Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Teaching Formal Methods in Application Domains: A Case Study in Computer and Network Security
AbstractIn this paper, we report on our experience of teaching formal methods as part of an introductory computer and network security module. This module is part of an applied undergraduate computer science degree. As a consequence, we neither can rely ...
- research-articleOctober 2023
Verifying Indistinguishability of Privacy-Preserving Protocols
Proceedings of the ACM on Programming Languages (PACMPL), Volume 7, Issue OOPSLA2Article No.: 273, Pages 1442–1469https://doi.org/10.1145/3622849Internet users rely on the protocols they use to protect their private information including their identity and the websites they visit. Formal verification of these protocols can detect subtle bugs that compromise these protections at design time, ...
- ArticleAugust 2015
Network-Aware Virtual Platform for the Verification of Embedded Software for Communications
- Calypso Barnes,
- Jean-Marie Cottin,
- Davide Quaglia,
- Enrico Fraccaroli,
- Alain Pegatoquet,
- François Verdier,
- Stefano Angeleri
DSD '15: Proceedings of the 2015 Euromicro Conference on Digital System DesignPages 518–525https://doi.org/10.1109/DSD.2015.110The paper focuses on techniques for the verification of software implementing communication functionality in networked embedded systems. We discuss the merits and limitations of tools for the simulation of a networked embedded system executing the ...
- ArticleApril 2015
The Foundational Cryptography Framework
Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036Pages 53–72https://doi.org/10.1007/978-3-662-46666-7_4We present the Foundational Cryptography Framework FCF for developing and checking complete proofs of security for cryptographic schemes within a proof assistant. This is a general-purpose framework that is capable of modeling and reasoning about a wide ...
- ArticleNovember 2013
Construction and Verification of Mobile Ad Hoc Network Protocols
AbstractIn recent years, Mobile Ad hoc Networks (MANETs) have been focused with the development and the spread of mobile devices. However, MANETs have a security problem. MANETs do not have choke points like Firewalls. It is difficult for MANETs to have ...
- ArticleNovember 2009
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
SEUS '09: Proceedings of the 7th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous SystemsPages 240–251https://doi.org/10.1007/978-3-642-10265-3_22Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network interconnects have particular characteristics and thus have different ...
- ArticleJune 2009
Recursive Parametric Automata and ε-Removal
FMOODS '09/FORTE '09: Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed SystemsPages 90–105https://doi.org/10.1007/978-3-642-02138-1_6This work is motivated by and arose from the parametric verification of communication protocols over unbounded channels, where the channel capacity is the parameter. Verification required the use of finite state automata (FSA) reduction, including <em>ε<...