Empirical evidence suggests that algorithmic decisions driven by Machine...
Be it for a malicious or legitimate purpose, packing, a transformation t...
A specification theory combines notions of specifications and implementa...
Over past years, the manually methods to create detection rules were no
...
Malware analysis techniques are divided into static and dynamic analysis...
Their highly adaptive nature and the combinatorial explosion of possible...
Packing is an obfuscation technique widely used by malware to hide the
c...
Domain-specific quantitative modeling and analysis approaches are fundam...
Lifted (family-based) static analysis by abstract interpretation is capa...
We develop a taxonomy of different behavioral specification theories and...
In this work we present our work in developing a software verification t...
Feature-based SPL analysis and family-based model checking have seen rap...
We lay out a general method for computing branching distances between la...
Distributed learning across a coalition of organizations allows the memb...
The concept of decomposition in computer science and engineering is
cons...
Variability models allow effective building of many custom model variant...
Analysis of a probabilistic system often requires to learn the joint
pro...
Transaction-level modeling with SystemC has been very successful in
desc...
This paper presents our approach to the quantitative modeling and analys...