Behavior Analysis of Malware by Rewriting-based Abstraction - Extended Version
Texte intégral
Documents relatifs
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of
In its original version [2], and consistently with the definition of structural balance given earlier in Section 1, it consists in finding a partition of the set of vertices V
In this work, we adapt the Tree Automata Completion algorithm to approximate accurately the set of terms reachable by rewriting under the innermost strategy.. We formally prove that
We implemented the presented techniques in a tool which is able to capture execution traces of a given program, to build its trace automaton, to abstract it with respect to a set
open-source analysis toolkit for Java programs. It operates either on Java source code or byte- code. It allows developers to analyze and transform programs. For instance,
Keywords: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language..
Class2Table synchronously creates a class in a class diagram with its corresponding table in the relational database. Accordingly, subclasses are connected to the tables of its
Unit´e de recherche INRIA Rennes, Irisa, Campus universitaire de Beaulieu, 35042 RENNES Cedex Unit´e de recherche INRIA Rhˆone-Alpes, 655, avenue de l’Europe, 38330 MONTBONNOT ST