Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal methods
biblio
NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained Approximation
Submitted by aekwall on Mon, 05/03/2021 - 12:14pm
verification
MIMICs
formal methods
Differential Verification
differential analysis
scalable verification
Compositionality
Predictive Metrics
deep learning
Scalability
Task Analysis
Biological neural networks
software engineering
Neural networks
tools
Neurons
machine learning
pubcrawl
Resiliency
biblio
Exploiting Dual-Rail Register Invariants for Equivalence Verification of NCL Circuits
Submitted by aekwall on Mon, 05/03/2021 - 12:13pm
Wires
NULL Convention Logic
equivalence checking
asynchronous circuits
scalable verification
formal methods
Rails
formal verification
Registers
Resiliency
Compositionality
Predictive Metrics
Scalability
Logic gates
Industries
Synchronization
pubcrawl
biblio
Formalizing Constructive Cryptography using CryptHOL
Submitted by aekwall on Mon, 09/14/2020 - 11:27am
Theorem Proving
composability
random systems
proof rules
information-theoretically secure channel
game-based proofs
CryptHOL
constructive cryptography
computer-aided cryptography
composable cryptographic security statements
computer aided cryptography
universal composability
complex system
Cryptography
cryptographic proofs
formal methods
verification
formal verification
computer science
Complexity theory
Probabilistic logic
tools
pubcrawl
game theory
encryption
file
Distributed and Trustworthy Automated Reasoning
Submitted by Anonymous on Fri, 08/14/2020 - 1:26pm. Contributor:
Marijn Huele
Presented as part of the
2020 HCSS conference
.
automated reasoning
distributed and trustworthy
formal methods
HCSS Conference 2020
Presentation
HCSS 2020
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 12:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Real-Time SCADA Attack Detection by Means of Formal Methods
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
critical machines
Chemicals
programmable controllers
programmable logic controller
Clocks
formal methods
chemical manufacturing plants
chemical substances
control smart grid
Compositionality
real-time SCADA attack detection
SCADA control systems
SCADA water distribution system
timed automata
timed automaton
timed temporal logic
water supply
security
Semantics
SCADA Systems Security
automata theory
automata
Safety
Temporal Logic
model checking
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
critical infrastructures
critical infrastructure
security of data
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 11:11am
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
file
Counterexample-Guided Synthesis of Perception Models and Control
Submitted by saseshia on Thu, 01/16/2020 - 4:02pm. Contributors:
Sanjit Seshia
Shromona Ghosh
Hadi Ravanbakhsh
control synthesis
Perception Modeling
Perception Error
formal methods
Posters
1545126
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »