Regular model checking A Bouajjani, B Jonsson, M Nilsson, T Touili Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000 | 401 | 2000 |
A generic approach to the static analysis of concurrent programs with procedures A Bouajjani, J Esparza, T Touili ACM SIGPLAN Notices 38 (1), 62-73, 2003 | 203 | 2003 |
Regular symbolic analysis of dynamic networks of pushdown systems A Bouajjani, M Müller-Olm, T Touili CONCUR 2005–Concurrency Theory: 16th International Conference, CONCUR 2005 …, 2005 | 150 | 2005 |
Interprocedural analysis of concurrent programs under a context bound A Lal, T Touili, N Kidd, T Reps International conference on Tools and algorithms for the construction and …, 2008 | 110 | 2008 |
Verification by network decomposition E Clarke, M Talupur, T Touili, H Veith CONCUR 2004-Concurrency Theory: 15th International Conference, London, UK …, 2004 | 99 | 2004 |
Pushdown model checking for malware detection F Song, T Touili International Journal on Software Tools for Technology Transfer 16 (2), 147-173, 2014 | 94 | 2014 |
Efficient malware detection using model-checking F Song, T Touili International Symposium on Formal Methods, 418-433, 2012 | 90 | 2012 |
Verifying concurrent message-passing C programs with recursive calls S Chaki, E Clarke, N Kidd, T Reps, T Touili Tools and Algorithms for the Construction and Analysis of Systems: 12th …, 2006 | 89 | 2006 |
Regular model checking using widening techniques T Touili Electronic Notes in Theoretical Computer Science 50 (4), 342-356, 2001 | 83 | 2001 |
Extrapolating tree transformations A Bouajjani, T Touili Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002 | 79 | 2002 |
Antichain-based universality and inclusion testing over nondeterministic finite tree automata A Bouajjani, P Habermehl, L Holík, T Touili, T Vojnar International Conference on Implementation and Application of Automata, 57-67, 2008 | 68 | 2008 |
Reachability analysis of process rewrite systems A Bouajjani, T Touili International Conference on Foundations of Software Technology and …, 2003 | 55 | 2003 |
On computing reachability sets of process rewrite systems A Bouajjani, T Touili International Conference on Rewriting Techniques and Applications, 484-499, 2005 | 54 | 2005 |
On the reachability analysis of acyclic networks of pushdown systems MF Atig, A Bouajjani, T Touili International Conference on Concurrency Theory, 356-371, 2008 | 53 | 2008 |
Model-checking for android malware detection F Song, T Touili Asian Symposium on Programming Languages and Systems, 216-235, 2014 | 42 | 2014 |
PoMMaDe: pushdown model-checking for malware detection F Song, T Touili Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 41 | 2013 |
Mining malware specifications through static reachability analysis HD Macedo, T Touili Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 41 | 2013 |
State/event software verification for branching-time specifications S Chaki, E Clarke, O Grumberg, J Ouaknine, N Sharygina, T Touili, ... International Conference on Integrated Formal Methods, 53-69, 2005 | 41 | 2005 |
Efficient CTL model-checking for pushdown systems F Song, T Touili Theoretical Computer Science 549, 127-145, 2014 | 38 | 2014 |
LTL model-checking for malware detection F Song, T Touili Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013 | 38 | 2013 |