.
Int. J. Found. Comput. Sci., 2003

A generic approach to the static analysis of concurrent programs with procedures.
Proceedings of the Conference Record of POPL 2003: The 30th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2003

Reachability Analysis of Process Rewrite Systems.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003

2002
Extrapolating Tree Transformations.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Regular Model Checking using Widening Techniques.
Electr. Notes Theor. Comput. Sci., 2001

Permutation Rewriting and Algorithmic Verification.
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001

2000
Regular Model Checking.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000


  Loading...