On the Reachability Analysis of Acyclic Networks of Pushdown Systems

Mohamed Faouzi Atig , Ahmed Bouajjani , Tayssir Touili
international conference on concurrency theory 356 -371

44
2008
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks

Nicholas Kidd , Peter Lammich , Tayssir Touili , Thomas Reps
international workshop on model checking software 125 -142

11
2009
Interprocedural analysis of concurrent programs under a context bound

Akash Lal , Tayssir Touili , Nicholas Kidd , Thomas Reps
tools and algorithms for construction and analysis of systems 282 -298

87
2008
Model-Checking for Android Malware Detection

Fu Song , Tayssir Touili
asian symposium on programming languages and systems 216 -235

21
2014
Pushdown model checking for malware detection

Fu Song , Tayssir Touili
International Journal on Software Tools for Technology Transfer 16 ( 2) 147 -173

16
2014
Widening techniques for regular tree model checking

Ahmed Bouajjani , Tayssir Touili
International Journal on Software Tools for Technology Transfer 14 ( 2) 145 -165

8
2012
CARET model checking for pushdown systems

Huu-Vu Nguyen , Tayssir Touili
symposium on applied computing 1393 -1400

7
2017
Reachability analysis of Process Rewrite Systems

Ahmed Bouajjani , Tayssir Touili
foundations of software technology and theoretical computer science 74 -87

39
2003
Reachability Analysis of Pushdown Systems with an Upper Stack

Adrien Pommellet , Marcio Diaz , Tayssir Touili
Language and Automata Theory and Applications 447 -459

2017
Process Rewrite Systems for Software Model Checking

Tayssir Touili
theoretical aspects of software engineering 15 -22

2013
Regular Hedge Model Checking

Julien ďOrso , Tayssir Touili
ifip world computer congress wcc 213 -230

9
2006
Extracting Android Malicious Behaviors.

Khanh-Huu-The Dam , Tayssir Touili
formal methods in security engineering 714 -723

2017
Dealing with Priorities and Locks for Concurrent Programs

Marcio Diaz , Tayssir Touili
Automated Technology for Verification and Analysis 208 -224

1
2017
Constrained Reachability of Process Rewrite Systems

Tayssir Touili
international colloquium on theoretical aspects of computing 5684 307 -321

1
2009
Permutation rewriting and algorithmic verification

Ahmed Bouajjani , Anca Muscholl , Tayssir Touili
Information & Computation 205 ( 2) 199 -224

23
2007
Model-checking software library API usage rules

Fu Song , Tayssir Touili
Software and Systems Modeling 15 ( 4) 961 -985

1
2016
State/Event software verification for branching-time specifications

Sagar Chaki , Edmund Clarke , Orna Grumberg , Joël Ouaknine
integrated formal methods 53 -69

22
2005
STAMAD: a STAtic MAlware Detector

Khanh Huu The Dam , Tayssir Touili
availability, reliability and security

2
2019
On Computing Reachability Sets of Process Rewrite Systems

Ahmed Bouajjani , Tayssir Touili
Lecture Notes in Computer Science 484 -499

43
2005
Automatic extraction of malicious behaviors

Khanh-Huu-The Dam , Tayssir Touili
international conference on malicious and unwanted software 1 -10

5
2016