Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
protocol verification
biblio
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
collaboration
composability
Compositionality
computer architecture
computer network security
Control Automation Technology devices
Data models
Decoding
deep learning
deep learning model
deep learning perspective
EtherCAT
Fuzz Testing
fuzzing
fuzzing framework
industrial communication processes
industrial communication protocols
industrial network
industrial protocol fuzzing framework
Industrial Safety
learning (artificial intelligence)
Local area networks
modern industrial control systems
Policy Based Governance
policy-based governance
privacy
protocol frame structures
protocol frames
protocol verification
Protocols
pubcrawl
security
security checks
security vulnerabilities
self learning
SeqFuzzer
stateful protocols
target protocol
vulnerability mining
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
authorisation
collaboration
composability
Compositionality
computational model
computer network security
cryptographic proof
cryptographic protocol
Cryptographic Protocols
CryptoVerif proof assistant
Elliptic curve cryptography
IP networks
Noise Protocol Framework
open source Virtual Private Network
Policy Based Governance
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
security protocols
standards
transport data messages
verification
Virtual private networks
vpn
WireGuard virtual private network protocol
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
amplification DoS attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
Denial of Service attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
policy-based governance
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
refined intruder model
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
biblio
Security in Wireless Sensor Networks: A formal verification of protocols
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
analyzed protocols
collaboration
complex networked control systems
composability
Compositionality
concerns improved guarantees
concerns security aspects
Cryptographic Protocols
formal verification
industrial domains
Policy Based Governance
policy-based governance
privacy
protocol verification
pubcrawl
real-time communications
safe transmissions
secure transmissions
security
Security analysis
security breaches
Security Properties
telecommunication security
wireless sensor networks
WSN technology
biblio
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
collaboration
composability
Compositionality
Cryptographic Protocols
encryption
formal verification
Needham-Schroeder symmetric-key protocol
Policy Based Governance
policy-based governance
privacy
protocol verification
pubcrawl
Reliability
security
security of data
security vulnerability
telecommunication security
Waste materials
witness functions
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
accountability
accountability automated verification
accountable algorithms protocol
Calculus
certificate transparency
cognition
collaboration
composability
Compositionality
computer security
Cryptographic Protocols
Cryptography
formal methods and verification
formal verification
mechanized method
Policy Based Governance
policy-based governance
privacy
protocol verification
protocol-agnostic definition
Protocols
pubcrawl
security property
security protocol design
security protocols
security violation
tools
traditional trust assumptions
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 11:05am
CoCoME case study
collaboration
computer architecture
cyber-physical microservice architectures
cyber-physical systems
Formal Specification
individual microservices
Information Flow
information leaks
Information systems
information-flow security policies
macro-level policy
macro-level security policy
message passing
microservice architectural style
microservices
Perturbation methods
Policy Based Governance
policy-based governance
protocol verification
Protocols
pubcrawl
real-time behavior
resulting microlevel policies
security
security of data
security restrictions
Servers
service-oriented architecture
software architects
biblio
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 11:22am
protocol verification
complex protocols
Complexity theory
composability
computer aided cryptography
Cryptographic Protocols
Cryptography
Decisional Diffie-Hellman problem
desired ideal functionality
Diffie-Hellman key-exchange
Diffie-Hellman protocol UC
EasyCrypt
EASYCRYPT proof assistant
formal verification
game-based security
Games
hard computational problems
ideal key-exchange functionality
ideal secure-communication functionality
ideally authenticated communication
Mechanization
mechanized UC security analyses
one-time-pad encryption
proving simulation-based security
pubcrawl
secure message communication
Task Analysis
universal composability
universal composition operation
universally composable security framework
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 3:30pm
Analytical models
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Cryptography
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
Symbolic-Model
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
biblio
Deductive Verification of Distributed Protocols in First-Order Logic
Submitted by grigby1 on Tue, 11/12/2019 - 3:30pm
automated provers
automated theorem provers
cognition
collaboration
complex systems
composability
Compositionality
Computer languages
deductive verification approach
design automation
distributed protocols
distributed systems
first-order logic
formal logic
Formal Specification
formal verification
infinite-state systems
logical verification conditions
long standing research goal
policy-based governance
privacy
program verification
protocol verification
Protocols
pubcrawl
Safety
SMT solvers
Theorem Proving
tools
Tutorials
validity checking
verification problem
1
2
3
4
5
next ›
last »