Synthesizing near-optimal malware specifications from suspicious behaviorsMatt FredriksonSomesh Jhaet al.2010S&P 2010
Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure sizeJason FranklinSagar Chakiet al.2010S&P 2010