Regular model checking A Bouajjani, B Jonsson, M Nilsson, T Touili Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000 | 378 | 2000 |
A generic approach to the static analysis of concurrent programs with procedures A Bouajjani, J Esparza, T Touili ACM SIGPLAN Notices 38 (1), 62-73, 2003 | 196 | 2003 |
Regular symbolic analysis of dynamic networks of pushdown systems A Bouajjani, M Müller-Olm, T Touili CONCUR 2005–Concurrency Theory: 16th International Conference, CONCUR 2005 …, 2005 | 149 | 2005 |
Interprocedural analysis of concurrent programs under a context bound A Lal, T Touili, N Kidd, T Reps Tools and Algorithms for the Construction and Analysis of Systems: 14th …, 2008 | 106 | 2008 |
Verification by network decomposition E Clarke, M Talupur, T Touili, H Veith CONCUR 2004-Concurrency Theory: 15th International Conference, London, UK …, 2004 | 93 | 2004 |
Verifying concurrent message-passing C programs with recursive calls S Chaki, E Clarke, N Kidd, T Reps, T Touili Tools and Algorithms for the Construction and Analysis of Systems: 12th …, 2006 | 88 | 2006 |
Pushdown model checking for malware detection F Song, T Touili International Journal on Software Tools for Technology Transfer 16 (2), 147-173, 2014 | 86 | 2014 |
Efficient malware detection using model-checking F Song, T Touili FM 2012: Formal Methods: 18th International Symposium, Paris, France, August …, 2012 | 85 | 2012 |
Regular model checking using widening techniques T Touili Electronic Notes in Theoretical Computer Science 50 (4), 342-356, 2001 | 81 | 2001 |
Extrapolating tree transformations A Bouajjani, T Touili CAV 2, 539-554, 2002 | 76 | 2002 |
Antichain-based universality and inclusion testing over nondeterministic finite tree automata A Bouajjani, P Habermehl, L Holík, T Touili, T Vojnar Implementation and Applications of Automata: 13th International Conference …, 2008 | 59 | 2008 |
Reachability analysis of process rewrite systems A Bouajjani, T Touili FST TCS 2003: Foundations of Software Technology and Theoretical Computer …, 2003 | 55 | 2003 |
On the reachability analysis of acyclic networks of pushdown systems MF Atig, A Bouajjani, T Touili CONCUR 2008-Concurrency Theory: 19th International Conference, CONCUR 2008 …, 2008 | 53 | 2008 |
On computing reachability sets of process rewrite systems A Bouajjani, T Touili RTA 3467, 484-499, 2005 | 53 | 2005 |
Mining malware specifications through static reachability analysis HD Macedo, T Touili Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 39 | 2013 |
State/event software verification for branching-time specifications S Chaki, E Clarke, O Grumberg, J Ouaknine, N Sharygina, T Touili, ... Integrated Formal Methods: 5th International Conference, IFM 2005, Eindhoven …, 2005 | 39 | 2005 |
Model-checking for android malware detection F Song, T Touili Programming Languages and Systems: 12th Asian Symposium, APLAS 2014 …, 2014 | 38 | 2014 |
Efficient CTL model-checking for pushdown systems F Song, T Touili Theoretical Computer Science 549, 127-145, 2014 | 37 | 2014 |
PoMMaDe: pushdown model-checking for malware detection F Song, T Touili Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 36 | 2013 |
LTL model-checking for malware detection F Song, T Touili Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013 | 35 | 2013 |