Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal verification
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
Symbolic-Model
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
policy-based governance
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
Cryptography
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Analytical models
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence
biblio
Deductive Verification of Distributed Protocols in First-Order Logic
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
infinite-state systems
verification problem
validity checking
Tutorials
tools
Theorem Proving
SMT solvers
Safety
pubcrawl
Protocols
protocol verification
program verification
privacy
policy-based governance
long standing research goal
logical verification conditions
automated provers
formal verification
Formal Specification
formal logic
first-order logic
distributed systems
distributed protocols
design automation
deductive verification approach
Computer languages
Compositionality
composability
complex systems
collaboration
cognition
automated theorem provers
biblio
Architecture Analysis and Verification of I3C Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SoC
MIPI
Monitoring
Pins
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
IP networks
system Verilog
test environments
Universal Verification Methodology
UVM
verification components
verification environment
VLSI
formal verification
back end design
base class library
Clocks
collaboration
composability
Compositionality
Conferences
digital integrated circuits
Aerospace electronics
front end design
hardware description languages
I3C
I3C bus protocol
improved inter integrated circuit
integrated circuit design
integrated circuit testing
biblio
Realization of System Verification Platform of IoT Smart Node Chip
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
IoT smart node chip
Wireless fidelity
transmission protocol
Systems Simulation
system verification platform
system verification
simulation verification
pubcrawl
Prototypes
Protocols
protocol verification
privacy
policy-based governance
large scale integrated circuits
automobiles
IoT node
Internet of Things
FPGA-based prototype verification
FPGA
formal verification
field programmable gate arrays
efficient verification platform
design cost reduction
Compositionality
composability
collaboration
chip design cycle
biblio
Formal Verification Technology for Asynchronous Communication Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
policy-based governance
verification work efficiency
UART communication
traditional simulation method
Software
pubcrawl
PSL
Protocols
protocol verification
property
product design quality
Product design
process control
privacy
aerospace FPGA software products
formal verification technology
formal verification
field programmable gate arrays
Compositionality
composability
complete verification process
collaboration
Clocks
blind spots
asynchronous communication protocol
asynchronous communication
assert
biblio
Formal Modeling and Verification of Blockchain System
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
Blockchain protocols
collaboration
composability
Compositionality
formal methods
formal verification
model-checking
policy-based governance
privacy
protocol verification
pubcrawl
biblio
Protecting Privacy with a Declarative Policy Framework
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
privacy policy framework
formal verification
Human behavior
Ontologies
policy decision point
privacy
privacy enhancing technologies
Privacy Policies
privacy policy creation
privacy policy decision engine
privacy policy engine decisions
Formal Specification
privacy policy management
privacy policy validation
privacy protection
pubcrawl
Scalability
security of data
Semantics
technical details
user interfaces
Common Data Model
Resiliency
-Automated-reasoning
-Data-sharing
-Ontology
-Policy
-Policy-Decision-Engine
-Privacy-Framework
-Reasoning
-Rule
-Semantic-Technology
Computing Theory and Privacy
Cryptography
Data models
data privacy
Databases
declarative policy framework
Engines
enterprise privacy prototype system
expressive policy specification
formal shareability theory
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 12:35pm
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »