• Aucun résultat trouvé

Behavior Analysis of Malware by Rewriting-based Abstraction - Extended Version

N/A
N/A
Protected

Academic year: 2021

Partager "Behavior Analysis of Malware by Rewriting-based Abstraction - Extended Version"

Copied!
15
0
0

Texte intégral

Loading

Références

Documents relatifs

open-source analysis toolkit for Java programs. It operates either on Java source code or byte- code. It allows developers to analyze and transform programs. For instance,

Keywords: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language..

Class2Table synchronously creates a class in a class diagram with its corresponding table in the relational database. Accordingly, subclasses are connected to the tables of its

In this work, we adapt the Tree Automata Completion algorithm to approximate accurately the set of terms reachable by rewriting under the innermost strategy.. We formally prove that

We implemented the presented techniques in a tool which is able to capture execution traces of a given program, to build its trace automaton, to abstract it with respect to a set

In its original version [2], and consistently with the definition of structural balance given earlier in Section 1, it consists in finding a partition of the set of vertices V

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of

Unit´e de recherche INRIA Rennes, Irisa, Campus universitaire de Beaulieu, 35042 RENNES Cedex Unit´e de recherche INRIA Rhˆone-Alpes, 655, avenue de l’Europe, 38330 MONTBONNOT ST