Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal verification
biblio
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
LAOCOON
verification rules
Trojan horses
trojan horse detection
temporal properties
supply chain security
sensitive information
security
Safety
run-time verification
run-time monitoring
Resiliency
resilience
pubcrawl
Monitoring
malicious inclusions
active fault attacks
invasive software
Integrated circuit modeling
hardware Trojan horses
hardware Trojan detection
Hardware Security
Hardware
generic attackers
formal verification techniques
formal verification
Fault Attacks
electronic systems
dedicated monitoring circuits
cyber physical systems
Circuit faults
automata
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Security Analysis of Cloud-Connected Industrial Control Systems Using Combinatorial Testing
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Industrial Control Systems Anomaly Detection
combinatorial testing
formal verification
Industrial Control Systems
model checking
pubcrawl
resilience
Resiliency
Scalability
VDM-SL
file
Verified Control of Cooperative Autonomous Vehicles
Submitted by Christoffer Heckman on Fri, 01/10/2020 - 4:38pm. Contributors:
Christoffer Heckman
Lijun Chen
Dirk Grunwald
John Hauser
Sriram Sankaranarayanan
formal verification
autonomous vehicles
Posters
1646556
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+
Submitted by grigby1 on Mon, 12/30/2019 - 2:19pm
Mathematical model
TLA+
TLA
Silicon
Scalability
Resiliency
pubcrawl
ProVerif
protocol correctness
pre-meditated correctness
passive attacker
mutual key
communicating parties
liveness property
key agreement protocol verification
ING
GDH
formal verification
exponentiation
divide and conquer key distribution protocol
DC DHKE
Cryptography
Cryptographic Protocols
contributory group key agreement
biblio
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Games
universally composable security framework
universal composition operation
universal composability
Task Analysis
secure message communication
pubcrawl
proving simulation-based security
one-time-pad encryption
mechanized UC security analyses
Mechanization
ideally authenticated communication
ideal secure-communication functionality
ideal key-exchange functionality
hard computational problems
protocol verification
game-based security
formal verification
EASYCRYPT proof assistant
EasyCrypt
Diffie-Hellman protocol UC
Diffie-Hellman key-exchange
desired ideal functionality
Decisional Diffie-Hellman problem
Cryptography
Cryptographic Protocols
computer aided cryptography
composability
Complexity theory
complex protocols
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »