-
1Conference
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Sara Foresti and MotiYung and Fabio Martinelli
Πηγή: ESORICS - 17th European Symposium on Research in Computer Security - 2012 ; https://inria.hal.science/hal-00762252 ; ESORICS - 17th European Symposium on Research in Computer Security - 2012, Sep 2012, Pisa, Italy. pp.806-823, ⟨10.1007/978-3-642-33167-1⟩
Θεματικοί όροι: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
2Conference
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Sara Foresti and MotiYung and Fabio Martinelli
Πηγή: ESORICS - 17th European Symposium on Research in Computer Security - 2012 ; https://inria.hal.science/hal-00762252 ; ESORICS - 17th European Symposium on Research in Computer Security - 2012, Sep 2012, Pisa, Italy. pp.806-823, ⟨10.1007/978-3-642-33167-1⟩
Θεματικοί όροι: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
3Conference
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), Sara Foresti and MotiYung and Fabio Martinelli
Πηγή: ESORICS - 17th European Symposium on Research in Computer Security - 2012 ; https://hal.inria.fr/hal-00762252 ; ESORICS - 17th European Symposium on Research in Computer Security - 2012, Sep 2012, Pisa, Italy. pp.806-823, ⟨10.1007/978-3-642-33167-1⟩
Θεματικοί όροι: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Relation: hal-00762252; https://hal.inria.fr/hal-00762252; https://hal.inria.fr/hal-00762252/document; https://hal.inria.fr/hal-00762252/file/esorics-definitif.pdf
-
4Conference
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Howard Barringer, Klaus Havelund, Insup Lee, Grigore Rosu, Oleg Sokolsky
Πηγή: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Θεματικοί όροι: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Θέμα γεωγραφικό: St. Julians, Malta
-
5Conference
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Howard Barringer, Klaus Havelund, Insup Lee, Grigore Rosu, Oleg Sokolsky
Πηγή: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Θεματικοί όροι: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Θέμα γεωγραφικό: St. Julians, Malta
-
6Conference
Συγγραφείς: Gnaedig, Isabelle, Kaczmarek, Matthieu, Reynaud, Daniel, Wloka, Stéphane
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Fernando C. Colón Osorio
Πηγή: 5th International Conference on Malicious and Unwanted Software
https://inria.hal.science/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceΘεματικοί όροι: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
7Conference
Συγγραφείς: Gnaedig, Isabelle, Kaczmarek, Matthieu, Reynaud, Daniel, Wloka, Stéphane
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), Fernando C. Colón Osorio
Πηγή: 5th International Conference on Malicious and Unwanted Software
https://hal.inria.fr/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceΘεματικοί όροι: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Relation: inria-00538376; https://hal.inria.fr/inria-00538376; https://hal.inria.fr/inria-00538376/document; https://hal.inria.fr/inria-00538376/file/packer.pdf
-
8Conference
Συγγραφείς: Le Guernic, Gurvan, Jensen, Thomas
Συνεισφορές: Logiciel : ANalyse et DEveloppement (Lande), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computing and Information Sciences Kansas (CIS@K-STATE), Kansas State University, Andrei Sabelfeld
Πηγή: Workshop on Foundations of Computer Security - FCS'05 ; https://inria.hal.science/inria-00001218 ; Workshop on Foundations of Computer Security - FCS'05, Jul 2005, Chicago/USA, pp.19--30
Θεματικοί όροι: security, non-interference, language-based security, information flow control, monitoring, dynamic analysis, semantics, ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.4: Sequential Programming, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.6: Monitors, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.1: Formal Definitions and Theory/D.3.1.0: Semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.2: Operational semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.5: Program analysis, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection/K.6.5.2: Invasive software (e.g., viruses, worms, Trojan horses), [INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
9Conference
Συγγραφείς: Le Guernic, Gurvan, Jensen, Thomas
Συνεισφορές: Logiciel : ANalyse et DEveloppement (Lande), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Centre Inria de l'Université de Rennes, Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computing and Information Sciences Kansas (CIS@K-STATE), Kansas State University, Andrei Sabelfeld
Πηγή: Workshop on Foundations of Computer Security - FCS'05 ; https://inria.hal.science/inria-00001218 ; Workshop on Foundations of Computer Security - FCS'05, Jul 2005, Chicago/USA, pp.19--30
Θεματικοί όροι: security, non-interference, language-based security, information flow control, monitoring, dynamic analysis, semantics, ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.4: Sequential Programming, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.6: Monitors, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.1: Formal Definitions and Theory/D.3.1.0: Semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.2: Operational semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.5: Program analysis, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection/K.6.5.2: Invasive software (e.g., viruses, worms, Trojan horses), [INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
10Conference
Συγγραφείς: Le Guernic, Gurvan, Jensen, Thomas
Συνεισφορές: Logiciel : ANalyse et DEveloppement (Lande), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computing and Information Sciences Kansas (CIS@K-STATE), Kansas State University, Andrei Sabelfeld
Πηγή: Workshop on Foundations of Computer Security - FCS'05 ; https://inria.hal.science/inria-00001218 ; Workshop on Foundations of Computer Security - FCS'05, Jul 2005, Chicago/USA, pp.19--30
Θεματικοί όροι: security, non-interference, language-based security, information flow control, monitoring, dynamic analysis, semantics, ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.4: Sequential Programming, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.6: Monitors, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.1: Formal Definitions and Theory/D.3.1.0: Semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.2: Operational semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.5: Program analysis, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection/K.6.5.2: Invasive software (e.g., viruses, worms, Trojan horses), [INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
11Conference
Συγγραφείς: Le Guernic, Gurvan, Jensen, Thomas
Συνεισφορές: Logiciel : ANalyse et DEveloppement (Lande), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computing and Information Sciences Kansas (CIS@K-STATE), Kansas State University, Andrei Sabelfeld
Πηγή: Workshop on Foundations of Computer Security - FCS'05 ; https://hal.inria.fr/inria-00001218 ; Workshop on Foundations of Computer Security - FCS'05, Jul 2005, Chicago/USA, pp.19--30
Θεματικοί όροι: security, non-interference, language-based security, information flow control, monitoring, dynamic analysis, semantics, ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.4: Sequential Programming, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.6: Monitors, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.1: Formal Definitions and Theory/D.3.1.0: Semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.2: Operational semantics, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.5: Program analysis, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection/K.6.5.2: Invasive software (e.g., viruses, worms, Trojan horses), [INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Relation: inria-00001218; https://hal.inria.fr/inria-00001218; https://hal.inria.fr/inria-00001218/document; https://hal.inria.fr/inria-00001218/file/le-guernic05monitoringInformationFlow.pdf
-
12Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/hal-00803412 ; [Research Report] 2013.
Θεματικοί όροι: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, probability, weight, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
13Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)
Πηγή: https://hal.inria.fr/hal-00803412 ; [Research Report] 2013.
Θεματικοί όροι: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, probability, weight, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Relation: hal-00803412; https://hal.inria.fr/hal-00803412; https://hal.inria.fr/hal-00803412/document; https://hal.inria.fr/hal-00803412/file/pondere-hal.pdf
-
14Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/inria-00594396 ; [Research Report] 2011.
Θεματικοί όροι: behavioral analysis, malware detection, behavior abstraction, model checking, temporal logic, term rewriting, static analysis, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
15Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/inria-00594396 ; [Research Report] 2011.
Θεματικοί όροι: behavioral analysis, malware detection, behavior abstraction, model checking, temporal logic, term rewriting, static analysis, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
16Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)
Πηγή: https://hal.inria.fr/inria-00594396 ; [Research Report] 2011.
Θεματικοί όροι: behavioral analysis, malware detection, behavior abstraction, model checking, temporal logic, term rewriting, static analysis, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00594396; https://hal.inria.fr/inria-00594396; https://hal.inria.fr/inria-00594396/document; https://hal.inria.fr/inria-00594396/file/fmcad-extended.pdf
-
17Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/inria-00509486 ; 2010.
Θεματικοί όροι: malware, behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
18Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/inria-00547884 ; [Research Report] 2010.
Θεματικοί όροι: malware, behavioral detection, abstraction, trace, term rewriting, finite state automaton, formal language, dynamic binary instrumentation, temporal logic, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
19Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/inria-00509486 ; 2010.
Θεματικοί όροι: malware, behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
20Report
Συγγραφείς: Beaucamps, Philippe, Gnaedig, Isabelle, Marion, Jean-Yves
Συνεισφορές: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
Πηγή: https://inria.hal.science/inria-00547884 ; [Research Report] 2010.
Θεματικοί όροι: malware, behavioral detection, abstraction, trace, term rewriting, finite state automaton, formal language, dynamic binary instrumentation, temporal logic, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]