Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Formal-Verification
biblio
Formal Verification of Secure Forwarding Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 11:31am
Network-Security
Veins
Security-Protocols
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
parametrized-verification
network topology
authentication
Isabelle/HOL
Formal-Verification
data-plane
computer architecture
Compositionality
composability
collaboration
autonomous systems
authorization
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 11:55am
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 3:30pm
Symbolic-Model
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
policy-based governance
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
Cryptography
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Analytical models
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence