default search action
Tayssir Touili
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c64]Walid Messahel, Tayssir Touili:
Reachability Analysis of Concurrent Self-modifying Code. ICECCS 2024: 257-271 - 2023
- [j15]Tayssir Touili, Xin Ye:
Reachability Analysis of Self Modifying Code. Int. J. Found. Comput. Sci. 34(5): 507-536 (2023) - 2022
- [j14]Tayssir Touili, Xin Ye:
LTL model checking of self modifying code. Formal Methods Syst. Des. 60(2): 195-227 (2022) - [j13]Khanh-Huu-The Dam, Tayssir Touili:
Extracting malicious behaviours. Int. J. Inf. Comput. Secur. 17(3/4): 365-404 (2022) - [c63]Tayssir Touili, Xin Ye:
SMODIC: A Model Checker for Self-modifying Code. ARES 2022: 20:1-20:6 - [c62]Tayssir Touili:
Register Automata for Malware Specification. ARES 2022: 147:1-147:7 - 2021
- [c61]Khanh-Huu-The Dam, Tayssir Touili:
MADLIRA: A Tool for Android Malware Detection. ICISSP 2021: 670-675 - 2020
- [j12]Adrien Pommellet, Tayssir Touili:
LTL model checking for communicating concurrent programs. Innov. Syst. Softw. Eng. 16(2): 161-179 (2020) - [c60]Tayssir Touili, Xin Ye:
CTL Model Checking of Self Modifying Code. ICECCS 2020: 11-20
2010 – 2019
- 2019
- [c59]Khanh-Huu-The Dam, Tayssir Touili:
STAMAD: a STAtic MAlware Detector. ARES 2019: 25:1-25:6 - [c58]Tayssir Touili, Xin Ye:
LTL Model Checking of Self Modifying Code. ICECCS 2019: 1-10 - [c57]Huu-Vu Nguyen, Tayssir Touili:
BCARET Model Checking for Malware Detection. ICTAC 2019: 273-291 - [i8]Adrien Pommellet, Tayssir Touili:
Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-vous. CoRR abs/1907.02834 (2019) - [i7]Tayssir Touili, Xin Ye:
Reachability Analysis of Self Modifying Code. CoRR abs/1909.12626 (2019) - [i6]Tayssir Touili, Xin Ye:
LTL Model Checking of Self Modifying Code. CoRR abs/1909.12635 (2019) - 2018
- [c56]Khanh-Huu-The Dam, Tayssir Touili:
Learning Malware Using Generalized Graph Kernels. ARES 2018: 28:1-28:6 - [c55]Khanh-Huu-The Dam, Tayssir Touili:
Precise Extraction of Malicious Behaviors. COMPSAC (1) 2018: 229-234 - [c54]Huu-Vu Nguyen, Tayssir Touili:
Branching Temporal Logic of Calls and Returns for Pushdown Systems. IFM 2018: 326-345 - [c53]Marcio Diaz, Tayssir Touili:
Model Checking Dynamic Pushdown Networks with Locks and Priorities. NETYS 2018: 240-251 - [c52]Adrien Pommellet, Tayssir Touili:
Model-Checking HyperLTL for Pushdown Systems. SPIN 2018: 133-152 - [c51]Adrien Pommellet, Tayssir Touili:
LTL Model-Checking for Communicating Concurrent Programs. VECoS 2018: 150-165 - [p1]Aarti Gupta, Vineet Kahlon, Shaz Qadeer, Tayssir Touili:
Model Checking Concurrent Programs. Handbook of Model Checking 2018: 573-611 - [i5]Huu-Vu Nguyen, Tayssir Touili:
Branching Temporal Logic of Calls and Returns for Pushdown Systems. CoRR abs/1805.04580 (2018) - [i4]Adrien Pommellet, Marcio Diaz, Tayssir Touili:
Reachability Analysis of Pushdown Systems with an Upper Stack. CoRR abs/1811.02982 (2018) - 2017
- [c50]Khanh-Huu-The Dam, Tayssir Touili:
Learning Android Malware. ARES 2017: 59:1-59:9 - [c49]Adrien Pommellet, Tayssir Touili:
Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-Vous. APLAS 2017: 235-254 - [c48]Marcio Diaz, Tayssir Touili:
Dealing with Priorities and Locks for Concurrent Programs. ATVA 2017: 208-224 - [c47]Tayssir Touili, Xin Ye:
Reachability Analysis of Self Modifying Code. ICECCS 2017: 120-127 - [c46]Khanh-Huu-The Dam, Tayssir Touili:
Malware Detection based on Graph Classification. ICISSP 2017: 455-463 - [c45]Khanh-Huu-The Dam, Tayssir Touili:
Extracting Android Malicious Behaviors. ICISSP 2017: 714-723 - [c44]Adrien Pommellet, Marcio Diaz, Tayssir Touili:
Reachability Analysis of Pushdown Systems with an Upper Stack. LATA 2017: 447-459 - [c43]Huu-Vu Nguyen, Tayssir Touili:
CARET Analysis of Multithreaded Programs. LOPSTR 2017: 73-90 - [c42]Marcio Diaz, Tayssir Touili:
Reachability Analysis of Dynamic Pushdown Networks with Priorities. NETYS 2017: 288-303 - [c41]Huu-Vu Nguyen, Tayssir Touili:
CARET model checking for pushdown systems. SAC 2017: 1393-1400 - [c40]Huu-Vu Nguyen, Tayssir Touili:
CARET model checking for malware detection. SPIN 2017: 152-161 - [i3]Huu-Vu Nguyen, Tayssir Touili:
CARET analysis of multithreaded programs. CoRR abs/1709.09006 (2017) - 2016
- [j11]Fu Song, Tayssir Touili:
Model-checking software library API usage rules. Softw. Syst. Model. 15(4): 961-985 (2016) - [c39]Khanh-Huu-The Dam, Tayssir Touili:
Automatic extraction of malicious behaviors. MALWARE 2016: 47-56 - [i2]Fu Song, Tayssir Touili:
LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks. CoRR abs/1611.02528 (2016) - 2015
- [j10]Fu Song, Tayssir Touili:
Model checking dynamic pushdown networks. Formal Aspects Comput. 27(2): 397-421 (2015) - 2014
- [j9]Fu Song, Tayssir Touili:
Pushdown model checking for malware detection. Int. J. Softw. Tools Technol. Transf. 16(2): 147-173 (2014) - [j8]Fu Song, Tayssir Touili:
Efficient CTL model-checking for pushdown systems. Theor. Comput. Sci. 549: 127-145 (2014) - [c38]Fu Song, Tayssir Touili:
Model-Checking for Android Malware Detection. APLAS 2014: 216-235 - 2013
- [c37]Fu Song, Tayssir Touili:
Model Checking Dynamic Pushdown Networks. APLAS 2013: 33-49 - [c36]Hugo Daniel Macedo, Tayssir Touili:
Mining Malware Specifications through Static Reachability Analysis. ESORICS 2013: 517-535 - [c35]Fu Song, Tayssir Touili:
Model-Checking Software Library API Usage Rules. IFM 2013: 192-207 - [c34]Fu Song, Tayssir Touili:
PoMMaDe: pushdown model-checking for malware detection. ESEC/SIGSOFT FSE 2013: 607-610 - [c33]Fu Song, Tayssir Touili:
LTL Model-Checking for Malware Detection. TACAS 2013: 416-431 - [c32]Tayssir Touili:
Process Rewrite Systems for Software Model Checking. TASE 2013: 15-22 - [i1]Hugo Daniel Macedo, Tayssir Touili:
Mining Malware Specifications through Static Reachability Analysis. CoRR abs/1312.4814 (2013) - 2012
- [j7]Tayssir Touili:
Preface. Formal Methods Syst. Des. 40(2): 121 (2012) - [j6]Tayssir Touili:
Computing transitive closures of hedge transformations. Int. J. Crit. Comput. Based Syst. 3(1/2): 132-150 (2012) - [j5]Ahmed Bouajjani, Tayssir Touili:
Widening techniques for regular tree model checking. Int. J. Softw. Tools Technol. Transf. 14(2): 145-165 (2012) - [c31]Fu Song, Tayssir Touili:
Efficient Malware Detection Using Model-Checking. FM 2012: 418-433 - [c30]Fu Song, Tayssir Touili:
PuMoC: a CTL model-checker for sequential programs. ASE 2012: 346-349 - [c29]Fu Song, Tayssir Touili:
Pushdown Model Checking for Malware Detection. TACAS 2012: 110-125 - 2011
- [j4]Nicholas Kidd, Peter Lammich, Tayssir Touili, Thomas W. Reps:
A decision procedure for detecting atomicity violations for communicating processes with locks. Int. J. Softw. Tools Technol. Transf. 13(1): 37-60 (2011) - [c28]Fu Song, Tayssir Touili:
Efficient CTL Model-Checking for Pushdown Systems. CONCUR 2011: 434-449 - 2010
- [j3]Tayssir Touili, Mohamed Faouzi Atig:
Verifying parallel programs with dynamic communication structures. Theor. Comput. Sci. 411(38-39): 3460-3468 (2010) - [e1]Tayssir Touili, Byron Cook, Paul B. Jackson:
Computer Aided Verification, 22nd International Conference, CAV 2010, Edinburgh, UK, July 15-19, 2010. Proceedings. Lecture Notes in Computer Science 6174, Springer 2010, ISBN 978-3-642-14294-9 [contents]
2000 – 2009
- 2009
- [c27]Tayssir Touili:
Constrained Reachability of Process Rewrite Systems. ICTAC 2009: 307-321 - [c26]Nicholas Kidd, Peter Lammich, Tayssir Touili, Thomas W. Reps:
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks. SPIN 2009: 125-142 - [c25]Mohamed Faouzi Atig, Tayssir Touili:
Verifying Parallel Programs with Dynamic Communication Structures. CIAA 2009: 145-154 - [c24]Mihaela Sighireanu, Tayssir Touili:
Bounded Communication Reachability Analysis of Process Rewrite Systems with Ordered Parallelism. INFINITY 2009: 43-56 - [c23]Narjes Ben Rajeb, Brahim Nasraoui, Riadh Robbana, Tayssir Touili:
Verifying Multithreaded Recursive Programs with Integer Variables. INFINITY 2009: 143-154 - 2008
- [c22]Mohamed Faouzi Atig, Ahmed Bouajjani, Tayssir Touili:
On the Reachability Analysis of Acyclic Networks of Pushdown Systems. CONCUR 2008: 356-371 - [c21]Mohamed Faouzi Atig, Ahmed Bouajjani, Tayssir Touili:
Analyzing Asynchronous Programs with Preemption. FSTTCS 2008: 37-48 - [c20]Akash Lal, Tayssir Touili, Nicholas Kidd, Thomas W. Reps:
Interprocedural Analysis of Concurrent Programs Under a Context Bound. TACAS 2008: 282-298 - [c19]Ahmed Bouajjani, Peter Habermehl, Lukás Holík, Tayssir Touili, Tomás Vojnar:
Antichain-Based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata. CIAA 2008: 57-67 - 2007
- [j2]Ahmed Bouajjani, Anca Muscholl, Tayssir Touili:
Permutation rewriting and algorithmic verification. Inf. Comput. 205(2): 199-224 (2007) - [c18]Eugene Asarin, Thierry Cachat, Alexander V. Seliverstov, Tayssir Touili, Vassily A. Lyubetsky:
Attenuation Regulation as a Term Rewriting System. AB 2007: 81-94 - [c17]Gaël Patin, Mihaela Sighireanu, Tayssir Touili:
Spade: Verification of Multithreaded Dynamic and Recursive Programs. CAV 2007: 254-257 - [c16]Akash Lal, Nicholas Kidd, Thomas W. Reps, Tayssir Touili:
Abstract Error Projection. SAS 2007: 200-217 - 2006
- [c15]Julien d'Orso, Tayssir Touili:
Regular Hedge Model Checking. IFIP TCS 2006: 213-230 - [c14]Sagar Chaki, Edmund M. Clarke, Nicholas Kidd, Thomas W. Reps, Tayssir Touili:
Verifying Concurrent Message-Passing C Programs with Recursive Calls. TACAS 2006: 334-349 - [c13]Ahmed Bouajjani, Jan Strejcek, Tayssir Touili:
On Symbolic Verification of Weakly Extended PAD. EXPRESS 2006: 47-64 - 2005
- [c12]Ahmed Bouajjani, Markus Müller-Olm, Tayssir Touili:
Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems. CONCUR 2005: 473-487 - [c11]Sagar Chaki, Edmund M. Clarke, Orna Grumberg, Joël Ouaknine, Natasha Sharygina, Tayssir Touili, Helmut Veith:
State/Event Software Verification for Branching-Time Specifications. IFM 2005: 53-69 - [c10]Ahmed Bouajjani, Tayssir Touili:
On Computing Reachability Sets of Process Rewrite Systems. RTA 2005: 484-499 - [c9]Tayssir Touili:
Dealing with Communication for Dynamic Multithreaded Recursive Programs. VISSAS 2005: 213-227 - 2004
- [c8]Edmund M. Clarke, Muralidhar Talupur, Tayssir Touili, Helmut Veith:
Verification by Network Decomposition. CONCUR 2004: 276-291 - [c7]Ahmed Bouajjani, Javier Esparza, Tayssir Touili:
Reachability Analysis of Synchronized PA Systems. INFINITY 2004: 153-178 - 2003
- [b1]Tayssir Touili:
Analyse symbolique de systèmes infinis basée sur les automates: Application à la vérification de systèmes paramétrés et dynamiques. Paris Diderot University, France, 2003 - [j1]Ahmed Bouajjani, Javier Esparza, Tayssir Touili:
A Generic Approach to the Static Analysis of Concurrent Programs with Procedures. Int. J. Found. Comput. Sci. 14(4): 551- (2003) - [c6]Ahmed Bouajjani, Tayssir Touili:
Reachability Analysis of Process Rewrite Systems. FSTTCS 2003: 74-87 - [c5]Ahmed Bouajjani, Javier Esparza, Tayssir Touili:
A generic approach to the static analysis of concurrent programs with procedures. POPL 2003: 62-73 - 2002
- [c4]Ahmed Bouajjani, Tayssir Touili:
Extrapolating Tree Transformations. CAV 2002: 539-554 - 2001
- [c3]Ahmed Bouajjani, Anca Muscholl, Tayssir Touili:
Permutation Rewriting and Algorithmic Verification. LICS 2001: 399-408 - [c2]Tayssir Touili:
Regular Model Checking using Widening Techniques. VEPAS 2001: 342-356 - 2000
- [c1]Ahmed Bouajjani, Bengt Jonsson, Marcus Nilsson, Tayssir Touili:
Regular Model Checking. CAV 2000: 403-418
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint