Regular model checking A Bouajjani, B Jonsson, M Nilsson, T Touili International Conference on Computer Aided Verification, 403-418, 2000 | 375 | 2000 |
A generic approach to the static analysis of concurrent programs with procedures A Bouajjani, J Esparza, T Touili International Journal of Foundations of Computer Science 14 (04), 551-582, 2003 | 200 | 2003 |
Regular symbolic analysis of dynamic networks of pushdown systems A Bouajjani, M Müller-Olm, T Touili International Conference on Concurrency Theory, 473-487, 2005 | 148 | 2005 |
Interprocedural analysis of concurrent programs under a context bound A Lal, T Touili, N Kidd, T Reps International conference on Tools and algorithms for the construction and …, 2008 | 108 | 2008 |
Verification by network decomposition E Clarke, M Talupur, T Touili, H Veith International Conference on Concurrency Theory, 276-291, 2004 | 94 | 2004 |
Verifying concurrent message-passing C programs with recursive calls S Chaki, E Clarke, N Kidd, T Reps, T Touili International Conference on Tools and Algorithms for the Construction and …, 2006 | 90 | 2006 |
Pushdown model checking for malware detection F Song, T Touili International Journal on Software Tools for Technology Transfer 16 (2), 147-173, 2014 | 84 | 2014 |
Regular model checking using widening techniques T Touili Electronic Notes in Theoretical Computer Science 50 (4), 342-356, 2001 | 81 | 2001 |
Efficient malware detection using model-checking F Song, T Touili International Symposium on Formal Methods, 418-433, 2012 | 80 | 2012 |
Extrapolating tree transformations A Bouajjani, T Touili International Conference on Computer Aided Verification, 539-554, 2002 | 76 | 2002 |
Antichain-based universality and inclusion testing over nondeterministic finite tree automata A Bouajjani, P Habermehl, L Holík, T Touili, T Vojnar International Conference on Implementation and Application of Automata, 57-67, 2008 | 57 | 2008 |
Reachability analysis of process rewrite systems A Bouajjani, T Touili International Conference on Foundations of Software Technology and …, 2003 | 54 | 2003 |
On computing reachability sets of process rewrite systems A Bouajjani, T Touili International Conference on Rewriting Techniques and Applications, 484-499, 2005 | 53 | 2005 |
On the reachability analysis of acyclic networks of pushdown systems MF Atig, A Bouajjani, T Touili International Conference on Concurrency Theory, 356-371, 2008 | 52 | 2008 |
State/event software verification for branching-time specifications S Chaki, E Clarke, O Grumberg, J Ouaknine, N Sharygina, T Touili, ... International Conference on Integrated Formal Methods, 53-69, 2005 | 40 | 2005 |
Model-checking for android malware detection F Song, T Touili Asian Symposium on Programming Languages and Systems, 216-235, 2014 | 37 | 2014 |
Mining malware specifications through static reachability analysis HD Macedo, T Touili European Symposium on Research in Computer Security, 517-535, 2013 | 36 | 2013 |
Efficient CTL model-checking for pushdown systems F Song, T Touili Theoretical Computer Science 549, 127-145, 2014 | 34 | 2014 |
PoMMaDe: pushdown model-checking for malware detection F Song, T Touili Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 34 | 2013 |
LTL model-checking for malware detection F Song, T Touili International Conference on Tools and Algorithms for the Construction and …, 2013 | 33 | 2013 |